* arm-tdep.c (thumb_expand_immediate): New function.
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
415f38a6 4 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010
72a80a16 5 Free Software Foundation, Inc.
252b5132 6
5e8d7549 7 This file is part of BFD, the Binary File Descriptor library.
252b5132 8
5e8d7549
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
5e8d7549 12 (at your option) any later version.
252b5132 13
5e8d7549
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
5e8d7549 19 You should have received a copy of the GNU General Public License
b34976b6 20 along with this program; if not, write to the Free Software
cd123cb7
NC
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
23
252b5132 24
1b74d094
BW
25/*
26SECTION
252b5132
RH
27 ELF backends
28
29 BFD support for ELF formats is being worked on.
30 Currently, the best supported back ends are for sparc and i386
31 (running svr4 or Solaris 2).
32
33 Documentation of the internals of the support code still needs
34 to be written. The code is changing quickly enough that we
661a3fd4 35 haven't bothered yet. */
252b5132 36
7ee38065
MS
37/* For sparc64-cross-sparc32. */
38#define _SYSCALL32
252b5132 39#include "sysdep.h"
3db64b00 40#include "bfd.h"
252b5132
RH
41#include "bfdlink.h"
42#include "libbfd.h"
43#define ARCH_SIZE 0
44#include "elf-bfd.h"
e0e8c97f 45#include "libiberty.h"
ff59fc36 46#include "safe-ctype.h"
252b5132 47
8bc7f138
L
48#ifdef CORE_HEADER
49#include CORE_HEADER
50#endif
51
217aa764 52static int elf_sort_sections (const void *, const void *);
c84fca4d 53static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
54static bfd_boolean prep_headers (bfd *);
55static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
718175fa
JK
56static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
57static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
58 file_ptr offset);
50b2bdb7 59
252b5132
RH
60/* Swap version information in and out. The version information is
61 currently size independent. If that ever changes, this code will
62 need to move into elfcode.h. */
63
64/* Swap in a Verdef structure. */
65
66void
217aa764
AM
67_bfd_elf_swap_verdef_in (bfd *abfd,
68 const Elf_External_Verdef *src,
69 Elf_Internal_Verdef *dst)
252b5132 70{
dc810e39
AM
71 dst->vd_version = H_GET_16 (abfd, src->vd_version);
72 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
73 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
74 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
75 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
76 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
77 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
78}
79
80/* Swap out a Verdef structure. */
81
82void
217aa764
AM
83_bfd_elf_swap_verdef_out (bfd *abfd,
84 const Elf_Internal_Verdef *src,
85 Elf_External_Verdef *dst)
252b5132 86{
dc810e39
AM
87 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
88 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
89 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
90 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
91 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
92 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
93 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
94}
95
96/* Swap in a Verdaux structure. */
97
98void
217aa764
AM
99_bfd_elf_swap_verdaux_in (bfd *abfd,
100 const Elf_External_Verdaux *src,
101 Elf_Internal_Verdaux *dst)
252b5132 102{
dc810e39
AM
103 dst->vda_name = H_GET_32 (abfd, src->vda_name);
104 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
105}
106
107/* Swap out a Verdaux structure. */
108
109void
217aa764
AM
110_bfd_elf_swap_verdaux_out (bfd *abfd,
111 const Elf_Internal_Verdaux *src,
112 Elf_External_Verdaux *dst)
252b5132 113{
dc810e39
AM
114 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
115 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
116}
117
118/* Swap in a Verneed structure. */
119
120void
217aa764
AM
121_bfd_elf_swap_verneed_in (bfd *abfd,
122 const Elf_External_Verneed *src,
123 Elf_Internal_Verneed *dst)
252b5132 124{
dc810e39
AM
125 dst->vn_version = H_GET_16 (abfd, src->vn_version);
126 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
127 dst->vn_file = H_GET_32 (abfd, src->vn_file);
128 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
129 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
130}
131
132/* Swap out a Verneed structure. */
133
134void
217aa764
AM
135_bfd_elf_swap_verneed_out (bfd *abfd,
136 const Elf_Internal_Verneed *src,
137 Elf_External_Verneed *dst)
252b5132 138{
dc810e39
AM
139 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
140 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
141 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
142 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
143 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
144}
145
146/* Swap in a Vernaux structure. */
147
148void
217aa764
AM
149_bfd_elf_swap_vernaux_in (bfd *abfd,
150 const Elf_External_Vernaux *src,
151 Elf_Internal_Vernaux *dst)
252b5132 152{
dc810e39
AM
153 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
154 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
155 dst->vna_other = H_GET_16 (abfd, src->vna_other);
156 dst->vna_name = H_GET_32 (abfd, src->vna_name);
157 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
158}
159
160/* Swap out a Vernaux structure. */
161
162void
217aa764
AM
163_bfd_elf_swap_vernaux_out (bfd *abfd,
164 const Elf_Internal_Vernaux *src,
165 Elf_External_Vernaux *dst)
252b5132 166{
dc810e39
AM
167 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
168 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
169 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
170 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
171 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
172}
173
174/* Swap in a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_in (bfd *abfd,
178 const Elf_External_Versym *src,
179 Elf_Internal_Versym *dst)
252b5132 180{
dc810e39 181 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
182}
183
184/* Swap out a Versym structure. */
185
186void
217aa764
AM
187_bfd_elf_swap_versym_out (bfd *abfd,
188 const Elf_Internal_Versym *src,
189 Elf_External_Versym *dst)
252b5132 190{
dc810e39 191 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
192}
193
194/* Standard ELF hash function. Do not change this function; you will
195 cause invalid hash tables to be generated. */
3a99b017 196
252b5132 197unsigned long
217aa764 198bfd_elf_hash (const char *namearg)
252b5132 199{
3a99b017 200 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
201 unsigned long h = 0;
202 unsigned long g;
203 int ch;
204
205 while ((ch = *name++) != '\0')
206 {
207 h = (h << 4) + ch;
208 if ((g = (h & 0xf0000000)) != 0)
209 {
210 h ^= g >> 24;
211 /* The ELF ABI says `h &= ~g', but this is equivalent in
212 this case and on some machines one insn instead of two. */
213 h ^= g;
214 }
215 }
32dfa85d 216 return h & 0xffffffff;
252b5132
RH
217}
218
fdc90cb4
JJ
219/* DT_GNU_HASH hash function. Do not change this function; you will
220 cause invalid hash tables to be generated. */
221
222unsigned long
223bfd_elf_gnu_hash (const char *namearg)
224{
225 const unsigned char *name = (const unsigned char *) namearg;
226 unsigned long h = 5381;
227 unsigned char ch;
228
229 while ((ch = *name++) != '\0')
230 h = (h << 5) + h + ch;
231 return h & 0xffffffff;
232}
233
0c8d6e5c
AM
234/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
235 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 236bfd_boolean
0c8d6e5c 237bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 238 size_t object_size,
4dfe6ac6 239 enum elf_target_id object_id)
252b5132 240{
0ffa91dd
NC
241 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
242 abfd->tdata.any = bfd_zalloc (abfd, object_size);
243 if (abfd->tdata.any == NULL)
244 return FALSE;
252b5132 245
0ffa91dd
NC
246 elf_object_id (abfd) = object_id;
247 elf_program_header_size (abfd) = (bfd_size_type) -1;
b34976b6 248 return TRUE;
252b5132
RH
249}
250
0ffa91dd
NC
251
252bfd_boolean
ae95ffa6 253bfd_elf_make_object (bfd *abfd)
0ffa91dd 254{
ae95ffa6 255 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 256 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 257 bed->target_id);
0ffa91dd
NC
258}
259
b34976b6 260bfd_boolean
217aa764 261bfd_elf_mkcorefile (bfd *abfd)
252b5132 262{
c044fabd 263 /* I think this can be done just like an object file. */
ae95ffa6 264 return abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd);
252b5132
RH
265}
266
72a80a16 267static char *
217aa764 268bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
269{
270 Elf_Internal_Shdr **i_shdrp;
f075ee0c 271 bfd_byte *shstrtab = NULL;
dc810e39
AM
272 file_ptr offset;
273 bfd_size_type shstrtabsize;
252b5132
RH
274
275 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
276 if (i_shdrp == 0
277 || shindex >= elf_numsections (abfd)
278 || i_shdrp[shindex] == 0)
f075ee0c 279 return NULL;
252b5132 280
f075ee0c 281 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
282 if (shstrtab == NULL)
283 {
c044fabd 284 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
285 offset = i_shdrp[shindex]->sh_offset;
286 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
287
288 /* Allocate and clear an extra byte at the end, to prevent crashes
289 in case the string table is not terminated. */
3471d59d 290 if (shstrtabsize + 1 <= 1
a50b1753 291 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL
c6c60d09
JJ
292 || bfd_seek (abfd, offset, SEEK_SET) != 0)
293 shstrtab = NULL;
294 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
295 {
296 if (bfd_get_error () != bfd_error_system_call)
297 bfd_set_error (bfd_error_file_truncated);
298 shstrtab = NULL;
3471d59d
CC
299 /* Once we've failed to read it, make sure we don't keep
300 trying. Otherwise, we'll keep allocating space for
301 the string table over and over. */
302 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
303 }
304 else
305 shstrtab[shstrtabsize] = '\0';
217aa764 306 i_shdrp[shindex]->contents = shstrtab;
252b5132 307 }
f075ee0c 308 return (char *) shstrtab;
252b5132
RH
309}
310
311char *
217aa764
AM
312bfd_elf_string_from_elf_section (bfd *abfd,
313 unsigned int shindex,
314 unsigned int strindex)
252b5132
RH
315{
316 Elf_Internal_Shdr *hdr;
317
318 if (strindex == 0)
319 return "";
320
74f2e02b
AM
321 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
322 return NULL;
323
252b5132
RH
324 hdr = elf_elfsections (abfd)[shindex];
325
326 if (hdr->contents == NULL
327 && bfd_elf_get_str_section (abfd, shindex) == NULL)
328 return NULL;
329
330 if (strindex >= hdr->sh_size)
331 {
1b3a8575 332 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 333 (*_bfd_error_handler)
d003868e
AM
334 (_("%B: invalid string offset %u >= %lu for section `%s'"),
335 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 336 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 337 ? ".shstrtab"
1b3a8575 338 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 339 return NULL;
252b5132
RH
340 }
341
342 return ((char *) hdr->contents) + strindex;
343}
344
6cdc0ccc
AM
345/* Read and convert symbols to internal format.
346 SYMCOUNT specifies the number of symbols to read, starting from
347 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
348 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
349 symbols, and symbol section index extensions, respectively.
350 Returns a pointer to the internal symbol buffer (malloced if necessary)
351 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
352
353Elf_Internal_Sym *
217aa764
AM
354bfd_elf_get_elf_syms (bfd *ibfd,
355 Elf_Internal_Shdr *symtab_hdr,
356 size_t symcount,
357 size_t symoffset,
358 Elf_Internal_Sym *intsym_buf,
359 void *extsym_buf,
360 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
361{
362 Elf_Internal_Shdr *shndx_hdr;
217aa764 363 void *alloc_ext;
df622259 364 const bfd_byte *esym;
6cdc0ccc
AM
365 Elf_External_Sym_Shndx *alloc_extshndx;
366 Elf_External_Sym_Shndx *shndx;
4dd07732 367 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
368 Elf_Internal_Sym *isym;
369 Elf_Internal_Sym *isymend;
9c5bfbb7 370 const struct elf_backend_data *bed;
6cdc0ccc
AM
371 size_t extsym_size;
372 bfd_size_type amt;
373 file_ptr pos;
374
e44a2c9c
AM
375 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
376 abort ();
377
6cdc0ccc
AM
378 if (symcount == 0)
379 return intsym_buf;
380
381 /* Normal syms might have section extension entries. */
382 shndx_hdr = NULL;
383 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
384 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
385
386 /* Read the symbols. */
387 alloc_ext = NULL;
388 alloc_extshndx = NULL;
4dd07732 389 alloc_intsym = NULL;
6cdc0ccc
AM
390 bed = get_elf_backend_data (ibfd);
391 extsym_size = bed->s->sizeof_sym;
392 amt = symcount * extsym_size;
393 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
394 if (extsym_buf == NULL)
395 {
d0fb9a8d 396 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
397 extsym_buf = alloc_ext;
398 }
399 if (extsym_buf == NULL
400 || bfd_seek (ibfd, pos, SEEK_SET) != 0
401 || bfd_bread (extsym_buf, amt, ibfd) != amt)
402 {
403 intsym_buf = NULL;
404 goto out;
405 }
406
407 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
408 extshndx_buf = NULL;
409 else
410 {
411 amt = symcount * sizeof (Elf_External_Sym_Shndx);
412 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
413 if (extshndx_buf == NULL)
414 {
a50b1753
NC
415 alloc_extshndx = (Elf_External_Sym_Shndx *)
416 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
417 extshndx_buf = alloc_extshndx;
418 }
419 if (extshndx_buf == NULL
420 || bfd_seek (ibfd, pos, SEEK_SET) != 0
421 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
422 {
423 intsym_buf = NULL;
424 goto out;
425 }
426 }
427
428 if (intsym_buf == NULL)
429 {
a50b1753
NC
430 alloc_intsym = (Elf_Internal_Sym *)
431 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 432 intsym_buf = alloc_intsym;
6cdc0ccc
AM
433 if (intsym_buf == NULL)
434 goto out;
435 }
436
437 /* Convert the symbols to internal form. */
438 isymend = intsym_buf + symcount;
a50b1753
NC
439 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
440 shndx = extshndx_buf;
6cdc0ccc
AM
441 isym < isymend;
442 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
443 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
444 {
445 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
446 (*_bfd_error_handler) (_("%B symbol number %lu references "
447 "nonexistent SHT_SYMTAB_SHNDX section"),
448 ibfd, (unsigned long) symoffset);
4dd07732
AM
449 if (alloc_intsym != NULL)
450 free (alloc_intsym);
8384fb8f
AM
451 intsym_buf = NULL;
452 goto out;
453 }
6cdc0ccc
AM
454
455 out:
456 if (alloc_ext != NULL)
457 free (alloc_ext);
458 if (alloc_extshndx != NULL)
459 free (alloc_extshndx);
460
461 return intsym_buf;
462}
463
5cab59f6
AM
464/* Look up a symbol name. */
465const char *
be8dd2ca
AM
466bfd_elf_sym_name (bfd *abfd,
467 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
468 Elf_Internal_Sym *isym,
469 asection *sym_sec)
5cab59f6 470{
26c61ae5 471 const char *name;
5cab59f6 472 unsigned int iname = isym->st_name;
be8dd2ca 473 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 474
138f35cc
JJ
475 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
476 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 477 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
478 {
479 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
480 shindex = elf_elfheader (abfd)->e_shstrndx;
481 }
482
26c61ae5
L
483 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
484 if (name == NULL)
485 name = "(null)";
486 else if (sym_sec && *name == '\0')
487 name = bfd_section_name (abfd, sym_sec);
488
489 return name;
5cab59f6
AM
490}
491
dbb410c3
AM
492/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
493 sections. The first element is the flags, the rest are section
494 pointers. */
495
496typedef union elf_internal_group {
497 Elf_Internal_Shdr *shdr;
498 unsigned int flags;
499} Elf_Internal_Group;
500
b885599b
AM
501/* Return the name of the group signature symbol. Why isn't the
502 signature just a string? */
503
504static const char *
217aa764 505group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 506{
9dce4196 507 Elf_Internal_Shdr *hdr;
9dce4196
AM
508 unsigned char esym[sizeof (Elf64_External_Sym)];
509 Elf_External_Sym_Shndx eshndx;
510 Elf_Internal_Sym isym;
b885599b 511
13792e9d
L
512 /* First we need to ensure the symbol table is available. Make sure
513 that it is a symbol table section. */
4fbb74a6
AM
514 if (ghdr->sh_link >= elf_numsections (abfd))
515 return NULL;
13792e9d
L
516 hdr = elf_elfsections (abfd) [ghdr->sh_link];
517 if (hdr->sh_type != SHT_SYMTAB
518 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
519 return NULL;
520
9dce4196
AM
521 /* Go read the symbol. */
522 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
523 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
524 &isym, esym, &eshndx) == NULL)
b885599b 525 return NULL;
9dce4196 526
26c61ae5 527 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
528}
529
dbb410c3
AM
530/* Set next_in_group list pointer, and group name for NEWSECT. */
531
b34976b6 532static bfd_boolean
217aa764 533setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
534{
535 unsigned int num_group = elf_tdata (abfd)->num_group;
536
537 /* If num_group is zero, read in all SHT_GROUP sections. The count
538 is set to -1 if there are no SHT_GROUP sections. */
539 if (num_group == 0)
540 {
541 unsigned int i, shnum;
542
543 /* First count the number of groups. If we have a SHT_GROUP
544 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 545 shnum = elf_numsections (abfd);
dbb410c3 546 num_group = 0;
08a40648 547
1783205a
NC
548#define IS_VALID_GROUP_SECTION_HEADER(shdr) \
549 ( (shdr)->sh_type == SHT_GROUP \
550 && (shdr)->sh_size >= (2 * GRP_ENTRY_SIZE) \
551 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
552 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 553
dbb410c3
AM
554 for (i = 0; i < shnum; i++)
555 {
556 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
557
558 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3
AM
559 num_group += 1;
560 }
561
562 if (num_group == 0)
20dbb49d
L
563 {
564 num_group = (unsigned) -1;
565 elf_tdata (abfd)->num_group = num_group;
566 }
567 else
dbb410c3
AM
568 {
569 /* We keep a list of elf section headers for group sections,
570 so we can find them quickly. */
20dbb49d 571 bfd_size_type amt;
d0fb9a8d 572
20dbb49d 573 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
574 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
575 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 576 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 577 return FALSE;
dbb410c3
AM
578
579 num_group = 0;
580 for (i = 0; i < shnum; i++)
581 {
582 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
583
584 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3 585 {
973ffd63 586 unsigned char *src;
dbb410c3
AM
587 Elf_Internal_Group *dest;
588
589 /* Add to list of sections. */
590 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
591 num_group += 1;
592
593 /* Read the raw contents. */
594 BFD_ASSERT (sizeof (*dest) >= 4);
595 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
596 shdr->contents = (unsigned char *)
597 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
598 /* PR binutils/4110: Handle corrupt group headers. */
599 if (shdr->contents == NULL)
600 {
601 _bfd_error_handler
602 (_("%B: Corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
603 bfd_set_error (bfd_error_bad_value);
604 return FALSE;
605 }
606
607 memset (shdr->contents, 0, amt);
608
609 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
610 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
611 != shdr->sh_size))
b34976b6 612 return FALSE;
dbb410c3
AM
613
614 /* Translate raw contents, a flag word followed by an
615 array of elf section indices all in target byte order,
616 to the flag word followed by an array of elf section
617 pointers. */
618 src = shdr->contents + shdr->sh_size;
619 dest = (Elf_Internal_Group *) (shdr->contents + amt);
620 while (1)
621 {
622 unsigned int idx;
623
624 src -= 4;
625 --dest;
626 idx = H_GET_32 (abfd, src);
627 if (src == shdr->contents)
628 {
629 dest->flags = idx;
b885599b
AM
630 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
631 shdr->bfd_section->flags
632 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
633 break;
634 }
635 if (idx >= shnum)
636 {
637 ((*_bfd_error_handler)
d003868e 638 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
639 idx = 0;
640 }
641 dest->shdr = elf_elfsections (abfd)[idx];
642 }
643 }
644 }
645 }
646 }
647
648 if (num_group != (unsigned) -1)
649 {
650 unsigned int i;
651
652 for (i = 0; i < num_group; i++)
653 {
654 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
655 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
656 unsigned int n_elt = shdr->sh_size / 4;
657
658 /* Look through this group's sections to see if current
659 section is a member. */
660 while (--n_elt != 0)
661 if ((++idx)->shdr == hdr)
662 {
e0e8c97f 663 asection *s = NULL;
dbb410c3
AM
664
665 /* We are a member of this group. Go looking through
666 other members to see if any others are linked via
667 next_in_group. */
668 idx = (Elf_Internal_Group *) shdr->contents;
669 n_elt = shdr->sh_size / 4;
670 while (--n_elt != 0)
671 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 672 && elf_next_in_group (s) != NULL)
dbb410c3
AM
673 break;
674 if (n_elt != 0)
675 {
dbb410c3
AM
676 /* Snarf the group name from other member, and
677 insert current section in circular list. */
945906ff
AM
678 elf_group_name (newsect) = elf_group_name (s);
679 elf_next_in_group (newsect) = elf_next_in_group (s);
680 elf_next_in_group (s) = newsect;
dbb410c3
AM
681 }
682 else
683 {
dbb410c3
AM
684 const char *gname;
685
b885599b
AM
686 gname = group_signature (abfd, shdr);
687 if (gname == NULL)
b34976b6 688 return FALSE;
945906ff 689 elf_group_name (newsect) = gname;
dbb410c3
AM
690
691 /* Start a circular list with one element. */
945906ff 692 elf_next_in_group (newsect) = newsect;
dbb410c3 693 }
b885599b 694
9dce4196
AM
695 /* If the group section has been created, point to the
696 new member. */
dbb410c3 697 if (shdr->bfd_section != NULL)
945906ff 698 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 699
dbb410c3
AM
700 i = num_group - 1;
701 break;
702 }
703 }
704 }
705
945906ff 706 if (elf_group_name (newsect) == NULL)
dbb410c3 707 {
d003868e
AM
708 (*_bfd_error_handler) (_("%B: no group info for section %A"),
709 abfd, newsect);
dbb410c3 710 }
b34976b6 711 return TRUE;
dbb410c3
AM
712}
713
3d7f7666 714bfd_boolean
dd863624 715_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
716{
717 unsigned int i;
718 unsigned int num_group = elf_tdata (abfd)->num_group;
719 bfd_boolean result = TRUE;
dd863624
L
720 asection *s;
721
722 /* Process SHF_LINK_ORDER. */
723 for (s = abfd->sections; s != NULL; s = s->next)
724 {
725 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
726 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
727 {
728 unsigned int elfsec = this_hdr->sh_link;
729 /* FIXME: The old Intel compiler and old strip/objcopy may
730 not set the sh_link or sh_info fields. Hence we could
731 get the situation where elfsec is 0. */
732 if (elfsec == 0)
733 {
4fbb74a6 734 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
735 if (bed->link_order_error_handler)
736 bed->link_order_error_handler
737 (_("%B: warning: sh_link not set for section `%A'"),
738 abfd, s);
739 }
740 else
741 {
91d6fa6a 742 asection *linksec = NULL;
25bbc984 743
4fbb74a6
AM
744 if (elfsec < elf_numsections (abfd))
745 {
746 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 747 linksec = this_hdr->bfd_section;
4fbb74a6 748 }
25bbc984
L
749
750 /* PR 1991, 2008:
751 Some strip/objcopy may leave an incorrect value in
752 sh_link. We don't want to proceed. */
91d6fa6a 753 if (linksec == NULL)
25bbc984
L
754 {
755 (*_bfd_error_handler)
756 (_("%B: sh_link [%d] in section `%A' is incorrect"),
757 s->owner, s, elfsec);
758 result = FALSE;
759 }
760
91d6fa6a 761 elf_linked_to_section (s) = linksec;
dd863624
L
762 }
763 }
764 }
3d7f7666 765
dd863624 766 /* Process section groups. */
3d7f7666
L
767 if (num_group == (unsigned) -1)
768 return result;
769
770 for (i = 0; i < num_group; i++)
771 {
772 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
773 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
774 unsigned int n_elt = shdr->sh_size / 4;
775
776 while (--n_elt != 0)
777 if ((++idx)->shdr->bfd_section)
778 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
779 else if (idx->shdr->sh_type == SHT_RELA
780 || idx->shdr->sh_type == SHT_REL)
781 /* We won't include relocation sections in section groups in
782 output object files. We adjust the group section size here
783 so that relocatable link will work correctly when
784 relocation sections are in section group in input object
785 files. */
786 shdr->bfd_section->size -= 4;
787 else
788 {
789 /* There are some unknown sections in the group. */
790 (*_bfd_error_handler)
d003868e
AM
791 (_("%B: unknown [%d] section `%s' in group [%s]"),
792 abfd,
3d7f7666 793 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
794 bfd_elf_string_from_elf_section (abfd,
795 (elf_elfheader (abfd)
796 ->e_shstrndx),
797 idx->shdr->sh_name),
3d7f7666
L
798 shdr->bfd_section->name);
799 result = FALSE;
800 }
801 }
802 return result;
803}
804
72adc230
AM
805bfd_boolean
806bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
807{
808 return elf_next_in_group (sec) != NULL;
809}
810
252b5132
RH
811/* Make a BFD section from an ELF section. We store a pointer to the
812 BFD section in the bfd_section field of the header. */
813
b34976b6 814bfd_boolean
217aa764
AM
815_bfd_elf_make_section_from_shdr (bfd *abfd,
816 Elf_Internal_Shdr *hdr,
6dc132d9
L
817 const char *name,
818 int shindex)
252b5132
RH
819{
820 asection *newsect;
821 flagword flags;
9c5bfbb7 822 const struct elf_backend_data *bed;
252b5132
RH
823
824 if (hdr->bfd_section != NULL)
825 {
826 BFD_ASSERT (strcmp (name,
827 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 828 return TRUE;
252b5132
RH
829 }
830
831 newsect = bfd_make_section_anyway (abfd, name);
832 if (newsect == NULL)
b34976b6 833 return FALSE;
252b5132 834
1829f4b2
AM
835 hdr->bfd_section = newsect;
836 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 837 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 838
2f89ff8d
L
839 /* Always use the real type/flags. */
840 elf_section_type (newsect) = hdr->sh_type;
841 elf_section_flags (newsect) = hdr->sh_flags;
842
252b5132
RH
843 newsect->filepos = hdr->sh_offset;
844
845 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
846 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
847 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 848 bfd_log2 (hdr->sh_addralign)))
b34976b6 849 return FALSE;
252b5132
RH
850
851 flags = SEC_NO_FLAGS;
852 if (hdr->sh_type != SHT_NOBITS)
853 flags |= SEC_HAS_CONTENTS;
dbb410c3 854 if (hdr->sh_type == SHT_GROUP)
b3096250 855 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
856 if ((hdr->sh_flags & SHF_ALLOC) != 0)
857 {
858 flags |= SEC_ALLOC;
859 if (hdr->sh_type != SHT_NOBITS)
860 flags |= SEC_LOAD;
861 }
862 if ((hdr->sh_flags & SHF_WRITE) == 0)
863 flags |= SEC_READONLY;
864 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
865 flags |= SEC_CODE;
866 else if ((flags & SEC_LOAD) != 0)
867 flags |= SEC_DATA;
f5fa8ca2
JJ
868 if ((hdr->sh_flags & SHF_MERGE) != 0)
869 {
870 flags |= SEC_MERGE;
871 newsect->entsize = hdr->sh_entsize;
872 if ((hdr->sh_flags & SHF_STRINGS) != 0)
873 flags |= SEC_STRINGS;
874 }
dbb410c3
AM
875 if (hdr->sh_flags & SHF_GROUP)
876 if (!setup_group (abfd, hdr, newsect))
b34976b6 877 return FALSE;
13ae64f3
JJ
878 if ((hdr->sh_flags & SHF_TLS) != 0)
879 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
880 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
881 flags |= SEC_EXCLUDE;
252b5132 882
3d2b39cf 883 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 884 {
3d2b39cf
L
885 /* The debugging sections appear to be recognized only by name,
886 not any sort of flag. Their SEC_ALLOC bits are cleared. */
887 static const struct
888 {
889 const char *name;
890 int len;
891 } debug_sections [] =
892 {
0112cd26 893 { STRING_COMMA_LEN ("debug") }, /* 'd' */
3d2b39cf
L
894 { NULL, 0 }, /* 'e' */
895 { NULL, 0 }, /* 'f' */
0112cd26 896 { STRING_COMMA_LEN ("gnu.linkonce.wi.") }, /* 'g' */
3d2b39cf
L
897 { NULL, 0 }, /* 'h' */
898 { NULL, 0 }, /* 'i' */
899 { NULL, 0 }, /* 'j' */
900 { NULL, 0 }, /* 'k' */
0112cd26 901 { STRING_COMMA_LEN ("line") }, /* 'l' */
3d2b39cf
L
902 { NULL, 0 }, /* 'm' */
903 { NULL, 0 }, /* 'n' */
904 { NULL, 0 }, /* 'o' */
905 { NULL, 0 }, /* 'p' */
906 { NULL, 0 }, /* 'q' */
907 { NULL, 0 }, /* 'r' */
1b315056
CS
908 { STRING_COMMA_LEN ("stab") }, /* 's' */
909 { NULL, 0 }, /* 't' */
910 { NULL, 0 }, /* 'u' */
911 { NULL, 0 }, /* 'v' */
912 { NULL, 0 }, /* 'w' */
913 { NULL, 0 }, /* 'x' */
914 { NULL, 0 }, /* 'y' */
915 { STRING_COMMA_LEN ("zdebug") } /* 'z' */
3d2b39cf 916 };
08a40648 917
3d2b39cf
L
918 if (name [0] == '.')
919 {
920 int i = name [1] - 'd';
921 if (i >= 0
922 && i < (int) ARRAY_SIZE (debug_sections)
923 && debug_sections [i].name != NULL
924 && strncmp (&name [1], debug_sections [i].name,
925 debug_sections [i].len) == 0)
926 flags |= SEC_DEBUGGING;
927 }
928 }
252b5132
RH
929
930 /* As a GNU extension, if the name begins with .gnu.linkonce, we
931 only link a single copy of the section. This is used to support
932 g++. g++ will emit each template expansion in its own section.
933 The symbols will be defined as weak, so that multiple definitions
934 are permitted. The GNU linker extension is to actually discard
935 all but one of the sections. */
0112cd26 936 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 937 && elf_next_in_group (newsect) == NULL)
252b5132
RH
938 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
939
fa152c49
JW
940 bed = get_elf_backend_data (abfd);
941 if (bed->elf_backend_section_flags)
942 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 943 return FALSE;
fa152c49 944
252b5132 945 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 946 return FALSE;
252b5132 947
718175fa
JK
948 /* We do not parse the PT_NOTE segments as we are interested even in the
949 separate debug info files which may have the segments offsets corrupted.
950 PT_NOTEs from the core files are currently not parsed using BFD. */
951 if (hdr->sh_type == SHT_NOTE)
952 {
baea7ef1 953 bfd_byte *contents;
718175fa 954
baea7ef1 955 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
956 return FALSE;
957
baea7ef1 958 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
959 free (contents);
960 }
961
252b5132
RH
962 if ((flags & SEC_ALLOC) != 0)
963 {
964 Elf_Internal_Phdr *phdr;
6ffd7900
AM
965 unsigned int i, nload;
966
967 /* Some ELF linkers produce binaries with all the program header
968 p_paddr fields zero. If we have such a binary with more than
969 one PT_LOAD header, then leave the section lma equal to vma
970 so that we don't create sections with overlapping lma. */
971 phdr = elf_tdata (abfd)->phdr;
972 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
973 if (phdr->p_paddr != 0)
974 break;
975 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
976 ++nload;
977 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
978 return TRUE;
252b5132 979
252b5132
RH
980 phdr = elf_tdata (abfd)->phdr;
981 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
982 {
88967714 983 if (phdr->p_type == PT_LOAD
9a83a553 984 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 985 {
88967714
AM
986 if ((flags & SEC_LOAD) == 0)
987 newsect->lma = (phdr->p_paddr
988 + hdr->sh_addr - phdr->p_vaddr);
989 else
990 /* We used to use the same adjustment for SEC_LOAD
991 sections, but that doesn't work if the segment
992 is packed with code from multiple VMAs.
993 Instead we calculate the section LMA based on
994 the segment LMA. It is assumed that the
995 segment will contain sections with contiguous
996 LMAs, even if the VMAs are not. */
997 newsect->lma = (phdr->p_paddr
998 + hdr->sh_offset - phdr->p_offset);
999
1000 /* With contiguous segments, we can't tell from file
1001 offsets whether a section with zero size should
1002 be placed at the end of one segment or the
1003 beginning of the next. Decide based on vaddr. */
1004 if (hdr->sh_addr >= phdr->p_vaddr
1005 && (hdr->sh_addr + hdr->sh_size
1006 <= phdr->p_vaddr + phdr->p_memsz))
1007 break;
252b5132
RH
1008 }
1009 }
1010 }
1011
b34976b6 1012 return TRUE;
252b5132
RH
1013}
1014
252b5132
RH
1015const char *const bfd_elf_section_type_names[] = {
1016 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1017 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1018 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1019};
1020
1049f94e 1021/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1022 output, and the reloc is against an external symbol, and nothing
1023 has given us any additional addend, the resulting reloc will also
1024 be against the same symbol. In such a case, we don't want to
1025 change anything about the way the reloc is handled, since it will
1026 all be done at final link time. Rather than put special case code
1027 into bfd_perform_relocation, all the reloc types use this howto
1028 function. It just short circuits the reloc if producing
1049f94e 1029 relocatable output against an external symbol. */
252b5132 1030
252b5132 1031bfd_reloc_status_type
217aa764
AM
1032bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1033 arelent *reloc_entry,
1034 asymbol *symbol,
1035 void *data ATTRIBUTE_UNUSED,
1036 asection *input_section,
1037 bfd *output_bfd,
1038 char **error_message ATTRIBUTE_UNUSED)
1039{
1040 if (output_bfd != NULL
252b5132
RH
1041 && (symbol->flags & BSF_SECTION_SYM) == 0
1042 && (! reloc_entry->howto->partial_inplace
1043 || reloc_entry->addend == 0))
1044 {
1045 reloc_entry->address += input_section->output_offset;
1046 return bfd_reloc_ok;
1047 }
1048
1049 return bfd_reloc_continue;
1050}
1051\f
0ac4564e
L
1052/* Copy the program header and other data from one object module to
1053 another. */
252b5132 1054
b34976b6 1055bfd_boolean
217aa764 1056_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1057{
1058 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1059 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1060 return TRUE;
2d502050
L
1061
1062 BFD_ASSERT (!elf_flags_init (obfd)
1063 || (elf_elfheader (obfd)->e_flags
1064 == elf_elfheader (ibfd)->e_flags));
1065
0ac4564e 1066 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1067 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6 1068 elf_flags_init (obfd) = TRUE;
104d59d1
JM
1069
1070 /* Copy object attributes. */
1071 _bfd_elf_copy_obj_attributes (ibfd, obfd);
b34976b6 1072 return TRUE;
2d502050
L
1073}
1074
cedc298e
L
1075static const char *
1076get_segment_type (unsigned int p_type)
1077{
1078 const char *pt;
1079 switch (p_type)
1080 {
1081 case PT_NULL: pt = "NULL"; break;
1082 case PT_LOAD: pt = "LOAD"; break;
1083 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1084 case PT_INTERP: pt = "INTERP"; break;
1085 case PT_NOTE: pt = "NOTE"; break;
1086 case PT_SHLIB: pt = "SHLIB"; break;
1087 case PT_PHDR: pt = "PHDR"; break;
1088 case PT_TLS: pt = "TLS"; break;
1089 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1090 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1091 case PT_GNU_RELRO: pt = "RELRO"; break;
1092 default: pt = NULL; break;
1093 }
1094 return pt;
1095}
1096
f0b79d91
L
1097/* Print out the program headers. */
1098
b34976b6 1099bfd_boolean
217aa764 1100_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1101{
a50b1753 1102 FILE *f = (FILE *) farg;
252b5132
RH
1103 Elf_Internal_Phdr *p;
1104 asection *s;
1105 bfd_byte *dynbuf = NULL;
1106
1107 p = elf_tdata (abfd)->phdr;
1108 if (p != NULL)
1109 {
1110 unsigned int i, c;
1111
1112 fprintf (f, _("\nProgram Header:\n"));
1113 c = elf_elfheader (abfd)->e_phnum;
1114 for (i = 0; i < c; i++, p++)
1115 {
cedc298e 1116 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1117 char buf[20];
1118
cedc298e 1119 if (pt == NULL)
252b5132 1120 {
cedc298e
L
1121 sprintf (buf, "0x%lx", p->p_type);
1122 pt = buf;
252b5132 1123 }
dc810e39 1124 fprintf (f, "%8s off 0x", pt);
60b89a18 1125 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1126 fprintf (f, " vaddr 0x");
60b89a18 1127 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1128 fprintf (f, " paddr 0x");
60b89a18 1129 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1130 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1131 fprintf (f, " filesz 0x");
60b89a18 1132 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1133 fprintf (f, " memsz 0x");
60b89a18 1134 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1135 fprintf (f, " flags %c%c%c",
1136 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1137 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1138 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1139 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1140 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1141 fprintf (f, "\n");
1142 }
1143 }
1144
1145 s = bfd_get_section_by_name (abfd, ".dynamic");
1146 if (s != NULL)
1147 {
cb33740c 1148 unsigned int elfsec;
dc810e39 1149 unsigned long shlink;
252b5132
RH
1150 bfd_byte *extdyn, *extdynend;
1151 size_t extdynsize;
217aa764 1152 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1153
1154 fprintf (f, _("\nDynamic Section:\n"));
1155
eea6121a 1156 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1157 goto error_return;
1158
1159 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1160 if (elfsec == SHN_BAD)
252b5132 1161 goto error_return;
dc810e39 1162 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1163
1164 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1165 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1166
1167 extdyn = dynbuf;
eea6121a 1168 extdynend = extdyn + s->size;
252b5132
RH
1169 for (; extdyn < extdynend; extdyn += extdynsize)
1170 {
1171 Elf_Internal_Dyn dyn;
ad9563d6 1172 const char *name = "";
252b5132 1173 char ab[20];
b34976b6 1174 bfd_boolean stringp;
ad9563d6 1175 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1176
217aa764 1177 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1178
1179 if (dyn.d_tag == DT_NULL)
1180 break;
1181
b34976b6 1182 stringp = FALSE;
252b5132
RH
1183 switch (dyn.d_tag)
1184 {
1185 default:
ad9563d6
CM
1186 if (bed->elf_backend_get_target_dtag)
1187 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1188
1189 if (!strcmp (name, ""))
1190 {
1191 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1192 name = ab;
1193 }
252b5132
RH
1194 break;
1195
b34976b6 1196 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1197 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1198 case DT_PLTGOT: name = "PLTGOT"; break;
1199 case DT_HASH: name = "HASH"; break;
1200 case DT_STRTAB: name = "STRTAB"; break;
1201 case DT_SYMTAB: name = "SYMTAB"; break;
1202 case DT_RELA: name = "RELA"; break;
1203 case DT_RELASZ: name = "RELASZ"; break;
1204 case DT_RELAENT: name = "RELAENT"; break;
1205 case DT_STRSZ: name = "STRSZ"; break;
1206 case DT_SYMENT: name = "SYMENT"; break;
1207 case DT_INIT: name = "INIT"; break;
1208 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1209 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1210 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1211 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1212 case DT_REL: name = "REL"; break;
1213 case DT_RELSZ: name = "RELSZ"; break;
1214 case DT_RELENT: name = "RELENT"; break;
1215 case DT_PLTREL: name = "PLTREL"; break;
1216 case DT_DEBUG: name = "DEBUG"; break;
1217 case DT_TEXTREL: name = "TEXTREL"; break;
1218 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1219 case DT_BIND_NOW: name = "BIND_NOW"; break;
1220 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1221 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1222 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1223 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1224 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1225 case DT_FLAGS: name = "FLAGS"; break;
1226 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1227 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1228 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1229 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1230 case DT_MOVEENT: name = "MOVEENT"; break;
1231 case DT_MOVESZ: name = "MOVESZ"; break;
1232 case DT_FEATURE: name = "FEATURE"; break;
1233 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1234 case DT_SYMINSZ: name = "SYMINSZ"; break;
1235 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1236 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1237 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1238 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1239 case DT_PLTPAD: name = "PLTPAD"; break;
1240 case DT_MOVETAB: name = "MOVETAB"; break;
1241 case DT_SYMINFO: name = "SYMINFO"; break;
1242 case DT_RELACOUNT: name = "RELACOUNT"; break;
1243 case DT_RELCOUNT: name = "RELCOUNT"; break;
1244 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1245 case DT_VERSYM: name = "VERSYM"; break;
1246 case DT_VERDEF: name = "VERDEF"; break;
1247 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1248 case DT_VERNEED: name = "VERNEED"; break;
1249 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1250 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1251 case DT_USED: name = "USED"; break;
b34976b6 1252 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1253 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1254 }
1255
ad9563d6 1256 fprintf (f, " %-20s ", name);
252b5132 1257 if (! stringp)
a1f3c56e
AN
1258 {
1259 fprintf (f, "0x");
1260 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1261 }
252b5132
RH
1262 else
1263 {
1264 const char *string;
dc810e39 1265 unsigned int tagv = dyn.d_un.d_val;
252b5132 1266
dc810e39 1267 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1268 if (string == NULL)
1269 goto error_return;
1270 fprintf (f, "%s", string);
1271 }
1272 fprintf (f, "\n");
1273 }
1274
1275 free (dynbuf);
1276 dynbuf = NULL;
1277 }
1278
1279 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1280 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1281 {
fc0e6df6 1282 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1283 return FALSE;
252b5132
RH
1284 }
1285
1286 if (elf_dynverdef (abfd) != 0)
1287 {
1288 Elf_Internal_Verdef *t;
1289
1290 fprintf (f, _("\nVersion definitions:\n"));
1291 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1292 {
1293 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1294 t->vd_flags, t->vd_hash,
1295 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1296 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1297 {
1298 Elf_Internal_Verdaux *a;
1299
1300 fprintf (f, "\t");
1301 for (a = t->vd_auxptr->vda_nextptr;
1302 a != NULL;
1303 a = a->vda_nextptr)
d0fb9a8d
JJ
1304 fprintf (f, "%s ",
1305 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1306 fprintf (f, "\n");
1307 }
1308 }
1309 }
1310
1311 if (elf_dynverref (abfd) != 0)
1312 {
1313 Elf_Internal_Verneed *t;
1314
1315 fprintf (f, _("\nVersion References:\n"));
1316 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1317 {
1318 Elf_Internal_Vernaux *a;
1319
d0fb9a8d
JJ
1320 fprintf (f, _(" required from %s:\n"),
1321 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1322 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1323 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1324 a->vna_flags, a->vna_other,
1325 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1326 }
1327 }
1328
b34976b6 1329 return TRUE;
252b5132
RH
1330
1331 error_return:
1332 if (dynbuf != NULL)
1333 free (dynbuf);
b34976b6 1334 return FALSE;
252b5132
RH
1335}
1336
1337/* Display ELF-specific fields of a symbol. */
1338
1339void
217aa764
AM
1340bfd_elf_print_symbol (bfd *abfd,
1341 void *filep,
1342 asymbol *symbol,
1343 bfd_print_symbol_type how)
252b5132 1344{
a50b1753 1345 FILE *file = (FILE *) filep;
252b5132
RH
1346 switch (how)
1347 {
1348 case bfd_print_symbol_name:
1349 fprintf (file, "%s", symbol->name);
1350 break;
1351 case bfd_print_symbol_more:
1352 fprintf (file, "elf ");
60b89a18 1353 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1354 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1355 break;
1356 case bfd_print_symbol_all:
1357 {
4e8a9624
AM
1358 const char *section_name;
1359 const char *name = NULL;
9c5bfbb7 1360 const struct elf_backend_data *bed;
7a13edea 1361 unsigned char st_other;
dbb410c3 1362 bfd_vma val;
c044fabd 1363
252b5132 1364 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1365
1366 bed = get_elf_backend_data (abfd);
1367 if (bed->elf_backend_print_symbol_all)
c044fabd 1368 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1369
1370 if (name == NULL)
1371 {
7ee38065 1372 name = symbol->name;
217aa764 1373 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1374 }
1375
252b5132
RH
1376 fprintf (file, " %s\t", section_name);
1377 /* Print the "other" value for a symbol. For common symbols,
1378 we've already printed the size; now print the alignment.
