]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
Automatic date update in version.in
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91 2
82704155 3 Copyright (C) 1993-2019 Free Software Foundation, Inc.
252b5132 4
5e8d7549 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
5e8d7549
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
5e8d7549 10 (at your option) any later version.
252b5132 11
5e8d7549
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
5e8d7549 17 You should have received a copy of the GNU General Public License
b34976b6 18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132 22
1b74d094
BW
23/*
24SECTION
252b5132
RH
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
661a3fd4 33 haven't bothered yet. */
252b5132 34
7ee38065
MS
35/* For sparc64-cross-sparc32. */
36#define _SYSCALL32
252b5132 37#include "sysdep.h"
3a551c7a 38#include <limits.h>
3db64b00 39#include "bfd.h"
252b5132
RH
40#include "bfdlink.h"
41#include "libbfd.h"
42#define ARCH_SIZE 0
43#include "elf-bfd.h"
e0e8c97f 44#include "libiberty.h"
ff59fc36 45#include "safe-ctype.h"
de64ce13 46#include "elf-linux-core.h"
252b5132 47
8bc7f138
L
48#ifdef CORE_HEADER
49#include CORE_HEADER
50#endif
51
217aa764 52static int elf_sort_sections (const void *, const void *);
c84fca4d 53static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
ef10c3ac 54static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int) ;
718175fa 55static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
276da9b3 56 file_ptr offset, size_t align);
50b2bdb7 57
252b5132
RH
58/* Swap version information in and out. The version information is
59 currently size independent. If that ever changes, this code will
60 need to move into elfcode.h. */
61
62/* Swap in a Verdef structure. */
63
64void
217aa764
AM
65_bfd_elf_swap_verdef_in (bfd *abfd,
66 const Elf_External_Verdef *src,
67 Elf_Internal_Verdef *dst)
252b5132 68{
dc810e39
AM
69 dst->vd_version = H_GET_16 (abfd, src->vd_version);
70 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
71 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
72 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
73 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
74 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
75 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
76}
77
78/* Swap out a Verdef structure. */
79
80void
217aa764
AM
81_bfd_elf_swap_verdef_out (bfd *abfd,
82 const Elf_Internal_Verdef *src,
83 Elf_External_Verdef *dst)
252b5132 84{
dc810e39
AM
85 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
86 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
87 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
88 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
89 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
90 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
91 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
92}
93
94/* Swap in a Verdaux structure. */
95
96void
217aa764
AM
97_bfd_elf_swap_verdaux_in (bfd *abfd,
98 const Elf_External_Verdaux *src,
99 Elf_Internal_Verdaux *dst)
252b5132 100{
dc810e39
AM
101 dst->vda_name = H_GET_32 (abfd, src->vda_name);
102 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
103}
104
105/* Swap out a Verdaux structure. */
106
107void
217aa764
AM
108_bfd_elf_swap_verdaux_out (bfd *abfd,
109 const Elf_Internal_Verdaux *src,
110 Elf_External_Verdaux *dst)
252b5132 111{
dc810e39
AM
112 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
113 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
114}
115
116/* Swap in a Verneed structure. */
117
118void
217aa764
AM
119_bfd_elf_swap_verneed_in (bfd *abfd,
120 const Elf_External_Verneed *src,
121 Elf_Internal_Verneed *dst)
252b5132 122{
dc810e39
AM
123 dst->vn_version = H_GET_16 (abfd, src->vn_version);
124 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
125 dst->vn_file = H_GET_32 (abfd, src->vn_file);
126 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
127 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
128}
129
130/* Swap out a Verneed structure. */
131
132void
217aa764
AM
133_bfd_elf_swap_verneed_out (bfd *abfd,
134 const Elf_Internal_Verneed *src,
135 Elf_External_Verneed *dst)
252b5132 136{
dc810e39
AM
137 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
138 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
139 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
140 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
141 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
142}
143
144/* Swap in a Vernaux structure. */
145
146void
217aa764
AM
147_bfd_elf_swap_vernaux_in (bfd *abfd,
148 const Elf_External_Vernaux *src,
149 Elf_Internal_Vernaux *dst)
252b5132 150{
dc810e39
AM
151 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
152 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
153 dst->vna_other = H_GET_16 (abfd, src->vna_other);
154 dst->vna_name = H_GET_32 (abfd, src->vna_name);
155 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
156}
157
158/* Swap out a Vernaux structure. */
159
160void
217aa764
AM
161_bfd_elf_swap_vernaux_out (bfd *abfd,
162 const Elf_Internal_Vernaux *src,
163 Elf_External_Vernaux *dst)
252b5132 164{
dc810e39
AM
165 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
166 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
167 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
168 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
169 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
170}
171
172/* Swap in a Versym structure. */
173
174void
217aa764
AM
175_bfd_elf_swap_versym_in (bfd *abfd,
176 const Elf_External_Versym *src,
177 Elf_Internal_Versym *dst)
252b5132 178{
dc810e39 179 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
180}
181
182/* Swap out a Versym structure. */
183
184void
217aa764
AM
185_bfd_elf_swap_versym_out (bfd *abfd,
186 const Elf_Internal_Versym *src,
187 Elf_External_Versym *dst)
252b5132 188{
dc810e39 189 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
190}
191
192/* Standard ELF hash function. Do not change this function; you will
193 cause invalid hash tables to be generated. */
3a99b017 194
252b5132 195unsigned long
217aa764 196bfd_elf_hash (const char *namearg)
252b5132 197{
3a99b017 198 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
199 unsigned long h = 0;
200 unsigned long g;
201 int ch;
202
203 while ((ch = *name++) != '\0')
204 {
205 h = (h << 4) + ch;
206 if ((g = (h & 0xf0000000)) != 0)
207 {
208 h ^= g >> 24;
209 /* The ELF ABI says `h &= ~g', but this is equivalent in
210 this case and on some machines one insn instead of two. */
211 h ^= g;
212 }
213 }
32dfa85d 214 return h & 0xffffffff;
252b5132
RH
215}
216
fdc90cb4
JJ
217/* DT_GNU_HASH hash function. Do not change this function; you will
218 cause invalid hash tables to be generated. */
219
220unsigned long
221bfd_elf_gnu_hash (const char *namearg)
222{
223 const unsigned char *name = (const unsigned char *) namearg;
224 unsigned long h = 5381;
225 unsigned char ch;
226
227 while ((ch = *name++) != '\0')
228 h = (h << 5) + h + ch;
229 return h & 0xffffffff;
230}
231
0c8d6e5c
AM
232/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
233 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 234bfd_boolean
0c8d6e5c 235bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 236 size_t object_size,
4dfe6ac6 237 enum elf_target_id object_id)
252b5132 238{
0ffa91dd
NC
239 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
240 abfd->tdata.any = bfd_zalloc (abfd, object_size);
241 if (abfd->tdata.any == NULL)
242 return FALSE;
252b5132 243
0ffa91dd 244 elf_object_id (abfd) = object_id;
c0355132
AM
245 if (abfd->direction != read_direction)
246 {
247 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
248 if (o == NULL)
249 return FALSE;
250 elf_tdata (abfd)->o = o;
251 elf_program_header_size (abfd) = (bfd_size_type) -1;
252 }
b34976b6 253 return TRUE;
252b5132
RH
254}
255
0ffa91dd
NC
256
257bfd_boolean
ae95ffa6 258bfd_elf_make_object (bfd *abfd)
0ffa91dd 259{
ae95ffa6 260 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 261 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 262 bed->target_id);
0ffa91dd
NC
263}
264
b34976b6 265bfd_boolean
217aa764 266bfd_elf_mkcorefile (bfd *abfd)
252b5132 267{
c044fabd 268 /* I think this can be done just like an object file. */
228e534f
AM
269 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
270 return FALSE;
271 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
272 return elf_tdata (abfd)->core != NULL;
252b5132
RH
273}
274
6d5944fc 275char *
217aa764 276bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
277{
278 Elf_Internal_Shdr **i_shdrp;
f075ee0c 279 bfd_byte *shstrtab = NULL;
dc810e39
AM
280 file_ptr offset;
281 bfd_size_type shstrtabsize;
252b5132
RH
282
283 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
284 if (i_shdrp == 0
285 || shindex >= elf_numsections (abfd)
286 || i_shdrp[shindex] == 0)
f075ee0c 287 return NULL;
252b5132 288
f075ee0c 289 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
290 if (shstrtab == NULL)
291 {
c044fabd 292 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
293 offset = i_shdrp[shindex]->sh_offset;
294 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
295
296 /* Allocate and clear an extra byte at the end, to prevent crashes
297 in case the string table is not terminated. */
3471d59d 298 if (shstrtabsize + 1 <= 1
95a6d235 299 || shstrtabsize > bfd_get_file_size (abfd)
06614111
NC
300 || bfd_seek (abfd, offset, SEEK_SET) != 0
301 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL)
c6c60d09
JJ
302 shstrtab = NULL;
303 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
304 {
305 if (bfd_get_error () != bfd_error_system_call)
306 bfd_set_error (bfd_error_file_truncated);
06614111 307 bfd_release (abfd, shstrtab);
c6c60d09 308 shstrtab = NULL;
3471d59d
CC
309 /* Once we've failed to read it, make sure we don't keep
310 trying. Otherwise, we'll keep allocating space for
311 the string table over and over. */
312 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
313 }
314 else
315 shstrtab[shstrtabsize] = '\0';
217aa764 316 i_shdrp[shindex]->contents = shstrtab;
252b5132 317 }
f075ee0c 318 return (char *) shstrtab;
252b5132
RH
319}
320
321char *
217aa764
AM
322bfd_elf_string_from_elf_section (bfd *abfd,
323 unsigned int shindex,
324 unsigned int strindex)
252b5132
RH
325{
326 Elf_Internal_Shdr *hdr;
327
328 if (strindex == 0)
329 return "";
330
74f2e02b
AM
331 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
332 return NULL;
333
252b5132
RH
334 hdr = elf_elfsections (abfd)[shindex];
335
06614111
NC
336 if (hdr->contents == NULL)
337 {
338 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
339 {
340 /* PR 17512: file: f057ec89. */
695344c0 341 /* xgettext:c-format */
871b3ab2 342 _bfd_error_handler (_("%pB: attempt to load strings from"
63a5468a 343 " a non-string section (number %d)"),
06614111
NC
344 abfd, shindex);
345 return NULL;
346 }
b1fa9dd6 347
06614111
NC
348 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
349 return NULL;
350 }
eed5def8
NC
351 else
352 {
353 /* PR 24273: The string section's contents may have already
354 been loaded elsewhere, eg because a corrupt file has the
355 string section index in the ELF header pointing at a group
356 section. So be paranoid, and test that the last byte of
357 the section is zero. */
358 if (hdr->sh_size == 0 || hdr->contents[hdr->sh_size - 1] != 0)
359 return NULL;
360 }
252b5132
RH
361
362 if (strindex >= hdr->sh_size)
363 {
1b3a8575 364 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
4eca0228 365 _bfd_error_handler
695344c0 366 /* xgettext:c-format */
2dcf00ce
AM
367 (_("%pB: invalid string offset %u >= %" PRIu64 " for section `%s'"),
368 abfd, strindex, (uint64_t) hdr->sh_size,
1b3a8575 369 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 370 ? ".shstrtab"
1b3a8575 371 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 372 return NULL;
252b5132
RH
373 }
374
375 return ((char *) hdr->contents) + strindex;
376}
377
6cdc0ccc
AM
378/* Read and convert symbols to internal format.
379 SYMCOUNT specifies the number of symbols to read, starting from
380 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
381 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
382 symbols, and symbol section index extensions, respectively.