1379 For other symbols, we have no specified alignment, and
1380 we've printed the address; now print the size. */
dcf6c779 1381 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1382 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1383 else
1384 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1385 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1386
1387 /* If we have version information, print it. */
1388 if (elf_tdata (abfd)->dynversym_section != 0
1389 && (elf_tdata (abfd)->dynverdef_section != 0
1390 || elf_tdata (abfd)->dynverref_section != 0))
1391 {
1392 unsigned int vernum;
1393 const char *version_string;
1394
1395 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1396
1397 if (vernum == 0)
1398 version_string = "";
1399 else if (vernum == 1)
1400 version_string = "Base";
1401 else if (vernum <= elf_tdata (abfd)->cverdefs)
1402 version_string =
1403 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1404 else
1405 {
1406 Elf_Internal_Verneed *t;
1407
1408 version_string = "";
1409 for (t = elf_tdata (abfd)->verref;
1410 t != NULL;
1411 t = t->vn_nextref)
1412 {
1413 Elf_Internal_Vernaux *a;
1414
1415 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1416 {
1417 if (a->vna_other == vernum)
1418 {
1419 version_string = a->vna_nodename;
1420 break;
1421 }
1422 }
1423 }
1424 }
1425
1426 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1427 fprintf (file, " %-11s", version_string);
1428 else
1429 {
1430 int i;
1431
1432 fprintf (file, " (%s)", version_string);
1433 for (i = 10 - strlen (version_string); i > 0; --i)
1434 putc (' ', file);
1435 }
1436 }
1437
1438 /* If the st_other field is not zero, print it. */
7a13edea 1439 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1440
7a13edea
NC
1441 switch (st_other)
1442 {
1443 case 0: break;
1444 case STV_INTERNAL: fprintf (file, " .internal"); break;
1445 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1446 case STV_PROTECTED: fprintf (file, " .protected"); break;
1447 default:
1448 /* Some other non-defined flags are also present, so print
1449 everything hex. */
1450 fprintf (file, " 0x%02x", (unsigned int) st_other);
1451 }
252b5132 1452
587ff49e 1453 fprintf (file, " %s", name);
252b5132
RH
1454 }
1455 break;
1456 }
1457}
252b5132 1458
252b5132
RH
1459/* Allocate an ELF string table--force the first byte to be zero. */
1460
1461struct bfd_strtab_hash *
217aa764 1462_bfd_elf_stringtab_init (void)
252b5132
RH
1463{
1464 struct bfd_strtab_hash *ret;
1465
1466 ret = _bfd_stringtab_init ();
1467 if (ret != NULL)
1468 {
1469 bfd_size_type loc;
1470
b34976b6 1471 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1472 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1473 if (loc == (bfd_size_type) -1)
1474 {
1475 _bfd_stringtab_free (ret);
1476 ret = NULL;
1477 }
1478 }
1479 return ret;
1480}
1481\f
1482/* ELF .o/exec file reading */
1483
c044fabd 1484/* Create a new bfd section from an ELF section header. */
252b5132 1485
b34976b6 1486bfd_boolean
217aa764 1487bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1488{
4fbb74a6
AM
1489 Elf_Internal_Shdr *hdr;
1490 Elf_Internal_Ehdr *ehdr;
1491 const struct elf_backend_data *bed;
90937f86 1492 const char *name;
252b5132 1493
4fbb74a6
AM
1494 if (shindex >= elf_numsections (abfd))
1495 return FALSE;
1496
1497 hdr = elf_elfsections (abfd)[shindex];
1498 ehdr = elf_elfheader (abfd);
1499 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1500 hdr->sh_name);
933d961a
JJ
1501 if (name == NULL)
1502 return FALSE;
252b5132 1503
4fbb74a6 1504 bed = get_elf_backend_data (abfd);
252b5132
RH
1505 switch (hdr->sh_type)
1506 {
1507 case SHT_NULL:
1508 /* Inactive section. Throw it away. */
b34976b6 1509 return TRUE;
252b5132
RH
1510
1511 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1512 case SHT_NOBITS: /* .bss section. */
1513 case SHT_HASH: /* .hash section. */
1514 case SHT_NOTE: /* .note section. */
25e27870
L
1515 case SHT_INIT_ARRAY: /* .init_array section. */
1516 case SHT_FINI_ARRAY: /* .fini_array section. */
1517 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1518 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1519 case SHT_GNU_HASH: /* .gnu.hash section. */
6dc132d9 1520 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1521
797fc050 1522 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1523 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1524 return FALSE;
cfcac11d
NC
1525 if (hdr->sh_link > elf_numsections (abfd))
1526 {
caa83f8b 1527 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
1528 field set to SHN_BEFORE or SHN_AFTER. */
1529 switch (bfd_get_arch (abfd))
1530 {
caa83f8b 1531 case bfd_arch_i386:
cfcac11d
NC
1532 case bfd_arch_sparc:
1533 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
1534 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
1535 break;
1536 /* Otherwise fall through. */
1537 default:
1538 return FALSE;
1539 }
1540 }
1541 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
8e0ed13f 1542 return FALSE;
cfcac11d 1543 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
1544 {
1545 Elf_Internal_Shdr *dynsymhdr;
1546
1547 /* The shared libraries distributed with hpux11 have a bogus
1548 sh_link field for the ".dynamic" section. Find the
1549 string table for the ".dynsym" section instead. */
1550 if (elf_dynsymtab (abfd) != 0)
1551 {
1552 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1553 hdr->sh_link = dynsymhdr->sh_link;
1554 }
1555 else
1556 {
1557 unsigned int i, num_sec;
1558
1559 num_sec = elf_numsections (abfd);
1560 for (i = 1; i < num_sec; i++)
1561 {
1562 dynsymhdr = elf_elfsections (abfd)[i];
1563 if (dynsymhdr->sh_type == SHT_DYNSYM)
1564 {
1565 hdr->sh_link = dynsymhdr->sh_link;
1566 break;
1567 }
1568 }
1569 }
1570 }
1571 break;
1572
252b5132
RH
1573 case SHT_SYMTAB: /* A symbol table */
1574 if (elf_onesymtab (abfd) == shindex)
b34976b6 1575 return TRUE;
252b5132 1576
a50b2160
JJ
1577 if (hdr->sh_entsize != bed->s->sizeof_sym)
1578 return FALSE;
3337c1e5
AM
1579 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
1580 return FALSE;
252b5132
RH
1581 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1582 elf_onesymtab (abfd) = shindex;
1583 elf_tdata (abfd)->symtab_hdr = *hdr;
1584 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1585 abfd->flags |= HAS_SYMS;
1586
1587 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1588 SHF_ALLOC is set, and this is a shared object, then we also
1589 treat this section as a BFD section. We can not base the
1590 decision purely on SHF_ALLOC, because that flag is sometimes
1591 set in a relocatable object file, which would confuse the
1592 linker. */
252b5132
RH
1593 if ((hdr->sh_flags & SHF_ALLOC) != 0
1594 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1595 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1596 shindex))
b34976b6 1597 return FALSE;
252b5132 1598
1b3a8575
AM
1599 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1600 can't read symbols without that section loaded as well. It
1601 is most likely specified by the next section header. */
1602 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1603 {
1604 unsigned int i, num_sec;
1605
1606 num_sec = elf_numsections (abfd);
1607 for (i = shindex + 1; i < num_sec; i++)
1608 {
1609 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1610 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1611 && hdr2->sh_link == shindex)
1612 break;
1613 }
1614 if (i == num_sec)
1615 for (i = 1; i < shindex; i++)
1616 {
1617 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1618 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1619 && hdr2->sh_link == shindex)
1620 break;
1621 }
1622 if (i != shindex)
1623 return bfd_section_from_shdr (abfd, i);
1624 }
b34976b6 1625 return TRUE;
252b5132
RH
1626
1627 case SHT_DYNSYM: /* A dynamic symbol table */
1628 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1629 return TRUE;
252b5132 1630
a50b2160
JJ
1631 if (hdr->sh_entsize != bed->s->sizeof_sym)
1632 return FALSE;
252b5132
RH
1633 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1634 elf_dynsymtab (abfd) = shindex;
1635 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1636 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1637 abfd->flags |= HAS_SYMS;
1638
1639 /* Besides being a symbol table, we also treat this as a regular
1640 section, so that objcopy can handle it. */
6dc132d9 1641 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1642
9ad5cbcf
AM
1643 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1644 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1645 return TRUE;
9ad5cbcf 1646
1b3a8575 1647 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1648 elf_symtab_shndx (abfd) = shindex;
1649 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1650 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1651 return TRUE;
9ad5cbcf 1652
252b5132
RH
1653 case SHT_STRTAB: /* A string table */
1654 if (hdr->bfd_section != NULL)
b34976b6 1655 return TRUE;
252b5132
RH
1656 if (ehdr->e_shstrndx == shindex)
1657 {
1658 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1659 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1660 return TRUE;
252b5132 1661 }
1b3a8575
AM
1662 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1663 {
1664 symtab_strtab:
1665 elf_tdata (abfd)->strtab_hdr = *hdr;
1666 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1667 return TRUE;
1668 }
1669 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1670 {
1671 dynsymtab_strtab:
1672 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1673 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1674 elf_elfsections (abfd)[shindex] = hdr;
1675 /* We also treat this as a regular section, so that objcopy
1676 can handle it. */
6dc132d9
L
1677 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1678 shindex);
1b3a8575 1679 }
252b5132 1680
1b3a8575
AM
1681 /* If the string table isn't one of the above, then treat it as a
1682 regular section. We need to scan all the headers to be sure,
1683 just in case this strtab section appeared before the above. */
1684 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1685 {
1686 unsigned int i, num_sec;
252b5132 1687
1b3a8575
AM
1688 num_sec = elf_numsections (abfd);
1689 for (i = 1; i < num_sec; i++)
1690 {
1691 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1692 if (hdr2->sh_link == shindex)
1693 {
933d961a
JJ
1694 /* Prevent endless recursion on broken objects. */
1695 if (i == shindex)
1696 return FALSE;
1b3a8575
AM
1697 if (! bfd_section_from_shdr (abfd, i))
1698 return FALSE;
1699 if (elf_onesymtab (abfd) == i)
1700 goto symtab_strtab;
1701 if (elf_dynsymtab (abfd) == i)
1702 goto dynsymtab_strtab;
1703 }
1704 }
1705 }
6dc132d9 1706 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1707
1708 case SHT_REL:
1709 case SHT_RELA:
1710 /* *These* do a lot of work -- but build no sections! */
1711 {
1712 asection *target_sect;
d4730f92 1713 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 1714 unsigned int num_sec = elf_numsections (abfd);
d4730f92
BS
1715 struct bfd_elf_section_data *esdt;
1716 bfd_size_type amt;
252b5132 1717
aa2ca951
JJ
1718 if (hdr->sh_entsize
1719 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1720 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1721 return FALSE;
1722
03ae5f59 1723 /* Check for a bogus link to avoid crashing. */
4fbb74a6 1724 if (hdr->sh_link >= num_sec)
03ae5f59
ILT
1725 {
1726 ((*_bfd_error_handler)
d003868e
AM
1727 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1728 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1729 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1730 shindex);
03ae5f59
ILT
1731 }
1732
252b5132
RH
1733 /* For some incomprehensible reason Oracle distributes
1734 libraries for Solaris in which some of the objects have
1735 bogus sh_link fields. It would be nice if we could just
1736 reject them, but, unfortunately, some people need to use
1737 them. We scan through the section headers; if we find only
1738 one suitable symbol table, we clobber the sh_link to point
83b89087
L
1739 to it. I hope this doesn't break anything.
1740
1741 Don't do it on executable nor shared library. */
1742 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
1743 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
1744 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1745 {
9ad5cbcf 1746 unsigned int scan;
252b5132
RH
1747 int found;
1748
1749 found = 0;
9ad5cbcf 1750 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1751 {
1752 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1753 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1754 {
1755 if (found != 0)
1756 {
1757 found = 0;
1758 break;
1759 }
1760 found = scan;
1761 }
1762 }
1763 if (found != 0)
1764 hdr->sh_link = found;
1765 }
1766
1767 /* Get the symbol table. */
1b3a8575
AM
1768 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1769 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1770 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1771 return FALSE;
252b5132
RH
1772
1773 /* If this reloc section does not use the main symbol table we
1774 don't treat it as a reloc section. BFD can't adequately
1775 represent such a section, so at least for now, we don't
c044fabd 1776 try. We just present it as a normal section. We also
60bcf0fa 1777 can't use it as a reloc section if it points to the null
83b89087
L
1778 section, an invalid section, another reloc section, or its
1779 sh_link points to the null section. */
185ef66d 1780 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 1781 || hdr->sh_link == SHN_UNDEF
185ef66d 1782 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
1783 || hdr->sh_info >= num_sec
1784 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
1785 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
1786 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1787 shindex);
252b5132
RH
1788
1789 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 1790 return FALSE;
252b5132
RH
1791 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
1792 if (target_sect == NULL)
b34976b6 1793 return FALSE;
252b5132 1794
d4730f92
BS
1795 esdt = elf_section_data (target_sect);
1796 if (hdr->sh_type == SHT_RELA)
1797 p_hdr = &esdt->rela.hdr;
252b5132 1798 else
d4730f92
BS
1799 p_hdr = &esdt->rel.hdr;
1800
1801 BFD_ASSERT (*p_hdr == NULL);
1802 amt = sizeof (*hdr2);
1803 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, amt);
1804 if (hdr2 == NULL)
1805 return FALSE;
252b5132 1806 *hdr2 = *hdr;
d4730f92 1807 *p_hdr = hdr2;
252b5132 1808 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 1809 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
1810 target_sect->flags |= SEC_RELOC;
1811 target_sect->relocation = NULL;
1812 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
1813 /* In the section to which the relocations apply, mark whether
1814 its relocations are of the REL or RELA variety. */
72730e0c 1815 if (hdr->sh_size != 0)
d4730f92
BS
1816 {
1817 if (hdr->sh_type == SHT_RELA)
1818 target_sect->use_rela_p = 1;
1819 }
252b5132 1820 abfd->flags |= HAS_RELOC;
b34976b6 1821 return TRUE;
252b5132 1822 }
252b5132
RH
1823
1824 case SHT_GNU_verdef:
1825 elf_dynverdef (abfd) = shindex;
1826 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 1827 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1828
1829 case SHT_GNU_versym:
a50b2160
JJ
1830 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
1831 return FALSE;
252b5132
RH
1832 elf_dynversym (abfd) = shindex;
1833 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 1834 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1835
1836 case SHT_GNU_verneed:
1837 elf_dynverref (abfd) = shindex;
1838 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 1839 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1840
1841 case SHT_SHLIB:
b34976b6 1842 return TRUE;
252b5132 1843
dbb410c3 1844 case SHT_GROUP:
1783205a 1845 if (! IS_VALID_GROUP_SECTION_HEADER (hdr))
a50b2160 1846 return FALSE;
6dc132d9 1847 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1848 return FALSE;
dbb410c3
AM
1849 if (hdr->contents != NULL)
1850 {
1851 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
1783205a 1852 unsigned int n_elt = hdr->sh_size / GRP_ENTRY_SIZE;
dbb410c3
AM
1853 asection *s;
1854
b885599b
AM
1855 if (idx->flags & GRP_COMDAT)
1856 hdr->bfd_section->flags
1857 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1858
45c5e9ed
L
1859 /* We try to keep the same section order as it comes in. */
1860 idx += n_elt;
dbb410c3 1861 while (--n_elt != 0)
1783205a
NC
1862 {
1863 --idx;
1864
1865 if (idx->shdr != NULL
1866 && (s = idx->shdr->bfd_section) != NULL
1867 && elf_next_in_group (s) != NULL)
1868 {
1869 elf_next_in_group (hdr->bfd_section) = s;
1870 break;
1871 }
1872 }
dbb410c3
AM
1873 }
1874 break;
1875
252b5132 1876 default:
104d59d1
JM
1877 /* Possibly an attributes section. */
1878 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
1879 || hdr->sh_type == bed->obj_attrs_section_type)
1880 {
1881 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1882 return FALSE;
1883 _bfd_elf_parse_attributes (abfd, hdr);
1884 return TRUE;
1885 }
1886
252b5132 1887 /* Check for any processor-specific section types. */
3eb70a79
L
1888 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
1889 return TRUE;
1890
1891 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
1892 {
1893 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1894 /* FIXME: How to properly handle allocated section reserved
1895 for applications? */
1896 (*_bfd_error_handler)
1897 (_("%B: don't know how to handle allocated, application "
1898 "specific section `%s' [0x%8x]"),
1899 abfd, name, hdr->sh_type);
1900 else
1901 /* Allow sections reserved for applications. */
1902 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1903 shindex);
1904 }
1905 else if (hdr->sh_type >= SHT_LOPROC
1906 && hdr->sh_type <= SHT_HIPROC)
1907 /* FIXME: We should handle this section. */
1908 (*_bfd_error_handler)
1909 (_("%B: don't know how to handle processor specific section "
1910 "`%s' [0x%8x]"),
1911 abfd, name, hdr->sh_type);
1912 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
1913 {
1914 /* Unrecognised OS-specific sections. */
1915 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
1916 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 1917 required to correctly process the section and the file should
ff15b240
NC
1918 be rejected with an error message. */
1919 (*_bfd_error_handler)
1920 (_("%B: don't know how to handle OS specific section "
1921 "`%s' [0x%8x]"),
1922 abfd, name, hdr->sh_type);
1923 else
1924 /* Otherwise it should be processed. */
1925 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1926 }
3eb70a79
L
1927 else
1928 /* FIXME: We should handle this section. */
1929 (*_bfd_error_handler)
1930 (_("%B: don't know how to handle section `%s' [0x%8x]"),
1931 abfd, name, hdr->sh_type);
1932
1933 return FALSE;
252b5132
RH
1934 }
1935
b34976b6 1936 return TRUE;
252b5132
RH
1937}
1938
87d72d41 1939/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 1940
87d72d41
AM
1941Elf_Internal_Sym *
1942bfd_sym_from_r_symndx (struct sym_cache *cache,
1943 bfd *abfd,
1944 unsigned long r_symndx)
ec338859 1945{
ec338859
AM
1946 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
1947
a5d1b3b5
AM
1948 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
1949 {
1950 Elf_Internal_Shdr *symtab_hdr;
1951 unsigned char esym[sizeof (Elf64_External_Sym)];
1952 Elf_External_Sym_Shndx eshndx;
ec338859 1953
a5d1b3b5
AM
1954 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1955 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 1956 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 1957 return NULL;
9ad5cbcf 1958
a5d1b3b5
AM
1959 if (cache->abfd != abfd)
1960 {
1961 memset (cache->indx, -1, sizeof (cache->indx));
1962 cache->abfd = abfd;
1963 }
1964 cache->indx[ent] = r_symndx;
ec338859 1965 }
a5d1b3b5 1966
87d72d41 1967 return &cache->sym[ent];
ec338859
AM
1968}
1969
252b5132
RH
1970/* Given an ELF section number, retrieve the corresponding BFD
1971 section. */
1972
1973asection *
91d6fa6a 1974bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 1975{
91d6fa6a 1976 if (sec_index >= elf_numsections (abfd))
252b5132 1977 return NULL;
91d6fa6a 1978 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
1979}
1980
b35d266b 1981static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 1982{
0112cd26
NC
1983 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1984 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1985};
1986
b35d266b 1987static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 1988{
0112cd26
NC
1989 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
1990 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1991};
1992
b35d266b 1993static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 1994{
0112cd26
NC
1995 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1996 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1997 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
1998 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
1999 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2000 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2001 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2002 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2003 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2004 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2005 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2006};
2007
b35d266b 2008static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2009{
0112cd26
NC
2010 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2011 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2012 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2013};
2014
b35d266b 2015static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2016{
0112cd26
NC
2017 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2018 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2019 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2020 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2021 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2022 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2023 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2024 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2025 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2026};
2027
b35d266b 2028static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2029{
0112cd26
NC
2030 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2031 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2032};
2033
b35d266b 2034static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2035{
0112cd26
NC
2036 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2037 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2038 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2039 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2040};
2041
b35d266b 2042static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2043{
0112cd26
NC
2044 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2045 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2046};
2047
b35d266b 2048static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2049{
0112cd26
NC
2050 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2051 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2052 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2053};
2054
b35d266b 2055static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2056{
0112cd26
NC
2057 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2058 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2059 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2060};
2061
b35d266b 2062static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2063{
0112cd26
NC
2064 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2065 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2066 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2067 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2068 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2069};
2070
b35d266b 2071static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2072{
0112cd26
NC
2073 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2074 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2075 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2076 /* See struct bfd_elf_special_section declaration for the semantics of
2077 this special case where .prefix_length != strlen (.prefix). */
2078 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2079 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2080};
2081
b35d266b 2082static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2083{
0112cd26
NC
2084 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2085 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2086 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2087 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2088};
2089
1b315056
CS
2090static const struct bfd_elf_special_section special_sections_z[] =
2091{
2092 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2093 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2094 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2095 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2096 { NULL, 0, 0, 0, 0 }
2097};
2098
b35d266b 2099static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2100{
7f4d3958 2101 special_sections_b, /* 'b' */
98ece1b3 2102 special_sections_c, /* 'c' */
7f4d3958
L
2103 special_sections_d, /* 'd' */
2104 NULL, /* 'e' */
2105 special_sections_f, /* 'f' */
2106 special_sections_g, /* 'g' */
2107 special_sections_h, /* 'h' */
2108 special_sections_i, /* 'i' */
2109 NULL, /* 'j' */
2110 NULL, /* 'k' */
2111 special_sections_l, /* 'l' */
2112 NULL, /* 'm' */
2113 special_sections_n, /* 'n' */
2114 NULL, /* 'o' */
2115 special_sections_p, /* 'p' */
2116 NULL, /* 'q' */
2117 special_sections_r, /* 'r' */
2118 special_sections_s, /* 's' */
2119 special_sections_t, /* 't' */
1b315056
CS
2120 NULL, /* 'u' */
2121 NULL, /* 'v' */
2122 NULL, /* 'w' */
2123 NULL, /* 'x' */
2124 NULL, /* 'y' */
2125 special_sections_z /* 'z' */
7f4d3958
L
2126};
2127
551b43fd
AM
2128const struct bfd_elf_special_section *
2129_bfd_elf_get_special_section (const char *name,
2130 const struct bfd_elf_special_section *spec,
2131 unsigned int rela)
2f89ff8d
L
2132{
2133 int i;
7f4d3958 2134 int len;
7f4d3958 2135
551b43fd 2136 len = strlen (name);
7f4d3958 2137
551b43fd 2138 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2139 {
2140 int suffix_len;
551b43fd 2141 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2142
2143 if (len < prefix_len)
2144 continue;
551b43fd 2145 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2146 continue;
2147
551b43fd 2148 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2149 if (suffix_len <= 0)
2150 {
2151 if (name[prefix_len] != 0)
2152 {
2153 if (suffix_len == 0)
2154 continue;
2155 if (name[prefix_len] != '.'
2156 && (suffix_len == -2
551b43fd 2157 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2158 continue;
2159 }
2160 }
2161 else
2162 {
2163 if (len < prefix_len + suffix_len)
2164 continue;
2165 if (memcmp (name + len - suffix_len,
551b43fd 2166 spec[i].prefix + prefix_len,
7dcb9820
AM
2167 suffix_len) != 0)
2168 continue;
2169 }
551b43fd 2170 return &spec[i];
7dcb9820 2171 }
2f89ff8d
L
2172
2173 return NULL;
2174}
2175
7dcb9820 2176const struct bfd_elf_special_section *
29ef7005 2177_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2178{
551b43fd
AM
2179 int i;
2180 const struct bfd_elf_special_section *spec;
29ef7005 2181 const struct elf_backend_data *bed;
2f89ff8d
L
2182
2183 /* See if this is one of the special sections. */
551b43fd
AM
2184 if (sec->name == NULL)
2185 return NULL;
2f89ff8d 2186
29ef7005
L
2187 bed = get_elf_backend_data (abfd);
2188 spec = bed->special_sections;
2189 if (spec)
2190 {
2191 spec = _bfd_elf_get_special_section (sec->name,
2192 bed->special_sections,
2193 sec->use_rela_p);
2194 if (spec != NULL)
2195 return spec;
2196 }
2197
551b43fd
AM
2198 if (sec->name[0] != '.')
2199 return NULL;
2f89ff8d 2200
551b43fd 2201 i = sec->name[1] - 'b';
1b315056 2202 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2203 return NULL;
2204
2205 spec = special_sections[i];
2f89ff8d 2206
551b43fd
AM
2207 if (spec == NULL)
2208 return NULL;
2209
2210 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2211}
2212
b34976b6 2213bfd_boolean
217aa764 2214_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2215{
2216 struct bfd_elf_section_data *sdata;
551b43fd 2217 const struct elf_backend_data *bed;
7dcb9820 2218 const struct bfd_elf_special_section *ssect;
252b5132 2219
f0abc2a1
AM
2220 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2221 if (sdata == NULL)
2222 {
a50b1753
NC
2223 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2224 sizeof (*sdata));
f0abc2a1
AM
2225 if (sdata == NULL)
2226 return FALSE;
217aa764 2227 sec->used_by_bfd = sdata;
f0abc2a1 2228 }
bf572ba0 2229
551b43fd
AM
2230 /* Indicate whether or not this section should use RELA relocations. */
2231 bed = get_elf_backend_data (abfd);
2232 sec->use_rela_p = bed->default_use_rela_p;
2233
e843e0f8
L
2234 /* When we read a file, we don't need to set ELF section type and
2235 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2236 anyway. We will set ELF section type and flags for all linker
2237 created sections. If user specifies BFD section flags, we will
2238 set ELF section type and flags based on BFD section flags in
2239 elf_fake_sections. */
2240 if ((!sec->flags && abfd->direction != read_direction)
3496cb2a 2241 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2242 {
551b43fd 2243 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2244 if (ssect != NULL)
2245 {
2246 elf_section_type (sec) = ssect->type;
2247 elf_section_flags (sec) = ssect->attr;
2248 }
2f89ff8d
L
2249 }
2250
f592407e 2251 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2252}
2253
2254/* Create a new bfd section from an ELF program header.
2255
2256 Since program segments have no names, we generate a synthetic name
2257 of the form segment<NUM>, where NUM is generally the index in the
2258 program header table. For segments that are split (see below) we
2259 generate the names segment<NUM>a and segment<NUM>b.
2260
2261 Note that some program segments may have a file size that is different than
2262 (less than) the memory size. All this means is that at execution the
2263 system must allocate the amount of memory specified by the memory size,
2264 but only initialize it with the first "file size" bytes read from the
2265 file. This would occur for example, with program segments consisting
2266 of combined data+bss.
2267
2268 To handle the above situation, this routine generates TWO bfd sections
2269 for the single program segment. The first has the length specified by
2270 the file size of the segment, and the second has the length specified
2271 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2272 into its initialized and uninitialized parts.