383 Returns a pointer to the internal symbol buffer (malloced if necessary)
384 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
385
386Elf_Internal_Sym *
217aa764
AM
387bfd_elf_get_elf_syms (bfd *ibfd,
388 Elf_Internal_Shdr *symtab_hdr,
389 size_t symcount,
390 size_t symoffset,
391 Elf_Internal_Sym *intsym_buf,
392 void *extsym_buf,
393 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
394{
395 Elf_Internal_Shdr *shndx_hdr;
217aa764 396 void *alloc_ext;
df622259 397 const bfd_byte *esym;
6cdc0ccc
AM
398 Elf_External_Sym_Shndx *alloc_extshndx;
399 Elf_External_Sym_Shndx *shndx;
4dd07732 400 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
401 Elf_Internal_Sym *isym;
402 Elf_Internal_Sym *isymend;
9c5bfbb7 403 const struct elf_backend_data *bed;
6cdc0ccc
AM
404 size_t extsym_size;
405 bfd_size_type amt;
406 file_ptr pos;
407
e44a2c9c
AM
408 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
409 abort ();
410
6cdc0ccc
AM
411 if (symcount == 0)
412 return intsym_buf;
413
414 /* Normal syms might have section extension entries. */
415 shndx_hdr = NULL;
6a40cf0c
NC
416 if (elf_symtab_shndx_list (ibfd) != NULL)
417 {
418 elf_section_list * entry;
419 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
420
421 /* Find an index section that is linked to this symtab section. */
422 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
315350be
NC
423 {
424 /* PR 20063. */
425 if (entry->hdr.sh_link >= elf_numsections (ibfd))
426 continue;
427
428 if (sections[entry->hdr.sh_link] == symtab_hdr)
429 {
430 shndx_hdr = & entry->hdr;
431 break;
432 };
433 }
6a40cf0c
NC
434
435 if (shndx_hdr == NULL)
436 {
437 if (symtab_hdr == & elf_symtab_hdr (ibfd))
438 /* Not really accurate, but this was how the old code used to work. */
439 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
440 /* Otherwise we do nothing. The assumption is that
441 the index table will not be needed. */
442 }
443 }
6cdc0ccc
AM
444
445 /* Read the symbols. */
446 alloc_ext = NULL;
447 alloc_extshndx = NULL;
4dd07732 448 alloc_intsym = NULL;
6cdc0ccc
AM
449 bed = get_elf_backend_data (ibfd);
450 extsym_size = bed->s->sizeof_sym;
ef53be89 451 amt = (bfd_size_type) symcount * extsym_size;
6cdc0ccc
AM
452 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
453 if (extsym_buf == NULL)
454 {
d0fb9a8d 455 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
456 extsym_buf = alloc_ext;
457 }
458 if (extsym_buf == NULL
459 || bfd_seek (ibfd, pos, SEEK_SET) != 0
460 || bfd_bread (extsym_buf, amt, ibfd) != amt)
461 {
462 intsym_buf = NULL;
463 goto out;
464 }
465
466 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
467 extshndx_buf = NULL;
468 else
469 {
ef53be89 470 amt = (bfd_size_type) symcount * sizeof (Elf_External_Sym_Shndx);
6cdc0ccc
AM
471 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
472 if (extshndx_buf == NULL)
473 {
a50b1753 474 alloc_extshndx = (Elf_External_Sym_Shndx *)
07d6d2b8 475 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
476 extshndx_buf = alloc_extshndx;
477 }
478 if (extshndx_buf == NULL
479 || bfd_seek (ibfd, pos, SEEK_SET) != 0
480 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
481 {
482 intsym_buf = NULL;
483 goto out;
484 }
485 }
486
487 if (intsym_buf == NULL)
488 {
a50b1753 489 alloc_intsym = (Elf_Internal_Sym *)
07d6d2b8 490 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 491 intsym_buf = alloc_intsym;
6cdc0ccc
AM
492 if (intsym_buf == NULL)
493 goto out;
494 }
495
496 /* Convert the symbols to internal form. */
497 isymend = intsym_buf + symcount;
a50b1753 498 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
07d6d2b8 499 shndx = extshndx_buf;
6cdc0ccc
AM
500 isym < isymend;
501 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
502 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
503 {
504 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
695344c0 505 /* xgettext:c-format */
871b3ab2 506 _bfd_error_handler (_("%pB symbol number %lu references"
63a5468a 507 " nonexistent SHT_SYMTAB_SHNDX section"),
4eca0228 508 ibfd, (unsigned long) symoffset);
4dd07732
AM
509 if (alloc_intsym != NULL)
510 free (alloc_intsym);
8384fb8f
AM
511 intsym_buf = NULL;
512 goto out;
513 }
6cdc0ccc
AM
514
515 out:
516 if (alloc_ext != NULL)
517 free (alloc_ext);
518 if (alloc_extshndx != NULL)
519 free (alloc_extshndx);
520
521 return intsym_buf;
522}
523
5cab59f6
AM
524/* Look up a symbol name. */
525const char *
be8dd2ca
AM
526bfd_elf_sym_name (bfd *abfd,
527 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
528 Elf_Internal_Sym *isym,
529 asection *sym_sec)
5cab59f6 530{
26c61ae5 531 const char *name;
5cab59f6 532 unsigned int iname = isym->st_name;
be8dd2ca 533 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 534
138f35cc
JJ
535 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
536 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 537 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
538 {
539 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
540 shindex = elf_elfheader (abfd)->e_shstrndx;
541 }
542
26c61ae5
L
543 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
544 if (name == NULL)
545 name = "(null)";
546 else if (sym_sec && *name == '\0')
fd361982 547 name = bfd_section_name (sym_sec);
26c61ae5
L
548
549 return name;
5cab59f6
AM
550}
551
dbb410c3
AM
552/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
553 sections. The first element is the flags, the rest are section
554 pointers. */
555
556typedef union elf_internal_group {
557 Elf_Internal_Shdr *shdr;
558 unsigned int flags;
559} Elf_Internal_Group;
560
b885599b
AM
561/* Return the name of the group signature symbol. Why isn't the
562 signature just a string? */
563
564static const char *
217aa764 565group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 566{
9dce4196 567 Elf_Internal_Shdr *hdr;
9dce4196
AM
568 unsigned char esym[sizeof (Elf64_External_Sym)];
569 Elf_External_Sym_Shndx eshndx;
570 Elf_Internal_Sym isym;
b885599b 571
13792e9d
L
572 /* First we need to ensure the symbol table is available. Make sure
573 that it is a symbol table section. */
4fbb74a6
AM
574 if (ghdr->sh_link >= elf_numsections (abfd))
575 return NULL;
13792e9d
L
576 hdr = elf_elfsections (abfd) [ghdr->sh_link];
577 if (hdr->sh_type != SHT_SYMTAB
578 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
579 return NULL;
580
9dce4196
AM
581 /* Go read the symbol. */
582 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
583 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
584 &isym, esym, &eshndx) == NULL)
b885599b 585 return NULL;
9dce4196 586
26c61ae5 587 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
588}
589
dbb410c3
AM
590/* Set next_in_group list pointer, and group name for NEWSECT. */
591
b34976b6 592static bfd_boolean
217aa764 593setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
594{
595 unsigned int num_group = elf_tdata (abfd)->num_group;
596
597 /* If num_group is zero, read in all SHT_GROUP sections. The count
598 is set to -1 if there are no SHT_GROUP sections. */
599 if (num_group == 0)
600 {
601 unsigned int i, shnum;
602
603 /* First count the number of groups. If we have a SHT_GROUP
604 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 605 shnum = elf_numsections (abfd);
dbb410c3 606 num_group = 0;
08a40648 607
44534af3 608#define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
1783205a 609 ( (shdr)->sh_type == SHT_GROUP \
44534af3 610 && (shdr)->sh_size >= minsize \
1783205a
NC
611 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
612 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 613
dbb410c3
AM
614 for (i = 0; i < shnum; i++)
615 {
616 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 617
44534af3 618 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3
AM
619 num_group += 1;
620 }
621
622 if (num_group == 0)
20dbb49d
L
623 {
624 num_group = (unsigned) -1;
625 elf_tdata (abfd)->num_group = num_group;
ce497010 626 elf_tdata (abfd)->group_sect_ptr = NULL;
20dbb49d
L
627 }
628 else
dbb410c3
AM
629 {
630 /* We keep a list of elf section headers for group sections,
631 so we can find them quickly. */
20dbb49d 632 bfd_size_type amt;
d0fb9a8d 633
20dbb49d 634 elf_tdata (abfd)->num_group = num_group;
a50b1753 635 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
07d6d2b8 636 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 637 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 638 return FALSE;
4bba0fb1
AM
639 memset (elf_tdata (abfd)->group_sect_ptr, 0,
640 num_group * sizeof (Elf_Internal_Shdr *));
dbb410c3 641 num_group = 0;
ce497010 642
dbb410c3
AM
643 for (i = 0; i < shnum; i++)
644 {
645 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 646
44534af3 647 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3 648 {
973ffd63 649 unsigned char *src;
dbb410c3
AM
650 Elf_Internal_Group *dest;
651
07d6d2b8
AM
652 /* Make sure the group section has a BFD section
653 attached to it. */
654 if (!bfd_section_from_shdr (abfd, i))
655 return FALSE;
656
dbb410c3
AM
657 /* Add to list of sections. */
658 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
659 num_group += 1;
660
661 /* Read the raw contents. */
662 BFD_ASSERT (sizeof (*dest) >= 4);
663 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753 664 shdr->contents = (unsigned char *)
eed5def8 665 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
666 /* PR binutils/4110: Handle corrupt group headers. */
667 if (shdr->contents == NULL)
668 {
669 _bfd_error_handler
695344c0 670 /* xgettext:c-format */
871b3ab2 671 (_("%pB: corrupt size field in group section"
2dcf00ce
AM
672 " header: %#" PRIx64),
673 abfd, (uint64_t) shdr->sh_size);
1783205a 674 bfd_set_error (bfd_error_bad_value);
493a3386
NC
675 -- num_group;
676 continue;
1783205a
NC
677 }
678
679 memset (shdr->contents, 0, amt);
680
681 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
682 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
683 != shdr->sh_size))
493a3386
NC
684 {
685 _bfd_error_handler
695344c0 686 /* xgettext:c-format */
871b3ab2 687 (_("%pB: invalid size field in group section"
2dcf00ce
AM
688 " header: %#" PRIx64 ""),
689 abfd, (uint64_t) shdr->sh_size);
493a3386
NC
690 bfd_set_error (bfd_error_bad_value);
691 -- num_group;
63a5468a
AM
692 /* PR 17510: If the group contents are even
693 partially corrupt, do not allow any of the
694 contents to be used. */
493a3386
NC
695 memset (shdr->contents, 0, amt);
696 continue;
697 }
708d7d0d 698
dbb410c3
AM
699 /* Translate raw contents, a flag word followed by an
700 array of elf section indices all in target byte order,
701 to the flag word followed by an array of elf section
702 pointers. */
703 src = shdr->contents + shdr->sh_size;
704 dest = (Elf_Internal_Group *) (shdr->contents + amt);
06614111 705
dbb410c3
AM
706 while (1)
707 {
708 unsigned int idx;
709
710 src -= 4;
711 --dest;
712 idx = H_GET_32 (abfd, src);
713 if (src == shdr->contents)
714 {
715 dest->flags = idx;
b885599b
AM
716 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
717 shdr->bfd_section->flags
718 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
719 break;
720 }
4bba0fb1 721 if (idx < shnum)
bae363f1
L
722 {
723 dest->shdr = elf_elfsections (abfd)[idx];
724 /* PR binutils/23199: All sections in a
725 section group should be marked with
726 SHF_GROUP. But some tools generate
727 broken objects without SHF_GROUP. Fix
728 them up here. */
729 dest->shdr->sh_flags |= SHF_GROUP;
730 }
4bba0fb1
AM
731 if (idx >= shnum
732 || dest->shdr->sh_type == SHT_GROUP)
dbb410c3 733 {
4eca0228 734 _bfd_error_handler
4bba0fb1
AM
735 (_("%pB: invalid entry in SHT_GROUP section [%u]"),
736 abfd, i);
737 dest->shdr = NULL;
dbb410c3 738 }
dbb410c3
AM
739 }
740 }
741 }
493a3386
NC
742
743 /* PR 17510: Corrupt binaries might contain invalid groups. */
744 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
745 {
746 elf_tdata (abfd)->num_group = num_group;
747
748 /* If all groups are invalid then fail. */
749 if (num_group == 0)
750 {
751 elf_tdata (abfd)->group_sect_ptr = NULL;
752 elf_tdata (abfd)->num_group = num_group = -1;
4eca0228 753 _bfd_error_handler
871b3ab2 754 (_("%pB: no valid group sections found"), abfd);
493a3386
NC
755 bfd_set_error (bfd_error_bad_value);
756 }
757 }
dbb410c3
AM
758 }
759 }
760
761 if (num_group != (unsigned) -1)
762 {
564e11c9
JW
763 unsigned int search_offset = elf_tdata (abfd)->group_search_offset;
764 unsigned int j;
dbb410c3 765
564e11c9 766 for (j = 0; j < num_group; j++)
dbb410c3 767 {
564e11c9
JW
768 /* Begin search from previous found group. */
769 unsigned i = (j + search_offset) % num_group;
770
dbb410c3 771 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
ce497010 772 Elf_Internal_Group *idx;
0c54f692 773 bfd_size_type n_elt;
ce497010
NC
774
775 if (shdr == NULL)
776 continue;
777
778 idx = (Elf_Internal_Group *) shdr->contents;
0c54f692
NC
779 if (idx == NULL || shdr->sh_size < 4)
780 {
781 /* See PR 21957 for a reproducer. */
782 /* xgettext:c-format */
871b3ab2 783 _bfd_error_handler (_("%pB: group section '%pA' has no contents"),
0c54f692
NC
784 abfd, shdr->bfd_section);
785 elf_tdata (abfd)->group_sect_ptr[i] = NULL;
786 bfd_set_error (bfd_error_bad_value);
787 return FALSE;
788 }
ce497010 789 n_elt = shdr->sh_size / 4;
dbb410c3
AM
790
791 /* Look through this group's sections to see if current
792 section is a member. */
793 while (--n_elt != 0)
794 if ((++idx)->shdr == hdr)
795 {
e0e8c97f 796 asection *s = NULL;
dbb410c3
AM
797
798 /* We are a member of this group. Go looking through
799 other members to see if any others are linked via
800 next_in_group. */
801 idx = (Elf_Internal_Group *) shdr->contents;
802 n_elt = shdr->sh_size / 4;
803 while (--n_elt != 0)
4bba0fb1
AM
804 if ((++idx)->shdr != NULL
805 && (s = idx->shdr->bfd_section) != NULL
945906ff 806 && elf_next_in_group (s) != NULL)
dbb410c3
AM
807 break;
808 if (n_elt != 0)
809 {
dbb410c3
AM
810 /* Snarf the group name from other member, and
811 insert current section in circular list. */
945906ff
AM
812 elf_group_name (newsect) = elf_group_name (s);
813 elf_next_in_group (newsect) = elf_next_in_group (s);
814 elf_next_in_group (s) = newsect;
dbb410c3
AM
815 }
816 else
817 {
dbb410c3
AM
818 const char *gname;
819
b885599b
AM
820 gname = group_signature (abfd, shdr);
821 if (gname == NULL)
b34976b6 822 return FALSE;
945906ff 823 elf_group_name (newsect) = gname;
dbb410c3
AM
824
825 /* Start a circular list with one element. */
945906ff 826 elf_next_in_group (newsect) = newsect;
dbb410c3 827 }
b885599b 828
9dce4196
AM
829 /* If the group section has been created, point to the
830 new member. */
dbb410c3 831 if (shdr->bfd_section != NULL)
945906ff 832 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 833
564e11c9
JW
834 elf_tdata (abfd)->group_search_offset = i;
835 j = num_group - 1;
dbb410c3
AM
836 break;
837 }
838 }
839 }
840
945906ff 841 if (elf_group_name (newsect) == NULL)
dbb410c3 842 {
695344c0 843 /* xgettext:c-format */
871b3ab2 844 _bfd_error_handler (_("%pB: no group info for section '%pA'"),
4eca0228 845 abfd, newsect);
493a3386 846 return FALSE;
dbb410c3 847 }
b34976b6 848 return TRUE;
dbb410c3
AM
849}
850
3d7f7666 851bfd_boolean
dd863624 852_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
853{
854 unsigned int i;
855 unsigned int num_group = elf_tdata (abfd)->num_group;
856 bfd_boolean result = TRUE;
dd863624
L
857 asection *s;
858
859 /* Process SHF_LINK_ORDER. */
860 for (s = abfd->sections; s != NULL; s = s->next)
861 {
862 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
863 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
864 {
865 unsigned int elfsec = this_hdr->sh_link;
866 /* FIXME: The old Intel compiler and old strip/objcopy may
867 not set the sh_link or sh_info fields. Hence we could
868 get the situation where elfsec is 0. */
869 if (elfsec == 0)
870 {
4fbb74a6 871 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
872 if (bed->link_order_error_handler)
873 bed->link_order_error_handler
695344c0 874 /* xgettext:c-format */
871b3ab2 875 (_("%pB: warning: sh_link not set for section `%pA'"),
dd863624
L
876 abfd, s);
877 }
878 else
879 {
91d6fa6a 880 asection *linksec = NULL;
25bbc984 881
4fbb74a6
AM
882 if (elfsec < elf_numsections (abfd))
883 {
884 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 885 linksec = this_hdr->bfd_section;
4fbb74a6 886 }
25bbc984
L
887
888 /* PR 1991, 2008:
889 Some strip/objcopy may leave an incorrect value in
890 sh_link. We don't want to proceed. */
91d6fa6a 891 if (linksec == NULL)
25bbc984 892 {
4eca0228 893 _bfd_error_handler
695344c0 894 /* xgettext:c-format */
871b3ab2 895 (_("%pB: sh_link [%d] in section `%pA' is incorrect"),
c08bb8dd 896 s->owner, elfsec, s);
25bbc984
L
897 result = FALSE;
898 }
899
91d6fa6a 900 elf_linked_to_section (s) = linksec;
dd863624
L
901 }
902 }
53720c49
AM
903 else if (this_hdr->sh_type == SHT_GROUP
904 && elf_next_in_group (s) == NULL)
905 {
4eca0228 906 _bfd_error_handler
695344c0 907 /* xgettext:c-format */
871b3ab2 908 (_("%pB: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
53720c49
AM
909 abfd, elf_section_data (s)->this_idx);
910 result = FALSE;
911 }
dd863624 912 }
3d7f7666 913
dd863624 914 /* Process section groups. */
3d7f7666
L
915 if (num_group == (unsigned) -1)
916 return result;
917
918 for (i = 0; i < num_group; i++)
919 {
920 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
4b0e8a5f
NC
921 Elf_Internal_Group *idx;
922 unsigned int n_elt;
3d7f7666 923
4b0e8a5f
NC
924 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
925 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
926 {
4eca0228 927 _bfd_error_handler
695344c0 928 /* xgettext:c-format */
871b3ab2 929 (_("%pB: section group entry number %u is corrupt"),
4b0e8a5f
NC
930 abfd, i);
931 result = FALSE;
932 continue;
933 }
934
935 idx = (Elf_Internal_Group *) shdr->contents;
936 n_elt = shdr->sh_size / 4;
1b786873 937
3d7f7666 938 while (--n_elt != 0)
24d3e51b
NC
939 {
940 ++ idx;
941
942 if (idx->shdr == NULL)
943 continue;
944 else if (idx->shdr->bfd_section)
945 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
db4677b8
AM
946 else if (idx->shdr->sh_type != SHT_RELA
947 && idx->shdr->sh_type != SHT_REL)
24d3e51b
NC
948 {
949 /* There are some unknown sections in the group. */
950 _bfd_error_handler
951 /* xgettext:c-format */
871b3ab2 952 (_("%pB: unknown type [%#x] section `%s' in group [%pA]"),
24d3e51b
NC
953 abfd,
954 idx->shdr->sh_type,
955 bfd_elf_string_from_elf_section (abfd,
956 (elf_elfheader (abfd)
957 ->e_shstrndx),
958 idx->shdr->sh_name),
959 shdr->bfd_section);
960 result = FALSE;
961 }
962 }
3d7f7666 963 }
24d3e51b 964
3d7f7666
L
965 return result;
966}
967
72adc230
AM
968bfd_boolean
969bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
970{
971 return elf_next_in_group (sec) != NULL;
972}
973
cb7f4b29
AM
974const char *
975bfd_elf_group_name (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
976{
977 if (elf_sec_group (sec) != NULL)
978 return elf_group_name (sec);
979 return NULL;
980}
981
f6fe1ccd
L
982static char *
983convert_debug_to_zdebug (bfd *abfd, const char *name)
984{
985 unsigned int len = strlen (name);
986 char *new_name = bfd_alloc (abfd, len + 2);
987 if (new_name == NULL)
988 return NULL;
989 new_name[0] = '.';
990 new_name[1] = 'z';
991 memcpy (new_name + 2, name + 1, len);
992 return new_name;
993}
994
995static char *
996convert_zdebug_to_debug (bfd *abfd, const char *name)
997{
998 unsigned int len = strlen (name);
999 char *new_name = bfd_alloc (abfd, len);
1000 if (new_name == NULL)
1001 return NULL;
1002 new_name[0] = '.';
1003 memcpy (new_name + 1, name + 2, len - 1);
1004 return new_name;
1005}
1006
cc5277b1
ML
1007/* This a copy of lto_section defined in GCC (lto-streamer.h). */
1008
1009struct lto_section
1010{
1011 int16_t major_version;
1012 int16_t minor_version;
1013 unsigned char slim_object;
1014
1015 /* Flags is a private field that is not defined publicly. */
1016 uint16_t flags;
1017};
1018
252b5132
RH
1019/* Make a BFD section from an ELF section. We store a pointer to the
1020 BFD section in the bfd_section field of the header. */
1021
b34976b6 1022bfd_boolean
217aa764
AM
1023_bfd_elf_make_section_from_shdr (bfd *abfd,
1024 Elf_Internal_Shdr *hdr,
6dc132d9
L
1025 const char *name,
1026 int shindex)
252b5132
RH
1027{
1028 asection *newsect;
1029 flagword flags;
9c5bfbb7 1030 const struct elf_backend_data *bed;
252b5132
RH
1031
1032 if (hdr->bfd_section != NULL)
4e011fb5 1033 return TRUE;
252b5132
RH
1034
1035 newsect = bfd_make_section_anyway (abfd, name);
1036 if (newsect == NULL)
b34976b6 1037 return FALSE;
252b5132 1038
1829f4b2
AM
1039 hdr->bfd_section = newsect;
1040 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 1041 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 1042
2f89ff8d
L
1043 /* Always use the real type/flags. */
1044 elf_section_type (newsect) = hdr->sh_type;
1045 elf_section_flags (newsect) = hdr->sh_flags;
1046
252b5132
RH
1047 newsect->filepos = hdr->sh_offset;
1048
fd361982
AM
1049 if (!bfd_set_section_vma (newsect, hdr->sh_addr)
1050 || !bfd_set_section_size (newsect, hdr->sh_size)
1051 || !bfd_set_section_alignment (newsect, bfd_log2 (hdr->sh_addralign)))
b34976b6 1052 return FALSE;
252b5132
RH
1053
1054 flags = SEC_NO_FLAGS;
1055 if (hdr->sh_type != SHT_NOBITS)
1056 flags |= SEC_HAS_CONTENTS;
dbb410c3 1057 if (hdr->sh_type == SHT_GROUP)
7bdf4127 1058 flags |= SEC_GROUP;
252b5132
RH
1059 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1060 {
1061 flags |= SEC_ALLOC;
1062 if (hdr->sh_type != SHT_NOBITS)
1063 flags |= SEC_LOAD;
1064 }
1065 if ((hdr->sh_flags & SHF_WRITE) == 0)
1066 flags |= SEC_READONLY;
1067 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
1068 flags |= SEC_CODE;
1069 else if ((flags & SEC_LOAD) != 0)
1070 flags |= SEC_DATA;
f5fa8ca2
JJ
1071 if ((hdr->sh_flags & SHF_MERGE) != 0)
1072 {
1073 flags |= SEC_MERGE;
1074 newsect->entsize = hdr->sh_entsize;
f5fa8ca2 1075 }
84865015
NC
1076 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1077 flags |= SEC_STRINGS;
dbb410c3
AM
1078 if (hdr->sh_flags & SHF_GROUP)
1079 if (!setup_group (abfd, hdr, newsect))
b34976b6 1080 return FALSE;
13ae64f3
JJ
1081 if ((hdr->sh_flags & SHF_TLS) != 0)
1082 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
1083 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1084 flags |= SEC_EXCLUDE;
252b5132 1085
df3a023b
AM
1086 switch (elf_elfheader (abfd)->e_ident[EI_OSABI])
1087 {
1088 /* FIXME: We should not recognize SHF_GNU_MBIND for ELFOSABI_NONE,
1089 but binutils as of 2019-07-23 did not set the EI_OSABI header
1090 byte. */
1091 case ELFOSABI_NONE:
1092 case ELFOSABI_GNU:
1093 case ELFOSABI_FREEBSD:
1094 if ((hdr->sh_flags & SHF_GNU_MBIND) != 0)
1095 elf_tdata (abfd)->has_gnu_osabi |= elf_gnu_osabi_mbind;
1096 break;
1097 }
1098
3d2b39cf 1099 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 1100 {
3d2b39cf
L
1101 /* The debugging sections appear to be recognized only by name,
1102 not any sort of flag. Their SEC_ALLOC bits are cleared. */
3d2b39cf
L
1103 if (name [0] == '.')
1104 {
bb294208
AM
1105 if (strncmp (name, ".debug", 6) == 0
1106 || strncmp (name, ".gnu.linkonce.wi.", 17) == 0
1107 || strncmp (name, ".zdebug", 7) == 0)
1108 flags |= SEC_DEBUGGING | SEC_ELF_OCTETS;
1109 else if (strncmp (name, GNU_BUILD_ATTRS_SECTION_NAME, 21) == 0
1110 || strncmp (name, ".note.gnu", 9) == 0)
1111 flags |= SEC_ELF_OCTETS;
1112 else if (strncmp (name, ".line", 5) == 0
1113 || strncmp (name, ".stab", 5) == 0
1114 || strcmp (name, ".gdb_index") == 0)
3d2b39cf
L
1115 flags |= SEC_DEBUGGING;
1116 }
1117 }
252b5132
RH
1118
1119 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1120 only link a single copy of the section. This is used to support
1121 g++. g++ will emit each template expansion in its own section.
1122 The symbols will be defined as weak, so that multiple definitions
1123 are permitted. The GNU linker extension is to actually discard
1124 all but one of the sections. */
0112cd26 1125 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 1126 && elf_next_in_group (newsect) == NULL)
252b5132
RH
1127 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1128
fa152c49
JW
1129 bed = get_elf_backend_data (abfd);
1130 if (bed->elf_backend_section_flags)
1131 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 1132 return FALSE;
fa152c49 1133
fd361982 1134 if (!bfd_set_section_flags (newsect, flags))
b34976b6 1135 return FALSE;
252b5132 1136
718175fa
JK
1137 /* We do not parse the PT_NOTE segments as we are interested even in the
1138 separate debug info files which may have the segments offsets corrupted.
1139 PT_NOTEs from the core files are currently not parsed using BFD. */
1140 if (hdr->sh_type == SHT_NOTE)
1141 {
baea7ef1 1142 bfd_byte *contents;
718175fa 1143
baea7ef1 1144 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
1145 return FALSE;
1146
276da9b3
L
1147 elf_parse_notes (abfd, (char *) contents, hdr->sh_size,
1148 hdr->sh_offset, hdr->sh_addralign);
718175fa
JK
1149 free (contents);
1150 }
1151
252b5132
RH
1152 if ((flags & SEC_ALLOC) != 0)
1153 {
1154 Elf_Internal_Phdr *phdr;
6ffd7900
AM
1155 unsigned int i, nload;
1156
1157 /* Some ELF linkers produce binaries with all the program header
1158 p_paddr fields zero. If we have such a binary with more than
1159 one PT_LOAD header, then leave the section lma equal to vma
1160 so that we don't create sections with overlapping lma. */
1161 phdr = elf_tdata (abfd)->phdr;
1162 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1163 if (phdr->p_paddr != 0)
1164 break;
1165 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1166 ++nload;
1167 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1168 return TRUE;
252b5132 1169
252b5132
RH
1170 phdr = elf_tdata (abfd)->phdr;
1171 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1172 {
86b2281f
AM
1173 if (((phdr->p_type == PT_LOAD
1174 && (hdr->sh_flags & SHF_TLS) == 0)
1175 || phdr->p_type == PT_TLS)
9a83a553 1176 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 1177 {
88967714
AM
1178 if ((flags & SEC_LOAD) == 0)
1179 newsect->lma = (phdr->p_paddr
1180 + hdr->sh_addr - phdr->p_vaddr);
1181 else
1182 /* We used to use the same adjustment for SEC_LOAD
1183 sections, but that doesn't work if the segment
1184 is packed with code from multiple VMAs.