252b5132
RH
2273
2274 */
2275
b34976b6 2276bfd_boolean
217aa764
AM
2277_bfd_elf_make_section_from_phdr (bfd *abfd,
2278 Elf_Internal_Phdr *hdr,
91d6fa6a 2279 int hdr_index,
a50b1753 2280 const char *type_name)
252b5132
RH
2281{
2282 asection *newsect;
2283 char *name;
2284 char namebuf[64];
d4c88bbb 2285 size_t len;
252b5132
RH
2286 int split;
2287
2288 split = ((hdr->p_memsz > 0)
2289 && (hdr->p_filesz > 0)
2290 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2291
2292 if (hdr->p_filesz > 0)
252b5132 2293 {
91d6fa6a 2294 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2295 len = strlen (namebuf) + 1;
a50b1753 2296 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2297 if (!name)
2298 return FALSE;
2299 memcpy (name, namebuf, len);
2300 newsect = bfd_make_section (abfd, name);
2301 if (newsect == NULL)
2302 return FALSE;
2303 newsect->vma = hdr->p_vaddr;
2304 newsect->lma = hdr->p_paddr;
2305 newsect->size = hdr->p_filesz;
2306 newsect->filepos = hdr->p_offset;
2307 newsect->flags |= SEC_HAS_CONTENTS;
2308 newsect->alignment_power = bfd_log2 (hdr->p_align);
2309 if (hdr->p_type == PT_LOAD)
252b5132 2310 {
d5191d0c
AM
2311 newsect->flags |= SEC_ALLOC;
2312 newsect->flags |= SEC_LOAD;
2313 if (hdr->p_flags & PF_X)
2314 {
2315 /* FIXME: all we known is that it has execute PERMISSION,
2316 may be data. */
2317 newsect->flags |= SEC_CODE;
2318 }
2319 }
2320 if (!(hdr->p_flags & PF_W))
2321 {
2322 newsect->flags |= SEC_READONLY;
252b5132 2323 }
252b5132
RH
2324 }
2325
d5191d0c 2326 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2327 {
d5191d0c
AM
2328 bfd_vma align;
2329
91d6fa6a 2330 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2331 len = strlen (namebuf) + 1;
a50b1753 2332 name = (char *) bfd_alloc (abfd, len);
252b5132 2333 if (!name)
b34976b6 2334 return FALSE;
d4c88bbb 2335 memcpy (name, namebuf, len);
252b5132
RH
2336 newsect = bfd_make_section (abfd, name);
2337 if (newsect == NULL)
b34976b6 2338 return FALSE;
252b5132
RH
2339 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2340 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2341 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2342 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2343 align = newsect->vma & -newsect->vma;
2344 if (align == 0 || align > hdr->p_align)
2345 align = hdr->p_align;
2346 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2347 if (hdr->p_type == PT_LOAD)
2348 {
d5191d0c
AM
2349 /* Hack for gdb. Segments that have not been modified do
2350 not have their contents written to a core file, on the
2351 assumption that a debugger can find the contents in the
2352 executable. We flag this case by setting the fake
2353 section size to zero. Note that "real" bss sections will
2354 always have their contents dumped to the core file. */
2355 if (bfd_get_format (abfd) == bfd_core)
2356 newsect->size = 0;
252b5132
RH
2357 newsect->flags |= SEC_ALLOC;
2358 if (hdr->p_flags & PF_X)
2359 newsect->flags |= SEC_CODE;
2360 }
2361 if (!(hdr->p_flags & PF_W))
2362 newsect->flags |= SEC_READONLY;
2363 }
2364
b34976b6 2365 return TRUE;
252b5132
RH
2366}
2367
b34976b6 2368bfd_boolean
91d6fa6a 2369bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2370{
9c5bfbb7 2371 const struct elf_backend_data *bed;
20cfcaae
NC
2372
2373 switch (hdr->p_type)
2374 {
2375 case PT_NULL:
91d6fa6a 2376 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2377
2378 case PT_LOAD:
91d6fa6a 2379 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2380
2381 case PT_DYNAMIC:
91d6fa6a 2382 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2383
2384 case PT_INTERP:
91d6fa6a 2385 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2386
2387 case PT_NOTE:
91d6fa6a 2388 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2389 return FALSE;
718175fa 2390 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2391 return FALSE;
2392 return TRUE;
20cfcaae
NC
2393
2394 case PT_SHLIB:
91d6fa6a 2395 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
2396
2397 case PT_PHDR:
91d6fa6a 2398 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 2399
811072d8 2400 case PT_GNU_EH_FRAME:
91d6fa6a 2401 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
2402 "eh_frame_hdr");
2403
2b05f1b7 2404 case PT_GNU_STACK:
91d6fa6a 2405 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 2406
8c37241b 2407 case PT_GNU_RELRO:
91d6fa6a 2408 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 2409
20cfcaae 2410 default:
8c1acd09 2411 /* Check for any processor-specific program segment types. */
20cfcaae 2412 bed = get_elf_backend_data (abfd);
91d6fa6a 2413 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
2414 }
2415}
2416
d4730f92
BS
2417/* Return the REL_HDR for SEC, assuming there is only a single one, either
2418 REL or RELA. */
2419
2420Elf_Internal_Shdr *
2421_bfd_elf_single_rel_hdr (asection *sec)
2422{
2423 if (elf_section_data (sec)->rel.hdr)
2424 {
2425 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
2426 return elf_section_data (sec)->rel.hdr;
2427 }
2428 else
2429 return elf_section_data (sec)->rela.hdr;
2430}
2431
2432/* Allocate and initialize a section-header for a new reloc section,
2433 containing relocations against ASECT. It is stored in RELDATA. If
2434 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
2435 relocations. */
23bc299b 2436
b34976b6 2437bfd_boolean
217aa764 2438_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 2439 struct bfd_elf_section_reloc_data *reldata,
217aa764
AM
2440 asection *asect,
2441 bfd_boolean use_rela_p)
23bc299b 2442{
d4730f92 2443 Elf_Internal_Shdr *rel_hdr;
23bc299b 2444 char *name;
9c5bfbb7 2445 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92
BS
2446 bfd_size_type amt;
2447
2448 amt = sizeof (Elf_Internal_Shdr);
2449 BFD_ASSERT (reldata->hdr == NULL);
2450 rel_hdr = bfd_zalloc (abfd, amt);
2451 reldata->hdr = rel_hdr;
23bc299b 2452
d4730f92 2453 amt = sizeof ".rela" + strlen (asect->name);
a50b1753 2454 name = (char *) bfd_alloc (abfd, amt);
23bc299b 2455 if (name == NULL)
b34976b6 2456 return FALSE;
23bc299b
MM
2457 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2458 rel_hdr->sh_name =
2b0f7ef9 2459 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2460 FALSE);
23bc299b 2461 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2462 return FALSE;
23bc299b
MM
2463 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2464 rel_hdr->sh_entsize = (use_rela_p
2465 ? bed->s->sizeof_rela
2466 : bed->s->sizeof_rel);
72de5009 2467 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
2468 rel_hdr->sh_flags = 0;
2469 rel_hdr->sh_addr = 0;
2470 rel_hdr->sh_size = 0;
2471 rel_hdr->sh_offset = 0;
2472
b34976b6 2473 return TRUE;
23bc299b
MM
2474}
2475
94be91de
JB
2476/* Return the default section type based on the passed in section flags. */
2477
2478int
2479bfd_elf_get_default_section_type (flagword flags)
2480{
2481 if ((flags & SEC_ALLOC) != 0
2e76e85a 2482 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
2483 return SHT_NOBITS;
2484 return SHT_PROGBITS;
2485}
2486
d4730f92
BS
2487struct fake_section_arg
2488{
2489 struct bfd_link_info *link_info;
2490 bfd_boolean failed;
2491};
2492
252b5132
RH
2493/* Set up an ELF internal section header for a section. */
2494
252b5132 2495static void
d4730f92 2496elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 2497{
d4730f92 2498 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 2499 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 2500 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 2501 Elf_Internal_Shdr *this_hdr;
0414f35b 2502 unsigned int sh_type;
252b5132 2503
d4730f92 2504 if (arg->failed)
252b5132
RH
2505 {
2506 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2507 loop. */
252b5132
RH
2508 return;
2509 }
2510
d4730f92 2511 this_hdr = &esd->this_hdr;
252b5132 2512
e57b5356
AM
2513 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2514 asect->name, FALSE);
2515 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2516 {
d4730f92 2517 arg->failed = TRUE;
252b5132
RH
2518 return;
2519 }
2520
a4d8e49b 2521 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2522
2523 if ((asect->flags & SEC_ALLOC) != 0
2524 || asect->user_set_vma)
2525 this_hdr->sh_addr = asect->vma;
2526 else
2527 this_hdr->sh_addr = 0;
2528
2529 this_hdr->sh_offset = 0;
eea6121a 2530 this_hdr->sh_size = asect->size;
252b5132 2531 this_hdr->sh_link = 0;
72de5009 2532 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
2533 /* The sh_entsize and sh_info fields may have been set already by
2534 copy_private_section_data. */
2535
2536 this_hdr->bfd_section = asect;
2537 this_hdr->contents = NULL;
2538
3cddba1e
L
2539 /* If the section type is unspecified, we set it based on
2540 asect->flags. */
98ece1b3
AM
2541 if ((asect->flags & SEC_GROUP) != 0)
2542 sh_type = SHT_GROUP;
98ece1b3 2543 else
94be91de 2544 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 2545
3cddba1e 2546 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
2547 this_hdr->sh_type = sh_type;
2548 else if (this_hdr->sh_type == SHT_NOBITS
2549 && sh_type == SHT_PROGBITS
2550 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 2551 {
98ece1b3
AM
2552 /* Warn if we are changing a NOBITS section to PROGBITS, but
2553 allow the link to proceed. This can happen when users link
2554 non-bss input sections to bss output sections, or emit data
2555 to a bss output section via a linker script. */
2556 (*_bfd_error_handler)
58f0869b 2557 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 2558 this_hdr->sh_type = sh_type;
3cddba1e
L
2559 }
2560
2f89ff8d 2561 switch (this_hdr->sh_type)
252b5132 2562 {
2f89ff8d 2563 default:
2f89ff8d
L
2564 break;
2565
2566 case SHT_STRTAB:
2567 case SHT_INIT_ARRAY:
2568 case SHT_FINI_ARRAY:
2569 case SHT_PREINIT_ARRAY:
2570 case SHT_NOTE:
2571 case SHT_NOBITS:
2572 case SHT_PROGBITS:
2573 break;
2574
2575 case SHT_HASH:
c7ac6ff8 2576 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2577 break;
5de3bf90 2578
2f89ff8d 2579 case SHT_DYNSYM:
252b5132 2580 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2581 break;
2582
2583 case SHT_DYNAMIC:
252b5132 2584 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2585 break;
2586
2587 case SHT_RELA:
2588 if (get_elf_backend_data (abfd)->may_use_rela_p)
2589 this_hdr->sh_entsize = bed->s->sizeof_rela;
2590 break;
2591
2592 case SHT_REL:
2593 if (get_elf_backend_data (abfd)->may_use_rel_p)
2594 this_hdr->sh_entsize = bed->s->sizeof_rel;
2595 break;
2596
2597 case SHT_GNU_versym:
252b5132 2598 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2599 break;
2600
2601 case SHT_GNU_verdef:
252b5132
RH
2602 this_hdr->sh_entsize = 0;
2603 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2604 cverdefs. The linker will set cverdefs, but sh_info will be
2605 zero. */
252b5132
RH
2606 if (this_hdr->sh_info == 0)
2607 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2608 else
2609 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2610 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2611 break;
2612
2613 case SHT_GNU_verneed:
252b5132
RH
2614 this_hdr->sh_entsize = 0;
2615 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2616 cverrefs. The linker will set cverrefs, but sh_info will be
2617 zero. */
252b5132
RH
2618 if (this_hdr->sh_info == 0)
2619 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2620 else
2621 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2622 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2623 break;
2624
2625 case SHT_GROUP:
1783205a 2626 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 2627 break;
fdc90cb4
JJ
2628
2629 case SHT_GNU_HASH:
2630 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2631 break;
dbb410c3 2632 }
252b5132
RH
2633
2634 if ((asect->flags & SEC_ALLOC) != 0)
2635 this_hdr->sh_flags |= SHF_ALLOC;
2636 if ((asect->flags & SEC_READONLY) == 0)
2637 this_hdr->sh_flags |= SHF_WRITE;
2638 if ((asect->flags & SEC_CODE) != 0)
2639 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2640 if ((asect->flags & SEC_MERGE) != 0)
2641 {
2642 this_hdr->sh_flags |= SHF_MERGE;
2643 this_hdr->sh_entsize = asect->entsize;
2644 if ((asect->flags & SEC_STRINGS) != 0)
2645 this_hdr->sh_flags |= SHF_STRINGS;
2646 }
1126897b 2647 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2648 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2649 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2650 {
2651 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2652 if (asect->size == 0
2653 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2654 {
3a800eb9 2655 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2656
704afa60 2657 this_hdr->sh_size = 0;
3a800eb9
AM
2658 if (o != NULL)
2659 {
704afa60 2660 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2661 if (this_hdr->sh_size != 0)
2662 this_hdr->sh_type = SHT_NOBITS;
2663 }
704afa60
JJ
2664 }
2665 }
18ae9cc1
L
2666 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
2667 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 2668
d4730f92
BS
2669 /* If the section has relocs, set up a section header for the
2670 SHT_REL[A] section. If two relocation sections are required for
2671 this section, it is up to the processor-specific back-end to
2672 create the other. */
2673 if ((asect->flags & SEC_RELOC) != 0)
2674 {
2675 /* When doing a relocatable link, create both REL and RELA sections if
2676 needed. */
2677 if (arg->link_info
2678 /* Do the normal setup if we wouldn't create any sections here. */
2679 && esd->rel.count + esd->rela.count > 0
2680 && (arg->link_info->relocatable || arg->link_info->emitrelocations))
2681 {
2682 if (esd->rel.count && esd->rel.hdr == NULL
2683 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, asect, FALSE))
2684 {
2685 arg->failed = TRUE;
2686 return;
2687 }
2688 if (esd->rela.count && esd->rela.hdr == NULL
2689 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, asect, TRUE))
2690 {
2691 arg->failed = TRUE;
2692 return;
2693 }
2694 }
2695 else if (!_bfd_elf_init_reloc_shdr (abfd,
2696 (asect->use_rela_p
2697 ? &esd->rela : &esd->rel),
2698 asect,
2699 asect->use_rela_p))
2700 arg->failed = TRUE;
2701 }
2702
252b5132 2703 /* Check for processor-specific section types. */
0414f35b 2704 sh_type = this_hdr->sh_type;
e1fddb6b
AO
2705 if (bed->elf_backend_fake_sections
2706 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
d4730f92 2707 arg->failed = TRUE;
252b5132 2708
42bb2e33 2709 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
2710 {
2711 /* Don't change the header type from NOBITS if we are being
42bb2e33 2712 called for objcopy --only-keep-debug. */
0414f35b
AM
2713 this_hdr->sh_type = sh_type;
2714 }
252b5132
RH
2715}
2716
bcacc0f5
AM
2717/* Fill in the contents of a SHT_GROUP section. Called from
2718 _bfd_elf_compute_section_file_positions for gas, objcopy, and
2719 when ELF targets use the generic linker, ld. Called for ld -r
2720 from bfd_elf_final_link. */
dbb410c3 2721
1126897b 2722void
217aa764 2723bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2724{
a50b1753 2725 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 2726 asection *elt, *first;
dbb410c3 2727 unsigned char *loc;
b34976b6 2728 bfd_boolean gas;
dbb410c3 2729
7e4111ad
L
2730 /* Ignore linker created group section. See elfNN_ia64_object_p in
2731 elfxx-ia64.c. */
2732 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2733 || *failedptr)
2734 return;
2735
bcacc0f5
AM
2736 if (elf_section_data (sec)->this_hdr.sh_info == 0)
2737 {
2738 unsigned long symindx = 0;
2739
2740 /* elf_group_id will have been set up by objcopy and the
2741 generic linker. */
2742 if (elf_group_id (sec) != NULL)
2743 symindx = elf_group_id (sec)->udata.i;
1126897b 2744
bcacc0f5
AM
2745 if (symindx == 0)
2746 {
2747 /* If called from the assembler, swap_out_syms will have set up
2748 elf_section_syms. */
2749 BFD_ASSERT (elf_section_syms (abfd) != NULL);
2750 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2751 }
2752 elf_section_data (sec)->this_hdr.sh_info = symindx;
2753 }
2754 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 2755 {
bcacc0f5
AM
2756 /* The ELF backend linker sets sh_info to -2 when the group
2757 signature symbol is global, and thus the index can't be
2758 set until all local symbols are output. */
2759 asection *igroup = elf_sec_group (elf_next_in_group (sec));
2760 struct bfd_elf_section_data *sec_data = elf_section_data (igroup);
2761 unsigned long symndx = sec_data->this_hdr.sh_info;
2762 unsigned long extsymoff = 0;
2763 struct elf_link_hash_entry *h;
2764
2765 if (!elf_bad_symtab (igroup->owner))
2766 {
2767 Elf_Internal_Shdr *symtab_hdr;
2768
2769 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
2770 extsymoff = symtab_hdr->sh_info;
2771 }
2772 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
2773 while (h->root.type == bfd_link_hash_indirect
2774 || h->root.type == bfd_link_hash_warning)
2775 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2776
2777 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 2778 }
dbb410c3 2779
1126897b 2780 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2781 gas = TRUE;
dbb410c3
AM
2782 if (sec->contents == NULL)
2783 {
b34976b6 2784 gas = FALSE;
a50b1753 2785 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
2786
2787 /* Arrange for the section to be written out. */
2788 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2789 if (sec->contents == NULL)
2790 {
b34976b6 2791 *failedptr = TRUE;
dbb410c3
AM
2792 return;
2793 }
2794 }
2795
eea6121a 2796 loc = sec->contents + sec->size;
dbb410c3 2797
9dce4196
AM
2798 /* Get the pointer to the first section in the group that gas
2799 squirreled away here. objcopy arranges for this to be set to the
2800 start of the input section group. */
2801 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2802
2803 /* First element is a flag word. Rest of section is elf section
2804 indices for all the sections of the group. Write them backwards
2805 just to keep the group in the same order as given in .section
2806 directives, not that it matters. */
2807 while (elt != NULL)
2808 {
9dce4196 2809 asection *s;
9dce4196 2810
9dce4196 2811 s = elt;
415f38a6
AM
2812 if (!gas)
2813 s = s->output_section;
2814 if (s != NULL
2815 && !bfd_is_abs_section (s))
01e1a5bc 2816 {
415f38a6
AM
2817 unsigned int idx = elf_section_data (s)->this_idx;
2818
01e1a5bc 2819 loc -= 4;
01e1a5bc
NC
2820 H_PUT_32 (abfd, idx, loc);
2821 }
945906ff 2822 elt = elf_next_in_group (elt);
9dce4196
AM
2823 if (elt == first)
2824 break;
dbb410c3
AM
2825 }
2826
3d7f7666 2827 if ((loc -= 4) != sec->contents)
9dce4196 2828 abort ();
dbb410c3 2829
9dce4196 2830 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2831}
2832
252b5132
RH
2833/* Assign all ELF section numbers. The dummy first section is handled here
2834 too. The link/info pointers for the standard section types are filled
2835 in here too, while we're at it. */
2836
b34976b6 2837static bfd_boolean
da9f89d4 2838assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2839{
2840 struct elf_obj_tdata *t = elf_tdata (abfd);
2841 asection *sec;
2b0f7ef9 2842 unsigned int section_number, secn;
252b5132 2843 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2844 struct bfd_elf_section_data *d;
3516e984 2845 bfd_boolean need_symtab;
252b5132
RH
2846
2847 section_number = 1;
2848
2b0f7ef9
JJ
2849 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2850
da9f89d4
L
2851 /* SHT_GROUP sections are in relocatable files only. */
2852 if (link_info == NULL || link_info->relocatable)
252b5132 2853 {
da9f89d4 2854 /* Put SHT_GROUP sections first. */
04dd1667 2855 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2856 {
5daa8fe7 2857 d = elf_section_data (sec);
da9f89d4
L
2858
2859 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 2860 {
5daa8fe7 2861 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2862 {
2863 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2864 bfd_section_list_remove (abfd, sec);
da9f89d4 2865 abfd->section_count--;
da9f89d4 2866 }
08a40648 2867 else
4fbb74a6 2868 d->this_idx = section_number++;
da9f89d4 2869 }
47cc2cf5
PB
2870 }
2871 }
2872
2873 for (sec = abfd->sections; sec; sec = sec->next)
2874 {
2875 d = elf_section_data (sec);
2876
2877 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 2878 d->this_idx = section_number++;
2b0f7ef9 2879 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 2880 if (d->rel.hdr)
2b0f7ef9 2881 {
d4730f92
BS
2882 d->rel.idx = section_number++;
2883 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 2884 }
d4730f92
BS
2885 else
2886 d->rel.idx = 0;
23bc299b 2887
d4730f92 2888 if (d->rela.hdr)
2b0f7ef9 2889 {
d4730f92
BS
2890 d->rela.idx = section_number++;
2891 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 2892 }
23bc299b 2893 else
d4730f92 2894 d->rela.idx = 0;
252b5132
RH
2895 }
2896
2897 t->shstrtab_section = section_number++;
2b0f7ef9 2898 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2899 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132 2900
3516e984
L
2901 need_symtab = (bfd_get_symcount (abfd) > 0
2902 || (link_info == NULL
2903 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
2904 == HAS_RELOC)));
2905 if (need_symtab)
252b5132
RH
2906 {
2907 t->symtab_section = section_number++;
2b0f7ef9 2908 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 2909 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 2910 {
9ad5cbcf
AM
2911 t->symtab_shndx_section = section_number++;
2912 t->symtab_shndx_hdr.sh_name
2913 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2914 ".symtab_shndx", FALSE);
9ad5cbcf 2915 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2916 return FALSE;
9ad5cbcf 2917 }
252b5132 2918 t->strtab_section = section_number++;
2b0f7ef9 2919 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2920 }
2921
2b0f7ef9
JJ
2922 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2923 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2924
2925 elf_numsections (abfd) = section_number;
252b5132
RH
2926 elf_elfheader (abfd)->e_shnum = section_number;
2927
2928 /* Set up the list of section header pointers, in agreement with the
2929 indices. */
a50b1753
NC
2930 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
2931 sizeof (Elf_Internal_Shdr *));
252b5132 2932 if (i_shdrp == NULL)
b34976b6 2933 return FALSE;
252b5132 2934
a50b1753
NC
2935 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
2936 sizeof (Elf_Internal_Shdr));
252b5132
RH
2937 if (i_shdrp[0] == NULL)
2938 {
2939 bfd_release (abfd, i_shdrp);
b34976b6 2940 return FALSE;
252b5132 2941 }
252b5132
RH
2942
2943 elf_elfsections (abfd) = i_shdrp;
2944
2945 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3516e984 2946 if (need_symtab)
252b5132
RH
2947 {
2948 i_shdrp[t->symtab_section] = &t->symtab_hdr;
4fbb74a6 2949 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf
AM
2950 {
2951 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
2952 t->symtab_shndx_hdr.sh_link = t->symtab_section;
2953 }
252b5132
RH
2954 i_shdrp[t->strtab_section] = &t->strtab_hdr;
2955 t->symtab_hdr.sh_link = t->strtab_section;
2956 }
38ce5b11 2957
252b5132
RH
2958 for (sec = abfd->sections; sec; sec = sec->next)
2959 {
252b5132
RH
2960 asection *s;
2961 const char *name;
2962
91d6fa6a
NC
2963 d = elf_section_data (sec);
2964
252b5132 2965 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
2966 if (d->rel.idx != 0)
2967 i_shdrp[d->rel.idx] = d->rel.hdr;
2968 if (d->rela.idx != 0)
2969 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
2970
2971 /* Fill in the sh_link and sh_info fields while we're at it. */
2972
2973 /* sh_link of a reloc section is the section index of the symbol
2974 table. sh_info is the section index of the section to which
2975 the relocation entries apply. */
d4730f92 2976 if (d->rel.idx != 0)
252b5132 2977 {
d4730f92
BS
2978 d->rel.hdr->sh_link = t->symtab_section;
2979 d->rel.hdr->sh_info = d->this_idx;
252b5132 2980 }
d4730f92 2981 if (d->rela.idx != 0)
23bc299b 2982 {
d4730f92
BS
2983 d->rela.hdr->sh_link = t->symtab_section;
2984 d->rela.hdr->sh_info = d->this_idx;
23bc299b 2985 }
252b5132 2986
38ce5b11
L
2987 /* We need to set up sh_link for SHF_LINK_ORDER. */
2988 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
2989 {
2990 s = elf_linked_to_section (sec);
2991 if (s)
38ce5b11 2992 {
f2876037 2993 /* elf_linked_to_section points to the input section. */
ccd2ec6a 2994 if (link_info != NULL)
38ce5b11 2995 {
f2876037 2996 /* Check discarded linkonce section. */
ccd2ec6a 2997 if (elf_discarded_section (s))
38ce5b11 2998 {
ccd2ec6a
L
2999 asection *kept;
3000 (*_bfd_error_handler)
3001 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3002 abfd, d->this_hdr.bfd_section,
3003 s, s->owner);
3004 /* Point to the kept section if it has the same
3005 size as the discarded one. */
c0f00686 3006 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3007 if (kept == NULL)
185d09ad 3008 {
ccd2ec6a
L
3009 bfd_set_error (bfd_error_bad_value);
3010 return FALSE;
185d09ad 3011 }
ccd2ec6a 3012 s = kept;
38ce5b11 3013 }
e424ecc8 3014
ccd2ec6a
L
3015 s = s->output_section;
3016 BFD_ASSERT (s != NULL);
38ce5b11 3017 }
f2876037
L
3018 else
3019 {
3020 /* Handle objcopy. */
3021 if (s->output_section == NULL)
3022 {
3023 (*_bfd_error_handler)
3024 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
3025 abfd, d->this_hdr.bfd_section, s, s->owner);
3026 bfd_set_error (bfd_error_bad_value);
3027 return FALSE;
3028 }
3029 s = s->output_section;
3030 }
ccd2ec6a
L
3031 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3032 }
3033 else
3034 {
3035 /* PR 290:
3036 The Intel C compiler generates SHT_IA_64_UNWIND with
3037 SHF_LINK_ORDER. But it doesn't set the sh_link or
3038 sh_info fields. Hence we could get the situation
08a40648 3039 where s is NULL. */
ccd2ec6a
L
3040 const struct elf_backend_data *bed
3041 = get_elf_backend_data (abfd);
3042 if (bed->link_order_error_handler)
3043 bed->link_order_error_handler
3044 (_("%B: warning: sh_link not set for section `%A'"),
3045 abfd, sec);
38ce5b11
L
3046 }
3047 }
3048
252b5132
RH
3049 switch (d->this_hdr.sh_type)
3050 {
3051 case SHT_REL:
3052 case SHT_RELA:
3053 /* A reloc section which we are treating as a normal BFD
3054 section. sh_link is the section index of the symbol
3055 table. sh_info is the section index of the section to
3056 which the relocation entries apply. We assume that an
3057 allocated reloc section uses the dynamic symbol table.
3058 FIXME: How can we be sure? */
3059 s = bfd_get_section_by_name (abfd, ".dynsym");
3060 if (s != NULL)
3061 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3062
3063 /* We look up the section the relocs apply to by name. */
3064 name = sec->name;
3065 if (d->this_hdr.sh_type == SHT_REL)
3066 name += 4;
3067 else
3068 name += 5;
3069 s = bfd_get_section_by_name (abfd, name);
3070 if (s != NULL)
3071 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3072 break;
3073
3074 case SHT_STRTAB:
3075 /* We assume that a section named .stab*str is a stabs
3076 string section. We look for a section with the same name
3077 but without the trailing ``str'', and set its sh_link
3078 field to point to this section. */
0112cd26 3079 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3080 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3081 {
3082 size_t len;
3083 char *alc;
3084
3085 len = strlen (sec->name);
a50b1753 3086 alc = (char *) bfd_malloc (len - 2);
252b5132 3087 if (alc == NULL)
b34976b6 3088 return FALSE;
d4c88bbb 3089 memcpy (alc, sec->name, len - 3);
252b5132
RH
3090 alc[len - 3] = '\0';
3091 s = bfd_get_section_by_name (abfd, alc);
3092 free (alc);
3093 if (s != NULL)
3094 {
3095 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3096
3097 /* This is a .stab section. */
0594c12d
AM
3098 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3099 elf_section_data (s)->this_hdr.sh_entsize
3100 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3101 }
3102 }
3103 break;
3104
3105 case SHT_DYNAMIC:
3106 case SHT_DYNSYM:
3107 case SHT_GNU_verneed:
3108 case SHT_GNU_verdef:
3109 /* sh_link is the section header index of the string table
3110 used for the dynamic entries, or the symbol table, or the
3111 version strings. */
3112 s = bfd_get_section_by_name (abfd, ".dynstr");
3113 if (s != NULL)
3114 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3115 break;
3116
7f1204bb
JJ
3117 case SHT_GNU_LIBLIST:
3118 /* sh_link is the section header index of the prelink library
08a40648
AM
3119 list used for the dynamic entries, or the symbol table, or
3120 the version strings. */
7f1204bb
JJ
3121 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3122 ? ".dynstr" : ".gnu.libstr");
3123 if (s != NULL)
3124 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3125 break;
3126
252b5132 3127 case SHT_HASH:
fdc90cb4 3128 case SHT_GNU_HASH:
252b5132
RH
3129 case SHT_GNU_versym:
3130 /* sh_link is the section header index of the symbol table
3131 this hash table or version table is for. */
3132 s = bfd_get_section_by_name (abfd, ".dynsym");
3133 if (s != NULL)
3134 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3135 break;
dbb410c3
AM
3136
3137 case SHT_GROUP:
3138 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3139 }
3140 }
3141
2b0f7ef9 3142 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3143 if (i_shdrp[secn] == NULL)
3144 i_shdrp[secn] = i_shdrp[0];
3145 else
3146 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3147 i_shdrp[secn]->sh_name);
b34976b6 3148 return TRUE;
252b5132
RH
3149}
3150
3151/* Map symbol from it's internal number to the external number, moving
3152 all local symbols to be at the head of the list. */
3153
5372391b 3154static bfd_boolean
217aa764 3155sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3156{
3157 /* If the backend has a special mapping, use it. */
9c5bfbb7 3158 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3159 if (bed->elf_backend_sym_is_global)
3160 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3161
e47bf690 3162 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3163 || bfd_is_und_section (bfd_get_section (sym))
3164 || bfd_is_com_section (bfd_get_section (sym)));
3165}
3166
5372391b 3167/* Don't output section symbols for sections that are not going to be
0f0a5e58 3168 output. */
5372391b
AM
3169
3170static bfd_boolean
3171ignore_section_sym (bfd *abfd, asymbol *sym)
3172{
3173 return ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58
AM
3174 && !(sym->section->owner == abfd
3175 || (sym->section->output_section->owner == abfd
3176 && sym->section->output_offset == 0)));
5372391b
AM
3177}
3178
b34976b6 3179static bfd_boolean
217aa764 3180elf_map_symbols (bfd *abfd)
252b5132 3181{
dc810e39 3182 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3183 asymbol **syms = bfd_get_outsymbols (abfd);
3184 asymbol **sect_syms;
dc810e39
AM
3185 unsigned int num_locals = 0;
3186 unsigned int num_globals = 0;
3187 unsigned int num_locals2 = 0;
3188 unsigned int num_globals2 = 0;
252b5132 3189 int max_index = 0;
dc810e39 3190 unsigned int idx;
252b5132
RH
3191 asection *asect;
3192 asymbol **new_syms;
252b5132
RH
3193
3194#ifdef DEBUG
3195 fprintf (stderr, "elf_map_symbols\n");
3196 fflush (stderr);
3197#endif
3198
252b5132
RH
3199 for (asect = abfd->sections; asect; asect = asect->next)
3200 {
3201 if (max_index < asect->index)
3202 max_index = asect->index;
3203 }
3204
3205 max_index++;
a50b1753 3206 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3207 if (sect_syms == NULL)
b34976b6 3208 return FALSE;
252b5132 3209 elf_section_syms (abfd) = sect_syms;
4e89ac30 3210 elf_num_section_syms (abfd) = max_index;
252b5132 3211
079e9a2f
AM
3212 /* Init sect_syms entries for any section symbols we have already
3213 decided to output. */
252b5132
RH
3214 for (idx = 0; idx < symcount; idx++)
3215 {
dc810e39 3216 asymbol *sym = syms[idx];
c044fabd 3217
252b5132 3218 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 3219 && sym->value == 0
5372391b 3220 && !ignore_section_sym (abfd, sym))
252b5132 3221 {
5372391b 3222 asection *sec = sym->section;
252b5132 3223
5372391b
AM
3224 if (sec->owner != abfd)
3225 sec = sec->output_section;
252b5132 3226
5372391b 3227 sect_syms[sec->index] = syms[idx];
252b5132
RH
3228 }
3229 }
3230
252b5132
RH
3231 /* Classify all of the symbols. */
3232 for (idx = 0; idx < symcount; idx++)
3233 {
5372391b
AM
3234 if (ignore_section_sym (abfd, syms[idx]))
3235 continue;
252b5132
RH
3236 if (!sym_is_global (abfd, syms[idx]))
3237 num_locals++;
3238 else
3239 num_globals++;
3240 }
079e9a2f 3241
5372391b 3242 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3243 sections will already have a section symbol in outsymbols, but
3244 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3245 at least in that case. */
252b5132
RH
3246 for (asect = abfd->sections; asect; asect = asect->next)
3247 {
079e9a2f 3248 if (sect_syms[asect->index] == NULL)
252b5132 3249 {
079e9a2f 3250 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3251 num_locals++;
3252 else
3253 num_globals++;
252b5132
RH
3254 }
3255 }
3256
3257 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
3258 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
3259 sizeof (asymbol *));
dc810e39 3260
252b5132 3261 if (new_syms == NULL)
b34976b6 3262 return FALSE;
252b5132
RH
3263
3264 for (idx = 0; idx < symcount; idx++)
3265 {
3266 asymbol *sym = syms[idx];
dc810e39 3267 unsigned int i;
252b5132 3268
5372391b
AM
3269 if (ignore_section_sym (abfd, sym))
3270 continue;
252b5132
RH
3271 if (!sym_is_global (abfd, sym))
3272 i = num_locals2++;
3273 else
3274 i = num_locals + num_globals2++;
3275 new_syms[i] = sym;
3276 sym->udata.i = i + 1;
3277 }
3278 for (asect = abfd->sections; asect; asect = asect->next)
3279 {
079e9a2f 3280 if (sect_syms[asect->index] == NULL)
252b5132 3281 {
079e9a2f 3282 asymbol *sym = asect->symbol;
dc810e39 3283 unsigned int i;
252b5132 3284
079e9a2f 3285 sect_syms[asect->index] = sym;
252b5132
RH
3286 if (!sym_is_global (abfd, sym))
3287 i = num_locals2++;
3288 else
3289 i = num_locals + num_globals2++;
3290 new_syms[i] = sym;
3291 sym->udata.i = i + 1;
3292 }
3293 }
3294
3295 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3296
3297 elf_num_locals (abfd) = num_locals;
3298 elf_num_globals (abfd) = num_globals;
b34976b6 3299 return TRUE;
252b5132
RH
3300}
3301
3302/* Align to the maximum file alignment that could be required for any
3303 ELF data structure. */
3304
268b6b39 3305static inline file_ptr
217aa764 3306align_file_position (file_ptr off, int align)
252b5132
RH
3307{
3308 return (off + align - 1) & ~(align - 1);
3309}
3310
3311/* Assign a file position to a section, optionally aligning to the
3312 required section alignment. */
3313
217aa764
AM
3314file_ptr
3315_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3316 file_ptr offset,
3317 bfd_boolean align)
252b5132 3318{
72de5009
AM
3319 if (align && i_shdrp->sh_addralign > 1)
3320 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
3321 i_shdrp->sh_offset = offset;
3322 if (i_shdrp->bfd_section != NULL)
3323 i_shdrp->bfd_section->filepos = offset;
3324 if (i_shdrp->sh_type != SHT_NOBITS)
3325 offset += i_shdrp->sh_size;
3326 return offset;
3327}
3328
3329/* Compute the file positions we are going to put the sections at, and
3330 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3331 is not NULL, this is being called by the ELF backend linker. */
3332
b34976b6 3333bfd_boolean
217aa764
AM
3334_bfd_elf_compute_section_file_positions (bfd *abfd,
3335 struct bfd_link_info *link_info)
252b5132 3336{
9c5bfbb7 3337 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3338 struct fake_section_arg fsargs;
b34976b6 3339 bfd_boolean failed;
4b6c0f2f 3340 struct bfd_strtab_hash *strtab = NULL;
252b5132 3341 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 3342 bfd_boolean need_symtab;
252b5132
RH
3343
3344 if (abfd->output_has_begun)
b34976b6 3345 return TRUE;
252b5132
RH
3346
3347 /* Do any elf backend specific processing first. */
3348 if (bed->elf_backend_begin_write_processing)
3349 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3350
3351 if (! prep_headers (abfd))
b34976b6 3352 return FALSE;
252b5132 3353
e6c51ed4
NC
3354 /* Post process the headers if necessary. */
3355 if (bed->elf_backend_post_process_headers)
3356 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3357
d4730f92
BS
3358 fsargs.failed = FALSE;
3359 fsargs.link_info = link_info;
3360 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
3361 if (fsargs.failed)
b34976b6 3362 return FALSE;
252b5132 3363
da9f89d4 3364 if (!assign_section_numbers (abfd, link_info))
b34976b6 3365 return FALSE;
252b5132
RH
3366
3367 /* The backend linker builds symbol table information itself. */
3516e984
L
3368 need_symtab = (link_info == NULL
3369 && (bfd_get_symcount (abfd) > 0
3370 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3371 == HAS_RELOC)));
3372 if (need_symtab)
252b5132
RH
3373 {
3374 /* Non-zero if doing a relocatable link. */
3375 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3376
3377 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3378 return FALSE;
252b5132
RH
3379 }
3380
d4730f92 3381 failed = FALSE;
1126897b 3382 if (link_info == NULL)
dbb410c3 3383 {
1126897b 3384 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3385 if (failed)
b34976b6 3386 return FALSE;
dbb410c3
AM
3387 }
3388
252b5132
RH
3389 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3390 /* sh_name was set in prep_headers. */
3391 shstrtab_hdr->sh_type = SHT_STRTAB;
3392 shstrtab_hdr->sh_flags = 0;
3393 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3394 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3395 shstrtab_hdr->sh_entsize = 0;
3396 shstrtab_hdr->sh_link = 0;
3397 shstrtab_hdr->sh_info = 0;
3398 /* sh_offset is set in assign_file_positions_except_relocs. */
3399 shstrtab_hdr->sh_addralign = 1;
3400
c84fca4d 3401 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3402 return FALSE;
252b5132 3403
3516e984 3404 if (need_symtab)
252b5132
RH
3405 {
3406 file_ptr off;
3407 Elf_Internal_Shdr *hdr;
3408
3409 off = elf_tdata (abfd)->next_file_pos;
3410
3411 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3412 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3413
9ad5cbcf
AM
3414 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3415 if (hdr->sh_size != 0)
b34976b6 3416 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3417
252b5132 3418 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3419 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3420
3421 elf_tdata (abfd)->next_file_pos = off;
3422
3423 /* Now that we know where the .strtab section goes, write it
08a40648 3424 out. */
252b5132
RH
3425 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3426 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3427 return FALSE;
252b5132
RH
3428 _bfd_stringtab_free (strtab);
3429 }
3430
b34976b6 3431 abfd->output_has_begun = TRUE;
252b5132 3432
b34976b6 3433 return TRUE;
252b5132
RH
3434}
3435
8ded5a0f
AM
3436/* Make an initial estimate of the size of the program header. If we
3437 get the number wrong here, we'll redo section placement. */
3438
3439static bfd_size_type
3440get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3441{
3442 size_t segs;
3443 asection *s;
2b05f1b7 3444 const struct elf_backend_data *bed;
8ded5a0f
AM
3445
3446 /* Assume we will need exactly two PT_LOAD segments: one for text
3447 and one for data. */
3448 segs = 2;
3449
3450 s = bfd_get_section_by_name (abfd, ".interp");
3451 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3452 {
3453 /* If we have a loadable interpreter section, we need a
3454 PT_INTERP segment. In this case, assume we also need a
3455 PT_PHDR segment, although that may not be true for all
3456 targets. */
3457 segs += 2;
3458 }
3459
3460 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3461 {
3462 /* We need a PT_DYNAMIC segment. */
3463 ++segs;
f210dcff 3464 }
08a40648 3465
ceae84aa 3466 if (info != NULL && info->relro)
f210dcff
L
3467 {
3468 /* We need a PT_GNU_RELRO segment. */
3469 ++segs;
8ded5a0f
AM
3470 }
3471
3472 if (elf_tdata (abfd)->eh_frame_hdr)
3473 {
3474 /* We need a PT_GNU_EH_FRAME segment. */
3475 ++segs;
3476 }
3477
2b05f1b7 3478 if (elf_tdata (abfd)->stack_flags)
8ded5a0f 3479 {
2b05f1b7
L
3480 /* We need a PT_GNU_STACK segment. */
3481 ++segs;
3482 }
94b11780 3483
2b05f1b7
L
3484 for (s = abfd->sections; s != NULL; s = s->next)
3485 {
8ded5a0f 3486 if ((s->flags & SEC_LOAD) != 0
0112cd26 3487 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3488 {
3489 /* We need a PT_NOTE segment. */
3490 ++segs;
1c5265b5
JJ
3491 /* Try to create just one PT_NOTE segment
3492 for all adjacent loadable .note* sections.