1185 Instead we calculate the section LMA based on
1186 the segment LMA. It is assumed that the
1187 segment will contain sections with contiguous
1188 LMAs, even if the VMAs are not. */
1189 newsect->lma = (phdr->p_paddr
1190 + hdr->sh_offset - phdr->p_offset);
1191
1192 /* With contiguous segments, we can't tell from file
1193 offsets whether a section with zero size should
1194 be placed at the end of one segment or the
1195 beginning of the next. Decide based on vaddr. */
1196 if (hdr->sh_addr >= phdr->p_vaddr
1197 && (hdr->sh_addr + hdr->sh_size
1198 <= phdr->p_vaddr + phdr->p_memsz))
1199 break;
252b5132
RH
1200 }
1201 }
1202 }
1203
4a114e3e
L
1204 /* Compress/decompress DWARF debug sections with names: .debug_* and
1205 .zdebug_*, after the section flags is set. */
1206 if ((flags & SEC_DEBUGGING)
1207 && ((name[1] == 'd' && name[6] == '_')
1208 || (name[1] == 'z' && name[7] == '_')))
1209 {
1210 enum { nothing, compress, decompress } action = nothing;
151411f8 1211 int compression_header_size;
dab394de 1212 bfd_size_type uncompressed_size;
4207142d 1213 unsigned int uncompressed_align_power;
151411f8
L
1214 bfd_boolean compressed
1215 = bfd_is_section_compressed_with_header (abfd, newsect,
dab394de 1216 &compression_header_size,
4207142d
MW
1217 &uncompressed_size,
1218 &uncompressed_align_power);
151411f8 1219 if (compressed)
4a114e3e
L
1220 {
1221 /* Compressed section. Check if we should decompress. */
1222 if ((abfd->flags & BFD_DECOMPRESS))
1223 action = decompress;
1224 }
151411f8
L
1225
1226 /* Compress the uncompressed section or convert from/to .zdebug*
1227 section. Check if we should compress. */
1228 if (action == nothing)
4a114e3e 1229 {
151411f8
L
1230 if (newsect->size != 0
1231 && (abfd->flags & BFD_COMPRESS)
1232 && compression_header_size >= 0
dab394de 1233 && uncompressed_size > 0
151411f8
L
1234 && (!compressed
1235 || ((compression_header_size > 0)
1236 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
4a114e3e 1237 action = compress;
151411f8
L
1238 else
1239 return TRUE;
4a114e3e
L
1240 }
1241
151411f8 1242 if (action == compress)
4a114e3e 1243 {
4a114e3e
L
1244 if (!bfd_init_section_compress_status (abfd, newsect))
1245 {
4eca0228 1246 _bfd_error_handler
695344c0 1247 /* xgettext:c-format */
871b3ab2 1248 (_("%pB: unable to initialize compress status for section %s"),
4a114e3e
L
1249 abfd, name);
1250 return FALSE;
1251 }
151411f8
L
1252 }
1253 else
1254 {
4a114e3e
L
1255 if (!bfd_init_section_decompress_status (abfd, newsect))
1256 {
4eca0228 1257 _bfd_error_handler
695344c0 1258 /* xgettext:c-format */
871b3ab2 1259 (_("%pB: unable to initialize decompress status for section %s"),
4a114e3e
L
1260 abfd, name);
1261 return FALSE;
1262 }
151411f8
L
1263 }
1264
f6fe1ccd 1265 if (abfd->is_linker_input)
151411f8 1266 {
f6fe1ccd
L
1267 if (name[1] == 'z'
1268 && (action == decompress
1269 || (action == compress
1270 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
4e011fb5 1271 {
f6fe1ccd
L
1272 /* Convert section name from .zdebug_* to .debug_* so
1273 that linker will consider this section as a debug
1274 section. */
1275 char *new_name = convert_zdebug_to_debug (abfd, name);
151411f8
L
1276 if (new_name == NULL)
1277 return FALSE;
fd361982 1278 bfd_rename_section (newsect, new_name);
151411f8 1279 }
4a114e3e 1280 }
f6fe1ccd
L
1281 else
1282 /* For objdump, don't rename the section. For objcopy, delay
1283 section rename to elf_fake_sections. */
1284 newsect->flags |= SEC_ELF_RENAME;
4a114e3e
L
1285 }
1286
cc5277b1
ML
1287 /* GCC uses .gnu.lto_.lto.<some_hash> as a LTO bytecode information
1288 section. */
1289 const char *lto_section_name = ".gnu.lto_.lto.";
1290 if (strncmp (name, lto_section_name, strlen (lto_section_name)) == 0)
1291 {
1292 struct lto_section lsection;
1293 if (bfd_get_section_contents (abfd, newsect, &lsection, 0,
1294 sizeof (struct lto_section)))
1295 abfd->lto_slim_object = lsection.slim_object;
1296 }
1297
b34976b6 1298 return TRUE;
252b5132
RH
1299}
1300
84865015
NC
1301const char *const bfd_elf_section_type_names[] =
1302{
252b5132
RH
1303 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1304 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1305 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1306};
1307
1049f94e 1308/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1309 output, and the reloc is against an external symbol, and nothing
1310 has given us any additional addend, the resulting reloc will also
1311 be against the same symbol. In such a case, we don't want to
1312 change anything about the way the reloc is handled, since it will
1313 all be done at final link time. Rather than put special case code
1314 into bfd_perform_relocation, all the reloc types use this howto
1315 function. It just short circuits the reloc if producing
1049f94e 1316 relocatable output against an external symbol. */
252b5132 1317
252b5132 1318bfd_reloc_status_type
217aa764
AM
1319bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1320 arelent *reloc_entry,
1321 asymbol *symbol,
1322 void *data ATTRIBUTE_UNUSED,
1323 asection *input_section,
1324 bfd *output_bfd,
1325 char **error_message ATTRIBUTE_UNUSED)
1326{
1327 if (output_bfd != NULL
252b5132
RH
1328 && (symbol->flags & BSF_SECTION_SYM) == 0
1329 && (! reloc_entry->howto->partial_inplace
1330 || reloc_entry->addend == 0))
1331 {
1332 reloc_entry->address += input_section->output_offset;
1333 return bfd_reloc_ok;
1334 }
1335
1336 return bfd_reloc_continue;
1337}
1338\f
84865015
NC
1339/* Returns TRUE if section A matches section B.
1340 Names, addresses and links may be different, but everything else
1341 should be the same. */
1342
1343static bfd_boolean
5522f910
NC
1344section_match (const Elf_Internal_Shdr * a,
1345 const Elf_Internal_Shdr * b)
84865015 1346{
ac85e67c
AM
1347 if (a->sh_type != b->sh_type
1348 || ((a->sh_flags ^ b->sh_flags) & ~SHF_INFO_LINK) != 0
1349 || a->sh_addralign != b->sh_addralign
1350 || a->sh_entsize != b->sh_entsize)
1351 return FALSE;
1352 if (a->sh_type == SHT_SYMTAB
1353 || a->sh_type == SHT_STRTAB)
1354 return TRUE;
1355 return a->sh_size == b->sh_size;
84865015
NC
1356}
1357
1358/* Find a section in OBFD that has the same characteristics
1359 as IHEADER. Return the index of this section or SHN_UNDEF if
1360 none can be found. Check's section HINT first, as this is likely
1361 to be the correct section. */
1362
1363static unsigned int
5cc4ca83
ST
1364find_link (const bfd *obfd, const Elf_Internal_Shdr *iheader,
1365 const unsigned int hint)
84865015
NC
1366{
1367 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1368 unsigned int i;
1369
a55c9876
NC
1370 BFD_ASSERT (iheader != NULL);
1371
1372 /* See PR 20922 for a reproducer of the NULL test. */
5cc4ca83
ST
1373 if (hint < elf_numsections (obfd)
1374 && oheaders[hint] != NULL
a55c9876 1375 && section_match (oheaders[hint], iheader))
84865015
NC
1376 return hint;
1377
1378 for (i = 1; i < elf_numsections (obfd); i++)
1379 {
1380 Elf_Internal_Shdr * oheader = oheaders[i];
1381
a55c9876
NC
1382 if (oheader == NULL)
1383 continue;
84865015
NC
1384 if (section_match (oheader, iheader))
1385 /* FIXME: Do we care if there is a potential for
1386 multiple matches ? */
1387 return i;
1388 }
1389
1390 return SHN_UNDEF;
1391}
1392
5522f910
NC
1393/* PR 19938: Attempt to set the ELF section header fields of an OS or
1394 Processor specific section, based upon a matching input section.
1395 Returns TRUE upon success, FALSE otherwise. */
07d6d2b8 1396
5522f910
NC
1397static bfd_boolean
1398copy_special_section_fields (const bfd *ibfd,
1399 bfd *obfd,
1400 const Elf_Internal_Shdr *iheader,
1401 Elf_Internal_Shdr *oheader,
1402 const unsigned int secnum)
1403{
1404 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1405 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1406 bfd_boolean changed = FALSE;
1407 unsigned int sh_link;
1408
1409 if (oheader->sh_type == SHT_NOBITS)
1410 {
1411 /* This is a feature for objcopy --only-keep-debug:
1412 When a section's type is changed to NOBITS, we preserve
1413 the sh_link and sh_info fields so that they can be
1414 matched up with the original.
1415
1416 Note: Strictly speaking these assignments are wrong.
1417 The sh_link and sh_info fields should point to the
1418 relevent sections in the output BFD, which may not be in
1419 the same location as they were in the input BFD. But
1420 the whole point of this action is to preserve the
1421 original values of the sh_link and sh_info fields, so
1422 that they can be matched up with the section headers in
1423 the original file. So strictly speaking we may be
1424 creating an invalid ELF file, but it is only for a file
1425 that just contains debug info and only for sections
1426 without any contents. */
1427 if (oheader->sh_link == 0)
1428 oheader->sh_link = iheader->sh_link;
1429 if (oheader->sh_info == 0)
1430 oheader->sh_info = iheader->sh_info;
1431 return TRUE;
1432 }
1433
1434 /* Allow the target a chance to decide how these fields should be set. */
1435 if (bed->elf_backend_copy_special_section_fields != NULL
1436 && bed->elf_backend_copy_special_section_fields
1437 (ibfd, obfd, iheader, oheader))
1438 return TRUE;
1439
1440 /* We have an iheader which might match oheader, and which has non-zero
1441 sh_info and/or sh_link fields. Attempt to follow those links and find
1442 the section in the output bfd which corresponds to the linked section
1443 in the input bfd. */
1444 if (iheader->sh_link != SHN_UNDEF)
1445 {
4f3ca05b
NC
1446 /* See PR 20931 for a reproducer. */
1447 if (iheader->sh_link >= elf_numsections (ibfd))
1448 {
76cfced5 1449 _bfd_error_handler
4f3ca05b 1450 /* xgettext:c-format */
9793eb77 1451 (_("%pB: invalid sh_link field (%d) in section number %d"),
4f3ca05b
NC
1452 ibfd, iheader->sh_link, secnum);
1453 return FALSE;
1454 }
1455
5522f910
NC
1456 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1457 if (sh_link != SHN_UNDEF)
1458 {
1459 oheader->sh_link = sh_link;
1460 changed = TRUE;
1461 }
1462 else
1463 /* FIXME: Should we install iheader->sh_link
1464 if we could not find a match ? */
76cfced5 1465 _bfd_error_handler
695344c0 1466 /* xgettext:c-format */
9793eb77 1467 (_("%pB: failed to find link section for section %d"), obfd, secnum);
5522f910
NC
1468 }
1469
1470 if (iheader->sh_info)
1471 {
1472 /* The sh_info field can hold arbitrary information, but if the
1473 SHF_LINK_INFO flag is set then it should be interpreted as a
1474 section index. */
1475 if (iheader->sh_flags & SHF_INFO_LINK)
1476 {
1477 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1478 iheader->sh_info);
1479 if (sh_link != SHN_UNDEF)
1480 oheader->sh_flags |= SHF_INFO_LINK;
1481 }
1482 else
1483 /* No idea what it means - just copy it. */
1484 sh_link = iheader->sh_info;
1485
1486 if (sh_link != SHN_UNDEF)
1487 {
1488 oheader->sh_info = sh_link;
1489 changed = TRUE;
1490 }
1491 else
76cfced5 1492 _bfd_error_handler
695344c0 1493 /* xgettext:c-format */
9793eb77 1494 (_("%pB: failed to find info section for section %d"), obfd, secnum);
5522f910
NC
1495 }
1496
1497 return changed;
1498}
07d6d2b8 1499
0ac4564e
L
1500/* Copy the program header and other data from one object module to
1501 another. */
252b5132 1502
b34976b6 1503bfd_boolean
217aa764 1504_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050 1505{
5522f910
NC
1506 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1507 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1508 const struct elf_backend_data *bed;
84865015
NC
1509 unsigned int i;
1510
2d502050 1511 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
84865015 1512 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1513 return TRUE;
2d502050 1514
57b828ef
L
1515 if (!elf_flags_init (obfd))
1516 {
1517 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1518 elf_flags_init (obfd) = TRUE;
1519 }
2d502050 1520
0ac4564e 1521 elf_gp (obfd) = elf_gp (ibfd);
57b828ef
L
1522
1523 /* Also copy the EI_OSABI field. */
1524 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1525 elf_elfheader (ibfd)->e_ident[EI_OSABI];
104d59d1 1526
5522f910
NC
1527 /* If set, copy the EI_ABIVERSION field. */
1528 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1529 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1530 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
07d6d2b8 1531
104d59d1
JM
1532 /* Copy object attributes. */
1533 _bfd_elf_copy_obj_attributes (ibfd, obfd);
63b9bbb7 1534
84865015
NC
1535 if (iheaders == NULL || oheaders == NULL)
1536 return TRUE;
63b9bbb7 1537
5522f910
NC
1538 bed = get_elf_backend_data (obfd);
1539
1540 /* Possibly copy other fields in the section header. */
84865015 1541 for (i = 1; i < elf_numsections (obfd); i++)
63b9bbb7 1542 {
84865015
NC
1543 unsigned int j;
1544 Elf_Internal_Shdr * oheader = oheaders[i];
63b9bbb7 1545
5522f910
NC
1546 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1547 because of a special case need for generating separate debug info
1548 files. See below for more details. */
84865015
NC
1549 if (oheader == NULL
1550 || (oheader->sh_type != SHT_NOBITS
5522f910
NC
1551 && oheader->sh_type < SHT_LOOS))
1552 continue;
1553
1554 /* Ignore empty sections, and sections whose
1555 fields have already been initialised. */
1556 if (oheader->sh_size == 0
84865015
NC
1557 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1558 continue;
63b9bbb7 1559
84865015 1560 /* Scan for the matching section in the input bfd.
5522f910
NC
1561 First we try for a direct mapping between the input and output sections. */
1562 for (j = 1; j < elf_numsections (ibfd); j++)
1563 {
1564 const Elf_Internal_Shdr * iheader = iheaders[j];
1565
1566 if (iheader == NULL)
1567 continue;
1568
1569 if (oheader->bfd_section != NULL
1570 && iheader->bfd_section != NULL
1571 && iheader->bfd_section->output_section != NULL
1572 && iheader->bfd_section->output_section == oheader->bfd_section)
1573 {
1574 /* We have found a connection from the input section to the
1575 output section. Attempt to copy the header fields. If
1576 this fails then do not try any further sections - there
1577 should only be a one-to-one mapping between input and output. */
1578 if (! copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1579 j = elf_numsections (ibfd);
1580 break;
1581 }
1582 }
1583
1584 if (j < elf_numsections (ibfd))
1585 continue;
1586
1587 /* That failed. So try to deduce the corresponding input section.
84865015
NC
1588 Unfortunately we cannot compare names as the output string table
1589 is empty, so instead we check size, address and type. */
1590 for (j = 1; j < elf_numsections (ibfd); j++)
1591 {
5522f910 1592 const Elf_Internal_Shdr * iheader = iheaders[j];
84865015 1593
5522f910
NC
1594 if (iheader == NULL)
1595 continue;
1596
1597 /* Try matching fields in the input section's header.
1598 Since --only-keep-debug turns all non-debug sections into
84865015
NC
1599 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1600 input type. */
1601 if ((oheader->sh_type == SHT_NOBITS
1602 || iheader->sh_type == oheader->sh_type)
5522f910
NC
1603 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1604 == (oheader->sh_flags & ~ SHF_INFO_LINK)
84865015
NC
1605 && iheader->sh_addralign == oheader->sh_addralign
1606 && iheader->sh_entsize == oheader->sh_entsize
1607 && iheader->sh_size == oheader->sh_size
1608 && iheader->sh_addr == oheader->sh_addr
1609 && (iheader->sh_info != oheader->sh_info
1610 || iheader->sh_link != oheader->sh_link))
63b9bbb7 1611 {
5522f910
NC
1612 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1613 break;
63b9bbb7
NC
1614 }
1615 }
5522f910
NC
1616
1617 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1618 {
1619 /* Final attempt. Call the backend copy function
1620 with a NULL input section. */
1621 if (bed->elf_backend_copy_special_section_fields != NULL)
1622 bed->elf_backend_copy_special_section_fields (ibfd, obfd, NULL, oheader);
1623 }
63b9bbb7
NC
1624 }
1625
b34976b6 1626 return TRUE;
2d502050
L
1627}
1628
cedc298e
L
1629static const char *
1630get_segment_type (unsigned int p_type)
1631{
1632 const char *pt;
1633 switch (p_type)
1634 {
1635 case PT_NULL: pt = "NULL"; break;
1636 case PT_LOAD: pt = "LOAD"; break;
1637 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1638 case PT_INTERP: pt = "INTERP"; break;
1639 case PT_NOTE: pt = "NOTE"; break;
1640 case PT_SHLIB: pt = "SHLIB"; break;
1641 case PT_PHDR: pt = "PHDR"; break;
1642 case PT_TLS: pt = "TLS"; break;
1643 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1644 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1645 case PT_GNU_RELRO: pt = "RELRO"; break;
1646 default: pt = NULL; break;
1647 }
1648 return pt;
1649}
1650
f0b79d91
L
1651/* Print out the program headers. */
1652
b34976b6 1653bfd_boolean
217aa764 1654_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1655{
a50b1753 1656 FILE *f = (FILE *) farg;
252b5132
RH
1657 Elf_Internal_Phdr *p;
1658 asection *s;
1659 bfd_byte *dynbuf = NULL;
1660
1661 p = elf_tdata (abfd)->phdr;
1662 if (p != NULL)
1663 {
1664 unsigned int i, c;
1665
1666 fprintf (f, _("\nProgram Header:\n"));
1667 c = elf_elfheader (abfd)->e_phnum;
1668 for (i = 0; i < c; i++, p++)
1669 {
cedc298e 1670 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1671 char buf[20];
1672
cedc298e 1673 if (pt == NULL)
252b5132 1674 {
cedc298e
L
1675 sprintf (buf, "0x%lx", p->p_type);
1676 pt = buf;
252b5132 1677 }
dc810e39 1678 fprintf (f, "%8s off 0x", pt);
60b89a18 1679 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1680 fprintf (f, " vaddr 0x");
60b89a18 1681 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1682 fprintf (f, " paddr 0x");
60b89a18 1683 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1684 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1685 fprintf (f, " filesz 0x");
60b89a18 1686 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1687 fprintf (f, " memsz 0x");
60b89a18 1688 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1689 fprintf (f, " flags %c%c%c",
1690 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1691 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1692 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1693 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1694 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1695 fprintf (f, "\n");
1696 }
1697 }
1698
1699 s = bfd_get_section_by_name (abfd, ".dynamic");
1700 if (s != NULL)
1701 {
cb33740c 1702 unsigned int elfsec;
dc810e39 1703 unsigned long shlink;
252b5132
RH
1704 bfd_byte *extdyn, *extdynend;
1705 size_t extdynsize;
217aa764 1706 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1707
1708 fprintf (f, _("\nDynamic Section:\n"));
1709
eea6121a 1710 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1711 goto error_return;
1712
1713 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1714 if (elfsec == SHN_BAD)
252b5132 1715 goto error_return;
dc810e39 1716 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1717
1718 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1719 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1720
1721 extdyn = dynbuf;
06614111
NC
1722 /* PR 17512: file: 6f427532. */
1723 if (s->size < extdynsize)
1724 goto error_return;
eea6121a 1725 extdynend = extdyn + s->size;
1036838a 1726 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
07d6d2b8 1727 Fix range check. */
1036838a 1728 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
252b5132
RH
1729 {
1730 Elf_Internal_Dyn dyn;
ad9563d6 1731 const char *name = "";
252b5132 1732 char ab[20];
b34976b6 1733 bfd_boolean stringp;
ad9563d6 1734 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1735
217aa764 1736 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1737
1738 if (dyn.d_tag == DT_NULL)
1739 break;
1740
b34976b6 1741 stringp = FALSE;
252b5132
RH
1742 switch (dyn.d_tag)
1743 {
1744 default:
ad9563d6
CM
1745 if (bed->elf_backend_get_target_dtag)
1746 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1747
1748 if (!strcmp (name, ""))
1749 {
cd9af601 1750 sprintf (ab, "%#" BFD_VMA_FMT "x", dyn.d_tag);
ad9563d6
CM
1751 name = ab;
1752 }
252b5132
RH
1753 break;
1754
b34976b6 1755 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1756 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1757 case DT_PLTGOT: name = "PLTGOT"; break;
1758 case DT_HASH: name = "HASH"; break;
1759 case DT_STRTAB: name = "STRTAB"; break;
1760 case DT_SYMTAB: name = "SYMTAB"; break;
1761 case DT_RELA: name = "RELA"; break;
1762 case DT_RELASZ: name = "RELASZ"; break;
1763 case DT_RELAENT: name = "RELAENT"; break;
1764 case DT_STRSZ: name = "STRSZ"; break;
1765 case DT_SYMENT: name = "SYMENT"; break;
1766 case DT_INIT: name = "INIT"; break;
1767 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1768 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1769 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1770 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1771 case DT_REL: name = "REL"; break;
1772 case DT_RELSZ: name = "RELSZ"; break;
1773 case DT_RELENT: name = "RELENT"; break;
1774 case DT_PLTREL: name = "PLTREL"; break;
1775 case DT_DEBUG: name = "DEBUG"; break;
1776 case DT_TEXTREL: name = "TEXTREL"; break;
1777 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1778 case DT_BIND_NOW: name = "BIND_NOW"; break;
1779 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1780 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1781 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1782 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1783 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1784 case DT_FLAGS: name = "FLAGS"; break;
1785 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1786 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1787 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1788 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1789 case DT_MOVEENT: name = "MOVEENT"; break;
1790 case DT_MOVESZ: name = "MOVESZ"; break;
1791 case DT_FEATURE: name = "FEATURE"; break;
1792 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1793 case DT_SYMINSZ: name = "SYMINSZ"; break;
1794 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1795 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1796 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1797 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1798 case DT_PLTPAD: name = "PLTPAD"; break;
1799 case DT_MOVETAB: name = "MOVETAB"; break;
1800 case DT_SYMINFO: name = "SYMINFO"; break;
1801 case DT_RELACOUNT: name = "RELACOUNT"; break;
1802 case DT_RELCOUNT: name = "RELCOUNT"; break;
1803 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1804 case DT_VERSYM: name = "VERSYM"; break;
1805 case DT_VERDEF: name = "VERDEF"; break;
1806 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1807 case DT_VERNEED: name = "VERNEED"; break;
1808 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1809 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1810 case DT_USED: name = "USED"; break;
b34976b6 1811 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1812 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1813 }
1814
ad9563d6 1815 fprintf (f, " %-20s ", name);
252b5132 1816 if (! stringp)
a1f3c56e
AN
1817 {
1818 fprintf (f, "0x");
1819 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1820 }
252b5132
RH
1821 else
1822 {
1823 const char *string;
dc810e39 1824 unsigned int tagv = dyn.d_un.d_val;
252b5132 1825
dc810e39 1826 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1827 if (string == NULL)
1828 goto error_return;
1829 fprintf (f, "%s", string);
1830 }
1831 fprintf (f, "\n");
1832 }
1833
1834 free (dynbuf);
1835 dynbuf = NULL;
1836 }
1837
1838 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1839 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1840 {
fc0e6df6 1841 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1842 return FALSE;
252b5132
RH
1843 }
1844
1845 if (elf_dynverdef (abfd) != 0)
1846 {
1847 Elf_Internal_Verdef *t;
1848
1849 fprintf (f, _("\nVersion definitions:\n"));
1850 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1851 {
1852 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1853 t->vd_flags, t->vd_hash,
1854 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1855 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1856 {
1857 Elf_Internal_Verdaux *a;
1858
1859 fprintf (f, "\t");
1860 for (a = t->vd_auxptr->vda_nextptr;
1861 a != NULL;
1862 a = a->vda_nextptr)
d0fb9a8d
JJ
1863 fprintf (f, "%s ",
1864 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1865 fprintf (f, "\n");
1866 }
1867 }
1868 }
1869
1870 if (elf_dynverref (abfd) != 0)
1871 {
1872 Elf_Internal_Verneed *t;
1873
1874 fprintf (f, _("\nVersion References:\n"));
1875 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1876 {
1877 Elf_Internal_Vernaux *a;
1878
d0fb9a8d
JJ
1879 fprintf (f, _(" required from %s:\n"),
1880 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1881 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1882 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1883 a->vna_flags, a->vna_other,
1884 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1885 }
1886 }
1887
b34976b6 1888 return TRUE;
252b5132
RH
1889
1890 error_return:
1891 if (dynbuf != NULL)
1892 free (dynbuf);
b34976b6 1893 return FALSE;
252b5132
RH
1894}
1895
bb4d2ac2
L
1896/* Get version string. */
1897
1898const char *
60bb06bc
L
1899_bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1900 bfd_boolean *hidden)
bb4d2ac2
L
1901{
1902 const char *version_string = NULL;
1903 if (elf_dynversym (abfd) != 0
1904 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1905 {
1906 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1907
1908 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1909 vernum &= VERSYM_VERSION;
1910
1911 if (vernum == 0)
1912 version_string = "";
1f6f5dba
L
1913 else if (vernum == 1
1914 && (vernum > elf_tdata (abfd)->cverdefs
1915 || (elf_tdata (abfd)->verdef[0].vd_flags
1916 == VER_FLG_BASE)))
bb4d2ac2
L
1917 version_string = "Base";
1918 else if (vernum <= elf_tdata (abfd)->cverdefs)
1919 version_string =
1920 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1921 else
1922 {
1923 Elf_Internal_Verneed *t;
1924
7a815dd5 1925 version_string = _("<corrupt>");
bb4d2ac2
L
1926 for (t = elf_tdata (abfd)->verref;
1927 t != NULL;
1928 t = t->vn_nextref)
1929 {
1930 Elf_Internal_Vernaux *a;
1931
1932 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1933 {
1934 if (a->vna_other == vernum)
1935 {
1936 version_string = a->vna_nodename;
1937 break;
1938 }
1939 }
1940 }
1941 }
1942 }
1943 return version_string;
1944}
1945
252b5132
RH
1946/* Display ELF-specific fields of a symbol. */
1947
1948void
217aa764
AM
1949bfd_elf_print_symbol (bfd *abfd,
1950 void *filep,
1951 asymbol *symbol,
1952 bfd_print_symbol_type how)
252b5132 1953{
a50b1753 1954 FILE *file = (FILE *) filep;
252b5132
RH
1955 switch (how)
1956 {
1957 case bfd_print_symbol_name:
1958 fprintf (file, "%s", symbol->name);
1959 break;
1960 case bfd_print_symbol_more:
1961 fprintf (file, "elf ");
60b89a18 1962 bfd_fprintf_vma (abfd, file, symbol->value);
cd9af601 1963 fprintf (file, " %x", symbol->flags);
252b5132
RH
1964 break;
1965 case bfd_print_symbol_all:
1966 {
4e8a9624
AM
1967 const char *section_name;
1968 const char *name = NULL;
9c5bfbb7 1969 const struct elf_backend_data *bed;
7a13edea 1970 unsigned char st_other;
dbb410c3 1971 bfd_vma val;
bb4d2ac2
L
1972 const char *version_string;
1973 bfd_boolean hidden;
c044fabd 1974
252b5132 1975 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1976
1977 bed = get_elf_backend_data (abfd);
1978 if (bed->elf_backend_print_symbol_all)
c044fabd 1979 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1980
1981 if (name == NULL)
1982 {
7ee38065 1983 name = symbol->name;
217aa764 1984 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1985 }
1986
252b5132
RH
1987 fprintf (file, " %s\t", section_name);
1988 /* Print the "other" value for a symbol. For common symbols,
1989 we've already printed the size; now print the alignment.
1990 For other symbols, we have no specified alignment, and
1991 we've printed the address; now print the size. */
dcf6c779 1992 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1993 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1994 else
1995 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1996 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1997
1998 /* If we have version information, print it. */
60bb06bc
L
1999 version_string = _bfd_elf_get_symbol_version_string (abfd,
2000 symbol,
2001 &hidden);
bb4d2ac2 2002 if (version_string)
252b5132 2003 {
bb4d2ac2 2004 if (!hidden)
252b5132
RH
2005 fprintf (file, " %-11s", version_string);
2006 else
2007 {
2008 int i;
2009
2010 fprintf (file, " (%s)", version_string);
2011 for (i = 10 - strlen (version_string); i > 0; --i)
2012 putc (' ', file);
2013 }
2014 }
2015
2016 /* If the st_other field is not zero, print it. */
7a13edea 2017 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 2018
7a13edea
NC
2019 switch (st_other)
2020 {
2021 case 0: break;
2022 case STV_INTERNAL: fprintf (file, " .internal"); break;
2023 case STV_HIDDEN: fprintf (file, " .hidden"); break;
2024 case STV_PROTECTED: fprintf (file, " .protected"); break;
2025 default:
2026 /* Some other non-defined flags are also present, so print
2027 everything hex. */
2028 fprintf (file, " 0x%02x", (unsigned int) st_other);
2029 }
252b5132 2030
587ff49e 2031 fprintf (file, " %s", name);
252b5132
RH
2032 }
2033 break;
2034 }
2035}
252b5132
RH
2036\f
2037/* ELF .o/exec file reading */
2038
c044fabd 2039/* Create a new bfd section from an ELF section header. */
252b5132 2040
b34976b6 2041bfd_boolean
217aa764 2042bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 2043{
4fbb74a6
AM
2044 Elf_Internal_Shdr *hdr;
2045 Elf_Internal_Ehdr *ehdr;
2046 const struct elf_backend_data *bed;
90937f86 2047 const char *name;
bf67003b
NC
2048 bfd_boolean ret = TRUE;
2049 static bfd_boolean * sections_being_created = NULL;
5a4b0ccc 2050 static bfd * sections_being_created_abfd = NULL;
bf67003b 2051 static unsigned int nesting = 0;
252b5132 2052
4fbb74a6
AM
2053 if (shindex >= elf_numsections (abfd))
2054 return FALSE;
2055
bf67003b
NC
2056 if (++ nesting > 3)
2057 {
2058 /* PR17512: A corrupt ELF binary might contain a recursive group of
67ce483b 2059 sections, with each the string indices pointing to the next in the
bf67003b
NC
2060 loop. Detect this here, by refusing to load a section that we are
2061 already in the process of loading. We only trigger this test if
2062 we have nested at least three sections deep as normal ELF binaries
5a4b0ccc
NC
2063 can expect to recurse at least once.