3493 gABI requires that within a PT_NOTE segment
3494 (and also inside of each SHT_NOTE section)
3495 each note is padded to a multiple of 4 size,
3496 so we check whether the sections are correctly
3497 aligned. */
3498 if (s->alignment_power == 2)
3499 while (s->next != NULL
3500 && s->next->alignment_power == 2
3501 && (s->next->flags & SEC_LOAD) != 0
3502 && CONST_STRNEQ (s->next->name, ".note"))
3503 s = s->next;
8ded5a0f
AM
3504 }
3505 }
3506
3507 for (s = abfd->sections; s != NULL; s = s->next)
3508 {
3509 if (s->flags & SEC_THREAD_LOCAL)
3510 {
3511 /* We need a PT_TLS segment. */
3512 ++segs;
3513 break;
3514 }
3515 }
3516
3517 /* Let the backend count up any program headers it might need. */
2b05f1b7 3518 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
3519 if (bed->elf_backend_additional_program_headers)
3520 {
3521 int a;
3522
3523 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3524 if (a == -1)
3525 abort ();
3526 segs += a;
3527 }
3528
3529 return segs * bed->s->sizeof_phdr;
3530}
3531
2ea37f1c
NC
3532/* Find the segment that contains the output_section of section. */
3533
3534Elf_Internal_Phdr *
3535_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
3536{
3537 struct elf_segment_map *m;
3538 Elf_Internal_Phdr *p;
3539
3540 for (m = elf_tdata (abfd)->segment_map,
3541 p = elf_tdata (abfd)->phdr;
3542 m != NULL;
3543 m = m->next, p++)
3544 {
3545 int i;
3546
3547 for (i = m->count - 1; i >= 0; i--)
3548 if (m->sections[i] == section)
3549 return p;
3550 }
3551
3552 return NULL;
3553}
3554
252b5132
RH
3555/* Create a mapping from a set of sections to a program segment. */
3556
217aa764
AM
3557static struct elf_segment_map *
3558make_mapping (bfd *abfd,
3559 asection **sections,
3560 unsigned int from,
3561 unsigned int to,
3562 bfd_boolean phdr)
252b5132
RH
3563{
3564 struct elf_segment_map *m;
3565 unsigned int i;
3566 asection **hdrpp;
dc810e39 3567 bfd_size_type amt;
252b5132 3568
dc810e39
AM
3569 amt = sizeof (struct elf_segment_map);
3570 amt += (to - from - 1) * sizeof (asection *);
a50b1753 3571 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
3572 if (m == NULL)
3573 return NULL;
3574 m->next = NULL;
3575 m->p_type = PT_LOAD;
3576 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3577 m->sections[i - from] = *hdrpp;
3578 m->count = to - from;
3579
3580 if (from == 0 && phdr)
3581 {
3582 /* Include the headers in the first PT_LOAD segment. */
3583 m->includes_filehdr = 1;
3584 m->includes_phdrs = 1;
3585 }
3586
3587 return m;
3588}
3589
229fcec5
MM
3590/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3591 on failure. */
3592
3593struct elf_segment_map *
3594_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3595{
3596 struct elf_segment_map *m;
3597
a50b1753
NC
3598 m = (struct elf_segment_map *) bfd_zalloc (abfd,
3599 sizeof (struct elf_segment_map));
229fcec5
MM
3600 if (m == NULL)
3601 return NULL;
3602 m->next = NULL;
3603 m->p_type = PT_DYNAMIC;
3604 m->count = 1;
3605 m->sections[0] = dynsec;
08a40648 3606
229fcec5
MM
3607 return m;
3608}
3609
8ded5a0f 3610/* Possibly add or remove segments from the segment map. */
252b5132 3611
b34976b6 3612static bfd_boolean
3dea8fca
AM
3613elf_modify_segment_map (bfd *abfd,
3614 struct bfd_link_info *info,
3615 bfd_boolean remove_empty_load)
252b5132 3616{
252e386e 3617 struct elf_segment_map **m;
8ded5a0f 3618 const struct elf_backend_data *bed;
252b5132 3619
8ded5a0f
AM
3620 /* The placement algorithm assumes that non allocated sections are
3621 not in PT_LOAD segments. We ensure this here by removing such
3622 sections from the segment map. We also remove excluded
252e386e
AM
3623 sections. Finally, any PT_LOAD segment without sections is
3624 removed. */
3625 m = &elf_tdata (abfd)->segment_map;
3626 while (*m)
8ded5a0f
AM
3627 {
3628 unsigned int i, new_count;
252b5132 3629
252e386e 3630 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3631 {
252e386e
AM
3632 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3633 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3634 || (*m)->p_type != PT_LOAD))
8ded5a0f 3635 {
252e386e
AM
3636 (*m)->sections[new_count] = (*m)->sections[i];
3637 new_count++;
8ded5a0f
AM
3638 }
3639 }
252e386e 3640 (*m)->count = new_count;
252b5132 3641
3dea8fca 3642 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
3643 *m = (*m)->next;
3644 else
3645 m = &(*m)->next;
8ded5a0f 3646 }
252b5132 3647
8ded5a0f
AM
3648 bed = get_elf_backend_data (abfd);
3649 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3650 {
252e386e 3651 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3652 return FALSE;
252b5132 3653 }
252b5132 3654
8ded5a0f
AM
3655 return TRUE;
3656}
252b5132 3657
8ded5a0f 3658/* Set up a mapping from BFD sections to program segments. */
252b5132 3659
8ded5a0f
AM
3660bfd_boolean
3661_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3662{
3663 unsigned int count;
3664 struct elf_segment_map *m;
3665 asection **sections = NULL;
3666 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 3667 bfd_boolean no_user_phdrs;
252b5132 3668
3dea8fca
AM
3669 no_user_phdrs = elf_tdata (abfd)->segment_map == NULL;
3670 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 3671 {
8ded5a0f
AM
3672 asection *s;
3673 unsigned int i;
3674 struct elf_segment_map *mfirst;
3675 struct elf_segment_map **pm;
3676 asection *last_hdr;
3677 bfd_vma last_size;
3678 unsigned int phdr_index;
3679 bfd_vma maxpagesize;
3680 asection **hdrpp;
3681 bfd_boolean phdr_in_segment = TRUE;
3682 bfd_boolean writable;
3683 int tls_count = 0;
3684 asection *first_tls = NULL;
3685 asection *dynsec, *eh_frame_hdr;
3686 bfd_size_type amt;
8d06853e 3687 bfd_vma addr_mask, wrap_to = 0;
252b5132 3688
8ded5a0f 3689 /* Select the allocated sections, and sort them. */
252b5132 3690
a50b1753
NC
3691 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
3692 sizeof (asection *));
8ded5a0f 3693 if (sections == NULL)
252b5132 3694 goto error_return;
252b5132 3695
8d06853e
AM
3696 /* Calculate top address, avoiding undefined behaviour of shift
3697 left operator when shift count is equal to size of type
3698 being shifted. */
3699 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
3700 addr_mask = (addr_mask << 1) + 1;
3701
8ded5a0f
AM
3702 i = 0;
3703 for (s = abfd->sections; s != NULL; s = s->next)
3704 {
3705 if ((s->flags & SEC_ALLOC) != 0)
3706 {
3707 sections[i] = s;
3708 ++i;
8d06853e
AM
3709 /* A wrapping section potentially clashes with header. */
3710 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
3711 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
3712 }
3713 }
3714 BFD_ASSERT (i <= bfd_count_sections (abfd));
3715 count = i;
252b5132 3716
8ded5a0f 3717 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 3718
8ded5a0f 3719 /* Build the mapping. */
252b5132 3720
8ded5a0f
AM
3721 mfirst = NULL;
3722 pm = &mfirst;
252b5132 3723
8ded5a0f
AM
3724 /* If we have a .interp section, then create a PT_PHDR segment for
3725 the program headers and a PT_INTERP segment for the .interp
3726 section. */
3727 s = bfd_get_section_by_name (abfd, ".interp");
3728 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3729 {
3730 amt = sizeof (struct elf_segment_map);
a50b1753 3731 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3732 if (m == NULL)
3733 goto error_return;
3734 m->next = NULL;
3735 m->p_type = PT_PHDR;
3736 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3737 m->p_flags = PF_R | PF_X;
3738 m->p_flags_valid = 1;
3739 m->includes_phdrs = 1;
252b5132 3740
8ded5a0f
AM
3741 *pm = m;
3742 pm = &m->next;
252b5132 3743
8ded5a0f 3744 amt = sizeof (struct elf_segment_map);
a50b1753 3745 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3746 if (m == NULL)
3747 goto error_return;
3748 m->next = NULL;
3749 m->p_type = PT_INTERP;
3750 m->count = 1;
3751 m->sections[0] = s;
3752
3753 *pm = m;
3754 pm = &m->next;
252b5132 3755 }
8ded5a0f
AM
3756
3757 /* Look through the sections. We put sections in the same program
3758 segment when the start of the second section can be placed within
3759 a few bytes of the end of the first section. */
3760 last_hdr = NULL;
3761 last_size = 0;
3762 phdr_index = 0;
3763 maxpagesize = bed->maxpagesize;
3764 writable = FALSE;
3765 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3766 if (dynsec != NULL
3767 && (dynsec->flags & SEC_LOAD) == 0)
3768 dynsec = NULL;
3769
3770 /* Deal with -Ttext or something similar such that the first section
3771 is not adjacent to the program headers. This is an
3772 approximation, since at this point we don't know exactly how many
3773 program headers we will need. */
3774 if (count > 0)
252b5132 3775 {
8ded5a0f
AM
3776 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
3777
62d7a5f6 3778 if (phdr_size == (bfd_size_type) -1)
8ded5a0f
AM
3779 phdr_size = get_program_header_size (abfd, info);
3780 if ((abfd->flags & D_PAGED) == 0
8d06853e
AM
3781 || (sections[0]->lma & addr_mask) < phdr_size
3782 || ((sections[0]->lma & addr_mask) % maxpagesize
3783 < phdr_size % maxpagesize)
3784 || (sections[0]->lma & addr_mask & -maxpagesize) < wrap_to)
8ded5a0f 3785 phdr_in_segment = FALSE;
252b5132
RH
3786 }
3787
8ded5a0f 3788 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 3789 {
8ded5a0f
AM
3790 asection *hdr;
3791 bfd_boolean new_segment;
3792
3793 hdr = *hdrpp;
3794
3795 /* See if this section and the last one will fit in the same
3796 segment. */
3797
3798 if (last_hdr == NULL)
3799 {
3800 /* If we don't have a segment yet, then we don't need a new
3801 one (we build the last one after this loop). */
3802 new_segment = FALSE;
3803 }
3804 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3805 {
3806 /* If this section has a different relation between the
3807 virtual address and the load address, then we need a new
3808 segment. */
3809 new_segment = TRUE;
3810 }
b5599592
AM
3811 else if (hdr->lma < last_hdr->lma + last_size
3812 || last_hdr->lma + last_size < last_hdr->lma)
3813 {
3814 /* If this section has a load address that makes it overlap
3815 the previous section, then we need a new segment. */
3816 new_segment = TRUE;
3817 }
39948a60
NC
3818 /* In the next test we have to be careful when last_hdr->lma is close
3819 to the end of the address space. If the aligned address wraps
3820 around to the start of the address space, then there are no more
3821 pages left in memory and it is OK to assume that the current
3822 section can be included in the current segment. */
3823 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
3824 > last_hdr->lma)
3825 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 3826 <= hdr->lma))
8ded5a0f
AM
3827 {
3828 /* If putting this section in this segment would force us to
3829 skip a page in the segment, then we need a new segment. */
3830 new_segment = TRUE;
3831 }
3832 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3833 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
3834 {
3835 /* We don't want to put a loadable section after a
3836 nonloadable section in the same segment.
3837 Consider .tbss sections as loadable for this purpose. */
3838 new_segment = TRUE;
3839 }
3840 else if ((abfd->flags & D_PAGED) == 0)
3841 {
3842 /* If the file is not demand paged, which means that we
3843 don't require the sections to be correctly aligned in the
3844 file, then there is no other reason for a new segment. */
3845 new_segment = FALSE;
3846 }
3847 else if (! writable
3848 && (hdr->flags & SEC_READONLY) == 0
8d06853e
AM
3849 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
3850 != (hdr->lma & -maxpagesize)))
8ded5a0f
AM
3851 {
3852 /* We don't want to put a writable section in a read only
3853 segment, unless they are on the same page in memory
3854 anyhow. We already know that the last section does not
3855 bring us past the current section on the page, so the
3856 only case in which the new section is not on the same
3857 page as the previous section is when the previous section
3858 ends precisely on a page boundary. */
3859 new_segment = TRUE;
3860 }
3861 else
3862 {
3863 /* Otherwise, we can use the same segment. */
3864 new_segment = FALSE;
3865 }
3866
2889e75b 3867 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
3868 if (last_hdr != NULL
3869 && info != NULL
3870 && info->callbacks->override_segment_assignment != NULL)
3871 new_segment
3872 = info->callbacks->override_segment_assignment (info, abfd, hdr,
3873 last_hdr,
3874 new_segment);
2889e75b 3875
8ded5a0f
AM
3876 if (! new_segment)
3877 {
3878 if ((hdr->flags & SEC_READONLY) == 0)
3879 writable = TRUE;
3880 last_hdr = hdr;
3881 /* .tbss sections effectively have zero size. */
3882 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
3883 != SEC_THREAD_LOCAL)
3884 last_size = hdr->size;
3885 else
3886 last_size = 0;
3887 continue;
3888 }
3889
3890 /* We need a new program segment. We must create a new program
3891 header holding all the sections from phdr_index until hdr. */
3892
3893 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3894 if (m == NULL)
3895 goto error_return;
3896
3897 *pm = m;
3898 pm = &m->next;
3899
252b5132 3900 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3901 writable = TRUE;
8ded5a0f
AM
3902 else
3903 writable = FALSE;
3904
baaff79e
JJ
3905 last_hdr = hdr;
3906 /* .tbss sections effectively have zero size. */
e5caec89 3907 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3908 last_size = hdr->size;
baaff79e
JJ
3909 else
3910 last_size = 0;
8ded5a0f
AM
3911 phdr_index = i;
3912 phdr_in_segment = FALSE;
252b5132
RH
3913 }
3914
8ded5a0f
AM
3915 /* Create a final PT_LOAD program segment. */
3916 if (last_hdr != NULL)
3917 {
3918 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3919 if (m == NULL)
3920 goto error_return;
252b5132 3921
8ded5a0f
AM
3922 *pm = m;
3923 pm = &m->next;
3924 }
252b5132 3925
8ded5a0f
AM
3926 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3927 if (dynsec != NULL)
3928 {
3929 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
3930 if (m == NULL)
3931 goto error_return;
3932 *pm = m;
3933 pm = &m->next;
3934 }
252b5132 3935
1c5265b5
JJ
3936 /* For each batch of consecutive loadable .note sections,
3937 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
3938 because if we link together nonloadable .note sections and
3939 loadable .note sections, we will generate two .note sections
3940 in the output file. FIXME: Using names for section types is
3941 bogus anyhow. */
8ded5a0f
AM
3942 for (s = abfd->sections; s != NULL; s = s->next)
3943 {
3944 if ((s->flags & SEC_LOAD) != 0
0112cd26 3945 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 3946 {
1c5265b5 3947 asection *s2;
91d6fa6a
NC
3948
3949 count = 1;
8ded5a0f 3950 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
3951 if (s->alignment_power == 2)
3952 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
3953 {
3954 if (s2->next->alignment_power == 2
3955 && (s2->next->flags & SEC_LOAD) != 0
3956 && CONST_STRNEQ (s2->next->name, ".note")
8d06853e
AM
3957 && align_power (s2->lma + s2->size, 2)
3958 == s2->next->lma)
55b581a6
JJ
3959 count++;
3960 else
3961 break;
3962 }
1c5265b5 3963 amt += (count - 1) * sizeof (asection *);
a50b1753 3964 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3965 if (m == NULL)
3966 goto error_return;
3967 m->next = NULL;
3968 m->p_type = PT_NOTE;
1c5265b5
JJ
3969 m->count = count;
3970 while (count > 1)
3971 {
3972 m->sections[m->count - count--] = s;
3973 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
3974 s = s->next;
3975 }
3976 m->sections[m->count - 1] = s;
3977 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
3978 *pm = m;
3979 pm = &m->next;
3980 }
3981 if (s->flags & SEC_THREAD_LOCAL)
3982 {
3983 if (! tls_count)
3984 first_tls = s;
3985 tls_count++;
3986 }
3987 }
252b5132 3988
8ded5a0f
AM
3989 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3990 if (tls_count > 0)
3991 {
8ded5a0f
AM
3992 amt = sizeof (struct elf_segment_map);
3993 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 3994 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3995 if (m == NULL)
3996 goto error_return;
3997 m->next = NULL;
3998 m->p_type = PT_TLS;
3999 m->count = tls_count;
4000 /* Mandated PF_R. */
4001 m->p_flags = PF_R;
4002 m->p_flags_valid = 1;
91d6fa6a 4003 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f
AM
4004 {
4005 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
4006 m->sections[i] = first_tls;
4007 first_tls = first_tls->next;
4008 }
252b5132 4009
8ded5a0f
AM
4010 *pm = m;
4011 pm = &m->next;
4012 }
252b5132 4013
8ded5a0f
AM
4014 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4015 segment. */
4016 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
4017 if (eh_frame_hdr != NULL
4018 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 4019 {
dc810e39 4020 amt = sizeof (struct elf_segment_map);
a50b1753 4021 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4022 if (m == NULL)
4023 goto error_return;
4024 m->next = NULL;
8ded5a0f 4025 m->p_type = PT_GNU_EH_FRAME;
252b5132 4026 m->count = 1;
8ded5a0f 4027 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
4028
4029 *pm = m;
4030 pm = &m->next;
4031 }
13ae64f3 4032
8ded5a0f 4033 if (elf_tdata (abfd)->stack_flags)
13ae64f3 4034 {
8ded5a0f 4035 amt = sizeof (struct elf_segment_map);
a50b1753 4036 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4037 if (m == NULL)
4038 goto error_return;
4039 m->next = NULL;
2b05f1b7 4040 m->p_type = PT_GNU_STACK;
8ded5a0f
AM
4041 m->p_flags = elf_tdata (abfd)->stack_flags;
4042 m->p_flags_valid = 1;
252b5132 4043
8ded5a0f
AM
4044 *pm = m;
4045 pm = &m->next;
4046 }
65765700 4047
ceae84aa 4048 if (info != NULL && info->relro)
8ded5a0f 4049 {
f210dcff
L
4050 for (m = mfirst; m != NULL; m = m->next)
4051 {
4052 if (m->p_type == PT_LOAD)
4053 {
4054 asection *last = m->sections[m->count - 1];
4055 bfd_vma vaddr = m->sections[0]->vma;
4056 bfd_vma filesz = last->vma - vaddr + last->size;
65765700 4057
f210dcff
L
4058 if (vaddr < info->relro_end
4059 && vaddr >= info->relro_start
4060 && (vaddr + filesz) >= info->relro_end)
4061 break;
4062 }
4063 }
4064
4065 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
4066 if (m != NULL)
4067 {
4068 amt = sizeof (struct elf_segment_map);
a50b1753 4069 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
4070 if (m == NULL)
4071 goto error_return;
4072 m->next = NULL;
4073 m->p_type = PT_GNU_RELRO;
4074 m->p_flags = PF_R;
4075 m->p_flags_valid = 1;
4076
4077 *pm = m;
4078 pm = &m->next;
4079 }
8ded5a0f 4080 }
9ee5e499 4081
8ded5a0f
AM
4082 free (sections);
4083 elf_tdata (abfd)->segment_map = mfirst;
9ee5e499
JJ
4084 }
4085
3dea8fca 4086 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 4087 return FALSE;
8c37241b 4088
8ded5a0f
AM
4089 for (count = 0, m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4090 ++count;
4091 elf_tdata (abfd)->program_header_size = count * bed->s->sizeof_phdr;
252b5132 4092
b34976b6 4093 return TRUE;
252b5132
RH
4094
4095 error_return:
4096 if (sections != NULL)
4097 free (sections);
b34976b6 4098 return FALSE;
252b5132
RH
4099}
4100
4101/* Sort sections by address. */
4102
4103static int
217aa764 4104elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4105{
4106 const asection *sec1 = *(const asection **) arg1;
4107 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4108 bfd_size_type size1, size2;
252b5132
RH
4109
4110 /* Sort by LMA first, since this is the address used to
4111 place the section into a segment. */
4112 if (sec1->lma < sec2->lma)
4113 return -1;
4114 else if (sec1->lma > sec2->lma)
4115 return 1;
4116
4117 /* Then sort by VMA. Normally the LMA and the VMA will be
4118 the same, and this will do nothing. */
4119 if (sec1->vma < sec2->vma)
4120 return -1;
4121 else if (sec1->vma > sec2->vma)
4122 return 1;
4123
4124 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4125
07c6e936 4126#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4127
4128 if (TOEND (sec1))
4129 {
4130 if (TOEND (sec2))
00a7cdc5
NC
4131 {
4132 /* If the indicies are the same, do not return 0
4133 here, but continue to try the next comparison. */
4134 if (sec1->target_index - sec2->target_index != 0)
4135 return sec1->target_index - sec2->target_index;
4136 }
252b5132
RH
4137 else
4138 return 1;
4139 }
00a7cdc5 4140 else if (TOEND (sec2))
252b5132
RH
4141 return -1;
4142
4143#undef TOEND
4144
00a7cdc5
NC
4145 /* Sort by size, to put zero sized sections
4146 before others at the same address. */
252b5132 4147
eea6121a
AM
4148 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4149 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4150
4151 if (size1 < size2)
252b5132 4152 return -1;
eecdbe52 4153 if (size1 > size2)
252b5132
RH
4154 return 1;
4155
4156 return sec1->target_index - sec2->target_index;
4157}
4158
340b6d91
AC
4159/* Ian Lance Taylor writes:
4160
4161 We shouldn't be using % with a negative signed number. That's just
4162 not good. We have to make sure either that the number is not
4163 negative, or that the number has an unsigned type. When the types
4164 are all the same size they wind up as unsigned. When file_ptr is a
4165 larger signed type, the arithmetic winds up as signed long long,
4166 which is wrong.
4167
4168 What we're trying to say here is something like ``increase OFF by
4169 the least amount that will cause it to be equal to the VMA modulo
4170 the page size.'' */
4171/* In other words, something like:
4172
4173 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4174 off_offset = off % bed->maxpagesize;
4175 if (vma_offset < off_offset)
4176 adjustment = vma_offset + bed->maxpagesize - off_offset;
4177 else
4178 adjustment = vma_offset - off_offset;
08a40648 4179
340b6d91
AC
4180 which can can be collapsed into the expression below. */
4181
4182static file_ptr
4183vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4184{
4185 return ((vma - off) % maxpagesize);
4186}
4187
6d33f217
L
4188static void
4189print_segment_map (const struct elf_segment_map *m)
4190{
4191 unsigned int j;
4192 const char *pt = get_segment_type (m->p_type);
4193 char buf[32];
4194
4195 if (pt == NULL)
4196 {
4197 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4198 sprintf (buf, "LOPROC+%7.7x",
4199 (unsigned int) (m->p_type - PT_LOPROC));
4200 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4201 sprintf (buf, "LOOS+%7.7x",
4202 (unsigned int) (m->p_type - PT_LOOS));
4203 else
4204 snprintf (buf, sizeof (buf), "%8.8x",
4205 (unsigned int) m->p_type);
4206 pt = buf;
4207 }
4208 fprintf (stderr, "%s:", pt);
4209 for (j = 0; j < m->count; j++)
4210 fprintf (stderr, " %s", m->sections [j]->name);
4211 putc ('\n',stderr);
4212}
4213
32812159
AM
4214static bfd_boolean
4215write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
4216{
4217 void *buf;
4218 bfd_boolean ret;
4219
4220 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
4221 return FALSE;
4222 buf = bfd_zmalloc (len);
4223 if (buf == NULL)
4224 return FALSE;
4225 ret = bfd_bwrite (buf, len, abfd) == len;
4226 free (buf);
4227 return ret;
4228}
4229
252b5132
RH
4230/* Assign file positions to the sections based on the mapping from
4231 sections to segments. This function also sets up some fields in
f3520d2f 4232 the file header. */
252b5132 4233
b34976b6 4234static bfd_boolean
f3520d2f
AM
4235assign_file_positions_for_load_sections (bfd *abfd,
4236 struct bfd_link_info *link_info)
252b5132
RH
4237{
4238 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4239 struct elf_segment_map *m;
252b5132 4240 Elf_Internal_Phdr *phdrs;
252b5132 4241 Elf_Internal_Phdr *p;
02bf8d82 4242 file_ptr off;
3f570048 4243 bfd_size_type maxpagesize;
f3520d2f 4244 unsigned int alloc;
0920dee7 4245 unsigned int i, j;
2b0bc088 4246 bfd_vma header_pad = 0;
252b5132 4247
e36284ab 4248 if (link_info == NULL
ceae84aa 4249 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 4250 return FALSE;
252b5132 4251
8ded5a0f 4252 alloc = 0;
252b5132 4253 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
2b0bc088
NC
4254 {
4255 ++alloc;
4256 if (m->header_size)
4257 header_pad = m->header_size;
4258 }
252b5132
RH
4259
4260 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4261 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
8ded5a0f 4262 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4263
62d7a5f6 4264 if (elf_tdata (abfd)->program_header_size == (bfd_size_type) -1)
8ded5a0f
AM
4265 elf_tdata (abfd)->program_header_size = alloc * bed->s->sizeof_phdr;
4266 else
4267 BFD_ASSERT (elf_tdata (abfd)->program_header_size
59e0647f 4268 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4269
4270 if (alloc == 0)
f3520d2f 4271 {
8ded5a0f
AM
4272 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4273 return TRUE;
f3520d2f 4274 }
252b5132 4275
57268894
HPN
4276 /* We're writing the size in elf_tdata (abfd)->program_header_size,
4277 see assign_file_positions_except_relocs, so make sure we have
4278 that amount allocated, with trailing space cleared.
4279 The variable alloc contains the computed need, while elf_tdata
4280 (abfd)->program_header_size contains the size used for the
4281 layout.
4282 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
4283 where the layout is forced to according to a larger size in the
4284 last iterations for the testcase ld-elf/header. */
4285 BFD_ASSERT (elf_tdata (abfd)->program_header_size % bed->s->sizeof_phdr
4286 == 0);
a50b1753
NC
4287 phdrs = (Elf_Internal_Phdr *)
4288 bfd_zalloc2 (abfd,
4289 (elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr),
4290 sizeof (Elf_Internal_Phdr));
f3520d2f 4291 elf_tdata (abfd)->phdr = phdrs;
252b5132 4292 if (phdrs == NULL)
b34976b6 4293 return FALSE;
252b5132 4294
3f570048
AM
4295 maxpagesize = 1;
4296 if ((abfd->flags & D_PAGED) != 0)
4297 maxpagesize = bed->maxpagesize;
4298
252b5132
RH
4299 off = bed->s->sizeof_ehdr;
4300 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4301 if (header_pad < (bfd_vma) off)
4302 header_pad = 0;
4303 else
4304 header_pad -= off;
4305 off += header_pad;
252b5132 4306
0920dee7 4307 for (m = elf_tdata (abfd)->segment_map, p = phdrs, j = 0;
252b5132 4308 m != NULL;
0920dee7 4309 m = m->next, p++, j++)
252b5132 4310 {
252b5132 4311 asection **secpp;
bf988460
AM
4312 bfd_vma off_adjust;
4313 bfd_boolean no_contents;
252b5132
RH
4314
4315 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4316 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4317 not be done to the PT_NOTE section of a corefile, which may
4318 contain several pseudo-sections artificially created by bfd.
4319 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4320 if (m->count > 1
4321 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4322 && m->p_type == PT_NOTE))
252b5132
RH
4323 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4324 elf_sort_sections);
4325
b301b248
AM
4326 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4327 number of sections with contents contributing to both p_filesz
4328 and p_memsz, followed by a number of sections with no contents
4329 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4330 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4331 p->p_type = m->p_type;
28a7f3e7 4332 p->p_flags = m->p_flags;
252b5132 4333
3f570048
AM
4334 if (m->count == 0)
4335 p->p_vaddr = 0;
4336 else
3271a814 4337 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4338
4339 if (m->p_paddr_valid)
4340 p->p_paddr = m->p_paddr;
4341 else if (m->count == 0)
4342 p->p_paddr = 0;
4343 else
08a40648 4344 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4345
4346 if (p->p_type == PT_LOAD
4347 && (abfd->flags & D_PAGED) != 0)
4348 {
4349 /* p_align in demand paged PT_LOAD segments effectively stores
4350 the maximum page size. When copying an executable with
4351 objcopy, we set m->p_align from the input file. Use this
4352 value for maxpagesize rather than bed->maxpagesize, which
4353 may be different. Note that we use maxpagesize for PT_TLS
4354 segment alignment later in this function, so we are relying
4355 on at least one PT_LOAD segment appearing before a PT_TLS
4356 segment. */
4357 if (m->p_align_valid)
4358 maxpagesize = m->p_align;
4359
4360 p->p_align = maxpagesize;
4361 }
3271a814
NS
4362 else if (m->p_align_valid)
4363 p->p_align = m->p_align;
e970b90a
DJ
4364 else if (m->count == 0)
4365 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4366 else
4367 p->p_align = 0;
4368
bf988460
AM
4369 no_contents = FALSE;
4370 off_adjust = 0;
252b5132 4371 if (p->p_type == PT_LOAD
b301b248 4372 && m->count > 0)
252b5132 4373 {
b301b248 4374 bfd_size_type align;
a49e53ed 4375 unsigned int align_power = 0;
b301b248 4376
3271a814
NS
4377 if (m->p_align_valid)
4378 align = p->p_align;
4379 else
252b5132 4380 {
3271a814
NS
4381 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4382 {
4383 unsigned int secalign;
08a40648 4384
3271a814
NS
4385 secalign = bfd_get_section_alignment (abfd, *secpp);
4386 if (secalign > align_power)
4387 align_power = secalign;
4388 }
4389 align = (bfd_size_type) 1 << align_power;
4390 if (align < maxpagesize)
4391 align = maxpagesize;
b301b248 4392 }
252b5132 4393
02bf8d82
AM
4394 for (i = 0; i < m->count; i++)
4395 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4396 /* If we aren't making room for this section, then
4397 it must be SHT_NOBITS regardless of what we've
4398 set via struct bfd_elf_special_section. */
4399 elf_section_type (m->sections[i]) = SHT_NOBITS;
4400
bf988460 4401 /* Find out whether this segment contains any loadable
aea274d3
AM
4402 sections. */
4403 no_contents = TRUE;
4404 for (i = 0; i < m->count; i++)
4405 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
4406 {
4407 no_contents = FALSE;
4408 break;
4409 }
bf988460 4410
85cfcbfb 4411 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
bf988460
AM
4412 off += off_adjust;
4413 if (no_contents)
4414 {
4415 /* We shouldn't need to align the segment on disk since
4416 the segment doesn't need file space, but the gABI
4417 arguably requires the alignment and glibc ld.so
4418 checks it. So to comply with the alignment
4419 requirement but not waste file space, we adjust
4420 p_offset for just this segment. (OFF_ADJUST is
4421 subtracted from OFF later.) This may put p_offset
4422 past the end of file, but that shouldn't matter. */
4423 }
4424 else
4425 off_adjust = 0;
252b5132 4426 }
b1a6d0b1
NC
4427 /* Make sure the .dynamic section is the first section in the
4428 PT_DYNAMIC segment. */
4429 else if (p->p_type == PT_DYNAMIC
4430 && m->count > 1
4431 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4432 {
4433 _bfd_error_handler
b301b248
AM
4434 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4435 abfd);
b1a6d0b1
NC
4436 bfd_set_error (bfd_error_bad_value);
4437 return FALSE;
4438 }
3f001e84
JK
4439 /* Set the note section type to SHT_NOTE. */
4440 else if (p->p_type == PT_NOTE)
4441 for (i = 0; i < m->count; i++)
4442 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 4443
252b5132
RH
4444 p->p_offset = 0;
4445 p->p_filesz = 0;
4446 p->p_memsz = 0;
4447
4448 if (m->includes_filehdr)
4449 {
bf988460 4450 if (!m->p_flags_valid)
252b5132 4451 p->p_flags |= PF_R;
252b5132
RH
4452 p->p_filesz = bed->s->sizeof_ehdr;
4453 p->p_memsz = bed->s->sizeof_ehdr;
4454 if (m->count > 0)
4455 {
4456 BFD_ASSERT (p->p_type == PT_LOAD);
4457
4458 if (p->p_vaddr < (bfd_vma) off)
4459 {
caf47ea6 4460 (*_bfd_error_handler)
b301b248
AM
4461 (_("%B: Not enough room for program headers, try linking with -N"),
4462 abfd);
252b5132 4463 bfd_set_error (bfd_error_bad_value);
b34976b6 4464 return FALSE;
252b5132
RH
4465 }
4466
4467 p->p_vaddr -= off;
bf988460 4468 if (!m->p_paddr_valid)
252b5132
RH
4469 p->p_paddr -= off;
4470 }
252b5132
RH
4471 }
4472
4473 if (m->includes_phdrs)
4474 {
bf988460 4475 if (!m->p_flags_valid)
252b5132
RH
4476 p->p_flags |= PF_R;
4477
f3520d2f 4478 if (!m->includes_filehdr)
252b5132
RH
4479 {
4480 p->p_offset = bed->s->sizeof_ehdr;
4481
4482 if (m->count > 0)
4483 {
4484 BFD_ASSERT (p->p_type == PT_LOAD);
4485 p->p_vaddr -= off - p->p_offset;
bf988460 4486 if (!m->p_paddr_valid)
252b5132
RH
4487 p->p_paddr -= off - p->p_offset;
4488 }
252b5132
RH
4489 }
4490
4491 p->p_filesz += alloc * bed->s->sizeof_phdr;
4492 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4493 if (m->count)
4494 {
4495 p->p_filesz += header_pad;
4496 p->p_memsz += header_pad;
4497 }
252b5132
RH
4498 }
4499
4500 if (p->p_type == PT_LOAD
4501 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4502 {
bf988460 4503 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 4504 p->p_offset = off;
252b5132
RH
4505 else
4506 {
4507 file_ptr adjust;
4508
4509 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
4510 if (!no_contents)
4511 p->p_filesz += adjust;
252b5132
RH
4512 p->p_memsz += adjust;
4513 }
4514 }
4515
1ea63fd2
AM
4516 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4517 maps. Set filepos for sections in PT_LOAD segments, and in
4518 core files, for sections in PT_NOTE segments.
4519 assign_file_positions_for_non_load_sections will set filepos
4520 for other sections and update p_filesz for other segments. */
252b5132
RH
4521 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4522 {
4523 asection *sec;
252b5132 4524 bfd_size_type align;
627b32bc 4525 Elf_Internal_Shdr *this_hdr;
252b5132
RH
4526
4527 sec = *secpp;
02bf8d82 4528 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 4529 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4530
88967714
AM
4531 if ((p->p_type == PT_LOAD
4532 || p->p_type == PT_TLS)
4533 && (this_hdr->sh_type != SHT_NOBITS
4534 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
4535 && ((this_hdr->sh_flags & SHF_TLS) == 0
4536 || p->p_type == PT_TLS))))
252b5132 4537 {
b5599592
AM
4538 bfd_vma p_start = p->p_paddr;
4539 bfd_vma p_end = p_start + p->p_memsz;
4540 bfd_vma s_start = sec->lma;
4541 bfd_vma adjust = s_start - p_end;
252b5132 4542
a2d1e028
L
4543 if (adjust != 0
4544 && (s_start < p_end
4545 || p_end < p_start))
252b5132 4546 {
88967714 4547 (*_bfd_error_handler)
b5599592
AM
4548 (_("%B: section %A lma %#lx adjusted to %#lx"), abfd, sec,
4549 (unsigned long) s_start, (unsigned long) p_end);
88967714 4550 adjust = 0;
b5599592 4551 sec->lma = p_end;
1cfb7d1e 4552 }
3ac9b6c9 4553 p->p_memsz += adjust;
1cfb7d1e 4554
88967714
AM
4555 if (this_hdr->sh_type != SHT_NOBITS)
4556 {
32812159
AM
4557 if (p->p_filesz + adjust < p->p_memsz)
4558 {
4559 /* We have a PROGBITS section following NOBITS ones.
4560 Allocate file space for the NOBITS section(s) and
4561 zero it. */
4562 adjust = p->p_memsz - p->p_filesz;
4563 if (!write_zeros (abfd, off, adjust))
4564 return FALSE;
4565 }
88967714
AM
4566 off += adjust;
4567 p->p_filesz += adjust;
252b5132 4568 }
252b5132
RH
4569 }
4570
4571 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4572 {
b301b248
AM
4573 /* The section at i == 0 is the one that actually contains
4574 everything. */
4a938328
MS
4575 if (i == 0)
4576 {
627b32bc 4577 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
4578 off += this_hdr->sh_size;
4579 p->p_filesz = this_hdr->sh_size;
b301b248
AM
4580 p->p_memsz = 0;
4581 p->p_align = 1;
252b5132 4582 }
4a938328 4583 else
252b5132 4584 {
b301b248 4585 /* The rest are fake sections that shouldn't be written. */
252b5132 4586 sec->filepos = 0;
eea6121a 4587 sec->size = 0;
b301b248
AM
4588 sec->flags = 0;
4589 continue;
252b5132 4590 }
252b5132
RH
4591 }
4592 else
4593 {
b301b248
AM
4594 if (p->p_type == PT_LOAD)
4595 {
02bf8d82
AM
4596 this_hdr->sh_offset = sec->filepos = off;
4597 if (this_hdr->sh_type != SHT_NOBITS)
6a3cd2b4 4598 off += this_hdr->sh_size;
b301b248 4599 }
252b5132 4600
02bf8d82 4601 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 4602 {
6a3cd2b4 4603 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
4604 /* A load section without SHF_ALLOC is something like
4605 a note section in a PT_NOTE segment. These take
4606 file space but are not loaded into memory. */
4607 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 4608 p->p_memsz += this_hdr->sh_size;
b301b248 4609 }
6a3cd2b4 4610 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 4611 {
6a3cd2b4
AM
4612 if (p->p_type == PT_TLS)
4613 p->p_memsz += this_hdr->sh_size;
4614
4615 /* .tbss is special. It doesn't contribute to p_memsz of
4616 normal segments. */
4617 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
4618 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
4619 }
4620
b10a8ae0
L
4621 if (align > p->p_align
4622 && !m->p_align_valid
4623 && (p->p_type != PT_LOAD
4624 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4625 p->p_align = align;
4626 }
4627
bf988460 4628 if (!m->p_flags_valid)
252b5132
RH
4629 {
4630 p->p_flags |= PF_R;
02bf8d82 4631 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 4632 p->p_flags |= PF_X;
02bf8d82 4633 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
4634 p->p_flags |= PF_W;
4635 }
4636 }
bf988460 4637 off -= off_adjust;
0920dee7 4638
7c928300
AM
4639 /* Check that all sections are in a PT_LOAD segment.