2064
2065 FIXME: It would be better if this array was attached to the bfd,
2066 rather than being held in a static pointer. */
2067
2068 if (sections_being_created_abfd != abfd)
2069 sections_being_created = NULL;
bf67003b
NC
2070 if (sections_being_created == NULL)
2071 {
bf67003b 2072 sections_being_created = (bfd_boolean *)
7a6e0d89 2073 bfd_zalloc2 (abfd, elf_numsections (abfd), sizeof (bfd_boolean));
5a4b0ccc 2074 sections_being_created_abfd = abfd;
bf67003b
NC
2075 }
2076 if (sections_being_created [shindex])
2077 {
4eca0228 2078 _bfd_error_handler
871b3ab2 2079 (_("%pB: warning: loop in section dependencies detected"), abfd);
bf67003b
NC
2080 return FALSE;
2081 }
2082 sections_being_created [shindex] = TRUE;
2083 }
2084
4fbb74a6
AM
2085 hdr = elf_elfsections (abfd)[shindex];
2086 ehdr = elf_elfheader (abfd);
2087 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 2088 hdr->sh_name);
933d961a 2089 if (name == NULL)
bf67003b 2090 goto fail;
252b5132 2091
4fbb74a6 2092 bed = get_elf_backend_data (abfd);
252b5132
RH
2093 switch (hdr->sh_type)
2094 {
2095 case SHT_NULL:
2096 /* Inactive section. Throw it away. */
bf67003b 2097 goto success;
252b5132 2098
bf67003b
NC
2099 case SHT_PROGBITS: /* Normal section with contents. */
2100 case SHT_NOBITS: /* .bss section. */
2101 case SHT_HASH: /* .hash section. */
2102 case SHT_NOTE: /* .note section. */
25e27870
L
2103 case SHT_INIT_ARRAY: /* .init_array section. */
2104 case SHT_FINI_ARRAY: /* .fini_array section. */
2105 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 2106 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 2107 case SHT_GNU_HASH: /* .gnu.hash section. */
bf67003b
NC
2108 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2109 goto success;
252b5132 2110
797fc050 2111 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 2112 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2113 goto fail;
2114
cfcac11d
NC
2115 if (hdr->sh_link > elf_numsections (abfd))
2116 {
caa83f8b 2117 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
2118 field set to SHN_BEFORE or SHN_AFTER. */
2119 switch (bfd_get_arch (abfd))
2120 {
caa83f8b 2121 case bfd_arch_i386:
cfcac11d
NC
2122 case bfd_arch_sparc:
2123 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
2124 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
2125 break;
2126 /* Otherwise fall through. */
2127 default:
bf67003b 2128 goto fail;
cfcac11d
NC
2129 }
2130 }
2131 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
bf67003b 2132 goto fail;
cfcac11d 2133 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
2134 {
2135 Elf_Internal_Shdr *dynsymhdr;
2136
2137 /* The shared libraries distributed with hpux11 have a bogus
2138 sh_link field for the ".dynamic" section. Find the
2139 string table for the ".dynsym" section instead. */
2140 if (elf_dynsymtab (abfd) != 0)
2141 {
2142 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2143 hdr->sh_link = dynsymhdr->sh_link;
2144 }
2145 else
2146 {
2147 unsigned int i, num_sec;
2148
2149 num_sec = elf_numsections (abfd);
2150 for (i = 1; i < num_sec; i++)
2151 {
2152 dynsymhdr = elf_elfsections (abfd)[i];
2153 if (dynsymhdr->sh_type == SHT_DYNSYM)
2154 {
2155 hdr->sh_link = dynsymhdr->sh_link;
2156 break;
2157 }
2158 }
2159 }
2160 }
bf67003b 2161 goto success;
797fc050 2162
bf67003b 2163 case SHT_SYMTAB: /* A symbol table. */
252b5132 2164 if (elf_onesymtab (abfd) == shindex)
bf67003b 2165 goto success;
252b5132 2166
a50b2160 2167 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2168 goto fail;
2169
3337c1e5 2170 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
eee3b786
AM
2171 {
2172 if (hdr->sh_size != 0)
bf67003b 2173 goto fail;
eee3b786
AM
2174 /* Some assemblers erroneously set sh_info to one with a
2175 zero sh_size. ld sees this as a global symbol count
2176 of (unsigned) -1. Fix it here. */
2177 hdr->sh_info = 0;
bf67003b 2178 goto success;
eee3b786 2179 }
bf67003b 2180
16ad13ec
NC
2181 /* PR 18854: A binary might contain more than one symbol table.
2182 Unusual, but possible. Warn, but continue. */
2183 if (elf_onesymtab (abfd) != 0)
2184 {
4eca0228 2185 _bfd_error_handler
695344c0 2186 /* xgettext:c-format */
871b3ab2 2187 (_("%pB: warning: multiple symbol tables detected"
63a5468a 2188 " - ignoring the table in section %u"),
16ad13ec
NC
2189 abfd, shindex);
2190 goto success;
2191 }
252b5132 2192 elf_onesymtab (abfd) = shindex;
6a40cf0c
NC
2193 elf_symtab_hdr (abfd) = *hdr;
2194 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
252b5132
RH
2195 abfd->flags |= HAS_SYMS;
2196
2197 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
2198 SHF_ALLOC is set, and this is a shared object, then we also
2199 treat this section as a BFD section. We can not base the
2200 decision purely on SHF_ALLOC, because that flag is sometimes
2201 set in a relocatable object file, which would confuse the
2202 linker. */
252b5132
RH
2203 if ((hdr->sh_flags & SHF_ALLOC) != 0
2204 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
2205 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2206 shindex))
bf67003b 2207 goto fail;
252b5132 2208
1b3a8575
AM
2209 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2210 can't read symbols without that section loaded as well. It
2211 is most likely specified by the next section header. */
6a40cf0c
NC
2212 {
2213 elf_section_list * entry;
2214 unsigned int i, num_sec;
1b3a8575 2215
6a40cf0c
NC
2216 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2217 if (entry->hdr.sh_link == shindex)
2218 goto success;
2219
2220 num_sec = elf_numsections (abfd);
2221 for (i = shindex + 1; i < num_sec; i++)
2222 {
2223 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2224
2225 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2226 && hdr2->sh_link == shindex)
2227 break;
2228 }
2229
2230 if (i == num_sec)
2231 for (i = 1; i < shindex; i++)
1b3a8575
AM
2232 {
2233 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
6a40cf0c 2234
1b3a8575
AM
2235 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2236 && hdr2->sh_link == shindex)
2237 break;
2238 }
6a40cf0c
NC
2239
2240 if (i != shindex)
2241 ret = bfd_section_from_shdr (abfd, i);
2242 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2243 goto success;
2244 }
252b5132 2245
bf67003b 2246 case SHT_DYNSYM: /* A dynamic symbol table. */
252b5132 2247 if (elf_dynsymtab (abfd) == shindex)
bf67003b 2248 goto success;
252b5132 2249
a50b2160 2250 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2251 goto fail;
2252
eee3b786
AM
2253 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2254 {
2255 if (hdr->sh_size != 0)
bf67003b
NC
2256 goto fail;
2257
eee3b786
AM
2258 /* Some linkers erroneously set sh_info to one with a
2259 zero sh_size. ld sees this as a global symbol count
2260 of (unsigned) -1. Fix it here. */
2261 hdr->sh_info = 0;
bf67003b 2262 goto success;
eee3b786 2263 }
bf67003b 2264
16ad13ec
NC
2265 /* PR 18854: A binary might contain more than one dynamic symbol table.
2266 Unusual, but possible. Warn, but continue. */
2267 if (elf_dynsymtab (abfd) != 0)
2268 {
4eca0228 2269 _bfd_error_handler
695344c0 2270 /* xgettext:c-format */
871b3ab2 2271 (_("%pB: warning: multiple dynamic symbol tables detected"
63a5468a 2272 " - ignoring the table in section %u"),
16ad13ec
NC
2273 abfd, shindex);
2274 goto success;
2275 }
252b5132
RH
2276 elf_dynsymtab (abfd) = shindex;
2277 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2278 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2279 abfd->flags |= HAS_SYMS;
2280
2281 /* Besides being a symbol table, we also treat this as a regular
2282 section, so that objcopy can handle it. */
bf67003b
NC
2283 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2284 goto success;
252b5132 2285
bf67003b 2286 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
6a40cf0c
NC
2287 {
2288 elf_section_list * entry;
9ad5cbcf 2289
6a40cf0c
NC
2290 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2291 if (entry->ndx == shindex)
2292 goto success;
07d6d2b8 2293
7a6e0d89 2294 entry = bfd_alloc (abfd, sizeof (*entry));
6a40cf0c
NC
2295 if (entry == NULL)
2296 goto fail;
2297 entry->ndx = shindex;
2298 entry->hdr = * hdr;
2299 entry->next = elf_symtab_shndx_list (abfd);
2300 elf_symtab_shndx_list (abfd) = entry;
2301 elf_elfsections (abfd)[shindex] = & entry->hdr;
2302 goto success;
2303 }
9ad5cbcf 2304
bf67003b 2305 case SHT_STRTAB: /* A string table. */
252b5132 2306 if (hdr->bfd_section != NULL)
bf67003b
NC
2307 goto success;
2308
252b5132
RH
2309 if (ehdr->e_shstrndx == shindex)
2310 {
2311 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2312 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
bf67003b 2313 goto success;
252b5132 2314 }
bf67003b 2315
1b3a8575
AM
2316 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2317 {
2318 symtab_strtab:
2319 elf_tdata (abfd)->strtab_hdr = *hdr;
2320 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
bf67003b 2321 goto success;
1b3a8575 2322 }
bf67003b 2323
1b3a8575
AM
2324 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2325 {
2326 dynsymtab_strtab:
2327 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2328 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2329 elf_elfsections (abfd)[shindex] = hdr;
2330 /* We also treat this as a regular section, so that objcopy
2331 can handle it. */
bf67003b
NC
2332 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2333 shindex);
2334 goto success;
1b3a8575 2335 }
252b5132 2336
1b3a8575
AM
2337 /* If the string table isn't one of the above, then treat it as a
2338 regular section. We need to scan all the headers to be sure,
2339 just in case this strtab section appeared before the above. */
2340 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2341 {
2342 unsigned int i, num_sec;
252b5132 2343
1b3a8575
AM
2344 num_sec = elf_numsections (abfd);
2345 for (i = 1; i < num_sec; i++)
2346 {
2347 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2348 if (hdr2->sh_link == shindex)
2349 {
933d961a
JJ
2350 /* Prevent endless recursion on broken objects. */
2351 if (i == shindex)
bf67003b 2352 goto fail;
1b3a8575 2353 if (! bfd_section_from_shdr (abfd, i))
bf67003b 2354 goto fail;
1b3a8575
AM
2355 if (elf_onesymtab (abfd) == i)
2356 goto symtab_strtab;
2357 if (elf_dynsymtab (abfd) == i)
2358 goto dynsymtab_strtab;
2359 }
2360 }
2361 }
bf67003b
NC
2362 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2363 goto success;
252b5132
RH
2364
2365 case SHT_REL:
2366 case SHT_RELA:
2367 /* *These* do a lot of work -- but build no sections! */
2368 {
2369 asection *target_sect;
d4730f92 2370 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 2371 unsigned int num_sec = elf_numsections (abfd);
d4730f92 2372 struct bfd_elf_section_data *esdt;
252b5132 2373
aa2ca951
JJ
2374 if (hdr->sh_entsize
2375 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160 2376 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
bf67003b 2377 goto fail;
a50b2160 2378
03ae5f59 2379 /* Check for a bogus link to avoid crashing. */
4fbb74a6 2380 if (hdr->sh_link >= num_sec)
03ae5f59 2381 {
4eca0228 2382 _bfd_error_handler
695344c0 2383 /* xgettext:c-format */
871b3ab2 2384 (_("%pB: invalid link %u for reloc section %s (index %u)"),
4eca0228 2385 abfd, hdr->sh_link, name, shindex);
bf67003b
NC
2386 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2387 shindex);
2388 goto success;
03ae5f59
ILT
2389 }
2390
252b5132
RH
2391 /* For some incomprehensible reason Oracle distributes
2392 libraries for Solaris in which some of the objects have
2393 bogus sh_link fields. It would be nice if we could just
2394 reject them, but, unfortunately, some people need to use
2395 them. We scan through the section headers; if we find only
2396 one suitable symbol table, we clobber the sh_link to point
83b89087
L
2397 to it. I hope this doesn't break anything.
2398
2399 Don't do it on executable nor shared library. */
2400 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2401 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
2402 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2403 {
9ad5cbcf 2404 unsigned int scan;
252b5132
RH
2405 int found;
2406
2407 found = 0;
9ad5cbcf 2408 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2409 {
2410 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2411 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2412 {
2413 if (found != 0)
2414 {
2415 found = 0;
2416 break;
2417 }
2418 found = scan;
2419 }
2420 }
2421 if (found != 0)
2422 hdr->sh_link = found;
2423 }
2424
2425 /* Get the symbol table. */
1b3a8575
AM
2426 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2427 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2428 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
bf67003b 2429 goto fail;
252b5132 2430
a4bcd733
AM
2431 /* If this is an alloc section in an executable or shared
2432 library, or the reloc section does not use the main symbol
2433 table we don't treat it as a reloc section. BFD can't
2434 adequately represent such a section, so at least for now,
2435 we don't try. We just present it as a normal section. We
2436 also can't use it as a reloc section if it points to the
2437 null section, an invalid section, another reloc section, or
2438 its sh_link points to the null section. */
2439 if (((abfd->flags & (DYNAMIC | EXEC_P)) != 0
2440 && (hdr->sh_flags & SHF_ALLOC) != 0)
83b89087 2441 || hdr->sh_link == SHN_UNDEF
a4bcd733 2442 || hdr->sh_link != elf_onesymtab (abfd)
185ef66d 2443 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
2444 || hdr->sh_info >= num_sec
2445 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2446 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
bf67003b
NC
2447 {
2448 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2449 shindex);
2450 goto success;
2451 }
252b5132
RH
2452
2453 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
bf67003b
NC
2454 goto fail;
2455
252b5132
RH
2456 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2457 if (target_sect == NULL)
bf67003b 2458 goto fail;
252b5132 2459
d4730f92
BS
2460 esdt = elf_section_data (target_sect);
2461 if (hdr->sh_type == SHT_RELA)
2462 p_hdr = &esdt->rela.hdr;
252b5132 2463 else
d4730f92
BS
2464 p_hdr = &esdt->rel.hdr;
2465
a7ba3896
NC
2466 /* PR 17512: file: 0b4f81b7.