4640 Don't check funky gdb generated core files. */
4641 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
4642 {
4643 bfd_boolean check_vma = TRUE;
4644
4645 for (i = 1; i < m->count; i++)
4646 if (m->sections[i]->vma == m->sections[i - 1]->vma
4647 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
4648 ->this_hdr), p) != 0
4649 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
4650 ->this_hdr), p) != 0)
0920dee7 4651 {
9a83a553
AM
4652 /* Looks like we have overlays packed into the segment. */
4653 check_vma = FALSE;
4654 break;
0920dee7 4655 }
9a83a553
AM
4656
4657 for (i = 0; i < m->count; i++)
4658 {
4659 Elf_Internal_Shdr *this_hdr;
4660 asection *sec;
4661
4662 sec = m->sections[i];
4663 this_hdr = &(elf_section_data(sec)->this_hdr);
f4638467 4664 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0))
9a83a553
AM
4665 {
4666 (*_bfd_error_handler)
4667 (_("%B: section `%A' can't be allocated in segment %d"),
4668 abfd, sec, j);
4669 print_segment_map (m);
4670 }
4671 }
4672 }
252b5132
RH
4673 }
4674
f3520d2f
AM
4675 elf_tdata (abfd)->next_file_pos = off;
4676 return TRUE;
4677}
4678
4679/* Assign file positions for the other sections. */
4680
4681static bfd_boolean
4682assign_file_positions_for_non_load_sections (bfd *abfd,
4683 struct bfd_link_info *link_info)
4684{
4685 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4686 Elf_Internal_Shdr **i_shdrpp;
4687 Elf_Internal_Shdr **hdrpp;
4688 Elf_Internal_Phdr *phdrs;
4689 Elf_Internal_Phdr *p;
4690 struct elf_segment_map *m;
4691 bfd_vma filehdr_vaddr, filehdr_paddr;
4692 bfd_vma phdrs_vaddr, phdrs_paddr;
4693 file_ptr off;
4694 unsigned int num_sec;
4695 unsigned int i;
4696 unsigned int count;
4697
5c182d5f
AM
4698 i_shdrpp = elf_elfsections (abfd);
4699 num_sec = elf_numsections (abfd);
f3520d2f 4700 off = elf_tdata (abfd)->next_file_pos;
5c182d5f
AM
4701 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4702 {
4703 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4704 Elf_Internal_Shdr *hdr;
4705
4706 hdr = *hdrpp;
4707 if (hdr->bfd_section != NULL
252e386e
AM
4708 && (hdr->bfd_section->filepos != 0
4709 || (hdr->sh_type == SHT_NOBITS
4710 && hdr->contents == NULL)))
627b32bc 4711 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
4712 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4713 {
f4638467
AM
4714 (*_bfd_error_handler)
4715 (_("%B: warning: allocated section `%s' not in segment"),
4716 abfd,
4717 (hdr->bfd_section == NULL
4718 ? "*unknown*"
4719 : hdr->bfd_section->name));
3ba71138
L
4720 /* We don't need to page align empty sections. */
4721 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
4722 off += vma_page_aligned_bias (hdr->sh_addr, off,
4723 bed->maxpagesize);
4724 else
4725 off += vma_page_aligned_bias (hdr->sh_addr, off,
4726 hdr->sh_addralign);
4727 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4728 FALSE);
4729 }
4730 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4731 && hdr->bfd_section == NULL)
4732 || hdr == i_shdrpp[tdata->symtab_section]
4733 || hdr == i_shdrpp[tdata->symtab_shndx_section]
4734 || hdr == i_shdrpp[tdata->strtab_section])
4735 hdr->sh_offset = -1;
4736 else
4737 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
4738 }
4739
252b5132
RH
4740 /* Now that we have set the section file positions, we can set up
4741 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4742 count = 0;
4743 filehdr_vaddr = 0;
4744 filehdr_paddr = 0;
4745 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4746 phdrs_paddr = 0;
4747 phdrs = elf_tdata (abfd)->phdr;
4748 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4749 m != NULL;
4750 m = m->next, p++)
4751 {
4752 ++count;
4753 if (p->p_type != PT_LOAD)
4754 continue;
4755
4756 if (m->includes_filehdr)
4757 {
4758 filehdr_vaddr = p->p_vaddr;
4759 filehdr_paddr = p->p_paddr;
4760 }
4761 if (m->includes_phdrs)
4762 {
4763 phdrs_vaddr = p->p_vaddr;
4764 phdrs_paddr = p->p_paddr;
4765 if (m->includes_filehdr)
4766 {
4767 phdrs_vaddr += bed->s->sizeof_ehdr;
4768 phdrs_paddr += bed->s->sizeof_ehdr;
4769 }
4770 }
4771 }
4772
252b5132
RH
4773 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4774 m != NULL;
4775 m = m->next, p++)
4776 {
129af99f 4777 if (p->p_type == PT_GNU_RELRO)
252b5132 4778 {
b84a33b5
AM
4779 const Elf_Internal_Phdr *lp;
4780
129af99f 4781 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
1ea63fd2 4782
129af99f 4783 if (link_info != NULL)
8c37241b 4784 {
129af99f
AS
4785 /* During linking the range of the RELRO segment is passed
4786 in link_info. */
8c37241b
JJ
4787 for (lp = phdrs; lp < phdrs + count; ++lp)
4788 {
4789 if (lp->p_type == PT_LOAD
8c37241b 4790 && lp->p_vaddr >= link_info->relro_start
b84a33b5
AM
4791 && lp->p_vaddr < link_info->relro_end
4792 && lp->p_vaddr + lp->p_filesz >= link_info->relro_end)
8c37241b
JJ
4793 break;
4794 }
8c37241b 4795 }
129af99f
AS
4796 else
4797 {
4798 /* Otherwise we are copying an executable or shared
b84a33b5 4799 library, but we need to use the same linker logic. */
129af99f
AS
4800 for (lp = phdrs; lp < phdrs + count; ++lp)
4801 {
4802 if (lp->p_type == PT_LOAD
4803 && lp->p_paddr == p->p_paddr)
4804 break;
4805 }
b84a33b5
AM
4806 }
4807
4808 if (lp < phdrs + count)
4809 {
4810 p->p_vaddr = lp->p_vaddr;
4811 p->p_paddr = lp->p_paddr;
4812 p->p_offset = lp->p_offset;
4813 if (link_info != NULL)
4814 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4815 else if (m->p_size_valid)
4816 p->p_filesz = m->p_size;
129af99f
AS
4817 else
4818 abort ();
b84a33b5
AM
4819 p->p_memsz = p->p_filesz;
4820 p->p_align = 1;
4821 p->p_flags = (lp->p_flags & ~PF_W);
129af99f 4822 }
9433b9b1 4823 else
b84a33b5
AM
4824 {
4825 memset (p, 0, sizeof *p);
4826 p->p_type = PT_NULL;
4827 }
129af99f
AS
4828 }
4829 else if (m->count != 0)
4830 {
4831 if (p->p_type != PT_LOAD
4832 && (p->p_type != PT_NOTE
4833 || bfd_get_format (abfd) != bfd_core))
4834 {
4835 Elf_Internal_Shdr *hdr;
4836 asection *sect;
4837
4838 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
4839
4840 sect = m->sections[m->count - 1];
4841 hdr = &elf_section_data (sect)->this_hdr;
4842 p->p_filesz = sect->filepos - m->sections[0]->filepos;
4843 if (hdr->sh_type != SHT_NOBITS)
4844 p->p_filesz += hdr->sh_size;
4845 p->p_offset = m->sections[0]->filepos;
4846 }
4847 }
4848 else if (m->includes_filehdr)
4849 {
4850 p->p_vaddr = filehdr_vaddr;
4851 if (! m->p_paddr_valid)
4852 p->p_paddr = filehdr_paddr;
4853 }
4854 else if (m->includes_phdrs)
4855 {
4856 p->p_vaddr = phdrs_vaddr;
4857 if (! m->p_paddr_valid)
4858 p->p_paddr = phdrs_paddr;
252b5132
RH
4859 }
4860 }
4861
252b5132
RH
4862 elf_tdata (abfd)->next_file_pos = off;
4863
b34976b6 4864 return TRUE;
252b5132
RH
4865}
4866
252b5132
RH
4867/* Work out the file positions of all the sections. This is called by
4868 _bfd_elf_compute_section_file_positions. All the section sizes and
4869 VMAs must be known before this is called.
4870
e0638f70
AM
4871 Reloc sections come in two flavours: Those processed specially as
4872 "side-channel" data attached to a section to which they apply, and
4873 those that bfd doesn't process as relocations. The latter sort are
4874 stored in a normal bfd section by bfd_section_from_shdr. We don't
4875 consider the former sort here, unless they form part of the loadable
4876 image. Reloc sections not assigned here will be handled later by
4877 assign_file_positions_for_relocs.
252b5132
RH
4878
4879 We also don't set the positions of the .symtab and .strtab here. */
4880
b34976b6 4881static bfd_boolean
c84fca4d
AO
4882assign_file_positions_except_relocs (bfd *abfd,
4883 struct bfd_link_info *link_info)
252b5132 4884{
5c182d5f
AM
4885 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4886 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 4887 file_ptr off;
9c5bfbb7 4888 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4889
4890 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4891 && bfd_get_format (abfd) != bfd_core)
4892 {
5c182d5f
AM
4893 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4894 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
4895 Elf_Internal_Shdr **hdrpp;
4896 unsigned int i;
4897
4898 /* Start after the ELF header. */
4899 off = i_ehdrp->e_ehsize;
4900
4901 /* We are not creating an executable, which means that we are
4902 not creating a program header, and that the actual order of
4903 the sections in the file is unimportant. */
9ad5cbcf 4904 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4905 {
4906 Elf_Internal_Shdr *hdr;
4907
4908 hdr = *hdrpp;
e0638f70
AM
4909 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4910 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4911 || i == tdata->symtab_section
4912 || i == tdata->symtab_shndx_section
252b5132
RH
4913 || i == tdata->strtab_section)
4914 {
4915 hdr->sh_offset = -1;
252b5132 4916 }
9ad5cbcf 4917 else
b34976b6 4918 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
4919 }
4920 }
4921 else
4922 {
f3520d2f
AM
4923 unsigned int alloc;
4924
252b5132 4925 /* Assign file positions for the loaded sections based on the
08a40648 4926 assignment of sections to segments. */
f3520d2f
AM
4927 if (!assign_file_positions_for_load_sections (abfd, link_info))
4928 return FALSE;
4929
4930 /* And for non-load sections. */
4931 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
4932 return FALSE;
4933
e36284ab
AM
4934 if (bed->elf_backend_modify_program_headers != NULL)
4935 {
4936 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
4937 return FALSE;
4938 }
4939
f3520d2f
AM
4940 /* Write out the program headers. */
4941 alloc = tdata->program_header_size / bed->s->sizeof_phdr;
4942 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
4943 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 4944 return FALSE;
252b5132 4945
5c182d5f 4946 off = tdata->next_file_pos;
252b5132
RH
4947 }
4948
4949 /* Place the section headers. */
45d6a902 4950 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4951 i_ehdrp->e_shoff = off;
4952 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4953
5c182d5f 4954 tdata->next_file_pos = off;
252b5132 4955
b34976b6 4956 return TRUE;
252b5132
RH
4957}
4958
b34976b6 4959static bfd_boolean
217aa764 4960prep_headers (bfd *abfd)
252b5132 4961{
3d540e93 4962 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 4963 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4964 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4965
4966 i_ehdrp = elf_elfheader (abfd);
252b5132 4967
2b0f7ef9 4968 shstrtab = _bfd_elf_strtab_init ();
252b5132 4969 if (shstrtab == NULL)
b34976b6 4970 return FALSE;
252b5132
RH
4971
4972 elf_shstrtab (abfd) = shstrtab;
4973
4974 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4975 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4976 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4977 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4978
4979 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4980 i_ehdrp->e_ident[EI_DATA] =
4981 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4982 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4983
252b5132
RH
4984 if ((abfd->flags & DYNAMIC) != 0)
4985 i_ehdrp->e_type = ET_DYN;
4986 else if ((abfd->flags & EXEC_P) != 0)
4987 i_ehdrp->e_type = ET_EXEC;
4988 else if (bfd_get_format (abfd) == bfd_core)
4989 i_ehdrp->e_type = ET_CORE;
4990 else
4991 i_ehdrp->e_type = ET_REL;
4992
4993 switch (bfd_get_arch (abfd))
4994 {
4995 case bfd_arch_unknown:
4996 i_ehdrp->e_machine = EM_NONE;
4997 break;
aa4f99bb
AO
4998
4999 /* There used to be a long list of cases here, each one setting
5000 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
5001 in the corresponding bfd definition. To avoid duplication,
5002 the switch was removed. Machines that need special handling
5003 can generally do it in elf_backend_final_write_processing(),
5004 unless they need the information earlier than the final write.
5005 Such need can generally be supplied by replacing the tests for
5006 e_machine with the conditions used to determine it. */
252b5132 5007 default:
9c5bfbb7
AM
5008 i_ehdrp->e_machine = bed->elf_machine_code;
5009 }
aa4f99bb 5010
252b5132
RH
5011 i_ehdrp->e_version = bed->s->ev_current;
5012 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
5013
c044fabd 5014 /* No program header, for now. */
252b5132
RH
5015 i_ehdrp->e_phoff = 0;
5016 i_ehdrp->e_phentsize = 0;
5017 i_ehdrp->e_phnum = 0;
5018
c044fabd 5019 /* Each bfd section is section header entry. */
252b5132
RH
5020 i_ehdrp->e_entry = bfd_get_start_address (abfd);
5021 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
5022
c044fabd 5023 /* If we're building an executable, we'll need a program header table. */
252b5132 5024 if (abfd->flags & EXEC_P)
0e71e495
BE
5025 /* It all happens later. */
5026 ;
252b5132
RH
5027 else
5028 {
5029 i_ehdrp->e_phentsize = 0;
252b5132
RH
5030 i_ehdrp->e_phoff = 0;
5031 }
5032
5033 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 5034 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 5035 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 5036 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 5037 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 5038 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
5039 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
5040 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
5041 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 5042 return FALSE;
252b5132 5043
b34976b6 5044 return TRUE;
252b5132
RH
5045}
5046
5047/* Assign file positions for all the reloc sections which are not part
5048 of the loadable file image. */
5049
5050void
217aa764 5051_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
5052{
5053 file_ptr off;
9ad5cbcf 5054 unsigned int i, num_sec;
252b5132
RH
5055 Elf_Internal_Shdr **shdrpp;
5056
5057 off = elf_tdata (abfd)->next_file_pos;
5058
9ad5cbcf
AM
5059 num_sec = elf_numsections (abfd);
5060 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
5061 {
5062 Elf_Internal_Shdr *shdrp;
5063
5064 shdrp = *shdrpp;
5065 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
5066 && shdrp->sh_offset == -1)
b34976b6 5067 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
5068 }
5069
5070 elf_tdata (abfd)->next_file_pos = off;
5071}
5072
b34976b6 5073bfd_boolean
217aa764 5074_bfd_elf_write_object_contents (bfd *abfd)
252b5132 5075{
9c5bfbb7 5076 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5077 Elf_Internal_Shdr **i_shdrp;
b34976b6 5078 bfd_boolean failed;
9ad5cbcf 5079 unsigned int count, num_sec;
252b5132
RH
5080
5081 if (! abfd->output_has_begun
217aa764 5082 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 5083 return FALSE;
252b5132
RH
5084
5085 i_shdrp = elf_elfsections (abfd);
252b5132 5086
b34976b6 5087 failed = FALSE;
252b5132
RH
5088 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
5089 if (failed)
b34976b6 5090 return FALSE;
252b5132
RH
5091
5092 _bfd_elf_assign_file_positions_for_relocs (abfd);
5093
c044fabd 5094 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
5095 num_sec = elf_numsections (abfd);
5096 for (count = 1; count < num_sec; count++)
252b5132
RH
5097 {
5098 if (bed->elf_backend_section_processing)
5099 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5100 if (i_shdrp[count]->contents)
5101 {
dc810e39
AM
5102 bfd_size_type amt = i_shdrp[count]->sh_size;
5103
252b5132 5104 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5105 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5106 return FALSE;
252b5132
RH
5107 }
5108 }
5109
5110 /* Write out the section header names. */
26ae6d5e
DJ
5111 if (elf_shstrtab (abfd) != NULL
5112 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 5113 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5114 return FALSE;
252b5132
RH
5115
5116 if (bed->elf_backend_final_write_processing)
5117 (*bed->elf_backend_final_write_processing) (abfd,
5118 elf_tdata (abfd)->linker);
5119
ff59fc36
RM
5120 if (!bed->s->write_shdrs_and_ehdr (abfd))
5121 return FALSE;
5122
5123 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
bfb53a4f
RM
5124 if (elf_tdata (abfd)->after_write_object_contents)
5125 return (*elf_tdata (abfd)->after_write_object_contents) (abfd);
ff59fc36
RM
5126
5127 return TRUE;
252b5132
RH
5128}
5129
b34976b6 5130bfd_boolean
217aa764 5131_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5132{
c044fabd 5133 /* Hopefully this can be done just like an object file. */
252b5132
RH
5134 return _bfd_elf_write_object_contents (abfd);
5135}
c044fabd
KH
5136
5137/* Given a section, search the header to find them. */
5138
cb33740c 5139unsigned int
198beae2 5140_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5141{
9c5bfbb7 5142 const struct elf_backend_data *bed;
91d6fa6a 5143 unsigned int sec_index;
252b5132 5144
9ad5cbcf
AM
5145 if (elf_section_data (asect) != NULL
5146 && elf_section_data (asect)->this_idx != 0)
5147 return elf_section_data (asect)->this_idx;
5148
5149 if (bfd_is_abs_section (asect))
91d6fa6a 5150 sec_index = SHN_ABS;
af746e92 5151 else if (bfd_is_com_section (asect))
91d6fa6a 5152 sec_index = SHN_COMMON;
af746e92 5153 else if (bfd_is_und_section (asect))
91d6fa6a 5154 sec_index = SHN_UNDEF;
af746e92 5155 else
91d6fa6a 5156 sec_index = SHN_BAD;
252b5132 5157
af746e92 5158 bed = get_elf_backend_data (abfd);
252b5132
RH
5159 if (bed->elf_backend_section_from_bfd_section)
5160 {
91d6fa6a 5161 int retval = sec_index;
9ad5cbcf 5162
af746e92
AM
5163 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5164 return retval;
252b5132
RH
5165 }
5166
91d6fa6a 5167 if (sec_index == SHN_BAD)
af746e92 5168 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5169
91d6fa6a 5170 return sec_index;
252b5132
RH
5171}
5172
5173/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5174 on error. */
5175
5176int
217aa764 5177_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5178{
5179 asymbol *asym_ptr = *asym_ptr_ptr;
5180 int idx;
5181 flagword flags = asym_ptr->flags;
5182
5183 /* When gas creates relocations against local labels, it creates its
5184 own symbol for the section, but does put the symbol into the
5185 symbol chain, so udata is 0. When the linker is generating
5186 relocatable output, this section symbol may be for one of the
5187 input sections rather than the output section. */
5188 if (asym_ptr->udata.i == 0
5189 && (flags & BSF_SECTION_SYM)
5190 && asym_ptr->section)
5191 {
5372391b 5192 asection *sec;
252b5132
RH
5193 int indx;
5194
5372391b
AM
5195 sec = asym_ptr->section;
5196 if (sec->owner != abfd && sec->output_section != NULL)
5197 sec = sec->output_section;
5198 if (sec->owner == abfd
5199 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5200 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5201 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5202 }
5203
5204 idx = asym_ptr->udata.i;
5205
5206 if (idx == 0)
5207 {
5208 /* This case can occur when using --strip-symbol on a symbol
08a40648 5209 which is used in a relocation entry. */
252b5132 5210 (*_bfd_error_handler)
d003868e
AM
5211 (_("%B: symbol `%s' required but not present"),
5212 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5213 bfd_set_error (bfd_error_no_symbols);
5214 return -1;
5215 }
5216
5217#if DEBUG & 4
5218 {
5219 fprintf (stderr,
661a3fd4 5220 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5221 (long) asym_ptr, asym_ptr->name, idx, flags,
5222 elf_symbol_flags (flags));
5223 fflush (stderr);
5224 }
5225#endif
5226
5227 return idx;
5228}
5229
84d1d650 5230/* Rewrite program header information. */
252b5132 5231
b34976b6 5232static bfd_boolean
84d1d650 5233rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5234{
b34976b6
AM
5235 Elf_Internal_Ehdr *iehdr;
5236 struct elf_segment_map *map;
5237 struct elf_segment_map *map_first;
5238 struct elf_segment_map **pointer_to_map;
5239 Elf_Internal_Phdr *segment;
5240 asection *section;
5241 unsigned int i;
5242 unsigned int num_segments;
5243 bfd_boolean phdr_included = FALSE;
5c44b38e 5244 bfd_boolean p_paddr_valid;
b34976b6
AM
5245 bfd_vma maxpagesize;
5246 struct elf_segment_map *phdr_adjust_seg = NULL;
5247 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5248 const struct elf_backend_data *bed;
bc67d8a6 5249
caf47ea6 5250 bed = get_elf_backend_data (ibfd);
252b5132
RH
5251 iehdr = elf_elfheader (ibfd);
5252
bc67d8a6 5253 map_first = NULL;
c044fabd 5254 pointer_to_map = &map_first;
252b5132
RH
5255
5256 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5257 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5258
5259 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5260#define SEGMENT_END(segment, start) \
5261 (start + (segment->p_memsz > segment->p_filesz \
5262 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5263
eecdbe52
JJ
5264#define SECTION_SIZE(section, segment) \
5265 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5266 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5267 ? section->size : 0)
eecdbe52 5268
b34976b6 5269 /* Returns TRUE if the given section is contained within
bc67d8a6 5270 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5271#define IS_CONTAINED_BY_VMA(section, segment) \
5272 (section->vma >= segment->p_vaddr \
eecdbe52 5273 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5274 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5275
b34976b6 5276 /* Returns TRUE if the given section is contained within
bc67d8a6 5277 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5278#define IS_CONTAINED_BY_LMA(section, segment, base) \
5279 (section->lma >= base \
eecdbe52 5280 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5281 <= SEGMENT_END (segment, base)))
252b5132 5282
0efc80c8
L
5283 /* Handle PT_NOTE segment. */
5284#define IS_NOTE(p, s) \
aecc8f8a 5285 (p->p_type == PT_NOTE \
0efc80c8 5286 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 5287 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5288 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5289 <= p->p_offset + p->p_filesz))
252b5132 5290
0efc80c8
L
5291 /* Special case: corefile "NOTE" section containing regs, prpsinfo
5292 etc. */
5293#define IS_COREFILE_NOTE(p, s) \
5294 (IS_NOTE (p, s) \
5295 && bfd_get_format (ibfd) == bfd_core \
5296 && s->vma == 0 \
5297 && s->lma == 0)
5298
252b5132
RH
5299 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5300 linker, which generates a PT_INTERP section with p_vaddr and
5301 p_memsz set to 0. */
aecc8f8a
AM
5302#define IS_SOLARIS_PT_INTERP(p, s) \
5303 (p->p_vaddr == 0 \
5304 && p->p_paddr == 0 \
5305 && p->p_memsz == 0 \
5306 && p->p_filesz > 0 \
5307 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5308 && s->size > 0 \
aecc8f8a 5309 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5310 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5311 <= p->p_offset + p->p_filesz))
5c440b1e 5312
bc67d8a6
NC
5313 /* Decide if the given section should be included in the given segment.
5314 A section will be included if:
f5ffc919 5315 1. It is within the address space of the segment -- we use the LMA
08a40648 5316 if that is set for the segment and the VMA otherwise,
0efc80c8
L
5317 2. It is an allocated section or a NOTE section in a PT_NOTE
5318 segment.
bc67d8a6 5319 3. There is an output section associated with it,
eecdbe52 5320 4. The section has not already been allocated to a previous segment.
2b05f1b7 5321 5. PT_GNU_STACK segments do not include any sections.
03394ac9 5322 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5323 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5324 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 5325 (with the possible exception of .dynamic). */
9f17e2a6 5326#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
5327 ((((segment->p_paddr \
5328 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5329 : IS_CONTAINED_BY_VMA (section, segment)) \
5330 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 5331 || IS_NOTE (segment, section)) \
2b05f1b7
L
5332 && segment->p_type != PT_GNU_STACK \
5333 && (segment->p_type != PT_TLS \
5334 || (section->flags & SEC_THREAD_LOCAL)) \
5335 && (segment->p_type == PT_LOAD \
5336 || segment->p_type == PT_TLS \
5337 || (section->flags & SEC_THREAD_LOCAL) == 0) \
5338 && (segment->p_type != PT_DYNAMIC \
5339 || SECTION_SIZE (section, segment) > 0 \
5340 || (segment->p_paddr \
5341 ? segment->p_paddr != section->lma \
5342 : segment->p_vaddr != section->vma) \
5343 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5344 == 0)) \
0067a569 5345 && !section->segment_mark)
bc67d8a6 5346
9f17e2a6
L
5347/* If the output section of a section in the input segment is NULL,
5348 it is removed from the corresponding output segment. */
5349#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
5350 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
5351 && section->output_section != NULL)
5352
b34976b6 5353 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5354#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5355 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5356
5357 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5358 their VMA address ranges and their LMA address ranges overlap.
5359 It is possible to have overlapping VMA ranges without overlapping LMA
5360 ranges. RedBoot images for example can have both .data and .bss mapped
5361 to the same VMA range, but with the .data section mapped to a different
5362 LMA. */
aecc8f8a 5363#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 5364 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 5365 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 5366 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 5367 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5368
5369 /* Initialise the segment mark field. */
5370 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5371 section->segment_mark = FALSE;
bc67d8a6 5372
5c44b38e
AM
5373 /* The Solaris linker creates program headers in which all the
5374 p_paddr fields are zero. When we try to objcopy or strip such a
5375 file, we get confused. Check for this case, and if we find it
5376 don't set the p_paddr_valid fields. */
5377 p_paddr_valid = FALSE;
5378 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5379 i < num_segments;
5380 i++, segment++)
5381 if (segment->p_paddr != 0)
5382 {
5383 p_paddr_valid = TRUE;
5384 break;
5385 }
5386
252b5132 5387 /* Scan through the segments specified in the program header
bc67d8a6 5388 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5389 in the loadable segments. These can be created by weird
aecc8f8a 5390 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5391 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5392 i < num_segments;
c044fabd 5393 i++, segment++)
252b5132 5394 {
252b5132 5395 unsigned int j;
c044fabd 5396 Elf_Internal_Phdr *segment2;
252b5132 5397
aecc8f8a
AM
5398 if (segment->p_type == PT_INTERP)
5399 for (section = ibfd->sections; section; section = section->next)
5400 if (IS_SOLARIS_PT_INTERP (segment, section))
5401 {
5402 /* Mininal change so that the normal section to segment
4cc11e76 5403 assignment code will work. */
aecc8f8a
AM
5404 segment->p_vaddr = section->vma;
5405 break;
5406 }
5407
bc67d8a6 5408 if (segment->p_type != PT_LOAD)
b10a8ae0
L
5409 {
5410 /* Remove PT_GNU_RELRO segment. */
5411 if (segment->p_type == PT_GNU_RELRO)
5412 segment->p_type = PT_NULL;
5413 continue;
5414 }
c044fabd 5415
bc67d8a6 5416 /* Determine if this segment overlaps any previous segments. */
0067a569 5417 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
5418 {
5419 bfd_signed_vma extra_length;
c044fabd 5420
bc67d8a6 5421 if (segment2->p_type != PT_LOAD
0067a569 5422 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 5423 continue;
c044fabd 5424
bc67d8a6
NC
5425 /* Merge the two segments together. */
5426 if (segment2->p_vaddr < segment->p_vaddr)
5427 {
c044fabd 5428 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 5429 SEGMENT. */
0067a569
AM
5430 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
5431 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 5432
bc67d8a6
NC
5433 if (extra_length > 0)
5434 {
0067a569 5435 segment2->p_memsz += extra_length;
bc67d8a6
NC
5436 segment2->p_filesz += extra_length;
5437 }
c044fabd 5438
bc67d8a6 5439 segment->p_type = PT_NULL;
c044fabd 5440
bc67d8a6
NC
5441 /* Since we have deleted P we must restart the outer loop. */
5442 i = 0;
5443 segment = elf_tdata (ibfd)->phdr;
5444 break;
5445 }
5446 else
5447 {
c044fabd 5448 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 5449 SEGMENT2. */
0067a569
AM
5450 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
5451 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 5452
bc67d8a6
NC
5453 if (extra_length > 0)
5454 {
0067a569 5455 segment->p_memsz += extra_length;
bc67d8a6
NC
5456 segment->p_filesz += extra_length;
5457 }
c044fabd 5458
bc67d8a6
NC
5459 segment2->p_type = PT_NULL;
5460 }
5461 }
5462 }
c044fabd 5463
bc67d8a6
NC
5464 /* The second scan attempts to assign sections to segments. */
5465 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5466 i < num_segments;
0067a569 5467 i++, segment++)
bc67d8a6 5468 {
0067a569
AM
5469 unsigned int section_count;
5470 asection **sections;
5471 asection *output_section;
5472 unsigned int isec;
5473 bfd_vma matching_lma;
5474 bfd_vma suggested_lma;
5475 unsigned int j;
dc810e39 5476 bfd_size_type amt;
0067a569
AM
5477 asection *first_section;
5478 bfd_boolean first_matching_lma;
5479 bfd_boolean first_suggested_lma;
bc67d8a6
NC
5480
5481 if (segment->p_type == PT_NULL)
5482 continue;
c044fabd 5483
9f17e2a6 5484 first_section = NULL;
bc67d8a6 5485 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5486 for (section = ibfd->sections, section_count = 0;
5487 section != NULL;
5488 section = section->next)
9f17e2a6
L
5489 {
5490 /* Find the first section in the input segment, which may be
5491 removed from the corresponding output segment. */
5492 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
5493 {
5494 if (first_section == NULL)
5495 first_section = section;
5496 if (section->output_section != NULL)
5497 ++section_count;
5498 }
5499 }
811072d8 5500
b5f852ea
NC
5501 /* Allocate a segment map big enough to contain
5502 all of the sections we have selected. */
dc810e39
AM
5503 amt = sizeof (struct elf_segment_map);
5504 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5505 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 5506 if (map == NULL)
b34976b6 5507 return FALSE;
252b5132
RH
5508
5509 /* Initialise the fields of the segment map. Default to
5510 using the physical address of the segment in the input BFD. */
0067a569
AM
5511 map->next = NULL;
5512 map->p_type = segment->p_type;
5513 map->p_flags = segment->p_flags;
bc67d8a6 5514 map->p_flags_valid = 1;
55d55ac7 5515
9f17e2a6
L
5516 /* If the first section in the input segment is removed, there is
5517 no need to preserve segment physical address in the corresponding
5518 output segment. */
945c025a 5519 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
5520 {
5521 map->p_paddr = segment->p_paddr;
5c44b38e 5522 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 5523 }
252b5132
RH
5524
5525 /* Determine if this segment contains the ELF file header
5526 and if it contains the program headers themselves. */
bc67d8a6
NC
5527 map->includes_filehdr = (segment->p_offset == 0
5528 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 5529 map->includes_phdrs = 0;
252b5132 5530
0067a569 5531 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 5532 {
bc67d8a6
NC
5533 map->includes_phdrs =
5534 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5535 && (segment->p_offset + segment->p_filesz
252b5132
RH
5536 >= ((bfd_vma) iehdr->e_phoff
5537 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5538
bc67d8a6 5539 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5540 phdr_included = TRUE;
252b5132
RH
5541 }
5542
bc67d8a6 5543 if (section_count == 0)
252b5132
RH
5544 {
5545 /* Special segments, such as the PT_PHDR segment, may contain
5546 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5547 something. They are allowed by the ELF spec however, so only
5548 a warning is produced. */
bc67d8a6 5549 if (segment->p_type == PT_LOAD)
0067a569
AM
5550 (*_bfd_error_handler) (_("%B: warning: Empty loadable segment"
5551 " detected, is this intentional ?\n"),
5552 ibfd);
252b5132 5553
bc67d8a6 5554 map->count = 0;
c044fabd
KH
5555 *pointer_to_map = map;
5556 pointer_to_map = &map->next;
252b5132
RH
5557
5558 continue;
5559 }
5560
5561 /* Now scan the sections in the input BFD again and attempt
5562 to add their corresponding output sections to the segment map.
5563 The problem here is how to handle an output section which has
5564 been moved (ie had its LMA changed). There are four possibilities:
5565
5566 1. None of the sections have been moved.
5567 In this case we can continue to use the segment LMA from the
5568 input BFD.
5569
5570 2. All of the sections have been moved by the same amount.
5571 In this case we can change the segment's LMA to match the LMA
5572 of the first section.
5573
5574 3. Some of the sections have been moved, others have not.
5575 In this case those sections which have not been moved can be
5576 placed in the current segment which will have to have its size,
5577 and possibly its LMA changed, and a new segment or segments will
5578 have to be created to contain the other sections.
5579
b5f852ea 5580 4. The sections have been moved, but not by the same amount.
252b5132
RH
5581 In this case we can change the segment's LMA to match the LMA
5582 of the first section and we will have to create a new segment
5583 or segments to contain the other sections.
5584
5585 In order to save time, we allocate an array to hold the section
5586 pointers that we are interested in. As these sections get assigned
5587 to a segment, they are removed from this array. */
5588
a50b1753 5589 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5590 if (sections == NULL)
b34976b6 5591 return FALSE;
252b5132
RH
5592
5593 /* Step One: Scan for segment vs section LMA conflicts.
5594 Also add the sections to the section array allocated above.
5595 Also add the sections to the current segment. In the common
5596 case, where the sections have not been moved, this means that
5597 we have completely filled the segment, and there is nothing
5598 more to do. */
252b5132 5599 isec = 0;
72730e0c 5600 matching_lma = 0;
252b5132 5601 suggested_lma = 0;
0067a569
AM
5602 first_matching_lma = TRUE;
5603 first_suggested_lma = TRUE;
252b5132 5604
147d51c2 5605 for (section = ibfd->sections;
bc67d8a6
NC
5606 section != NULL;
5607 section = section->next)
147d51c2
L
5608 if (section == first_section)
5609 break;
5610
5611 for (j = 0; section != NULL; section = section->next)
252b5132 5612 {
caf47ea6 5613 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5614 {
bc67d8a6
NC
5615 output_section = section->output_section;
5616
0067a569 5617 sections[j++] = section;
252b5132
RH
5618
5619 /* The Solaris native linker always sets p_paddr to 0.
5620 We try to catch that case here, and set it to the
5e8d7549
NC
5621 correct value. Note - some backends require that
5622 p_paddr be left as zero. */
5c44b38e 5623 if (!p_paddr_valid
4455705d 5624 && segment->p_vaddr != 0
0067a569 5625 && !bed->want_p_paddr_set_to_zero
252b5132 5626 && isec == 0
bc67d8a6 5627 && output_section->lma != 0
0067a569
AM
5628 && output_section->vma == (segment->p_vaddr
5629 + (map->includes_filehdr
5630 ? iehdr->e_ehsize
5631 : 0)
5632 + (map->includes_phdrs
5633 ? (iehdr->e_phnum
5634 * iehdr->e_phentsize)
5635 : 0)))
bc67d8a6 5636 map->p_paddr = segment->p_vaddr;
252b5132
RH
5637
5638 /* Match up the physical address of the segment with the
5639 LMA address of the output section. */
bc67d8a6 5640 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 5641 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
5642 || (bed->want_p_paddr_set_to_zero
5643 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 5644 {
0067a569
AM
5645 if (first_matching_lma || output_section->lma < matching_lma)
5646 {
5647 matching_lma = output_section->lma;
5648 first_matching_lma = FALSE;
5649 }
252b5132
RH
5650
5651 /* We assume that if the section fits within the segment
bc67d8a6 5652 then it does not overlap any other section within that
252b5132 5653 segment. */
0067a569
AM
5654 map->sections[isec++] = output_section;
5655 }
5656 else if (first_suggested_lma)
5657 {
5658 suggested_lma = output_section->lma;
5659 first_suggested_lma = FALSE;
252b5132 5660 }
147d51c2
L
5661
5662 if (j == section_count)
5663 break;
252b5132
RH
5664 }
5665 }
5666
bc67d8a6 5667 BFD_ASSERT (j == section_count);
252b5132
RH
5668
5669 /* Step Two: Adjust the physical address of the current segment,
5670 if necessary. */
bc67d8a6 5671 if (isec == section_count)
252b5132
RH
5672 {
5673 /* All of the sections fitted within the segment as currently
5674 specified. This is the default case. Add the segment to
5675 the list of built segments and carry on to process the next
5676 program header in the input BFD. */
bc67d8a6 5677 map->count = section_count;
c044fabd
KH
5678 *pointer_to_map = map;
5679 pointer_to_map = &map->next;
08a40648 5680
5c44b38e
AM
5681 if (p_paddr_valid
5682 && !bed->want_p_paddr_set_to_zero
147d51c2 5683 && matching_lma != map->p_paddr
5c44b38e
AM
5684 && !map->includes_filehdr
5685 && !map->includes_phdrs)
3271a814
NS
5686 /* There is some padding before the first section in the
5687 segment. So, we must account for that in the output
5688 segment's vma. */
5689 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 5690
252b5132
RH
5691 free (sections);
5692 continue;
5693 }
252b5132
RH
5694 else
5695 {
0067a569 5696 if (!first_matching_lma)
72730e0c
AM
5697 {
5698 /* At least one section fits inside the current segment.
5699 Keep it, but modify its physical address to match the
5700 LMA of the first section that fitted. */
bc67d8a6 5701 map->p_paddr = matching_lma;
72730e0c
AM
5702 }
5703 else
5704 {
5705 /* None of the sections fitted inside the current segment.
5706 Change the current segment's physical address to match
5707 the LMA of the first section. */
bc67d8a6 5708 map->p_paddr = suggested_lma;
72730e0c
AM
5709 }
5710
bc67d8a6
NC
5711 /* Offset the segment physical address from the lma
5712 to allow for space taken up by elf headers. */
5713 if (map->includes_filehdr)
010c8431
AM
5714 {
5715 if (map->p_paddr >= iehdr->e_ehsize)
5716 map->p_paddr -= iehdr->e_ehsize;
5717 else
5718 {
5719 map->includes_filehdr = FALSE;
5720 map->includes_phdrs = FALSE;
5721 }
5722 }
252b5132 5723
bc67d8a6
NC
5724 if (map->includes_phdrs)
5725 {
010c8431
AM
5726 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
5727 {
5728 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5729
5730 /* iehdr->e_phnum is just an estimate of the number
5731 of program headers that we will need. Make a note
5732 here of the number we used and the segment we chose
5733 to hold these headers, so that we can adjust the
5734 offset when we know the correct value. */
5735 phdr_adjust_num = iehdr->e_phnum;
5736 phdr_adjust_seg = map;
5737 }
5738 else
5739 map->includes_phdrs = FALSE;
bc67d8a6 5740 }
252b5132
RH
5741 }
5742
5743 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5744 those that fit to the current segment and removing them from the
252b5132
RH
5745 sections array; but making sure not to leave large gaps. Once all
5746 possible sections have been assigned to the current segment it is
5747 added to the list of built segments and if sections still remain
5748 to be assigned, a new segment is constructed before repeating
5749 the loop. */
5750 isec = 0;
5751 do
5752 {
bc67d8a6 5753 map->count = 0;
252b5132 5754 suggested_lma = 0;
0067a569 5755 first_suggested_lma = TRUE;
252b5132
RH
5756
5757 /* Fill the current segment with sections that fit. */
bc67d8a6 5758 for (j = 0; j < section_count; j++)
252b5132 5759 {
bc67d8a6 5760 section = sections[j];
252b5132 5761
bc67d8a6 5762 if (section == NULL)
252b5132
RH
5763 continue;
5764
bc67d8a6 5765 output_section = section->output_section;
252b5132 5766
bc67d8a6 5767 BFD_ASSERT (output_section != NULL);
c044fabd 5768
bc67d8a6
NC
5769 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5770 || IS_COREFILE_NOTE (segment, section))
252b5132 5771 {
bc67d8a6 5772 if (map->count == 0)
252b5132
RH
5773 {
5774 /* If the first section in a segment does not start at
bc67d8a6
NC
5775 the beginning of the segment, then something is
5776 wrong. */
0067a569
AM
5777 if (output_section->lma
5778 != (map->p_paddr
5779 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5780 + (map->includes_phdrs
5781 ? iehdr->e_phnum * iehdr->e_phentsize
5782 : 0)))
252b5132
RH
5783 abort ();
5784 }
5785 else
5786 {
0067a569 5787 asection *prev_sec;
252b5132 5788
bc67d8a6 5789 prev_sec = map->sections[map->count - 1];
252b5132
RH
5790
5791 /* If the gap between the end of the previous section
bc67d8a6
NC
5792 and the start of this section is more than
5793 maxpagesize then we need to start a new segment. */
eea6121a 5794 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5795 maxpagesize)
caf47ea6 5796 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 5797 || (prev_sec->lma + prev_sec->size
079e9a2f 5798 > output_section->lma))
252b5132 5799 {
0067a569
AM
5800 if (first_suggested_lma)
5801 {
5802 suggested_lma = output_section->lma;
5803 first_suggested_lma = FALSE;
5804 }
252b5132
RH
5805
5806 continue;
5807 }
5808 }
5809
bc67d8a6 5810 map->sections[map->count++] = output_section;
252b5132
RH
5811 ++isec;
5812 sections[j] = NULL;
b34976b6 5813 section->segment_mark = TRUE;
252b5132 5814 }
0067a569
AM
5815 else if (first_suggested_lma)
5816 {
5817 suggested_lma = output_section->lma;
5818 first_suggested_lma = FALSE;
5819 }
252b5132
RH
5820 }
5821
bc67d8a6 5822 BFD_ASSERT (map->count > 0);
252b5132
RH
5823
5824 /* Add the current segment to the list of built segments. */
c044fabd
KH
5825 *pointer_to_map = map;
5826 pointer_to_map = &map->next;
252b5132 5827
bc67d8a6 5828 if (isec < section_count)
252b5132
RH
5829 {
5830 /* We still have not allocated all of the sections to
5831 segments. Create a new segment here, initialise it
5832 and carry on looping. */
dc810e39
AM
5833 amt = sizeof (struct elf_segment_map);
5834 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5835 map = (struct elf_segment_map *) bfd_alloc (obfd, amt);
bc67d8a6 5836 if (map == NULL)
5ed6aba4
NC
5837 {
5838 free (sections);
5839 return FALSE;
5840 }
252b5132
RH
5841
5842 /* Initialise the fields of the segment map. Set the physical
5843 physical address to the LMA of the first section that has
5844 not yet been assigned. */
0067a569
AM
5845 map->next = NULL;
5846 map->p_type = segment->p_type;
5847 map->p_flags = segment->p_flags;
5848 map->p_flags_valid = 1;
5849 map->p_paddr = suggested_lma;
5c44b38e 5850 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 5851 map->includes_filehdr = 0;
0067a569 5852 map->includes_phdrs = 0;
252b5132
RH
5853 }
5854 }
bc67d8a6 5855 while (isec < section_count);
252b5132
RH
5856
5857 free (sections);
5858 }
5859
bc67d8a6
NC
5860 elf_tdata (obfd)->segment_map = map_first;
5861
5862 /* If we had to estimate the number of program headers that were
9ad5cbcf 5863 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5864 the offset if necessary. */
5865 if (phdr_adjust_seg != NULL)
5866 {
5867 unsigned int count;
c044fabd 5868
bc67d8a6 5869 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5870 count++;
252b5132 5871
bc67d8a6
NC
5872 if (count > phdr_adjust_num)
5873 phdr_adjust_seg->p_paddr
5874 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5875 }
c044fabd 5876
bc67d8a6 5877#undef SEGMENT_END
eecdbe52 5878#undef SECTION_SIZE
bc67d8a6
NC
5879#undef IS_CONTAINED_BY_VMA
5880#undef IS_CONTAINED_BY_LMA
0efc80c8 5881#undef IS_NOTE
252b5132 5882#undef IS_COREFILE_NOTE
bc67d8a6 5883#undef IS_SOLARIS_PT_INTERP
9f17e2a6 5884#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
5885#undef INCLUDE_SECTION_IN_SEGMENT
5886#undef SEGMENT_AFTER_SEGMENT
5887#undef SEGMENT_OVERLAPS
b34976b6 5888 return TRUE;
252b5132
RH
5889}
5890
84d1d650
L
5891/* Copy ELF program header information. */
5892
5893static bfd_boolean
5894copy_elf_program_header (bfd *ibfd, bfd *obfd)
5895{
5896 Elf_Internal_Ehdr *iehdr;
5897 struct elf_segment_map *map;
5898 struct elf_segment_map *map_first;
5899 struct elf_segment_map **pointer_to_map;
5900 Elf_Internal_Phdr *segment;
5901 unsigned int i;
5902 unsigned int num_segments;
5903 bfd_boolean phdr_included = FALSE;
88967714 5904 bfd_boolean p_paddr_valid;
84d1d650
L
5905
5906 iehdr = elf_elfheader (ibfd);
5907
5908 map_first = NULL;
5909 pointer_to_map = &map_first;
5910
88967714
AM
5911 /* If all the segment p_paddr fields are zero, don't set
5912 map->p_paddr_valid. */
5913 p_paddr_valid = FALSE;
84d1d650 5914 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
5915 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5916 i < num_segments;
5917 i++, segment++)
5918 if (segment->p_paddr != 0)
5919 {
5920 p_paddr_valid = TRUE;
5921 break;
5922 }
5923
84d1d650
L
5924 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5925 i < num_segments;
5926 i++, segment++)
5927 {
5928 asection *section;
5929 unsigned int section_count;
5930 bfd_size_type amt;
5931 Elf_Internal_Shdr *this_hdr;
53020534 5932 asection *first_section = NULL;
a76e6f2f 5933 asection *lowest_section;
84d1d650 5934
84d1d650
L
5935 /* Compute how many sections are in this segment. */
5936 for (section = ibfd->sections, section_count = 0;
5937 section != NULL;
5938 section = section->next)
5939 {
5940 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 5941 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 5942 {
a76e6f2f
AM
5943 if (first_section == NULL)
5944 first_section = section;
3271a814
NS
5945 section_count++;
5946 }
84d1d650
L
5947 }
5948
5949 /* Allocate a segment map big enough to contain
5950 all of the sections we have selected. */
5951 amt = sizeof (struct elf_segment_map);
5952 if (section_count != 0)
5953 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5954 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
5955 if (map == NULL)
5956 return FALSE;
5957
5958 /* Initialize the fields of the output segment map with the
5959 input segment. */
5960 map->next = NULL;
5961 map->p_type = segment->p_type;
5962 map->p_flags = segment->p_flags;
5963 map->p_flags_valid = 1;
5964 map->p_paddr = segment->p_paddr;
88967714 5965 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
5966 map->p_align = segment->p_align;
5967 map->p_align_valid = 1;
3271a814 5968 map->p_vaddr_offset = 0;
84d1d650 5969
9433b9b1 5970 if (map->p_type == PT_GNU_RELRO)
b10a8ae0
L
5971 {
5972 /* The PT_GNU_RELRO segment may contain the first a few
5973 bytes in the .got.plt section even if the whole .got.plt
5974 section isn't in the PT_GNU_RELRO segment. We won't
5975 change the size of the PT_GNU_RELRO segment. */
9433b9b1 5976 map->p_size = segment->p_memsz;
b10a8ae0
L
5977 map->p_size_valid = 1;
5978 }
5979
84d1d650
L
5980 /* Determine if this segment contains the ELF file header
5981 and if it contains the program headers themselves. */
5982 map->includes_filehdr = (segment->p_offset == 0
5983 && segment->p_filesz >= iehdr->e_ehsize);
5984
5985 map->includes_phdrs = 0;
5986 if (! phdr_included || segment->p_type != PT_LOAD)
5987 {
5988 map->includes_phdrs =
5989 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5990 && (segment->p_offset + segment->p_filesz
5991 >= ((bfd_vma) iehdr->e_phoff
5992 + iehdr->e_phnum * iehdr->e_phentsize)));
5993
5994 if (segment->p_type == PT_LOAD && map->includes_phdrs)
5995 phdr_included = TRUE;
5996 }
5997
a76e6f2f 5998 lowest_section = first_section;
84d1d650
L
5999 if (section_count != 0)
6000 {
6001 unsigned int isec = 0;
6002
53020534 6003 for (section = first_section;
84d1d650
L
6004 section != NULL;
6005 section = section->next)
6006 {
6007 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6008 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
6009 {
6010 map->sections[isec++] = section->output_section;
a76e6f2f
AM
6011 if (section->lma < lowest_section->lma)
6012 lowest_section = section;
6013 if ((section->flags & SEC_ALLOC) != 0)
6014 {
6015 bfd_vma seg_off;
6016
6017 /* Section lmas are set up from PT_LOAD header
6018 p_paddr in _bfd_elf_make_section_from_shdr.
6019 If this header has a p_paddr that disagrees
6020 with the section lma, flag the p_paddr as
6021 invalid. */
6022 if ((section->flags & SEC_LOAD) != 0)
6023 seg_off = this_hdr->sh_offset - segment->p_offset;
6024 else
6025 seg_off = this_hdr->sh_addr - segment->p_vaddr;
6026 if (section->lma - segment->p_paddr != seg_off)
6027 map->p_paddr_valid = FALSE;
6028 }
53020534
L
6029 if (isec == section_count)
6030 break;
6031 }
84d1d650
L
6032 }
6033 }
6034
a76e6f2f
AM
6035 if (map->includes_filehdr && lowest_section != NULL)
6036 /* We need to keep the space used by the headers fixed. */
6037 map->header_size = lowest_section->vma - segment->p_vaddr;
6038
6039 if (!map->includes_phdrs
6040 && !map->includes_filehdr
6041 && map->p_paddr_valid)
6042 /* There is some other padding before the first section. */
6043 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
6044 - segment->p_paddr);
6045
84d1d650
L
6046 map->count = section_count;
6047 *pointer_to_map = map;
6048 pointer_to_map = &map->next;
6049 }
6050
6051 elf_tdata (obfd)->segment_map = map_first;
6052 return TRUE;
6053}
6054
6055/* Copy private BFD data. This copies or rewrites ELF program header
6056 information. */
6057
6058static bfd_boolean
6059copy_private_bfd_data (bfd *ibfd, bfd *obfd)
6060{
84d1d650
L
6061 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6062 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6063 return TRUE;
6064
6065 if (elf_tdata (ibfd)->phdr == NULL)
6066 return TRUE;
6067
6068 if (ibfd->xvec == obfd->xvec)
6069 {
cb3ff1e5
NC
6070 /* Check to see if any sections in the input BFD
6071 covered by ELF program header have changed. */
d55ce4e2 6072 Elf_Internal_Phdr *segment;
84d1d650
L
6073 asection *section, *osec;
6074 unsigned int i, num_segments;
6075 Elf_Internal_Shdr *this_hdr;
147d51c2
L
6076 const struct elf_backend_data *bed;
6077
6078 bed = get_elf_backend_data (ibfd);
6079
6080 /* Regenerate the segment map if p_paddr is set to 0. */
6081 if (bed->want_p_paddr_set_to_zero)
6082 goto rewrite;
84d1d650
L
6083
6084 /* Initialize the segment mark field. */
6085 for (section = obfd->sections; section != NULL;
6086 section = section->next)
6087 section->segment_mark = FALSE;
6088
6089 num_segments = elf_elfheader (ibfd)->e_phnum;
6090 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6091 i < num_segments;
6092 i++, segment++)
6093 {
5f6999aa
NC
6094 /* PR binutils/3535. The Solaris linker always sets the p_paddr
6095 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
6096 which severly confuses things, so always regenerate the segment
6097 map in this case. */
6098 if (segment->p_paddr == 0
6099 && segment->p_memsz == 0
6100 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 6101 goto rewrite;
5f6999aa 6102
84d1d650
L
6103 for (section = ibfd->sections;
6104 section != NULL; section = section->next)
6105 {
6106 /* We mark the output section so that we know it comes
6107 from the input BFD. */
6108 osec = section->output_section;
6109 if (osec)
6110 osec->segment_mark = TRUE;
6111
6112 /* Check if this section is covered by the segment. */
6113 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6114 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
6115 {
6116 /* FIXME: Check if its output section is changed or
6117 removed. What else do we need to check? */
6118 if (osec == NULL
6119 || section->flags != osec->flags
6120 || section->lma != osec->lma
6121 || section->vma != osec->vma
6122 || section->size != osec->size
6123 || section->rawsize != osec->rawsize
6124 || section->alignment_power != osec->alignment_power)
6125 goto rewrite;
6126 }
6127 }
6128 }
6129
cb3ff1e5 6130 /* Check to see if any output section do not come from the
84d1d650
L
6131 input BFD. */
6132 for (section = obfd->sections; section != NULL;
6133 section = section->next)
6134 {
6135 if (section->segment_mark == FALSE)
6136 goto rewrite;
6137 else
6138 section->segment_mark = FALSE;
6139 }
6140
6141 return copy_elf_program_header (ibfd, obfd);
6142 }
6143
6144rewrite:
6145 return rewrite_elf_program_header (ibfd, obfd);
6146}
6147
ccd2ec6a
L
6148/* Initialize private output section information from input section. */
6149
6150bfd_boolean
6151_bfd_elf_init_private_section_data (bfd *ibfd,
6152 asection *isec,
6153 bfd *obfd,
6154 asection *osec,
6155 struct bfd_link_info *link_info)
6156
6157{
6158 Elf_Internal_Shdr *ihdr, *ohdr;
dfa7b0b8 6159 bfd_boolean final_link = link_info != NULL && !link_info->relocatable;
ccd2ec6a
L
6160
6161 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6162 || obfd->xvec->flavour != bfd_target_elf_flavour)
6163 return TRUE;
6164
dfa7b0b8
AM
6165 /* For objcopy and relocatable link, don't copy the output ELF
6166 section type from input if the output BFD section flags have been
6167 set to something different. For a final link allow some flags
6168 that the linker clears to differ. */
42bb2e33 6169 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
6170 && (osec->flags == isec->flags
6171 || (final_link
6172 && ((osec->flags ^ isec->flags)
0814be7d 6173 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 6174 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
6175
6176 /* FIXME: Is this correct for all OS/PROC specific flags? */
6177 elf_section_flags (osec) |= (elf_section_flags (isec)
6178 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
6179
6180 /* Set things up for objcopy and relocatable link. The output
6181 SHT_GROUP section will have its elf_next_in_group pointing back
6182 to the input group members. Ignore linker created group section.
6183 See elfNN_ia64_object_p in elfxx-ia64.c. */
dfa7b0b8 6184 if (!final_link)
ccd2ec6a
L
6185 {
6186 if (elf_sec_group (isec) == NULL
6187 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
6188 {
6189 if (elf_section_flags (isec) & SHF_GROUP)
6190 elf_section_flags (osec) |= SHF_GROUP;
6191 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 6192 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
6193 }
6194 }
6195
6196 ihdr = &elf_section_data (isec)->this_hdr;
6197
6198 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
6199 don't use the output section of the linked-to section since it
6200 may be NULL at this point. */
6201 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
6202 {
6203 ohdr = &elf_section_data (osec)->this_hdr;
6204 ohdr->sh_flags |= SHF_LINK_ORDER;
6205 elf_linked_to_section (osec) = elf_linked_to_section (isec);
6206 }
6207
6208 osec->use_rela_p = isec->use_rela_p;
6209
6210 return TRUE;
6211}
6212
252b5132
RH
6213/* Copy private section information. This copies over the entsize
6214 field, and sometimes the info field. */
6215
b34976b6 6216bfd_boolean
217aa764
AM
6217_bfd_elf_copy_private_section_data (bfd *ibfd,
6218 asection *isec,
6219 bfd *obfd,
6220 asection *osec)
252b5132
RH
6221{
6222 Elf_Internal_Shdr *ihdr, *ohdr;
6223
6224 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6225 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6226 return TRUE;
252b5132 6227
252b5132
RH
6228 ihdr = &elf_section_data (isec)->this_hdr;
6229 ohdr = &elf_section_data (osec)->this_hdr;
6230
6231 ohdr->sh_entsize = ihdr->sh_entsize;
6232
6233 if (ihdr->sh_type == SHT_SYMTAB
6234 || ihdr->sh_type == SHT_DYNSYM
6235 || ihdr->sh_type == SHT_GNU_verneed
6236 || ihdr->sh_type == SHT_GNU_verdef)
6237 ohdr->sh_info = ihdr->sh_info;
6238
ccd2ec6a
L
6239 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6240 NULL);
252b5132
RH
6241}
6242
d0bf826b
AM
6243/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
6244 necessary if we are removing either the SHT_GROUP section or any of
6245 the group member sections. DISCARDED is the value that a section's
6246 output_section has if the section will be discarded, NULL when this
6247 function is called from objcopy, bfd_abs_section_ptr when called
6248 from the linker. */
80fccad2
BW
6249
6250bfd_boolean
d0bf826b 6251_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 6252{
30288845
AM
6253 asection *isec;
6254
30288845 6255 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 6256 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
6257 {
6258 asection *first = elf_next_in_group (isec);
6259 asection *s = first;
d0bf826b
AM
6260 bfd_size_type removed = 0;
6261
30288845
AM
6262 while (s != NULL)
6263 {
415f38a6
AM
6264 /* If this member section is being output but the
6265 SHT_GROUP section is not, then clear the group info
6266 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
6267 if (s->output_section != discarded
6268 && isec->output_section == discarded)
30288845
AM
6269 {
6270 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6271 elf_group_name (s->output_section) = NULL;
6272 }
415f38a6
AM
6273 /* Conversely, if the member section is not being output
6274 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
6275 else if (s->output_section == discarded
6276 && isec->output_section != discarded)
6277 removed += 4;
30288845
AM
6278 s = elf_next_in_group (s);
6279 if (s == first)
6280 break;
6281 }
d0bf826b
AM
6282 if (removed != 0)
6283 {
6284 if (discarded != NULL)
6285 {
6286 /* If we've been called for ld -r, then we need to
6287 adjust the input section size. This function may
6288 be called multiple times, so save the original
6289 size. */
6290 if (isec->rawsize == 0)
6291 isec->rawsize = isec->size;
6292 isec->size = isec->rawsize - removed;
6293 }
6294 else
6295 {
6296 /* Adjust the output section size when called from
6297 objcopy. */
6298 isec->output_section->size -= removed;
6299 }
6300 }
30288845
AM
6301 }
6302
80fccad2
BW
6303 return TRUE;
6304}
6305
d0bf826b
AM
6306/* Copy private header information. */
6307
6308bfd_boolean
6309_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6310{
6311 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6312 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6313 return TRUE;
6314
6315 /* Copy over private BFD data if it has not already been copied.
6316 This must be done here, rather than in the copy_private_bfd_data
6317 entry point, because the latter is called after the section
6318 contents have been set, which means that the program headers have
6319 already been worked out. */
6320 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
6321 {
6322 if (! copy_private_bfd_data (ibfd, obfd))
6323 return FALSE;
6324 }
6325
6326 return _bfd_elf_fixup_group_sections (ibfd, NULL);
6327}
6328
252b5132
RH
6329/* Copy private symbol information. If this symbol is in a section
6330 which we did not map into a BFD section, try to map the section
6331 index correctly. We use special macro definitions for the mapped
6332 section indices; these definitions are interpreted by the
6333 swap_out_syms function. */
6334
9ad5cbcf
AM
6335#define MAP_ONESYMTAB (SHN_HIOS + 1)
6336#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6337#define MAP_STRTAB (SHN_HIOS + 3)
6338#define MAP_SHSTRTAB (SHN_HIOS + 4)
6339#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6340
b34976b6 6341bfd_boolean
217aa764
AM
6342_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6343 asymbol *isymarg,
6344 bfd *obfd,
6345 asymbol *osymarg)
252b5132
RH
6346{
6347 elf_symbol_type *isym, *osym;
6348
6349 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6350 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6351 return TRUE;
252b5132
RH
6352
6353 isym = elf_symbol_from (ibfd, isymarg);
6354 osym = elf_symbol_from (obfd, osymarg);
6355
6356 if (isym != NULL
8424d8f5 6357 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
6358 && osym != NULL
6359 && bfd_is_abs_section (isym->symbol.section))
6360 {
6361 unsigned int shndx;
6362
6363 shndx = isym->internal_elf_sym.st_shndx;
6364 if (shndx == elf_onesymtab (ibfd))
6365 shndx = MAP_ONESYMTAB;
6366 else if (shndx == elf_dynsymtab (ibfd))
6367 shndx = MAP_DYNSYMTAB;
6368 else if (shndx == elf_tdata (ibfd)->strtab_section)
6369 shndx = MAP_STRTAB;
6370 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
6371 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
6372 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
6373 shndx = MAP_SYM_SHNDX;
252b5132
RH
6374 osym->internal_elf_sym.st_shndx = shndx;
6375 }
6376
b34976b6 6377 return TRUE;
252b5132
RH
6378}
6379
6380/* Swap out the symbols. */
6381
b34976b6 6382static bfd_boolean
217aa764
AM
6383swap_out_syms (bfd *abfd,
6384 struct bfd_strtab_hash **sttp,
6385 int relocatable_p)
252b5132 6386{
9c5bfbb7 6387 const struct elf_backend_data *bed;
079e9a2f
AM
6388 int symcount;
6389 asymbol **syms;
6390 struct bfd_strtab_hash *stt;
6391 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6392 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6393 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6394 bfd_byte *outbound_syms;
6395 bfd_byte *outbound_shndx;
079e9a2f
AM
6396 int idx;
6397 bfd_size_type amt;
174fd7f9 6398 bfd_boolean name_local_sections;
252b5132
RH
6399
6400 if (!elf_map_symbols (abfd))
b34976b6 6401 return FALSE;
252b5132 6402
c044fabd 6403 /* Dump out the symtabs. */
079e9a2f
AM
6404 stt = _bfd_elf_stringtab_init ();
6405 if (stt == NULL)
b34976b6 6406 return FALSE;
252b5132 6407
079e9a2f
AM
6408 bed = get_elf_backend_data (abfd);
6409 symcount = bfd_get_symcount (abfd);
6410 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6411 symtab_hdr->sh_type = SHT_SYMTAB;
6412 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6413 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
6414 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
72de5009 6415 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
6416
6417 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6418 symstrtab_hdr->sh_type = SHT_STRTAB;
6419
a50b1753
NC
6420 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
6421 bed->s->sizeof_sym);
079e9a2f 6422 if (outbound_syms == NULL)
5ed6aba4
NC
6423 {
6424 _bfd_stringtab_free (stt);
6425 return FALSE;
6426 }
217aa764 6427 symtab_hdr->contents = outbound_syms;
252b5132 6428
9ad5cbcf
AM
6429 outbound_shndx = NULL;
6430 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6431 if (symtab_shndx_hdr->sh_name != 0)
6432 {
6433 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
a50b1753
NC
6434 outbound_shndx = (bfd_byte *)
6435 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6436 if (outbound_shndx == NULL)
5ed6aba4
NC
6437 {
6438 _bfd_stringtab_free (stt);
6439 return FALSE;
6440 }
6441
9ad5cbcf
AM
6442 symtab_shndx_hdr->contents = outbound_shndx;
6443 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6444 symtab_shndx_hdr->sh_size = amt;
6445 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6446 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6447 }
6448
589e6347 6449 /* Now generate the data (for "contents"). */
079e9a2f
AM
6450 {
6451 /* Fill in zeroth symbol and swap it out. */
6452 Elf_Internal_Sym sym;
6453 sym.st_name = 0;
6454 sym.st_value = 0;
6455 sym.st_size = 0;
6456 sym.st_info = 0;
6457 sym.st_other = 0;
6458 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 6459 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6460 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6461 if (outbound_shndx != NULL)
6462 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6463 }
252b5132 6464
174fd7f9
RS
6465 name_local_sections
6466 = (bed->elf_backend_name_local_section_symbols
6467 && bed->elf_backend_name_local_section_symbols (abfd));
6468
079e9a2f
AM
6469 syms = bfd_get_outsymbols (abfd);
6470 for (idx = 0; idx < symcount; idx++)
252b5132 6471 {
252b5132 6472 Elf_Internal_Sym sym;
079e9a2f
AM
6473 bfd_vma value = syms[idx]->value;
6474 elf_symbol_type *type_ptr;
6475 flagword flags = syms[idx]->flags;
6476 int type;
252b5132 6477
174fd7f9
RS
6478 if (!name_local_sections
6479 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6480 {
6481 /* Local section symbols have no name. */
6482 sym.st_name = 0;
6483 }
6484 else
6485 {
6486 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6487 syms[idx]->name,
b34976b6 6488 TRUE, FALSE);
079e9a2f 6489 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6490 {
6491 _bfd_stringtab_free (stt);
6492 return FALSE;
6493 }
079e9a2f 6494 }
252b5132 6495
079e9a2f 6496 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6497
079e9a2f
AM
6498 if ((flags & BSF_SECTION_SYM) == 0
6499 && bfd_is_com_section (syms[idx]->section))
6500 {
6501 /* ELF common symbols put the alignment into the `value' field,
6502 and the size into the `size' field. This is backwards from
6503 how BFD handles it, so reverse it here. */
6504 sym.st_size = value;
6505 if (type_ptr == NULL
6506 || type_ptr->internal_elf_sym.st_value == 0)
6507 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6508 else
6509 sym.st_value = type_ptr->internal_elf_sym.st_value;
6510 sym.st_shndx = _bfd_elf_section_from_bfd_section
6511 (abfd, syms[idx]->section);
6512 }
6513 else
6514 {
6515 asection *sec = syms[idx]->section;
cb33740c 6516 unsigned int shndx;
252b5132 6517
079e9a2f
AM
6518 if (sec->output_section)
6519 {
6520 value += sec->output_offset;
6521 sec = sec->output_section;
6522 }
589e6347 6523
079e9a2f
AM
6524 /* Don't add in the section vma for relocatable output. */
6525 if (! relocatable_p)
6526 value += sec->vma;
6527 sym.st_value = value;
6528 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6529
6530 if (bfd_is_abs_section (sec)
6531 && type_ptr != NULL
6532 && type_ptr->internal_elf_sym.st_shndx != 0)
6533 {
6534 /* This symbol is in a real ELF section which we did
6535 not create as a BFD section. Undo the mapping done
6536 by copy_private_symbol_data. */
6537 shndx = type_ptr->internal_elf_sym.st_shndx;
6538 switch (shndx)
6539 {
6540 case MAP_ONESYMTAB:
6541 shndx = elf_onesymtab (abfd);
6542 break;
6543 case MAP_DYNSYMTAB:
6544 shndx = elf_dynsymtab (abfd);
6545 break;
6546 case MAP_STRTAB:
6547 shndx = elf_tdata (abfd)->strtab_section;
6548 break;
6549 case MAP_SHSTRTAB:
6550 shndx = elf_tdata (abfd)->shstrtab_section;
6551 break;
9ad5cbcf
AM
6552 case MAP_SYM_SHNDX:
6553 shndx = elf_tdata (abfd)->symtab_shndx_section;
6554 break;
079e9a2f
AM
6555 default:
6556 break;
6557 }
6558 }
6559 else
6560 {
6561 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6562
cb33740c 6563 if (shndx == SHN_BAD)
079e9a2f
AM
6564 {
6565 asection *sec2;
6566
6567 /* Writing this would be a hell of a lot easier if
6568 we had some decent documentation on bfd, and
6569 knew what to expect of the library, and what to
6570 demand of applications. For example, it
6571 appears that `objcopy' might not set the
6572 section of a symbol to be a section that is
6573 actually in the output file. */
6574 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6575 if (sec2 == NULL)
6576 {
6577 _bfd_error_handler (_("\
6578Unable to find equivalent output section for symbol '%s' from section '%s'"),
6579 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6580 sec->name);
811072d8 6581 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6582 _bfd_stringtab_free (stt);
589e6347
NC
6583 return FALSE;
6584 }
811072d8 6585
079e9a2f 6586 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
cb33740c 6587 BFD_ASSERT (shndx != SHN_BAD);
079e9a2f
AM
6588 }
6589 }
252b5132 6590
079e9a2f
AM
6591 sym.st_shndx = shndx;
6592 }
252b5132 6593
13ae64f3
JJ
6594 if ((flags & BSF_THREAD_LOCAL) != 0)
6595 type = STT_TLS;
d8045f23
NC
6596 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
6597 type = STT_GNU_IFUNC;
13ae64f3 6598 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6599 type = STT_FUNC;
6600 else if ((flags & BSF_OBJECT) != 0)
6601 type = STT_OBJECT;
d9352518
DB
6602 else if ((flags & BSF_RELC) != 0)
6603 type = STT_RELC;
6604 else if ((flags & BSF_SRELC) != 0)
6605 type = STT_SRELC;
079e9a2f
AM
6606 else
6607 type = STT_NOTYPE;
252b5132 6608
13ae64f3
JJ
6609 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6610 type = STT_TLS;
6611
589e6347 6612 /* Processor-specific types. */
079e9a2f
AM
6613 if (type_ptr != NULL
6614 && bed->elf_backend_get_symbol_type)
6615 type = ((*bed->elf_backend_get_symbol_type)
6616 (&type_ptr->internal_elf_sym, type));
252b5132 6617
079e9a2f
AM
6618 if (flags & BSF_SECTION_SYM)
6619 {
6620 if (flags & BSF_GLOBAL)
6621 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6622 else
6623 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6624 }
6625 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 6626 {
504b7d20 6627#ifdef USE_STT_COMMON
0a40daed
MK
6628 if (type == STT_OBJECT)
6629 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_COMMON);
6630 else
504b7d20 6631#endif
c91e322a 6632 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 6633 }
079e9a2f
AM
6634 else if (bfd_is_und_section (syms[idx]->section))
6635 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6636 ? STB_WEAK
6637 : STB_GLOBAL),
6638 type);
6639 else if (flags & BSF_FILE)
6640 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6641 else
6642 {
6643 int bind = STB_LOCAL;
252b5132 6644
079e9a2f
AM
6645 if (flags & BSF_LOCAL)
6646 bind = STB_LOCAL;
3e7a7d11
NC
6647 else if (flags & BSF_GNU_UNIQUE)
6648 bind = STB_GNU_UNIQUE;
079e9a2f
AM
6649 else if (flags & BSF_WEAK)
6650 bind = STB_WEAK;
6651 else if (flags & BSF_GLOBAL)
6652 bind = STB_GLOBAL;
252b5132 6653
079e9a2f
AM
6654 sym.st_info = ELF_ST_INFO (bind, type);
6655 }
252b5132 6656
079e9a2f
AM
6657 if (type_ptr != NULL)
6658 sym.st_other = type_ptr->internal_elf_sym.st_other;
6659 else
6660 sym.st_other = 0;
252b5132 6661
9ad5cbcf 6662 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6663 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6664 if (outbound_shndx != NULL)
6665 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6666 }
252b5132 6667
079e9a2f
AM
6668 *sttp = stt;
6669 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6670 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6671
079e9a2f
AM
6672 symstrtab_hdr->sh_flags = 0;
6673 symstrtab_hdr->sh_addr = 0;
6674 symstrtab_hdr->sh_entsize = 0;
6675 symstrtab_hdr->sh_link = 0;
6676 symstrtab_hdr->sh_info = 0;
6677 symstrtab_hdr->sh_addralign = 1;
252b5132 6678
b34976b6 6679 return TRUE;
252b5132
RH
6680}
6681
6682/* Return the number of bytes required to hold the symtab vector.
6683
6684 Note that we base it on the count plus 1, since we will null terminate
6685 the vector allocated based on this size. However, the ELF symbol table
6686 always has a dummy entry as symbol #0, so it ends up even. */
6687
6688long
217aa764 6689_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6690{
6691 long symcount;
6692 long symtab_size;
6693 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6694
6695 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6696 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6697 if (symcount > 0)
6698 symtab_size -= sizeof (asymbol *);
252b5132
RH
6699
6700 return symtab_size;
6701}
6702
6703long
217aa764 6704_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6705{
6706 long symcount;
6707 long symtab_size;
6708 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6709
6710 if (elf_dynsymtab (abfd) == 0)
6711 {
6712 bfd_set_error (bfd_error_invalid_operation);
6713 return -1;
6714 }
6715
6716 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6717 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6718 if (symcount > 0)
6719 symtab_size -= sizeof (asymbol *);
252b5132
RH
6720
6721 return symtab_size;
6722}
6723
6724long
217aa764
AM
6725_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6726 sec_ptr asect)
252b5132
RH
6727{
6728 return (asect->reloc_count + 1) * sizeof (arelent *);
6729}
6730
6731/* Canonicalize the relocs. */
6732
6733long
217aa764
AM
6734_bfd_elf_canonicalize_reloc (bfd *abfd,
6735 sec_ptr section,
6736 arelent **relptr,
6737 asymbol **symbols)
252b5132
RH
6738{
6739 arelent *tblptr;
6740 unsigned int i;
9c5bfbb7 6741 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6742
b34976b6 6743 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6744 return -1;
6745
6746 tblptr = section->relocation;
6747 for (i = 0; i < section->reloc_count; i++)
6748 *relptr++ = tblptr++;
6749
6750 *relptr = NULL;
6751
6752 return section->reloc_count;
6753}
6754
6755long
6cee3f79 6756_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6757{
9c5bfbb7 6758 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6759 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6760
6761 if (symcount >= 0)
6762 bfd_get_symcount (abfd) = symcount;
6763 return symcount;
6764}
6765
6766long
217aa764
AM
6767_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6768 asymbol **allocation)
252b5132 6769{
9c5bfbb7 6770 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6771 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6772
6773 if (symcount >= 0)
6774 bfd_get_dynamic_symcount (abfd) = symcount;
6775 return symcount;
252b5132
RH
6776}
6777
8615f3f2
AM
6778/* Return the size required for the dynamic reloc entries. Any loadable
6779 section that was actually installed in the BFD, and has type SHT_REL
6780 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6781 dynamic reloc section. */
252b5132
RH
6782
6783long
217aa764 6784_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6785{
6786 long ret;
6787 asection *s;
6788
6789 if (elf_dynsymtab (abfd) == 0)
6790 {
6791 bfd_set_error (bfd_error_invalid_operation);
6792 return -1;
6793 }
6794
6795 ret = sizeof (arelent *);
6796 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 6797 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6798 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6799 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6800 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6801 * sizeof (arelent *));
6802
6803 return ret;
6804}
6805
8615f3f2
AM
6806/* Canonicalize the dynamic relocation entries. Note that we return the
6807 dynamic relocations as a single block, although they are actually
6808 associated with particular sections; the interface, which was
6809 designed for SunOS style shared libraries, expects that there is only
6810 one set of dynamic relocs. Any loadable section that was actually
6811 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6812 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6813
6814long
217aa764
AM
6815_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6816 arelent **storage,
6817 asymbol **syms)
252b5132 6818{
217aa764 6819 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6820 asection *s;
6821 long ret;
6822
6823 if (elf_dynsymtab (abfd) == 0)
6824 {
6825 bfd_set_error (bfd_error_invalid_operation);
6826 return -1;
6827 }
6828
6829 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6830 ret = 0;
6831 for (s = abfd->sections; s != NULL; s = s->next)
6832 {
266b05cf 6833 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6834 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6835 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6836 {
6837 arelent *p;
6838 long count, i;
6839
b34976b6 6840 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6841 return -1;
eea6121a 6842 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6843 p = s->relocation;
6844 for (i = 0; i < count; i++)
6845 *storage++ = p++;
6846 ret += count;
6847 }
6848 }
6849
6850 *storage = NULL;
6851
6852 return ret;
6853}
6854\f
6855/* Read in the version information. */
6856
b34976b6 6857bfd_boolean
fc0e6df6 6858_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6859{
6860 bfd_byte *contents = NULL;
fc0e6df6
PB
6861 unsigned int freeidx = 0;
6862
6863 if (elf_dynverref (abfd) != 0)
6864 {
6865 Elf_Internal_Shdr *hdr;
6866 Elf_External_Verneed *everneed;
6867 Elf_Internal_Verneed *iverneed;
6868 unsigned int i;
d0fb9a8d 6869 bfd_byte *contents_end;
fc0e6df6
PB
6870
6871 hdr = &elf_tdata (abfd)->dynverref_hdr;
6872
a50b1753
NC
6873 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
6874 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6875 if (elf_tdata (abfd)->verref == NULL)
6876 goto error_return;
6877
6878 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6879
a50b1753 6880 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
fc0e6df6 6881 if (contents == NULL)
d0fb9a8d
JJ
6882 {
6883error_return_verref:
6884 elf_tdata (abfd)->verref = NULL;
6885 elf_tdata (abfd)->cverrefs = 0;
6886 goto error_return;
6887 }
fc0e6df6
PB
6888 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6889 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6890 goto error_return_verref;
fc0e6df6 6891
d0fb9a8d
JJ
6892 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6893 goto error_return_verref;
6894
6895 BFD_ASSERT (sizeof (Elf_External_Verneed)
6896 == sizeof (Elf_External_Vernaux));
6897 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6898 everneed = (Elf_External_Verneed *) contents;
6899 iverneed = elf_tdata (abfd)->verref;
6900 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6901 {
6902 Elf_External_Vernaux *evernaux;
6903 Elf_Internal_Vernaux *ivernaux;
6904 unsigned int j;
6905
6906 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6907
6908 iverneed->vn_bfd = abfd;
6909
6910 iverneed->vn_filename =
6911 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6912 iverneed->vn_file);
6913 if (iverneed->vn_filename == NULL)
d0fb9a8d 6914 goto error_return_verref;
fc0e6df6 6915
d0fb9a8d
JJ
6916 if (iverneed->vn_cnt == 0)
6917 iverneed->vn_auxptr = NULL;
6918 else
6919 {
a50b1753
NC
6920 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
6921 bfd_alloc2 (abfd, iverneed->vn_cnt,
6922 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
6923 if (iverneed->vn_auxptr == NULL)
6924 goto error_return_verref;
6925 }
6926
6927 if (iverneed->vn_aux
6928 > (size_t) (contents_end - (bfd_byte *) everneed))
6929 goto error_return_verref;
fc0e6df6
PB
6930
6931 evernaux = ((Elf_External_Vernaux *)
6932 ((bfd_byte *) everneed + iverneed->vn_aux));
6933 ivernaux = iverneed->vn_auxptr;
6934 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6935 {
6936 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6937
6938 ivernaux->vna_nodename =
6939 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6940 ivernaux->vna_name);
6941 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6942 goto error_return_verref;
fc0e6df6
PB
6943
6944 if (j + 1 < iverneed->vn_cnt)
6945 ivernaux->vna_nextptr = ivernaux + 1;
6946 else
6947 ivernaux->vna_nextptr = NULL;
6948
d0fb9a8d
JJ
6949 if (ivernaux->vna_next
6950 > (size_t) (contents_end - (bfd_byte *) evernaux))
6951 goto error_return_verref;
6952
fc0e6df6
PB
6953 evernaux = ((Elf_External_Vernaux *)
6954 ((bfd_byte *) evernaux + ivernaux->vna_next));
6955
6956 if (ivernaux->vna_other > freeidx)
6957 freeidx = ivernaux->vna_other;
6958 }
6959
6960 if (i + 1 < hdr->sh_info)
6961 iverneed->vn_nextref = iverneed + 1;
6962 else
6963 iverneed->vn_nextref = NULL;
6964
d0fb9a8d
JJ
6965 if (iverneed->vn_next
6966 > (size_t) (contents_end - (bfd_byte *) everneed))
6967 goto error_return_verref;
6968
fc0e6df6
PB
6969 everneed = ((Elf_External_Verneed *)
6970 ((bfd_byte *) everneed + iverneed->vn_next));
6971 }
6972
6973 free (contents);
6974 contents = NULL;
6975 }
252b5132
RH
6976
6977 if (elf_dynverdef (abfd) != 0)
6978 {
6979 Elf_Internal_Shdr *hdr;
6980 Elf_External_Verdef *everdef;
6981 Elf_Internal_Verdef *iverdef;
f631889e
UD
6982 Elf_Internal_Verdef *iverdefarr;
6983 Elf_Internal_Verdef iverdefmem;
252b5132 6984 unsigned int i;
062e2358 6985 unsigned int maxidx;
d0fb9a8d 6986 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6987
6988 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6989
a50b1753 6990 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132
RH
6991 if (contents == NULL)
6992 goto error_return;
6993 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6994 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6995 goto error_return;
6996
d0fb9a8d
JJ
6997 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6998 goto error_return;
6999
7000 BFD_ASSERT (sizeof (Elf_External_Verdef)
7001 >= sizeof (Elf_External_Verdaux));
7002 contents_end_def = contents + hdr->sh_size
7003 - sizeof (Elf_External_Verdef);
7004 contents_end_aux = contents + hdr->sh_size
7005 - sizeof (Elf_External_Verdaux);
7006
f631889e
UD
7007 /* We know the number of entries in the section but not the maximum
7008 index. Therefore we have to run through all entries and find
7009 the maximum. */
252b5132 7010 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
7011 maxidx = 0;
7012 for (i = 0; i < hdr->sh_info; ++i)
7013 {
7014 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7015
062e2358
AM
7016 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
7017 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 7018
d0fb9a8d
JJ
7019 if (iverdefmem.vd_next
7020 > (size_t) (contents_end_def - (bfd_byte *) everdef))
7021 goto error_return;
7022
f631889e
UD
7023 everdef = ((Elf_External_Verdef *)
7024 ((bfd_byte *) everdef + iverdefmem.vd_next));
7025 }
7026
fc0e6df6
PB
7027 if (default_imported_symver)
7028 {
7029 if (freeidx > maxidx)
7030 maxidx = ++freeidx;
7031 else
7032 freeidx = ++maxidx;
7033 }
a50b1753
NC
7034 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7035 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e
UD
7036 if (elf_tdata (abfd)->verdef == NULL)
7037 goto error_return;
7038
7039 elf_tdata (abfd)->cverdefs = maxidx;
7040
7041 everdef = (Elf_External_Verdef *) contents;
7042 iverdefarr = elf_tdata (abfd)->verdef;
7043 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
7044 {
7045 Elf_External_Verdaux *everdaux;
7046 Elf_Internal_Verdaux *iverdaux;
7047 unsigned int j;
7048
f631889e
UD
7049 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7050
d0fb9a8d
JJ
7051 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
7052 {
7053error_return_verdef:
7054 elf_tdata (abfd)->verdef = NULL;
7055 elf_tdata (abfd)->cverdefs = 0;
7056 goto error_return;
7057 }
7058
f631889e
UD
7059 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
7060 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
7061
7062 iverdef->vd_bfd = abfd;
7063
d0fb9a8d
JJ
7064 if (iverdef->vd_cnt == 0)
7065 iverdef->vd_auxptr = NULL;
7066 else
7067 {
a50b1753
NC
7068 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7069 bfd_alloc2 (abfd, iverdef->vd_cnt,
7070 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7071 if (iverdef->vd_auxptr == NULL)
7072 goto error_return_verdef;
7073 }
7074
7075 if (iverdef->vd_aux
7076 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
7077 goto error_return_verdef;
252b5132
RH
7078
7079 everdaux = ((Elf_External_Verdaux *)
7080 ((bfd_byte *) everdef + iverdef->vd_aux));
7081 iverdaux = iverdef->vd_auxptr;
7082 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
7083 {
7084 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
7085
7086 iverdaux->vda_nodename =
7087 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7088 iverdaux->vda_name);
7089 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 7090 goto error_return_verdef;
252b5132
RH
7091
7092 if (j + 1 < iverdef->vd_cnt)
7093 iverdaux->vda_nextptr = iverdaux + 1;
7094 else
7095 iverdaux->vda_nextptr = NULL;
7096
d0fb9a8d
JJ
7097 if (iverdaux->vda_next
7098 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
7099 goto error_return_verdef;
7100
252b5132
RH
7101 everdaux = ((Elf_External_Verdaux *)
7102 ((bfd_byte *) everdaux + iverdaux->vda_next));
7103 }
7104
d0fb9a8d
JJ
7105 if (iverdef->vd_cnt)
7106 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 7107
d0fb9a8d 7108 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
7109 iverdef->vd_nextdef = iverdef + 1;
7110 else
7111 iverdef->vd_nextdef = NULL;
7112
7113 everdef = ((Elf_External_Verdef *)
7114 ((bfd_byte *) everdef + iverdef->vd_next));
7115 }
7116
7117 free (contents);
7118 contents = NULL;
7119 }
fc0e6df6 7120 else if (default_imported_symver)
252b5132 7121 {
fc0e6df6
PB
7122 if (freeidx < 3)
7123 freeidx = 3;
7124 else
7125 freeidx++;
252b5132 7126
a50b1753
NC
7127 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7128 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 7129 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
7130 goto error_return;
7131
fc0e6df6
PB
7132 elf_tdata (abfd)->cverdefs = freeidx;
7133 }
252b5132 7134
fc0e6df6
PB
7135 /* Create a default version based on the soname. */
7136 if (default_imported_symver)
7137 {
7138 Elf_Internal_Verdef *iverdef;
7139 Elf_Internal_Verdaux *iverdaux;
252b5132 7140
fc0e6df6 7141 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 7142
fc0e6df6
PB
7143 iverdef->vd_version = VER_DEF_CURRENT;
7144 iverdef->vd_flags = 0;
7145 iverdef->vd_ndx = freeidx;
7146 iverdef->vd_cnt = 1;
252b5132 7147
fc0e6df6 7148 iverdef->vd_bfd = abfd;
252b5132 7149
fc0e6df6
PB
7150 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
7151 if (iverdef->vd_nodename == NULL)
d0fb9a8d 7152 goto error_return_verdef;
fc0e6df6 7153 iverdef->vd_nextdef = NULL;
a50b1753
NC
7154 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7155 bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7156 if (iverdef->vd_auxptr == NULL)
7157 goto error_return_verdef;
252b5132 7158
fc0e6df6
PB
7159 iverdaux = iverdef->vd_auxptr;
7160 iverdaux->vda_nodename = iverdef->vd_nodename;
7161 iverdaux->vda_nextptr = NULL;
252b5132
RH
7162 }
7163
b34976b6 7164 return TRUE;
252b5132
RH
7165
7166 error_return:
5ed6aba4 7167 if (contents != NULL)
252b5132 7168 free (contents);
b34976b6 7169 return FALSE;
252b5132
RH
7170}
7171\f
7172asymbol *
217aa764 7173_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
7174{
7175 elf_symbol_type *newsym;
dc810e39 7176 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 7177
a50b1753 7178 newsym = (elf_symbol_type *) bfd_zalloc (abfd, amt);
252b5132
RH
7179 if (!newsym)
7180 return NULL;
7181 else
7182 {
7183 newsym->symbol.the_bfd = abfd;
7184 return &newsym->symbol;
7185 }
7186}
7187
7188void
217aa764
AM
7189_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
7190 asymbol *symbol,
7191 symbol_info *ret)
252b5132
RH
7192{
7193 bfd_symbol_info (symbol, ret);
7194}
7195
7196/* Return whether a symbol name implies a local symbol. Most targets
7197 use this function for the is_local_label_name entry point, but some
7198 override it. */
7199
b34976b6 7200bfd_boolean
217aa764
AM
7201_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
7202 const char *name)
252b5132
RH
7203{
7204 /* Normal local symbols start with ``.L''. */
7205 if (name[0] == '.' && name[1] == 'L')
b34976b6 7206 return TRUE;
252b5132
RH
7207
7208 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
7209 DWARF debugging symbols starting with ``..''. */
7210 if (name[0] == '.' && name[1] == '.')