2467 Also see PR 24456, for a file which deliberately has two reloc
2468 sections. */
06614111 2469 if (*p_hdr != NULL)
a7ba3896
NC
2470 {
2471 _bfd_error_handler
2472 /* xgettext:c-format */
2473 (_("%pB: warning: multiple relocation sections for section %pA \
2474found - ignoring all but the first"),
2475 abfd, target_sect);
2476 goto success;
2477 }
ef53be89 2478 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
d4730f92 2479 if (hdr2 == NULL)
bf67003b 2480 goto fail;
252b5132 2481 *hdr2 = *hdr;
d4730f92 2482 *p_hdr = hdr2;
252b5132 2483 elf_elfsections (abfd)[shindex] = hdr2;
056bafd4
MR
2484 target_sect->reloc_count += (NUM_SHDR_ENTRIES (hdr)
2485 * bed->s->int_rels_per_ext_rel);
252b5132
RH
2486 target_sect->flags |= SEC_RELOC;
2487 target_sect->relocation = NULL;
2488 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2489 /* In the section to which the relocations apply, mark whether
2490 its relocations are of the REL or RELA variety. */
72730e0c 2491 if (hdr->sh_size != 0)
d4730f92
BS
2492 {
2493 if (hdr->sh_type == SHT_RELA)
2494 target_sect->use_rela_p = 1;
2495 }
252b5132 2496 abfd->flags |= HAS_RELOC;
bf67003b 2497 goto success;
252b5132 2498 }
252b5132
RH
2499
2500 case SHT_GNU_verdef:
2501 elf_dynverdef (abfd) = shindex;
2502 elf_tdata (abfd)->dynverdef_hdr = *hdr;
bf67003b
NC
2503 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2504 goto success;
252b5132
RH
2505
2506 case SHT_GNU_versym:
a50b2160 2507 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
bf67003b
NC
2508 goto fail;
2509
252b5132
RH
2510 elf_dynversym (abfd) = shindex;
2511 elf_tdata (abfd)->dynversym_hdr = *hdr;
bf67003b
NC
2512 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2513 goto success;
252b5132
RH
2514
2515 case SHT_GNU_verneed:
2516 elf_dynverref (abfd) = shindex;
2517 elf_tdata (abfd)->dynverref_hdr = *hdr;
bf67003b
NC
2518 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2519 goto success;
252b5132
RH
2520
2521 case SHT_SHLIB:
bf67003b 2522 goto success;
252b5132 2523
dbb410c3 2524 case SHT_GROUP:
44534af3 2525 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
bf67003b
NC
2526 goto fail;
2527
6dc132d9 2528 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2529 goto fail;
2530
bf67003b 2531 goto success;
dbb410c3 2532
252b5132 2533 default:
104d59d1
JM
2534 /* Possibly an attributes section. */
2535 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2536 || hdr->sh_type == bed->obj_attrs_section_type)
2537 {
2538 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2539 goto fail;
104d59d1 2540 _bfd_elf_parse_attributes (abfd, hdr);
bf67003b 2541 goto success;
104d59d1
JM
2542 }
2543
252b5132 2544 /* Check for any processor-specific section types. */
3eb70a79 2545 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2546 goto success;
3eb70a79
L
2547
2548 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2549 {
2550 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2551 /* FIXME: How to properly handle allocated section reserved
2552 for applications? */
4eca0228 2553 _bfd_error_handler
695344c0 2554 /* xgettext:c-format */
871b3ab2 2555 (_("%pB: unknown type [%#x] section `%s'"),
76cfced5 2556 abfd, hdr->sh_type, name);
3eb70a79 2557 else
bf67003b
NC
2558 {
2559 /* Allow sections reserved for applications. */
2560 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2561 shindex);
2562 goto success;
2563 }
3eb70a79
L
2564 }
2565 else if (hdr->sh_type >= SHT_LOPROC
2566 && hdr->sh_type <= SHT_HIPROC)
2567 /* FIXME: We should handle this section. */
4eca0228 2568 _bfd_error_handler
695344c0 2569 /* xgettext:c-format */
871b3ab2 2570 (_("%pB: unknown type [%#x] section `%s'"),
76cfced5 2571 abfd, hdr->sh_type, name);
3eb70a79 2572 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
2573 {
2574 /* Unrecognised OS-specific sections. */
2575 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2576 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 2577 required to correctly process the section and the file should
ff15b240 2578 be rejected with an error message. */
4eca0228 2579 _bfd_error_handler
695344c0 2580 /* xgettext:c-format */
871b3ab2 2581 (_("%pB: unknown type [%#x] section `%s'"),
76cfced5 2582 abfd, hdr->sh_type, name);
ff15b240 2583 else
bf67003b
NC
2584 {
2585 /* Otherwise it should be processed. */
2586 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2587 goto success;
2588 }
ff15b240 2589 }
3eb70a79
L
2590 else
2591 /* FIXME: We should handle this section. */
4eca0228 2592 _bfd_error_handler
695344c0 2593 /* xgettext:c-format */
871b3ab2 2594 (_("%pB: unknown type [%#x] section `%s'"),
76cfced5 2595 abfd, hdr->sh_type, name);
3eb70a79 2596
bf67003b 2597 goto fail;
252b5132
RH
2598 }
2599
bf67003b
NC
2600 fail:
2601 ret = FALSE;
2602 success:
e5b470e2 2603 if (sections_being_created && sections_being_created_abfd == abfd)
bf67003b
NC
2604 sections_being_created [shindex] = FALSE;
2605 if (-- nesting == 0)
5a4b0ccc
NC
2606 {
2607 sections_being_created = NULL;
2608 sections_being_created_abfd = abfd;
2609 }
bf67003b 2610 return ret;
252b5132
RH
2611}
2612
87d72d41 2613/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2614
87d72d41
AM
2615Elf_Internal_Sym *
2616bfd_sym_from_r_symndx (struct sym_cache *cache,
2617 bfd *abfd,
2618 unsigned long r_symndx)
ec338859 2619{
ec338859
AM
2620 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2621
a5d1b3b5
AM
2622 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2623 {
2624 Elf_Internal_Shdr *symtab_hdr;
2625 unsigned char esym[sizeof (Elf64_External_Sym)];
2626 Elf_External_Sym_Shndx eshndx;
ec338859 2627
a5d1b3b5
AM
2628 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2629 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2630 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2631 return NULL;
9ad5cbcf 2632
a5d1b3b5
AM
2633 if (cache->abfd != abfd)
2634 {
2635 memset (cache->indx, -1, sizeof (cache->indx));
2636 cache->abfd = abfd;
2637 }
2638 cache->indx[ent] = r_symndx;
ec338859 2639 }
a5d1b3b5 2640
87d72d41 2641 return &cache->sym[ent];
ec338859
AM
2642}
2643
252b5132
RH
2644/* Given an ELF section number, retrieve the corresponding BFD
2645 section. */
2646
2647asection *
91d6fa6a 2648bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2649{
91d6fa6a 2650 if (sec_index >= elf_numsections (abfd))
252b5132 2651 return NULL;
91d6fa6a 2652 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2653}
2654
b35d266b 2655static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2656{
0112cd26 2657 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 2658 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2659};
2660
b35d266b 2661static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2662{
0112cd26 2663 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
1ff6de03 2664 { STRING_COMMA_LEN (".ctf"), 0, SHT_PROGBITS, 0 },
07d6d2b8 2665 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2666};
2667
b35d266b 2668static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2669{
07d6d2b8
AM
2670 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2671 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
a9a72a65
DE
2672 /* There are more DWARF sections than these, but they needn't be added here
2673 unless you have to cope with broken compilers that don't emit section
2674 attributes or you want to help the user writing assembler. */
07d6d2b8
AM
2675 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2676 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2677 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2678 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
0112cd26 2679 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
07d6d2b8
AM
2680 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2681 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2682 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2683 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2684};
2685
b35d266b 2686static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2687{
07d6d2b8 2688 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
6f9dbcd4 2689 { STRING_COMMA_LEN (".fini_array"), -2, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
07d6d2b8 2690 { NULL, 0 , 0, 0, 0 }
7f4d3958
L
2691};
2692
b35d266b 2693static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2694{
0112cd26 2695 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
2696 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
2697 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2698 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
0112cd26
NC
2699 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2700 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
07d6d2b8
AM
2701 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2702 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2703 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2704 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2705};
2706
b35d266b 2707static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2708{
07d6d2b8
AM
2709 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2710 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2711};
2712
b35d266b 2713static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2714{
07d6d2b8 2715 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
6f9dbcd4 2716 { STRING_COMMA_LEN (".init_array"), -2, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
2717 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2718 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2719};
2720
b35d266b 2721static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2722{
0112cd26 2723 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
07d6d2b8 2724 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2725};
2726
b35d266b 2727static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2728{
0112cd26 2729 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
07d6d2b8
AM
2730 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2731 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2732};
2733
b35d266b 2734static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2735{
6f9dbcd4 2736 { STRING_COMMA_LEN (".preinit_array"), -2, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
2737 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2738 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2739};
2740
b35d266b 2741static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2742{
0112cd26
NC
2743 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2744 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
07d6d2b8
AM
2745 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2746 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2747 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2748};
2749
b35d266b 2750static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2751{
0112cd26
NC
2752 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2753 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2754 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2755 /* See struct bfd_elf_special_section declaration for the semantics of
2756 this special case where .prefix_length != strlen (.prefix). */
2757 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
07d6d2b8 2758 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2759};
2760
b35d266b 2761static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2762{
07d6d2b8
AM
2763 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2764 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
0112cd26 2765 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
07d6d2b8 2766 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2767};
2768
1b315056
CS
2769static const struct bfd_elf_special_section special_sections_z[] =
2770{
07d6d2b8
AM
2771 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2772 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
1b315056
CS
2773 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2774 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
07d6d2b8 2775 { NULL, 0, 0, 0, 0 }
1b315056
CS
2776};
2777
e4c93b56 2778static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2779{
7f4d3958 2780 special_sections_b, /* 'b' */
98ece1b3 2781 special_sections_c, /* 'c' */
7f4d3958
L
2782 special_sections_d, /* 'd' */
2783 NULL, /* 'e' */
2784 special_sections_f, /* 'f' */
2785 special_sections_g, /* 'g' */
2786 special_sections_h, /* 'h' */
2787 special_sections_i, /* 'i' */
2788 NULL, /* 'j' */
2789 NULL, /* 'k' */
2790 special_sections_l, /* 'l' */
2791 NULL, /* 'm' */
2792 special_sections_n, /* 'n' */
2793 NULL, /* 'o' */
2794 special_sections_p, /* 'p' */
2795 NULL, /* 'q' */
2796 special_sections_r, /* 'r' */
2797 special_sections_s, /* 's' */
2798 special_sections_t, /* 't' */
1b315056
CS
2799 NULL, /* 'u' */
2800 NULL, /* 'v' */
2801 NULL, /* 'w' */
2802 NULL, /* 'x' */
2803 NULL, /* 'y' */
2804 special_sections_z /* 'z' */
7f4d3958
L
2805};
2806
551b43fd
AM
2807const struct bfd_elf_special_section *
2808_bfd_elf_get_special_section (const char *name,
2809 const struct bfd_elf_special_section *spec,
2810 unsigned int rela)
2f89ff8d
L
2811{
2812 int i;
7f4d3958 2813 int len;
7f4d3958 2814
551b43fd 2815 len = strlen (name);
7f4d3958 2816
551b43fd 2817 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2818 {
2819 int suffix_len;
551b43fd 2820 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2821
2822 if (len < prefix_len)
2823 continue;
551b43fd 2824 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2825 continue;
2826
551b43fd 2827 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2828 if (suffix_len <= 0)
2829 {
2830 if (name[prefix_len] != 0)
2831 {
2832 if (suffix_len == 0)
2833 continue;
2834 if (name[prefix_len] != '.'
2835 && (suffix_len == -2
551b43fd 2836 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2837 continue;
2838 }
2839 }
2840 else
2841 {
2842 if (len < prefix_len + suffix_len)
2843 continue;
2844 if (memcmp (name + len - suffix_len,
551b43fd 2845 spec[i].prefix + prefix_len,
7dcb9820
AM
2846 suffix_len) != 0)
2847 continue;
2848 }
551b43fd 2849 return &spec[i];
7dcb9820 2850 }
2f89ff8d
L
2851
2852 return NULL;
2853}
2854
7dcb9820 2855const struct bfd_elf_special_section *
29ef7005 2856_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2857{
551b43fd
AM
2858 int i;
2859 const struct bfd_elf_special_section *spec;
29ef7005 2860 const struct elf_backend_data *bed;
2f89ff8d
L
2861
2862 /* See if this is one of the special sections. */
551b43fd
AM
2863 if (sec->name == NULL)
2864 return NULL;
2f89ff8d 2865
29ef7005
L
2866 bed = get_elf_backend_data (abfd);
2867 spec = bed->special_sections;
2868 if (spec)
2869 {
2870 spec = _bfd_elf_get_special_section (sec->name,
2871 bed->special_sections,
2872 sec->use_rela_p);
2873 if (spec != NULL)
2874 return spec;
2875 }
2876
551b43fd
AM
2877 if (sec->name[0] != '.')
2878 return NULL;
2f89ff8d 2879
551b43fd 2880 i = sec->name[1] - 'b';
1b315056 2881 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2882 return NULL;
2883
2884 spec = special_sections[i];
2f89ff8d 2885
551b43fd
AM
2886 if (spec == NULL)
2887 return NULL;
2888
2889 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2890}
2891
b34976b6 2892bfd_boolean
217aa764 2893_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2894{
2895 struct bfd_elf_section_data *sdata;
551b43fd 2896 const struct elf_backend_data *bed;
7dcb9820 2897 const struct bfd_elf_special_section *ssect;
252b5132 2898
f0abc2a1
AM
2899 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2900 if (sdata == NULL)
2901 {
a50b1753 2902 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
07d6d2b8 2903 sizeof (*sdata));
f0abc2a1
AM
2904 if (sdata == NULL)
2905 return FALSE;
217aa764 2906 sec->used_by_bfd = sdata;
f0abc2a1 2907 }
bf572ba0 2908
551b43fd
AM
2909 /* Indicate whether or not this section should use RELA relocations. */
2910 bed = get_elf_backend_data (abfd);
2911 sec->use_rela_p = bed->default_use_rela_p;
2912
e843e0f8
L
2913 /* When we read a file, we don't need to set ELF section type and
2914 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2915 anyway. We will set ELF section type and flags for all linker
2916 created sections. If user specifies BFD section flags, we will
2917 set ELF section type and flags based on BFD section flags in
02ecc8e9
L
2918 elf_fake_sections. Special handling for .init_array/.fini_array
2919 output sections since they may contain .ctors/.dtors input
2920 sections. We don't want _bfd_elf_init_private_section_data to
2921 copy ELF section type from .ctors/.dtors input sections. */
2922 if (abfd->direction != read_direction
3496cb2a 2923 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2924 {
551b43fd 2925 ssect = (*bed->get_sec_type_attr) (abfd, sec);
02ecc8e9
L
2926 if (ssect != NULL
2927 && (!sec->flags
2928 || (sec->flags & SEC_LINKER_CREATED) != 0
2929 || ssect->type == SHT_INIT_ARRAY
2930 || ssect->type == SHT_FINI_ARRAY))
a31501e9
L
2931 {
2932 elf_section_type (sec) = ssect->type;
2933 elf_section_flags (sec) = ssect->attr;
2934 }
2f89ff8d
L
2935 }
2936
f592407e 2937 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2938}
2939
2940/* Create a new bfd section from an ELF program header.