b34976b6 7211 return TRUE;
252b5132
RH
7212
7213 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
7214 emitting DWARF debugging output. I suspect this is actually a
7215 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
7216 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
7217 underscore to be emitted on some ELF targets). For ease of use,
7218 we treat such symbols as local. */
7219 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 7220 return TRUE;
252b5132 7221
b34976b6 7222 return FALSE;
252b5132
RH
7223}
7224
7225alent *
217aa764
AM
7226_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
7227 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
7228{
7229 abort ();
7230 return NULL;
7231}
7232
b34976b6 7233bfd_boolean
217aa764
AM
7234_bfd_elf_set_arch_mach (bfd *abfd,
7235 enum bfd_architecture arch,
7236 unsigned long machine)
252b5132
RH
7237{
7238 /* If this isn't the right architecture for this backend, and this
7239 isn't the generic backend, fail. */
7240 if (arch != get_elf_backend_data (abfd)->arch
7241 && arch != bfd_arch_unknown
7242 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 7243 return FALSE;
252b5132
RH
7244
7245 return bfd_default_set_arch_mach (abfd, arch, machine);
7246}
7247
d1fad7c6
NC
7248/* Find the function to a particular section and offset,
7249 for error reporting. */
252b5132 7250
b34976b6 7251static bfd_boolean
b9d678e0 7252elf_find_function (bfd *abfd,
217aa764
AM
7253 asection *section,
7254 asymbol **symbols,
7255 bfd_vma offset,
7256 const char **filename_ptr,
7257 const char **functionname_ptr)
252b5132 7258{
252b5132 7259 const char *filename;
57426232 7260 asymbol *func, *file;
252b5132
RH
7261 bfd_vma low_func;
7262 asymbol **p;
57426232
JB
7263 /* ??? Given multiple file symbols, it is impossible to reliably
7264 choose the right file name for global symbols. File symbols are
7265 local symbols, and thus all file symbols must sort before any
7266 global symbols. The ELF spec may be interpreted to say that a
7267 file symbol must sort before other local symbols, but currently
7268 ld -r doesn't do this. So, for ld -r output, it is possible to
7269 make a better choice of file name for local symbols by ignoring
7270 file symbols appearing after a given local symbol. */
7271 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
b9d678e0 7272 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 7273
252b5132
RH
7274 filename = NULL;
7275 func = NULL;
57426232 7276 file = NULL;
252b5132 7277 low_func = 0;
57426232 7278 state = nothing_seen;
252b5132
RH
7279
7280 for (p = symbols; *p != NULL; p++)
7281 {
7282 elf_symbol_type *q;
b9d678e0 7283 unsigned int type;
252b5132
RH
7284
7285 q = (elf_symbol_type *) *p;
7286
b9d678e0
L
7287 type = ELF_ST_TYPE (q->internal_elf_sym.st_info);
7288 switch (type)
252b5132 7289 {
252b5132 7290 case STT_FILE:
57426232
JB
7291 file = &q->symbol;
7292 if (state == symbol_seen)
7293 state = file_after_symbol_seen;
7294 continue;
b9d678e0
L
7295 default:
7296 if (!bed->is_function_type (type))
7297 break;
252b5132 7298 case STT_NOTYPE:
6b40fcba 7299 if (bfd_get_section (&q->symbol) == section
252b5132
RH
7300 && q->symbol.value >= low_func
7301 && q->symbol.value <= offset)
7302 {
7303 func = (asymbol *) q;
7304 low_func = q->symbol.value;
a1923858
AM
7305 filename = NULL;
7306 if (file != NULL
7307 && (ELF_ST_BIND (q->internal_elf_sym.st_info) == STB_LOCAL
7308 || state != file_after_symbol_seen))
57426232 7309 filename = bfd_asymbol_name (file);
252b5132
RH
7310 }
7311 break;
7312 }
57426232
JB
7313 if (state == nothing_seen)
7314 state = symbol_seen;
252b5132
RH
7315 }
7316
7317 if (func == NULL)
b34976b6 7318 return FALSE;
252b5132 7319
d1fad7c6
NC
7320 if (filename_ptr)
7321 *filename_ptr = filename;
7322 if (functionname_ptr)
7323 *functionname_ptr = bfd_asymbol_name (func);
7324
b34976b6 7325 return TRUE;
d1fad7c6
NC
7326}
7327
7328/* Find the nearest line to a particular section and offset,
7329 for error reporting. */
7330
b34976b6 7331bfd_boolean
217aa764
AM
7332_bfd_elf_find_nearest_line (bfd *abfd,
7333 asection *section,
7334 asymbol **symbols,
7335 bfd_vma offset,
7336 const char **filename_ptr,
7337 const char **functionname_ptr,
7338 unsigned int *line_ptr)
d1fad7c6 7339{
b34976b6 7340 bfd_boolean found;
d1fad7c6
NC
7341
7342 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7343 filename_ptr, functionname_ptr,
7344 line_ptr))
d1fad7c6
NC
7345 {
7346 if (!*functionname_ptr)
4e8a9624
AM
7347 elf_find_function (abfd, section, symbols, offset,
7348 *filename_ptr ? NULL : filename_ptr,
7349 functionname_ptr);
7350
b34976b6 7351 return TRUE;
d1fad7c6
NC
7352 }
7353
7354 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7355 filename_ptr, functionname_ptr,
7356 line_ptr, 0,
7357 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7358 {
7359 if (!*functionname_ptr)
4e8a9624
AM
7360 elf_find_function (abfd, section, symbols, offset,
7361 *filename_ptr ? NULL : filename_ptr,
7362 functionname_ptr);
7363
b34976b6 7364 return TRUE;
d1fad7c6
NC
7365 }
7366
7367 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7368 &found, filename_ptr,
7369 functionname_ptr, line_ptr,
7370 &elf_tdata (abfd)->line_info))
b34976b6 7371 return FALSE;
dc43ada5 7372 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7373 return TRUE;
d1fad7c6
NC
7374
7375 if (symbols == NULL)
b34976b6 7376 return FALSE;
d1fad7c6
NC
7377
7378 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7379 filename_ptr, functionname_ptr))
b34976b6 7380 return FALSE;
d1fad7c6 7381
252b5132 7382 *line_ptr = 0;
b34976b6 7383 return TRUE;
252b5132
RH
7384}
7385
5420f73d
L
7386/* Find the line for a symbol. */
7387
7388bfd_boolean
7389_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7390 const char **filename_ptr, unsigned int *line_ptr)
7391{
7392 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
7393 filename_ptr, line_ptr, 0,
7394 &elf_tdata (abfd)->dwarf2_find_line_info);
7395}
7396
4ab527b0
FF
7397/* After a call to bfd_find_nearest_line, successive calls to
7398 bfd_find_inliner_info can be used to get source information about
7399 each level of function inlining that terminated at the address
7400 passed to bfd_find_nearest_line. Currently this is only supported
7401 for DWARF2 with appropriate DWARF3 extensions. */
7402
7403bfd_boolean
7404_bfd_elf_find_inliner_info (bfd *abfd,
7405 const char **filename_ptr,
7406 const char **functionname_ptr,
7407 unsigned int *line_ptr)
7408{
7409 bfd_boolean found;
7410 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7411 functionname_ptr, line_ptr,
7412 & elf_tdata (abfd)->dwarf2_find_line_info);
7413 return found;
7414}
7415
252b5132 7416int
a6b96beb 7417_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7418{
8ded5a0f
AM
7419 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7420 int ret = bed->s->sizeof_ehdr;
252b5132 7421
a6b96beb 7422 if (!info->relocatable)
8ded5a0f 7423 {
62d7a5f6 7424 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
8ded5a0f 7425
62d7a5f6
AM
7426 if (phdr_size == (bfd_size_type) -1)
7427 {
7428 struct elf_segment_map *m;
7429
7430 phdr_size = 0;
7431 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
7432 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7433
62d7a5f6
AM
7434 if (phdr_size == 0)
7435 phdr_size = get_program_header_size (abfd, info);
7436 }
8ded5a0f
AM
7437
7438 elf_tdata (abfd)->program_header_size = phdr_size;
7439 ret += phdr_size;
7440 }
7441
252b5132
RH
7442 return ret;
7443}
7444
b34976b6 7445bfd_boolean
217aa764
AM
7446_bfd_elf_set_section_contents (bfd *abfd,
7447 sec_ptr section,
0f867abe 7448 const void *location,
217aa764
AM
7449 file_ptr offset,
7450 bfd_size_type count)
252b5132
RH
7451{
7452 Elf_Internal_Shdr *hdr;
dc810e39 7453 bfd_signed_vma pos;
252b5132
RH
7454
7455 if (! abfd->output_has_begun
217aa764 7456 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7457 return FALSE;
252b5132
RH
7458
7459 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7460 pos = hdr->sh_offset + offset;
7461 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7462 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7463 return FALSE;
252b5132 7464
b34976b6 7465 return TRUE;
252b5132
RH
7466}
7467
7468void
217aa764
AM
7469_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7470 arelent *cache_ptr ATTRIBUTE_UNUSED,
7471 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7472{
7473 abort ();
7474}
7475
252b5132
RH
7476/* Try to convert a non-ELF reloc into an ELF one. */
7477
b34976b6 7478bfd_boolean
217aa764 7479_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7480{
c044fabd 7481 /* Check whether we really have an ELF howto. */
252b5132
RH
7482
7483 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7484 {
7485 bfd_reloc_code_real_type code;
7486 reloc_howto_type *howto;
7487
7488 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7489 equivalent ELF reloc. */
252b5132
RH
7490
7491 if (areloc->howto->pc_relative)
7492 {
7493 switch (areloc->howto->bitsize)
7494 {
7495 case 8:
7496 code = BFD_RELOC_8_PCREL;
7497 break;
7498 case 12:
7499 code = BFD_RELOC_12_PCREL;
7500 break;
7501 case 16:
7502 code = BFD_RELOC_16_PCREL;
7503 break;
7504 case 24:
7505 code = BFD_RELOC_24_PCREL;
7506 break;
7507 case 32:
7508 code = BFD_RELOC_32_PCREL;
7509 break;
7510 case 64:
7511 code = BFD_RELOC_64_PCREL;
7512 break;
7513 default:
7514 goto fail;
7515 }
7516
7517 howto = bfd_reloc_type_lookup (abfd, code);
7518
7519 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7520 {
7521 if (howto->pcrel_offset)
7522 areloc->addend += areloc->address;
7523 else
7524 areloc->addend -= areloc->address; /* addend is unsigned!! */
7525 }
7526 }
7527 else
7528 {
7529 switch (areloc->howto->bitsize)
7530 {
7531 case 8:
7532 code = BFD_RELOC_8;
7533 break;
7534 case 14:
7535 code = BFD_RELOC_14;
7536 break;
7537 case 16:
7538 code = BFD_RELOC_16;
7539 break;
7540 case 26:
7541 code = BFD_RELOC_26;
7542 break;
7543 case 32:
7544 code = BFD_RELOC_32;
7545 break;
7546 case 64:
7547 code = BFD_RELOC_64;
7548 break;
7549 default:
7550 goto fail;
7551 }
7552
7553 howto = bfd_reloc_type_lookup (abfd, code);
7554 }
7555
7556 if (howto)
7557 areloc->howto = howto;
7558 else
7559 goto fail;
7560 }
7561
b34976b6 7562 return TRUE;
252b5132
RH
7563
7564 fail:
7565 (*_bfd_error_handler)
d003868e
AM
7566 (_("%B: unsupported relocation type %s"),
7567 abfd, areloc->howto->name);
252b5132 7568 bfd_set_error (bfd_error_bad_value);
b34976b6 7569 return FALSE;
252b5132
RH
7570}
7571
b34976b6 7572bfd_boolean
217aa764 7573_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
7574{
7575 if (bfd_get_format (abfd) == bfd_object)
7576 {
b25e3d87 7577 if (elf_tdata (abfd) != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 7578 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 7579 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
7580 }
7581
7582 return _bfd_generic_close_and_cleanup (abfd);
7583}
7584
7585/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7586 in the relocation's offset. Thus we cannot allow any sort of sanity
7587 range-checking to interfere. There is nothing else to do in processing
7588 this reloc. */
7589
7590bfd_reloc_status_type
217aa764
AM
7591_bfd_elf_rel_vtable_reloc_fn
7592 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7593 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7594 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7595 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7596{
7597 return bfd_reloc_ok;
7598}
252b5132
RH
7599\f
7600/* Elf core file support. Much of this only works on native
7601 toolchains, since we rely on knowing the
7602 machine-dependent procfs structure in order to pick
c044fabd 7603 out details about the corefile. */
252b5132
RH
7604
7605#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
7606/* Needed for new procfs interface on sparc-solaris. */
7607# define _STRUCTURED_PROC 1
252b5132
RH
7608# include <sys/procfs.h>
7609#endif
7610
261b8d08
PA
7611/* Return a PID that identifies a "thread" for threaded cores, or the
7612 PID of the main process for non-threaded cores. */
252b5132
RH
7613
7614static int
217aa764 7615elfcore_make_pid (bfd *abfd)
252b5132 7616{
261b8d08
PA
7617 int pid;
7618
7619 pid = elf_tdata (abfd)->core_lwpid;
7620 if (pid == 0)
7621 pid = elf_tdata (abfd)->core_pid;
7622
7623 return pid;
252b5132
RH
7624}
7625
252b5132
RH
7626/* If there isn't a section called NAME, make one, using
7627 data from SECT. Note, this function will generate a
7628 reference to NAME, so you shouldn't deallocate or
c044fabd 7629 overwrite it. */
252b5132 7630
b34976b6 7631static bfd_boolean
217aa764 7632elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7633{
c044fabd 7634 asection *sect2;
252b5132
RH
7635
7636 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7637 return TRUE;
252b5132 7638
117ed4f8 7639 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 7640 if (sect2 == NULL)
b34976b6 7641 return FALSE;
252b5132 7642
eea6121a 7643 sect2->size = sect->size;
252b5132 7644 sect2->filepos = sect->filepos;
252b5132 7645 sect2->alignment_power = sect->alignment_power;
b34976b6 7646 return TRUE;
252b5132
RH
7647}
7648
bb0082d6
AM
7649/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7650 actually creates up to two pseudosections:
7651 - For the single-threaded case, a section named NAME, unless
7652 such a section already exists.
7653 - For the multi-threaded case, a section named "NAME/PID", where
7654 PID is elfcore_make_pid (abfd).
7655 Both pseudosections have identical contents. */
b34976b6 7656bfd_boolean
217aa764
AM
7657_bfd_elfcore_make_pseudosection (bfd *abfd,
7658 char *name,
7659 size_t size,
7660 ufile_ptr filepos)
bb0082d6
AM
7661{
7662 char buf[100];
7663 char *threaded_name;
d4c88bbb 7664 size_t len;
bb0082d6
AM
7665 asection *sect;
7666
7667 /* Build the section name. */
7668
7669 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7670 len = strlen (buf) + 1;
a50b1753 7671 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 7672 if (threaded_name == NULL)
b34976b6 7673 return FALSE;
d4c88bbb 7674 memcpy (threaded_name, buf, len);
bb0082d6 7675
117ed4f8
AM
7676 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
7677 SEC_HAS_CONTENTS);
bb0082d6 7678 if (sect == NULL)
b34976b6 7679 return FALSE;
eea6121a 7680 sect->size = size;
bb0082d6 7681 sect->filepos = filepos;
bb0082d6
AM
7682 sect->alignment_power = 2;
7683
936e320b 7684 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7685}
7686
252b5132 7687/* prstatus_t exists on:
4a938328 7688 solaris 2.5+
252b5132
RH
7689 linux 2.[01] + glibc
7690 unixware 4.2
7691*/
7692
7693#if defined (HAVE_PRSTATUS_T)
a7b97311 7694
b34976b6 7695static bfd_boolean
217aa764 7696elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7697{
eea6121a 7698 size_t size;
7ee38065 7699 int offset;
252b5132 7700
4a938328
MS
7701 if (note->descsz == sizeof (prstatus_t))
7702 {
7703 prstatus_t prstat;
252b5132 7704
eea6121a 7705 size = sizeof (prstat.pr_reg);
7ee38065 7706 offset = offsetof (prstatus_t, pr_reg);
4a938328 7707 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7708
fa49d224
NC
7709 /* Do not overwrite the core signal if it
7710 has already been set by another thread. */
7711 if (elf_tdata (abfd)->core_signal == 0)
7712 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
261b8d08
PA
7713 if (elf_tdata (abfd)->core_pid == 0)
7714 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7715
4a938328
MS
7716 /* pr_who exists on:
7717 solaris 2.5+
7718 unixware 4.2
7719 pr_who doesn't exist on:
7720 linux 2.[01]
7721 */
252b5132 7722#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7723 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
261b8d08
PA
7724#else
7725 elf_tdata (abfd)->core_lwpid = prstat.pr_pid;
252b5132 7726#endif
4a938328 7727 }
7ee38065 7728#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7729 else if (note->descsz == sizeof (prstatus32_t))
7730 {
7731 /* 64-bit host, 32-bit corefile */
7732 prstatus32_t prstat;
7733
eea6121a 7734 size = sizeof (prstat.pr_reg);
7ee38065 7735 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7736 memcpy (&prstat, note->descdata, sizeof (prstat));
7737
fa49d224
NC
7738 /* Do not overwrite the core signal if it
7739 has already been set by another thread. */
7740 if (elf_tdata (abfd)->core_signal == 0)
7741 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
261b8d08
PA
7742 if (elf_tdata (abfd)->core_pid == 0)
7743 elf_tdata (abfd)->core_pid = prstat.pr_pid;
4a938328
MS
7744
7745 /* pr_who exists on:
7746 solaris 2.5+
7747 unixware 4.2
7748 pr_who doesn't exist on:
7749 linux 2.[01]
7750 */
7ee38065 7751#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328 7752 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
261b8d08
PA
7753#else
7754 elf_tdata (abfd)->core_lwpid = prstat.pr_pid;
4a938328
MS
7755#endif
7756 }
7ee38065 7757#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7758 else
7759 {
7760 /* Fail - we don't know how to handle any other
7761 note size (ie. data object type). */
b34976b6 7762 return TRUE;
4a938328 7763 }
252b5132 7764
bb0082d6 7765 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7766 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7767 size, note->descpos + offset);
252b5132
RH
7768}
7769#endif /* defined (HAVE_PRSTATUS_T) */
7770
bb0082d6 7771/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7772static bfd_boolean
217aa764
AM
7773elfcore_make_note_pseudosection (bfd *abfd,
7774 char *name,
7775 Elf_Internal_Note *note)
252b5132 7776{
936e320b
AM
7777 return _bfd_elfcore_make_pseudosection (abfd, name,
7778 note->descsz, note->descpos);
252b5132
RH
7779}
7780
ff08c6bb
JB
7781/* There isn't a consistent prfpregset_t across platforms,
7782 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7783 data structure apart. */
7784
b34976b6 7785static bfd_boolean
217aa764 7786elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7787{
7788 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7789}
7790
ff08c6bb 7791/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 7792 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 7793 literally. */
c044fabd 7794
b34976b6 7795static bfd_boolean
217aa764 7796elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7797{
7798 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7799}
7800
4339cae0
L
7801/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
7802 with a note type of NT_X86_XSTATE. Just include the whole note's
7803 contents literally. */
7804
7805static bfd_boolean
7806elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
7807{
7808 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
7809}
7810
97753bd5
AM
7811static bfd_boolean
7812elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
7813{
7814 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
7815}
7816
89eeb0bc
LM
7817static bfd_boolean
7818elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
7819{
7820 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
7821}
97753bd5 7822
0675e188
UW
7823static bfd_boolean
7824elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
7825{
7826 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
7827}
7828
d7eeb400
MS
7829static bfd_boolean
7830elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
7831{
7832 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
7833}
7834
7835static bfd_boolean
7836elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
7837{
7838 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
7839}
7840
7841static bfd_boolean
7842elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
7843{
7844 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
7845}
7846
7847static bfd_boolean
7848elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
7849{
7850 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
7851}
7852
7853static bfd_boolean
7854elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
7855{
7856 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
7857}
7858
252b5132 7859#if defined (HAVE_PRPSINFO_T)
4a938328 7860typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7861#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7862typedef prpsinfo32_t elfcore_psinfo32_t;
7863#endif
252b5132
RH
7864#endif
7865
7866#if defined (HAVE_PSINFO_T)
4a938328 7867typedef psinfo_t elfcore_psinfo_t;
7ee38065 7868#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7869typedef psinfo32_t elfcore_psinfo32_t;
7870#endif
252b5132
RH
7871#endif
7872
252b5132
RH
7873/* return a malloc'ed copy of a string at START which is at
7874 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7875 the copy will always have a terminating '\0'. */
252b5132 7876
936e320b 7877char *
217aa764 7878_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7879{
dc810e39 7880 char *dups;
a50b1753 7881 char *end = (char *) memchr (start, '\0', max);
dc810e39 7882 size_t len;
252b5132
RH
7883
7884 if (end == NULL)
7885 len = max;
7886 else
7887 len = end - start;
7888
a50b1753 7889 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 7890 if (dups == NULL)
252b5132
RH
7891 return NULL;
7892
dc810e39
AM
7893 memcpy (dups, start, len);
7894 dups[len] = '\0';
252b5132 7895
dc810e39 7896 return dups;
252b5132
RH
7897}
7898
bb0082d6 7899#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7900static bfd_boolean
217aa764 7901elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7902{
4a938328
MS
7903 if (note->descsz == sizeof (elfcore_psinfo_t))
7904 {
7905 elfcore_psinfo_t psinfo;
252b5132 7906
7ee38065 7907 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7908
4a938328 7909 elf_tdata (abfd)->core_program
936e320b
AM
7910 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7911 sizeof (psinfo.pr_fname));
252b5132 7912
4a938328 7913 elf_tdata (abfd)->core_command
936e320b
AM
7914 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7915 sizeof (psinfo.pr_psargs));
4a938328 7916 }
7ee38065 7917#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7918 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7919 {
7920 /* 64-bit host, 32-bit corefile */
7921 elfcore_psinfo32_t psinfo;
7922
7ee38065 7923 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7924
4a938328 7925 elf_tdata (abfd)->core_program
936e320b
AM
7926 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7927 sizeof (psinfo.pr_fname));
4a938328
MS
7928
7929 elf_tdata (abfd)->core_command
936e320b
AM
7930 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7931 sizeof (psinfo.pr_psargs));
4a938328
MS
7932 }
7933#endif
7934
7935 else
7936 {
7937 /* Fail - we don't know how to handle any other
7938 note size (ie. data object type). */
b34976b6 7939 return TRUE;
4a938328 7940 }
252b5132
RH
7941
7942 /* Note that for some reason, a spurious space is tacked
7943 onto the end of the args in some (at least one anyway)
c044fabd 7944 implementations, so strip it off if it exists. */
252b5132
RH
7945
7946 {
c044fabd 7947 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7948 int n = strlen (command);
7949
7950 if (0 < n && command[n - 1] == ' ')
7951 command[n - 1] = '\0';
7952 }
7953
b34976b6 7954 return TRUE;
252b5132
RH
7955}
7956#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7957
252b5132 7958#if defined (HAVE_PSTATUS_T)
b34976b6 7959static bfd_boolean
217aa764 7960elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7961{
f572a39d
AM
7962 if (note->descsz == sizeof (pstatus_t)
7963#if defined (HAVE_PXSTATUS_T)
7964 || note->descsz == sizeof (pxstatus_t)
7965#endif
7966 )
4a938328
MS
7967 {
7968 pstatus_t pstat;
252b5132 7969
4a938328 7970 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7971
4a938328
MS
7972 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7973 }
7ee38065 7974#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7975 else if (note->descsz == sizeof (pstatus32_t))
7976 {
7977 /* 64-bit host, 32-bit corefile */
7978 pstatus32_t pstat;
252b5132 7979
4a938328 7980 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7981
4a938328
MS
7982 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7983 }
7984#endif
252b5132
RH
7985 /* Could grab some more details from the "representative"
7986 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7987 NT_LWPSTATUS note, presumably. */
252b5132 7988
b34976b6 7989 return TRUE;
252b5132
RH
7990}
7991#endif /* defined (HAVE_PSTATUS_T) */
7992
252b5132 7993#if defined (HAVE_LWPSTATUS_T)
b34976b6 7994static bfd_boolean
217aa764 7995elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7996{
7997 lwpstatus_t lwpstat;
7998 char buf[100];
c044fabd 7999 char *name;
d4c88bbb 8000 size_t len;
c044fabd 8001 asection *sect;
252b5132 8002
f572a39d
AM
8003 if (note->descsz != sizeof (lwpstat)
8004#if defined (HAVE_LWPXSTATUS_T)
8005 && note->descsz != sizeof (lwpxstatus_t)
8006#endif
8007 )
b34976b6 8008 return TRUE;
252b5132
RH
8009
8010 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
8011
8012 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
a1504221
JB
8013 /* Do not overwrite the core signal if it has already been set by
8014 another thread. */
8015 if (elf_tdata (abfd)->core_signal == 0)
8016 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
252b5132 8017
c044fabd 8018 /* Make a ".reg/999" section. */
252b5132
RH
8019
8020 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 8021 len = strlen (buf) + 1;
217aa764 8022 name = bfd_alloc (abfd, len);
252b5132 8023 if (name == NULL)
b34976b6 8024 return FALSE;
d4c88bbb 8025 memcpy (name, buf, len);
252b5132 8026
117ed4f8 8027 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8028 if (sect == NULL)
b34976b6 8029 return FALSE;
252b5132
RH
8030
8031#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8032 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
8033 sect->filepos = note->descpos
8034 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
8035#endif
8036
8037#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 8038 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
8039 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
8040#endif
8041
252b5132
RH
8042 sect->alignment_power = 2;
8043
8044 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8045 return FALSE;
252b5132
RH
8046
8047 /* Make a ".reg2/999" section */
8048
8049 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 8050 len = strlen (buf) + 1;
217aa764 8051 name = bfd_alloc (abfd, len);
252b5132 8052 if (name == NULL)
b34976b6 8053 return FALSE;
d4c88bbb 8054 memcpy (name, buf, len);
252b5132 8055
117ed4f8 8056 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8057 if (sect == NULL)
b34976b6 8058 return FALSE;
252b5132
RH
8059
8060#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8061 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
8062 sect->filepos = note->descpos
8063 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
8064#endif
8065
8066#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 8067 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
8068 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
8069#endif
8070
252b5132
RH
8071 sect->alignment_power = 2;
8072
936e320b 8073 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
8074}
8075#endif /* defined (HAVE_LWPSTATUS_T) */
8076
b34976b6 8077static bfd_boolean
217aa764 8078elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
8079{
8080 char buf[30];
c044fabd 8081 char *name;
d4c88bbb 8082 size_t len;
c044fabd 8083 asection *sect;
4a6636fb
PA
8084 int type;
8085 int is_active_thread;
8086 bfd_vma base_addr;
16e9c715 8087
4a6636fb 8088 if (note->descsz < 728)
b34976b6 8089 return TRUE;
16e9c715 8090
4a6636fb
PA
8091 if (! CONST_STRNEQ (note->namedata, "win32"))
8092 return TRUE;
8093
8094 type = bfd_get_32 (abfd, note->descdata);
c044fabd 8095
4a6636fb 8096 switch (type)
16e9c715 8097 {
4a6636fb 8098 case 1 /* NOTE_INFO_PROCESS */:
16e9c715 8099 /* FIXME: need to add ->core_command. */
4a6636fb
PA
8100 /* process_info.pid */
8101 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 8);
8102 /* process_info.signal */
8103 elf_tdata (abfd)->core_signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 8104 break;
16e9c715 8105
4a6636fb 8106 case 2 /* NOTE_INFO_THREAD */:
16e9c715 8107 /* Make a ".reg/999" section. */
4a6636fb
PA
8108 /* thread_info.tid */
8109 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 8110
d4c88bbb 8111 len = strlen (buf) + 1;
a50b1753 8112 name = (char *) bfd_alloc (abfd, len);
16e9c715 8113 if (name == NULL)
b34976b6 8114 return FALSE;
c044fabd 8115
d4c88bbb 8116 memcpy (name, buf, len);
16e9c715 8117
117ed4f8 8118 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 8119 if (sect == NULL)
b34976b6 8120 return FALSE;
c044fabd 8121
4a6636fb
PA
8122 /* sizeof (thread_info.thread_context) */
8123 sect->size = 716;
8124 /* offsetof (thread_info.thread_context) */
8125 sect->filepos = note->descpos + 12;
16e9c715
NC
8126 sect->alignment_power = 2;
8127
4a6636fb
PA
8128 /* thread_info.is_active_thread */
8129 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
8130
8131 if (is_active_thread)
16e9c715 8132 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8133 return FALSE;
16e9c715
NC
8134 break;
8135
4a6636fb 8136 case 3 /* NOTE_INFO_MODULE */:
16e9c715 8137 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
8138 /* module_info.base_address */
8139 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 8140 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 8141
d4c88bbb 8142 len = strlen (buf) + 1;
a50b1753 8143 name = (char *) bfd_alloc (abfd, len);
16e9c715 8144 if (name == NULL)
b34976b6 8145 return FALSE;
c044fabd 8146
d4c88bbb 8147 memcpy (name, buf, len);
252b5132 8148
117ed4f8 8149 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 8150
16e9c715 8151 if (sect == NULL)
b34976b6 8152 return FALSE;
c044fabd 8153
eea6121a 8154 sect->size = note->descsz;
16e9c715 8155 sect->filepos = note->descpos;
16e9c715
NC
8156 sect->alignment_power = 2;
8157 break;
8158
8159 default:
b34976b6 8160 return TRUE;
16e9c715
NC
8161 }
8162
b34976b6 8163 return TRUE;
16e9c715 8164}
252b5132 8165
b34976b6 8166static bfd_boolean
217aa764 8167elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 8168{
9c5bfbb7 8169 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 8170
252b5132
RH
8171 switch (note->type)
8172 {
8173 default:
b34976b6 8174 return TRUE;
252b5132 8175
252b5132 8176 case NT_PRSTATUS:
bb0082d6
AM
8177 if (bed->elf_backend_grok_prstatus)
8178 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 8179 return TRUE;
bb0082d6 8180#if defined (HAVE_PRSTATUS_T)
252b5132 8181 return elfcore_grok_prstatus (abfd, note);
bb0082d6 8182#else
b34976b6 8183 return TRUE;
252b5132
RH
8184#endif
8185
8186#if defined (HAVE_PSTATUS_T)
8187 case NT_PSTATUS:
8188 return elfcore_grok_pstatus (abfd, note);
8189#endif
8190
8191#if defined (HAVE_LWPSTATUS_T)
8192 case NT_LWPSTATUS:
8193 return elfcore_grok_lwpstatus (abfd, note);
8194#endif
8195
8196 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
8197 return elfcore_grok_prfpreg (abfd, note);
8198
c044fabd 8199 case NT_WIN32PSTATUS:
16e9c715 8200 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 8201
c044fabd 8202 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
8203 if (note->namesz == 6
8204 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
8205 return elfcore_grok_prxfpreg (abfd, note);
8206 else
b34976b6 8207 return TRUE;
ff08c6bb 8208
4339cae0
L
8209 case NT_X86_XSTATE: /* Linux XSAVE extension */
8210 if (note->namesz == 6
8211 && strcmp (note->namedata, "LINUX") == 0)
8212 return elfcore_grok_xstatereg (abfd, note);
8213 else
8214 return TRUE;
8215
97753bd5
AM
8216 case NT_PPC_VMX:
8217 if (note->namesz == 6
8218 && strcmp (note->namedata, "LINUX") == 0)
8219 return elfcore_grok_ppc_vmx (abfd, note);
8220 else
8221 return TRUE;
8222
89eeb0bc
LM
8223 case NT_PPC_VSX:
8224 if (note->namesz == 6
8225 && strcmp (note->namedata, "LINUX") == 0)
8226 return elfcore_grok_ppc_vsx (abfd, note);
8227 else
8228 return TRUE;
8229
0675e188
UW
8230 case NT_S390_HIGH_GPRS:
8231 if (note->namesz == 6
8232 && strcmp (note->namedata, "LINUX") == 0)
8233 return elfcore_grok_s390_high_gprs (abfd, note);
8234 else
8235 return TRUE;
8236
d7eeb400
MS
8237 case NT_S390_TIMER:
8238 if (note->namesz == 6
8239 && strcmp (note->namedata, "LINUX") == 0)
8240 return elfcore_grok_s390_timer (abfd, note);
8241 else
8242 return TRUE;
8243
8244 case NT_S390_TODCMP:
8245 if (note->namesz == 6
8246 && strcmp (note->namedata, "LINUX") == 0)
8247 return elfcore_grok_s390_todcmp (abfd, note);
8248 else
8249 return TRUE;
8250
8251 case NT_S390_TODPREG:
8252 if (note->namesz == 6
8253 && strcmp (note->namedata, "LINUX") == 0)
8254 return elfcore_grok_s390_todpreg (abfd, note);
8255 else
8256 return TRUE;
8257
8258 case NT_S390_CTRS:
8259 if (note->namesz == 6
8260 && strcmp (note->namedata, "LINUX") == 0)
8261 return elfcore_grok_s390_ctrs (abfd, note);
8262 else
8263 return TRUE;
8264
8265 case NT_S390_PREFIX:
8266 if (note->namesz == 6
8267 && strcmp (note->namedata, "LINUX") == 0)
8268 return elfcore_grok_s390_prefix (abfd, note);
8269 else
8270 return TRUE;
8271
252b5132
RH
8272 case NT_PRPSINFO:
8273 case NT_PSINFO:
bb0082d6
AM
8274 if (bed->elf_backend_grok_psinfo)
8275 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 8276 return TRUE;
bb0082d6 8277#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 8278 return elfcore_grok_psinfo (abfd, note);
bb0082d6 8279#else
b34976b6 8280 return TRUE;
252b5132 8281#endif
3333a7c3
RM
8282
8283 case NT_AUXV:
8284 {
117ed4f8
AM
8285 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8286 SEC_HAS_CONTENTS);
3333a7c3
RM
8287
8288 if (sect == NULL)
8289 return FALSE;
eea6121a 8290 sect->size = note->descsz;
3333a7c3 8291 sect->filepos = note->descpos;
3333a7c3
RM
8292 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8293
8294 return TRUE;
8295 }
252b5132
RH
8296 }
8297}
8298
718175fa
JK
8299static bfd_boolean
8300elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
8301{
8302 elf_tdata (abfd)->build_id_size = note->descsz;
a50b1753 8303 elf_tdata (abfd)->build_id = (bfd_byte *) bfd_alloc (abfd, note->descsz);
718175fa
JK
8304 if (elf_tdata (abfd)->build_id == NULL)
8305 return FALSE;
8306
8307 memcpy (elf_tdata (abfd)->build_id, note->descdata, note->descsz);
8308
8309 return TRUE;
8310}
8311
8312static bfd_boolean
8313elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
8314{
8315 switch (note->type)
8316 {
8317 default:
8318 return TRUE;
8319
8320 case NT_GNU_BUILD_ID:
8321 return elfobj_grok_gnu_build_id (abfd, note);
8322 }
8323}
8324
b34976b6 8325static bfd_boolean
217aa764 8326elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
8327{
8328 char *cp;
8329
8330 cp = strchr (note->namedata, '@');
8331 if (cp != NULL)
8332 {
d2b64500 8333 *lwpidp = atoi(cp + 1);
b34976b6 8334 return TRUE;
50b2bdb7 8335 }
b34976b6 8336 return FALSE;
50b2bdb7
AM
8337}
8338
b34976b6 8339static bfd_boolean
217aa764 8340elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 8341{
50b2bdb7
AM
8342 /* Signal number at offset 0x08. */
8343 elf_tdata (abfd)->core_signal
8344 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8345
8346 /* Process ID at offset 0x50. */
8347 elf_tdata (abfd)->core_pid
8348 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
8349
8350 /* Command name at 0x7c (max 32 bytes, including nul). */
8351 elf_tdata (abfd)->core_command
8352 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
8353
7720ba9f
MK
8354 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
8355 note);
50b2bdb7
AM
8356}
8357
b34976b6 8358static bfd_boolean
217aa764 8359elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
8360{
8361 int lwp;
8362
8363 if (elfcore_netbsd_get_lwpid (note, &lwp))
8364 elf_tdata (abfd)->core_lwpid = lwp;
8365
b4db1224 8366 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
8367 {
8368 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
8369 find this note before any of the others, which is fine,
8370 since the kernel writes this note out first when it
8371 creates a core file. */
47d9a591 8372
50b2bdb7
AM
8373 return elfcore_grok_netbsd_procinfo (abfd, note);
8374 }
8375
b4db1224
JT
8376 /* As of Jan 2002 there are no other machine-independent notes
8377 defined for NetBSD core files. If the note type is less
8378 than the start of the machine-dependent note types, we don't
8379 understand it. */
47d9a591 8380
b4db1224 8381 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 8382 return TRUE;
50b2bdb7
AM
8383
8384
8385 switch (bfd_get_arch (abfd))
8386 {
08a40648
AM
8387 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
8388 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
8389
8390 case bfd_arch_alpha:
8391 case bfd_arch_sparc:
8392 switch (note->type)
08a40648
AM
8393 {
8394 case NT_NETBSDCORE_FIRSTMACH+0:
8395 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8396
08a40648
AM
8397 case NT_NETBSDCORE_FIRSTMACH+2:
8398 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8399
08a40648
AM
8400 default:
8401 return TRUE;
8402 }
50b2bdb7 8403
08a40648
AM
8404 /* On all other arch's, PT_GETREGS == mach+1 and
8405 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
8406
8407 default:
8408 switch (note->type)
08a40648
AM
8409 {
8410 case NT_NETBSDCORE_FIRSTMACH+1:
8411 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8412
08a40648
AM
8413 case NT_NETBSDCORE_FIRSTMACH+3:
8414 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8415
08a40648
AM
8416 default:
8417 return TRUE;
8418 }
50b2bdb7
AM
8419 }
8420 /* NOTREACHED */
8421}
8422
67cc5033
MK
8423static bfd_boolean
8424elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
8425{
8426 /* Signal number at offset 0x08. */
8427 elf_tdata (abfd)->core_signal
8428 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8429
8430 /* Process ID at offset 0x20. */
8431 elf_tdata (abfd)->core_pid
8432 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
8433
8434 /* Command name at 0x48 (max 32 bytes, including nul). */
8435 elf_tdata (abfd)->core_command
8436 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
8437
8438 return TRUE;
8439}
8440
8441static bfd_boolean
8442elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
8443{
8444 if (note->type == NT_OPENBSD_PROCINFO)
8445 return elfcore_grok_openbsd_procinfo (abfd, note);
8446
8447 if (note->type == NT_OPENBSD_REGS)
8448 return elfcore_make_note_pseudosection (abfd, ".reg", note);
8449
8450 if (note->type == NT_OPENBSD_FPREGS)
8451 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8452
8453 if (note->type == NT_OPENBSD_XFPREGS)
8454 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8455
8456 if (note->type == NT_OPENBSD_AUXV)
8457 {
8458 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8459 SEC_HAS_CONTENTS);
8460
8461 if (sect == NULL)
8462 return FALSE;
8463 sect->size = note->descsz;
8464 sect->filepos = note->descpos;
8465 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8466
8467 return TRUE;
8468 }
8469
8470 if (note->type == NT_OPENBSD_WCOOKIE)
8471 {
8472 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
8473 SEC_HAS_CONTENTS);
8474
8475 if (sect == NULL)
8476 return FALSE;
8477 sect->size = note->descsz;
8478 sect->filepos = note->descpos;
8479 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8480
8481 return TRUE;
8482 }
8483
8484 return TRUE;
8485}
8486
07c6e936 8487static bfd_boolean
d3fd4074 8488elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
8489{
8490 void *ddata = note->descdata;
8491 char buf[100];
8492 char *name;
8493 asection *sect;
f8843e87
AM
8494 short sig;
8495 unsigned flags;
07c6e936
NC
8496
8497 /* nto_procfs_status 'pid' field is at offset 0. */
8498 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
8499
f8843e87
AM
8500 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
8501 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
8502
8503 /* nto_procfs_status 'flags' field is at offset 8. */
8504 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
8505
8506 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
8507 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
8508 {
8509 elf_tdata (abfd)->core_signal = sig;
8510 elf_tdata (abfd)->core_lwpid = *tid;
8511 }
07c6e936 8512
f8843e87
AM
8513 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
8514 do not come from signals so we make sure we set the current
8515 thread just in case. */
8516 if (flags & 0x00000080)
8517 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
8518
8519 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 8520 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 8521
a50b1753 8522 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8523 if (name == NULL)
8524 return FALSE;
8525 strcpy (name, buf);
8526
117ed4f8 8527 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8528 if (sect == NULL)
8529 return FALSE;
8530
eea6121a 8531 sect->size = note->descsz;
07c6e936 8532 sect->filepos = note->descpos;
07c6e936
NC
8533 sect->alignment_power = 2;
8534
8535 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
8536}
8537
8538static bfd_boolean
d69f560c
KW
8539elfcore_grok_nto_regs (bfd *abfd,
8540 Elf_Internal_Note *note,
d3fd4074 8541 long tid,
d69f560c 8542 char *base)
07c6e936
NC
8543{
8544 char buf[100];
8545 char *name;
8546 asection *sect;
8547
d69f560c 8548 /* Make a "(base)/%d" section. */
d3fd4074 8549 sprintf (buf, "%s/%ld", base, tid);
07c6e936 8550
a50b1753 8551 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8552 if (name == NULL)
8553 return FALSE;
8554 strcpy (name, buf);
8555
117ed4f8 8556 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8557 if (sect == NULL)
8558 return FALSE;
8559
eea6121a 8560 sect->size = note->descsz;
07c6e936 8561 sect->filepos = note->descpos;
07c6e936
NC
8562 sect->alignment_power = 2;
8563
f8843e87
AM
8564 /* This is the current thread. */
8565 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 8566 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
8567
8568 return TRUE;
07c6e936
NC
8569}
8570
8571#define BFD_QNT_CORE_INFO 7
8572#define BFD_QNT_CORE_STATUS 8
8573#define BFD_QNT_CORE_GREG 9
8574#define BFD_QNT_CORE_FPREG 10
8575
8576static bfd_boolean
217aa764 8577elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
8578{
8579 /* Every GREG section has a STATUS section before it. Store the
811072d8 8580 tid from the previous call to pass down to the next gregs
07c6e936 8581 function. */
d3fd4074 8582 static long tid = 1;
07c6e936
NC
8583
8584 switch (note->type)
8585 {
d69f560c
KW
8586 case BFD_QNT_CORE_INFO:
8587 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
8588 case BFD_QNT_CORE_STATUS:
8589 return elfcore_grok_nto_status (abfd, note, &tid);
8590 case BFD_QNT_CORE_GREG:
8591 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
8592 case BFD_QNT_CORE_FPREG:
8593 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
8594 default:
8595 return TRUE;
07c6e936
NC
8596 }
8597}
8598
b15fa79e
AM
8599static bfd_boolean
8600elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
8601{
8602 char *name;
8603 asection *sect;
8604 size_t len;
8605
8606 /* Use note name as section name. */
8607 len = note->namesz;
a50b1753 8608 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
8609 if (name == NULL)
8610 return FALSE;
8611 memcpy (name, note->namedata, len);
8612 name[len - 1] = '\0';
8613
8614 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
8615 if (sect == NULL)
8616 return FALSE;
8617
8618 sect->size = note->descsz;
8619 sect->filepos = note->descpos;
8620 sect->alignment_power = 1;
8621
8622 return TRUE;
8623}
8624
7c76fa91
MS
8625/* Function: elfcore_write_note
8626
47d9a591 8627 Inputs:
a39f3346 8628 buffer to hold note, and current size of buffer
7c76fa91
MS
8629 name of note
8630 type of note
8631 data for note
8632 size of data for note
8633
a39f3346
AM
8634 Writes note to end of buffer. ELF64 notes are written exactly as
8635 for ELF32, despite the current (as of 2006) ELF gabi specifying
8636 that they ought to have 8-byte namesz and descsz field, and have
8637 8-byte alignment. Other writers, eg. Linux kernel, do the same.
8638
7c76fa91 8639 Return:
a39f3346 8640 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
8641
8642char *
a39f3346 8643elfcore_write_note (bfd *abfd,
217aa764 8644 char *buf,
a39f3346 8645 int *bufsiz,
217aa764 8646 const char *name,
a39f3346 8647 int type,
217aa764 8648 const void *input,
a39f3346 8649 int size)
7c76fa91
MS
8650{
8651 Elf_External_Note *xnp;
d4c88bbb 8652 size_t namesz;
d4c88bbb 8653 size_t newspace;
a39f3346 8654 char *dest;
7c76fa91 8655
d4c88bbb 8656 namesz = 0;
d4c88bbb 8657 if (name != NULL)
a39f3346 8658 namesz = strlen (name) + 1;
d4c88bbb 8659
a39f3346 8660 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 8661
a50b1753 8662 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
8663 if (buf == NULL)
8664 return buf;
a39f3346 8665 dest = buf + *bufsiz;
7c76fa91
MS
8666 *bufsiz += newspace;
8667 xnp = (Elf_External_Note *) dest;
8668 H_PUT_32 (abfd, namesz, xnp->namesz);
8669 H_PUT_32 (abfd, size, xnp->descsz);
8670 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
8671 dest = xnp->name;
8672 if (name != NULL)
8673 {
8674 memcpy (dest, name, namesz);
8675 dest += namesz;
a39f3346 8676 while (namesz & 3)
d4c88bbb
AM
8677 {
8678 *dest++ = '\0';
a39f3346 8679 ++namesz;
d4c88bbb
AM
8680 }
8681 }
8682 memcpy (dest, input, size);
a39f3346
AM
8683 dest += size;
8684 while (size & 3)
8685 {
8686 *dest++ = '\0';
8687 ++size;
8688 }
8689 return buf;
7c76fa91
MS
8690}
8691
8692#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
8693char *
217aa764
AM
8694elfcore_write_prpsinfo (bfd *abfd,
8695 char *buf,
8696 int *bufsiz,
8697 const char *fname,
8698 const char *psargs)
7c76fa91 8699{
183e98be
AM
8700 const char *note_name = "CORE";
8701 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8702
8703 if (bed->elf_backend_write_core_note != NULL)
8704 {
8705 char *ret;
8706 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8707 NT_PRPSINFO, fname, psargs);
8708 if (ret != NULL)
8709 return ret;
8710 }
7c76fa91 8711
183e98be
AM
8712#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
8713 if (bed->s->elfclass == ELFCLASS32)
8714 {
8715#if defined (HAVE_PSINFO32_T)
8716 psinfo32_t data;
8717 int note_type = NT_PSINFO;
8718#else
8719 prpsinfo32_t data;
8720 int note_type = NT_PRPSINFO;
8721#endif
8722
8723 memset (&data, 0, sizeof (data));
8724 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8725 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8726 return elfcore_write_note (abfd, buf, bufsiz,
8727 note_name, note_type, &data, sizeof (data));
8728 }
8729 else
8730#endif
8731 {
7c76fa91 8732#if defined (HAVE_PSINFO_T)
183e98be
AM
8733 psinfo_t data;
8734 int note_type = NT_PSINFO;
7c76fa91 8735#else
183e98be
AM
8736 prpsinfo_t data;
8737 int note_type = NT_PRPSINFO;
7c76fa91
MS
8738#endif
8739
183e98be
AM
8740 memset (&data, 0, sizeof (data));
8741 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8742 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8743 return elfcore_write_note (abfd, buf, bufsiz,
8744 note_name, note_type, &data, sizeof (data));
8745 }
7c76fa91
MS
8746}
8747#endif /* PSINFO_T or PRPSINFO_T */
8748
8749#if defined (HAVE_PRSTATUS_T)
8750char *
217aa764
AM
8751elfcore_write_prstatus (bfd *abfd,
8752 char *buf,
8753 int *bufsiz,
8754 long pid,
8755 int cursig,
8756 const void *gregs)
7c76fa91 8757{
183e98be
AM
8758 const char *note_name = "CORE";
8759 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8760
183e98be
AM
8761 if (bed->elf_backend_write_core_note != NULL)
8762 {
8763 char *ret;
8764 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8765 NT_PRSTATUS,
8766 pid, cursig, gregs);
8767 if (ret != NULL)
8768 return ret;
8769 }
8770
8771#if defined (HAVE_PRSTATUS32_T)
8772 if (bed->s->elfclass == ELFCLASS32)
8773 {
8774 prstatus32_t prstat;
8775
8776 memset (&prstat, 0, sizeof (prstat));
8777 prstat.pr_pid = pid;
8778 prstat.pr_cursig = cursig;
8779 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8780 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8781 NT_PRSTATUS, &prstat, sizeof (prstat));
8782 }
8783 else
8784#endif
8785 {
8786 prstatus_t prstat;
8787
8788 memset (&prstat, 0, sizeof (prstat));
8789 prstat.pr_pid = pid;
8790 prstat.pr_cursig = cursig;
8791 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8792 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8793 NT_PRSTATUS, &prstat, sizeof (prstat));
8794 }
7c76fa91
MS
8795}
8796#endif /* HAVE_PRSTATUS_T */
8797
51316059
MS
8798#if defined (HAVE_LWPSTATUS_T)
8799char *
217aa764
AM
8800elfcore_write_lwpstatus (bfd *abfd,
8801 char *buf,
8802 int *bufsiz,
8803 long pid,
8804 int cursig,
8805 const void *gregs)
51316059
MS
8806{
8807 lwpstatus_t lwpstat;
183e98be 8808 const char *note_name = "CORE";
51316059
MS
8809
8810 memset (&lwpstat, 0, sizeof (lwpstat));
8811 lwpstat.pr_lwpid = pid >> 16;
8812 lwpstat.pr_cursig = cursig;
8813#if defined (HAVE_LWPSTATUS_T_PR_REG)
8814 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
8815#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
8816#if !defined(gregs)
8817 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
8818 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
8819#else
8820 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
8821 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
8822#endif
8823#endif
47d9a591 8824 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8825 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
8826}
8827#endif /* HAVE_LWPSTATUS_T */
8828
7c76fa91
MS
8829#if defined (HAVE_PSTATUS_T)
8830char *
217aa764
AM
8831elfcore_write_pstatus (bfd *abfd,
8832 char *buf,
8833 int *bufsiz,
8834 long pid,
6c10990d
NC
8835 int cursig ATTRIBUTE_UNUSED,
8836 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 8837{
183e98be
AM
8838 const char *note_name = "CORE";
8839#if defined (HAVE_PSTATUS32_T)
8840 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8841
183e98be
AM
8842 if (bed->s->elfclass == ELFCLASS32)
8843 {
8844 pstatus32_t pstat;
8845
8846 memset (&pstat, 0, sizeof (pstat));
8847 pstat.pr_pid = pid & 0xffff;
8848 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8849 NT_PSTATUS, &pstat, sizeof (pstat));
8850 return buf;
8851 }
8852 else
8853#endif
8854 {
8855 pstatus_t pstat;
8856
8857 memset (&pstat, 0, sizeof (pstat));
8858 pstat.pr_pid = pid & 0xffff;
8859 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8860 NT_PSTATUS, &pstat, sizeof (pstat));
8861 return buf;
8862 }
7c76fa91
MS
8863}
8864#endif /* HAVE_PSTATUS_T */
8865
8866char *
217aa764
AM
8867elfcore_write_prfpreg (bfd *abfd,
8868 char *buf,
8869 int *bufsiz,
8870 const void *fpregs,
8871 int size)
7c76fa91 8872{
183e98be 8873 const char *note_name = "CORE";
47d9a591 8874 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8875 note_name, NT_FPREGSET, fpregs, size);
8876}
8877
8878char *
217aa764
AM
8879elfcore_write_prxfpreg (bfd *abfd,
8880 char *buf,
8881 int *bufsiz,
8882 const void *xfpregs,
8883 int size)
7c76fa91
MS
8884{
8885 char *note_name = "LINUX";
47d9a591 8886 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8887 note_name, NT_PRXFPREG, xfpregs, size);
8888}
8889
4339cae0
L
8890char *
8891elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
8892 const void *xfpregs, int size)
8893{
8894 char *note_name = "LINUX";
8895 return elfcore_write_note (abfd, buf, bufsiz,
8896 note_name, NT_X86_XSTATE, xfpregs, size);
8897}
8898
97753bd5
AM
8899char *
8900elfcore_write_ppc_vmx (bfd *abfd,
8901 char *buf,
8902 int *bufsiz,
8903 const void *ppc_vmx,
8904 int size)
8905{
8906 char *note_name = "LINUX";
8907 return elfcore_write_note (abfd, buf, bufsiz,
8908 note_name, NT_PPC_VMX, ppc_vmx, size);
8909}
8910
89eeb0bc
LM
8911char *
8912elfcore_write_ppc_vsx (bfd *abfd,
8913 char *buf,
8914 int *bufsiz,
8915 const void *ppc_vsx,
8916 int size)
8917{
8918 char *note_name = "LINUX";
8919 return elfcore_write_note (abfd, buf, bufsiz,
8920 note_name, NT_PPC_VSX, ppc_vsx, size);
8921}
8922
0675e188
UW
8923static char *
8924elfcore_write_s390_high_gprs (bfd *abfd,
8925 char *buf,
8926 int *bufsiz,
8927 const void *s390_high_gprs,
8928 int size)
8929{
8930 char *note_name = "LINUX";
8931 return elfcore_write_note (abfd, buf, bufsiz,
8932 note_name, NT_S390_HIGH_GPRS,
8933 s390_high_gprs, size);
8934}
8935
d7eeb400
MS
8936char *
8937elfcore_write_s390_timer (bfd *abfd,
8938 char *buf,
8939 int *bufsiz,
8940 const void *s390_timer,
8941 int size)
8942{
8943 char *note_name = "LINUX";
8944 return elfcore_write_note (abfd, buf, bufsiz,
8945 note_name, NT_S390_TIMER, s390_timer, size);
8946}
8947
8948char *
8949elfcore_write_s390_todcmp (bfd *abfd,
8950 char *buf,
8951 int *bufsiz,
8952 const void *s390_todcmp,
8953 int size)
8954{
8955 char *note_name = "LINUX";
8956 return elfcore_write_note (abfd, buf, bufsiz,
8957 note_name, NT_S390_TODCMP, s390_todcmp, size);
8958}
8959
8960char *
8961elfcore_write_s390_todpreg (bfd *abfd,
8962 char *buf,
8963 int *bufsiz,
8964 const void *s390_todpreg,
8965 int size)
8966{
8967 char *note_name = "LINUX";
8968 return elfcore_write_note (abfd, buf, bufsiz,
8969 note_name, NT_S390_TODPREG, s390_todpreg, size);
8970}
8971
8972char *
8973elfcore_write_s390_ctrs (bfd *abfd,
8974 char *buf,
8975 int *bufsiz,
8976 const void *s390_ctrs,
8977 int size)
8978{
8979 char *note_name = "LINUX";
8980 return elfcore_write_note (abfd, buf, bufsiz,
8981 note_name, NT_S390_CTRS, s390_ctrs, size);
8982}
8983
8984char *
8985elfcore_write_s390_prefix (bfd *abfd,
8986 char *buf,
8987 int *bufsiz,
8988 const void *s390_prefix,
8989 int size)
8990{
8991 char *note_name = "LINUX";
8992 return elfcore_write_note (abfd, buf, bufsiz,
8993 note_name, NT_S390_PREFIX, s390_prefix, size);
8994}
8995
bb864ac1
CES
8996char *
8997elfcore_write_register_note (bfd *abfd,
8998 char *buf,
8999 int *bufsiz,
9000 const char *section,
9001 const void *data,
9002 int size)
9003{
9004 if (strcmp (section, ".reg2") == 0)
9005 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
9006 if (strcmp (section, ".reg-xfp") == 0)
9007 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
9008 if (strcmp (section, ".reg-xstate") == 0)
9009 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
9010 if (strcmp (section, ".reg-ppc-vmx") == 0)
9011 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
9012 if (strcmp (section, ".reg-ppc-vsx") == 0)
9013 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
9014 if (strcmp (section, ".reg-s390-high-gprs") == 0)
9015 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
9016 if (strcmp (section, ".reg-s390-timer") == 0)
9017 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
9018 if (strcmp (section, ".reg-s390-todcmp") == 0)
9019 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
9020 if (strcmp (section, ".reg-s390-todpreg") == 0)
9021 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
9022 if (strcmp (section, ".reg-s390-ctrs") == 0)
9023 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
9024 if (strcmp (section, ".reg-s390-prefix") == 0)
9025 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
bb864ac1
CES
9026 return NULL;
9027}
9028
b34976b6 9029static bfd_boolean
718175fa 9030elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 9031{
c044fabd 9032 char *p;
252b5132 9033
252b5132
RH
9034 p = buf;
9035 while (p < buf + size)
9036 {
c044fabd
KH
9037 /* FIXME: bad alignment assumption. */
9038 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
9039 Elf_Internal_Note in;
9040
baea7ef1
AM
9041 if (offsetof (Elf_External_Note, name) > buf - p + size)
9042 return FALSE;
9043
dc810e39 9044 in.type = H_GET_32 (abfd, xnp->type);
252b5132 9045
dc810e39 9046 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 9047 in.namedata = xnp->name;
baea7ef1
AM
9048 if (in.namesz > buf - in.namedata + size)
9049 return FALSE;
252b5132 9050
dc810e39 9051 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
9052 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
9053 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
9054 if (in.descsz != 0
9055 && (in.descdata >= buf + size
9056 || in.descsz > buf - in.descdata + size))
9057 return FALSE;
252b5132 9058
718175fa
JK
9059 switch (bfd_get_format (abfd))
9060 {
9061 default:
9062 return TRUE;
9063
9064 case bfd_core:
9065 if (CONST_STRNEQ (in.namedata, "NetBSD-CORE"))
9066 {
9067 if (! elfcore_grok_netbsd_note (abfd, &in))
9068 return FALSE;
9069 }
67cc5033
MK
9070 else if (CONST_STRNEQ (in.namedata, "OpenBSD"))
9071 {
9072 if (! elfcore_grok_openbsd_note (abfd, &in))
9073 return FALSE;
9074 }
718175fa
JK
9075 else if (CONST_STRNEQ (in.namedata, "QNX"))
9076 {
9077 if (! elfcore_grok_nto_note (abfd, &in))
9078 return FALSE;
9079 }
b15fa79e
AM
9080 else if (CONST_STRNEQ (in.namedata, "SPU/"))
9081 {
9082 if (! elfcore_grok_spu_note (abfd, &in))
9083 return FALSE;
9084 }
718175fa
JK
9085 else
9086 {
9087 if (! elfcore_grok_note (abfd, &in))
9088 return FALSE;
9089 }
9090 break;
9091
9092 case bfd_object:
9093 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
9094 {
9095 if (! elfobj_grok_gnu_note (abfd, &in))
9096 return FALSE;
9097 }
9098 break;
08a40648 9099 }
252b5132
RH
9100
9101 p = in.descdata + BFD_ALIGN (in.descsz, 4);
9102 }
9103
718175fa
JK
9104 return TRUE;
9105}
9106
9107static bfd_boolean
9108elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
9109{
9110 char *buf;
9111
9112 if (size <= 0)
9113 return TRUE;
9114
9115 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
9116 return FALSE;
9117
a50b1753 9118 buf = (char *) bfd_malloc (size);
718175fa
JK
9119 if (buf == NULL)
9120 return FALSE;
9121
9122 if (bfd_bread (buf, size, abfd) != size
9123 || !elf_parse_notes (abfd, buf, size, offset))
9124 {
9125 free (buf);
9126 return FALSE;
9127 }
9128
252b5132 9129 free (buf);
b34976b6 9130 return TRUE;
252b5132 9131}
98d8431c
JB
9132\f
9133/* Providing external access to the ELF program header table. */
9134
9135/* Return an upper bound on the number of bytes required to store a
9136 copy of ABFD's program header table entries. Return -1 if an error
9137 occurs; bfd_get_error will return an appropriate code. */
c044fabd 9138
98d8431c 9139long
217aa764 9140bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
9141{
9142 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9143 {
9144 bfd_set_error (bfd_error_wrong_format);
9145 return -1;
9146 }
9147
936e320b 9148 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
9149}
9150
98d8431c
JB
9151/* Copy ABFD's program header table entries to *PHDRS. The entries
9152 will be stored as an array of Elf_Internal_Phdr structures, as
9153 defined in include/elf/internal.h. To find out how large the
9154 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
9155
9156 Return the number of program header table entries read, or -1 if an
9157 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 9158
98d8431c 9159int
217aa764 9160bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
9161{
9162 int num_phdrs;
9163
9164 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9165 {
9166 bfd_set_error (bfd_error_wrong_format);
9167 return -1;
9168 }
9169
9170 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 9171 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
9172 num_phdrs * sizeof (Elf_Internal_Phdr));
9173
9174 return num_phdrs;
9175}
ae4221d7 9176
db6751f2 9177enum elf_reloc_type_class
217aa764 9178_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
9179{
9180 return reloc_class_normal;
9181}
f8df10f4 9182
47d9a591 9183/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
9184 relocation against a local symbol. */
9185
9186bfd_vma
217aa764
AM
9187_bfd_elf_rela_local_sym (bfd *abfd,
9188 Elf_Internal_Sym *sym,
8517fae7 9189 asection **psec,
217aa764 9190 Elf_Internal_Rela *rel)
f8df10f4 9191{
8517fae7 9192 asection *sec = *psec;
f8df10f4
JJ
9193 bfd_vma relocation;
9194
9195 relocation = (sec->output_section->vma
9196 + sec->output_offset
9197 + sym->st_value);
9198 if ((sec->flags & SEC_MERGE)
c629eae0 9199 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 9200 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 9201 {
f8df10f4 9202 rel->r_addend =
8517fae7 9203 _bfd_merged_section_offset (abfd, psec,
65765700 9204 elf_section_data (sec)->sec_info,
753731ee
AM
9205 sym->st_value + rel->r_addend);
9206 if (sec != *psec)
9207 {
9208 /* If we have changed the section, and our original section is
9209 marked with SEC_EXCLUDE, it means that the original
9210 SEC_MERGE section has been completely subsumed in some
9211 other SEC_MERGE section. In this case, we need to leave
9212 some info around for --emit-relocs. */
9213 if ((sec->flags & SEC_EXCLUDE) != 0)
9214 sec->kept_section = *psec;
9215 sec = *psec;
9216 }
8517fae7
AM
9217 rel->r_addend -= relocation;
9218 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
9219 }
9220 return relocation;
9221}
c629eae0
JJ
9222
9223bfd_vma
217aa764
AM
9224_bfd_elf_rel_local_sym (bfd *abfd,
9225 Elf_Internal_Sym *sym,
9226 asection **psec,
9227 bfd_vma addend)
47d9a591 9228{
c629eae0
JJ
9229 asection *sec = *psec;
9230
68bfbfcc 9231 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
9232 return sym->st_value + addend;
9233
9234 return _bfd_merged_section_offset (abfd, psec,
65765700 9235 elf_section_data (sec)->sec_info,
753731ee 9236 sym->st_value + addend);
c629eae0
JJ
9237}
9238
9239bfd_vma
217aa764 9240_bfd_elf_section_offset (bfd *abfd,
92e4ec35 9241 struct bfd_link_info *info,
217aa764
AM
9242 asection *sec,
9243 bfd_vma offset)
c629eae0 9244{
68bfbfcc 9245 switch (sec->sec_info_type)
65765700
JJ
9246 {
9247 case ELF_INFO_TYPE_STABS:
eea6121a
AM
9248 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
9249 offset);
65765700 9250 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 9251 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
9252 default:
9253 return offset;
9254 }
c629eae0 9255}
3333a7c3
RM
9256\f
9257/* Create a new BFD as if by bfd_openr. Rather than opening a file,
9258 reconstruct an ELF file by reading the segments out of remote memory
9259 based on the ELF file header at EHDR_VMA and the ELF program headers it
9260 points to. If not null, *LOADBASEP is filled in with the difference
9261 between the VMAs from which the segments were read, and the VMAs the
9262 file headers (and hence BFD's idea of each section's VMA) put them at.
9263
9264 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
9265 remote memory at target address VMA into the local buffer at MYADDR; it
9266 should return zero on success or an `errno' code on failure. TEMPL must
9267 be a BFD for an ELF target with the word size and byte order found in
9268 the remote memory. */
9269
9270bfd *
217aa764
AM
9271bfd_elf_bfd_from_remote_memory
9272 (bfd *templ,
9273 bfd_vma ehdr_vma,
9274 bfd_vma *loadbasep,
f075ee0c 9275 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
9276{
9277 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
9278 (templ, ehdr_vma, loadbasep, target_read_memory);
9279}
4c45e5c9
JJ
9280\f
9281long
c9727e01
AM
9282_bfd_elf_get_synthetic_symtab (bfd *abfd,
9283 long symcount ATTRIBUTE_UNUSED,
9284 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 9285 long dynsymcount,
c9727e01
AM
9286 asymbol **dynsyms,
9287 asymbol **ret)
4c45e5c9
JJ
9288{
9289 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9290 asection *relplt;
9291 asymbol *s;
9292 const char *relplt_name;
9293 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
9294 arelent *p;
9295 long count, i, n;
9296 size_t size;
9297 Elf_Internal_Shdr *hdr;
9298 char *names;
9299 asection *plt;
9300
8615f3f2
AM
9301 *ret = NULL;
9302
90e3cdf2
JJ
9303 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
9304 return 0;
9305
8615f3f2
AM
9306 if (dynsymcount <= 0)
9307 return 0;
9308
4c45e5c9
JJ
9309 if (!bed->plt_sym_val)
9310 return 0;
9311
9312 relplt_name = bed->relplt_name;
9313 if (relplt_name == NULL)
d35fd659 9314 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
9315 relplt = bfd_get_section_by_name (abfd, relplt_name);
9316 if (relplt == NULL)
9317 return 0;
9318
9319 hdr = &elf_section_data (relplt)->this_hdr;
9320 if (hdr->sh_link != elf_dynsymtab (abfd)
9321 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
9322 return 0;
9323
9324 plt = bfd_get_section_by_name (abfd, ".plt");
9325 if (plt == NULL)
9326 return 0;
9327
9328 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 9329 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
9330 return -1;
9331
eea6121a 9332 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
9333 size = count * sizeof (asymbol);
9334 p = relplt->relocation;
cb53bf42 9335 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
9336 {
9337 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
9338 if (p->addend != 0)
9339 {
9340#ifdef BFD64
9341 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
9342#else
9343 size += sizeof ("+0x") - 1 + 8;
9344#endif
9345 }
9346 }
4c45e5c9 9347
a50b1753 9348 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
9349 if (s == NULL)
9350 return -1;
9351
9352 names = (char *) (s + count);
9353 p = relplt->relocation;
9354 n = 0;
cb53bf42 9355 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
9356 {
9357 size_t len;
9358 bfd_vma addr;
9359
9360 addr = bed->plt_sym_val (i, plt, p);
9361 if (addr == (bfd_vma) -1)
9362 continue;
9363
9364 *s = **p->sym_ptr_ptr;
65a7a66f
AM
9365 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
9366 we are defining a symbol, ensure one of them is set. */
9367 if ((s->flags & BSF_LOCAL) == 0)
9368 s->flags |= BSF_GLOBAL;
6ba2a415 9369 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
9370 s->section = plt;
9371 s->value = addr - plt->vma;
9372 s->name = names;
8f39ba8e 9373 s->udata.p = NULL;
4c45e5c9
JJ
9374 len = strlen ((*p->sym_ptr_ptr)->name);
9375 memcpy (names, (*p->sym_ptr_ptr)->name, len);
9376 names += len;
041de40d
AM
9377 if (p->addend != 0)
9378 {
1d770845 9379 char buf[30], *a;
91d6fa6a 9380
041de40d
AM
9381 memcpy (names, "+0x", sizeof ("+0x") - 1);
9382 names += sizeof ("+0x") - 1;
1d770845
L
9383 bfd_sprintf_vma (abfd, buf, p->addend);
9384 for (a = buf; *a == '0'; ++a)
9385 ;
9386 len = strlen (a);
9387 memcpy (names, a, len);
9388 names += len;
041de40d 9389 }
4c45e5c9
JJ
9390 memcpy (names, "@plt", sizeof ("@plt"));
9391 names += sizeof ("@plt");
8f39ba8e 9392 ++s, ++n;
4c45e5c9
JJ
9393 }
9394
9395 return n;
9396}
3d7f7666 9397
3b22753a
L
9398/* It is only used by x86-64 so far. */
9399asection _bfd_elf_large_com_section
9400 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 9401 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 9402
d1036acb
L
9403void
9404_bfd_elf_set_osabi (bfd * abfd,
9405 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
9406{
9407 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
9408
9409 i_ehdrp = elf_elfheader (abfd);
9410
9411 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
9412
9413 /* To make things simpler for the loader on Linux systems we set the
9414 osabi field to ELFOSABI_LINUX if the binary contains symbols of
9415 the STT_GNU_IFUNC type. */
9416 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
9417 && elf_tdata (abfd)->has_ifunc_symbols)
9418 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
d1036acb 9419}
fcb93ecf
PB
9420
9421
9422/* Return TRUE for ELF symbol types that represent functions.
9423 This is the default version of this function, which is sufficient for
d8045f23 9424 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
9425
9426bfd_boolean
9427_bfd_elf_is_function_type (unsigned int type)
9428{
d8045f23
NC
9429 return (type == STT_FUNC
9430 || type == STT_GNU_IFUNC);
fcb93ecf 9431}
This page took 1.627219 seconds and 4 git commands to generate.