2941
2942 Since program segments have no names, we generate a synthetic name
2943 of the form segment<NUM>, where NUM is generally the index in the
2944 program header table. For segments that are split (see below) we
2945 generate the names segment<NUM>a and segment<NUM>b.
2946
2947 Note that some program segments may have a file size that is different than
2948 (less than) the memory size. All this means is that at execution the
2949 system must allocate the amount of memory specified by the memory size,
2950 but only initialize it with the first "file size" bytes read from the
2951 file. This would occur for example, with program segments consisting
2952 of combined data+bss.
2953
2954 To handle the above situation, this routine generates TWO bfd sections
2955 for the single program segment. The first has the length specified by
2956 the file size of the segment, and the second has the length specified
2957 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2958 into its initialized and uninitialized parts.
252b5132
RH
2959
2960 */
2961
b34976b6 2962bfd_boolean
217aa764
AM
2963_bfd_elf_make_section_from_phdr (bfd *abfd,
2964 Elf_Internal_Phdr *hdr,
91d6fa6a 2965 int hdr_index,
a50b1753 2966 const char *type_name)
252b5132
RH
2967{
2968 asection *newsect;
2969 char *name;
2970 char namebuf[64];
d4c88bbb 2971 size_t len;
252b5132
RH
2972 int split;
2973
2974 split = ((hdr->p_memsz > 0)
2975 && (hdr->p_filesz > 0)
2976 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2977
2978 if (hdr->p_filesz > 0)
252b5132 2979 {
91d6fa6a 2980 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2981 len = strlen (namebuf) + 1;
a50b1753 2982 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2983 if (!name)
2984 return FALSE;
2985 memcpy (name, namebuf, len);
2986 newsect = bfd_make_section (abfd, name);
2987 if (newsect == NULL)
2988 return FALSE;
2989 newsect->vma = hdr->p_vaddr;
2990 newsect->lma = hdr->p_paddr;
2991 newsect->size = hdr->p_filesz;
2992 newsect->filepos = hdr->p_offset;
2993 newsect->flags |= SEC_HAS_CONTENTS;
2994 newsect->alignment_power = bfd_log2 (hdr->p_align);
2995 if (hdr->p_type == PT_LOAD)
252b5132 2996 {
d5191d0c
AM
2997 newsect->flags |= SEC_ALLOC;
2998 newsect->flags |= SEC_LOAD;
2999 if (hdr->p_flags & PF_X)
3000 {
3001 /* FIXME: all we known is that it has execute PERMISSION,
3002 may be data. */
3003 newsect->flags |= SEC_CODE;
3004 }
3005 }
3006 if (!(hdr->p_flags & PF_W))
3007 {
3008 newsect->flags |= SEC_READONLY;
252b5132 3009 }
252b5132
RH
3010 }
3011
d5191d0c 3012 if (hdr->p_memsz > hdr->p_filesz)
252b5132 3013 {
d5191d0c
AM
3014 bfd_vma align;
3015
91d6fa6a 3016 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 3017 len = strlen (namebuf) + 1;
a50b1753 3018 name = (char *) bfd_alloc (abfd, len);
252b5132 3019 if (!name)
b34976b6 3020 return FALSE;
d4c88bbb 3021 memcpy (name, namebuf, len);
252b5132
RH
3022 newsect = bfd_make_section (abfd, name);
3023 if (newsect == NULL)
b34976b6 3024 return FALSE;
252b5132
RH
3025 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
3026 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 3027 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
3028 newsect->filepos = hdr->p_offset + hdr->p_filesz;
3029 align = newsect->vma & -newsect->vma;
3030 if (align == 0 || align > hdr->p_align)
3031 align = hdr->p_align;
3032 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
3033 if (hdr->p_type == PT_LOAD)
3034 {
d5191d0c
AM
3035 /* Hack for gdb. Segments that have not been modified do
3036 not have their contents written to a core file, on the
3037 assumption that a debugger can find the contents in the
3038 executable. We flag this case by setting the fake
3039 section size to zero. Note that "real" bss sections will
3040 always have their contents dumped to the core file. */
3041 if (bfd_get_format (abfd) == bfd_core)
3042 newsect->size = 0;
252b5132
RH
3043 newsect->flags |= SEC_ALLOC;
3044 if (hdr->p_flags & PF_X)
3045 newsect->flags |= SEC_CODE;
3046 }
3047 if (!(hdr->p_flags & PF_W))
3048 newsect->flags |= SEC_READONLY;
3049 }
3050
b34976b6 3051 return TRUE;
252b5132
RH
3052}
3053
864619bb
KS
3054static bfd_boolean
3055_bfd_elf_core_find_build_id (bfd *templ, bfd_vma offset)
3056{
3057 /* The return value is ignored. Build-ids are considered optional. */
3058 if (templ->xvec->flavour == bfd_target_elf_flavour)
3059 return (*get_elf_backend_data (templ)->elf_backend_core_find_build_id)
3060 (templ, offset);
3061 return FALSE;
3062}
3063
b34976b6 3064bfd_boolean
91d6fa6a 3065bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 3066{
9c5bfbb7 3067 const struct elf_backend_data *bed;
20cfcaae
NC
3068
3069 switch (hdr->p_type)
3070 {
3071 case PT_NULL:
91d6fa6a 3072 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
3073
3074 case PT_LOAD:
864619bb
KS
3075 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load"))
3076 return FALSE;
3077 if (bfd_get_format (abfd) == bfd_core && abfd->build_id == NULL)
3078 _bfd_elf_core_find_build_id (abfd, hdr->p_offset);
3079 return TRUE;
20cfcaae
NC
3080
3081 case PT_DYNAMIC:
91d6fa6a 3082 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
3083
3084 case PT_INTERP:
91d6fa6a 3085 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
3086
3087 case PT_NOTE:
91d6fa6a 3088 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 3089 return FALSE;
276da9b3
L
3090 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz,
3091 hdr->p_align))
b34976b6
AM
3092 return FALSE;
3093 return TRUE;
20cfcaae
NC
3094
3095 case PT_SHLIB:
91d6fa6a 3096 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
3097
3098 case PT_PHDR:
91d6fa6a 3099 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 3100
811072d8 3101 case PT_GNU_EH_FRAME:
91d6fa6a 3102 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
3103 "eh_frame_hdr");
3104
2b05f1b7 3105 case PT_GNU_STACK:
91d6fa6a 3106 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 3107
8c37241b 3108 case PT_GNU_RELRO:
91d6fa6a 3109 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 3110
20cfcaae 3111 default:
8c1acd09 3112 /* Check for any processor-specific program segment types. */
20cfcaae 3113 bed = get_elf_backend_data (abfd);
91d6fa6a 3114 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
3115 }
3116}
3117
d4730f92
BS
3118/* Return the REL_HDR for SEC, assuming there is only a single one, either
3119 REL or RELA. */
3120
3121Elf_Internal_Shdr *
3122_bfd_elf_single_rel_hdr (asection *sec)
3123{
3124 if (elf_section_data (sec)->rel.hdr)
3125 {
3126 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3127 return elf_section_data (sec)->rel.hdr;
3128 }
3129 else
3130 return elf_section_data (sec)->rela.hdr;
3131}
3132
3e19fb8f
L
3133static bfd_boolean
3134_bfd_elf_set_reloc_sh_name (bfd *abfd,
3135 Elf_Internal_Shdr *rel_hdr,
3136 const char *sec_name,
3137 bfd_boolean use_rela_p)
3138{
3139 char *name = (char *) bfd_alloc (abfd,
3140 sizeof ".rela" + strlen (sec_name));
3141 if (name == NULL)
3142 return FALSE;
3143
3144 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3145 rel_hdr->sh_name =
3146 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3147 FALSE);
3148 if (rel_hdr->sh_name == (unsigned int) -1)
3149 return FALSE;
3150
3151 return TRUE;
3152}
3153
d4730f92
BS
3154/* Allocate and initialize a section-header for a new reloc section,
3155 containing relocations against ASECT. It is stored in RELDATA. If
3156 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3157 relocations. */
23bc299b 3158
5d13b3b3 3159static bfd_boolean
217aa764 3160_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 3161 struct bfd_elf_section_reloc_data *reldata,
f6fe1ccd 3162 const char *sec_name,
3e19fb8f
L
3163 bfd_boolean use_rela_p,
3164 bfd_boolean delay_st_name_p)
23bc299b 3165{
d4730f92 3166 Elf_Internal_Shdr *rel_hdr;
9c5bfbb7 3167 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3168
d4730f92 3169 BFD_ASSERT (reldata->hdr == NULL);
ef53be89 3170 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
d4730f92 3171 reldata->hdr = rel_hdr;
23bc299b 3172
3e19fb8f
L
3173 if (delay_st_name_p)
3174 rel_hdr->sh_name = (unsigned int) -1;
3175 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3176 use_rela_p))
b34976b6 3177 return FALSE;
23bc299b
MM
3178 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3179 rel_hdr->sh_entsize = (use_rela_p
3180 ? bed->s->sizeof_rela
3181 : bed->s->sizeof_rel);
72de5009 3182 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
28e07a05 3183 rel_hdr->sh_flags = 0;
23bc299b
MM
3184 rel_hdr->sh_addr = 0;
3185 rel_hdr->sh_size = 0;
3186 rel_hdr->sh_offset = 0;
3187
b34976b6 3188 return TRUE;
23bc299b
MM
3189}
3190
94be91de
JB
3191/* Return the default section type based on the passed in section flags. */
3192
3193int
3194bfd_elf_get_default_section_type (flagword flags)
3195{
0e41bebb 3196 if ((flags & (SEC_ALLOC | SEC_IS_COMMON)) != 0
2e76e85a 3197 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
3198 return SHT_NOBITS;
3199 return SHT_PROGBITS;
3200}
3201
d4730f92
BS
3202struct fake_section_arg
3203{
3204 struct bfd_link_info *link_info;
3205 bfd_boolean failed;
3206};
3207
252b5132
RH
3208/* Set up an ELF internal section header for a section. */
3209
252b5132 3210static void
d4730f92 3211elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 3212{
d4730f92 3213 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 3214 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3215 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 3216 Elf_Internal_Shdr *this_hdr;
0414f35b 3217 unsigned int sh_type;
0ce398f1 3218 const char *name = asect->name;
3e19fb8f 3219 bfd_boolean delay_st_name_p = FALSE;
252b5132 3220
d4730f92 3221 if (arg->failed)
252b5132
RH
3222 {
3223 /* We already failed; just get out of the bfd_map_over_sections
08a40648 3224 loop. */
252b5132
RH
3225 return;
3226 }
3227
d4730f92 3228 this_hdr = &esd->this_hdr;
252b5132 3229
f6fe1ccd 3230 if (arg->link_info)
0ce398f1 3231 {
f6fe1ccd
L
3232 /* ld: compress DWARF debug sections with names: .debug_*. */
3233 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
3234 && (asect->flags & SEC_DEBUGGING)
3235 && name[1] == 'd'
3236 && name[6] == '_')
3237 {
3238 /* Set SEC_ELF_COMPRESS to indicate this section should be
3239 compressed. */
3240 asect->flags |= SEC_ELF_COMPRESS;
0ce398f1 3241
dd905818 3242 /* If this section will be compressed, delay adding section
3e19fb8f
L
3243 name to section name section after it is compressed in
3244 _bfd_elf_assign_file_positions_for_non_load. */
3245 delay_st_name_p = TRUE;
f6fe1ccd
L
3246 }
3247 }
3248 else if ((asect->flags & SEC_ELF_RENAME))
3249 {
3250 /* objcopy: rename output DWARF debug section. */
3251 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
3252 {
3253 /* When we decompress or compress with SHF_COMPRESSED,
3254 convert section name from .zdebug_* to .debug_* if
3255 needed. */
3256 if (name[1] == 'z')
3257 {
3258 char *new_name = convert_zdebug_to_debug (abfd, name);
3259 if (new_name == NULL)
3260 {
3261 arg->failed = TRUE;
3262 return;
3263 }
3264 name = new_name;
3265 }
3266 }
3267 else if (asect->compress_status == COMPRESS_SECTION_DONE)
0ce398f1 3268 {
f6fe1ccd
L
3269 /* PR binutils/18087: Compression does not always make a
3270 section smaller. So only rename the section when
3271 compression has actually taken place. If input section
3272 name is .zdebug_*, we should never compress it again. */
3273 char *new_name = convert_debug_to_zdebug (abfd, name);
0ce398f1
L
3274 if (new_name == NULL)
3275 {
3276 arg->failed = TRUE;
3277 return;
3278 }
f6fe1ccd
L
3279 BFD_ASSERT (name[1] != 'z');
3280 name = new_name;
0ce398f1
L
3281 }
3282 }
3283
3e19fb8f
L
3284 if (delay_st_name_p)
3285 this_hdr->sh_name = (unsigned int) -1;
3286 else
252b5132 3287 {
3e19fb8f
L
3288 this_hdr->sh_name
3289 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3290 name, FALSE);
3291 if (this_hdr->sh_name == (unsigned int) -1)
3292 {
3293 arg->failed = TRUE;
3294 return;
3295 }
252b5132
RH
3296 }
3297
a4d8e49b 3298 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
3299
3300 if ((asect->flags & SEC_ALLOC) != 0
3301 || asect->user_set_vma)
3302 this_hdr->sh_addr = asect->vma;
3303 else
3304 this_hdr->sh_addr = 0;
3305
3306 this_hdr->sh_offset = 0;
eea6121a 3307 this_hdr->sh_size = asect->size;
252b5132 3308 this_hdr->sh_link = 0;
c86934ce
NC
3309 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3310 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3311 {
4eca0228 3312 _bfd_error_handler
695344c0 3313 /* xgettext:c-format */
9793eb77 3314 (_("%pB: error: alignment power %d of section `%pA' is too big"),
c08bb8dd 3315 abfd, asect->alignment_power, asect);
c86934ce
NC
3316 arg->failed = TRUE;
3317 return;
3318 }
72de5009 3319 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
3320 /* The sh_entsize and sh_info fields may have been set already by
3321 copy_private_section_data. */
3322
3323 this_hdr->bfd_section = asect;
3324 this_hdr->contents = NULL;
3325
3cddba1e
L
3326 /* If the section type is unspecified, we set it based on
3327 asect->flags. */
98ece1b3
AM
3328 if ((asect->flags & SEC_GROUP) != 0)
3329 sh_type = SHT_GROUP;
98ece1b3 3330 else
94be91de 3331 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 3332
3cddba1e 3333 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
3334 this_hdr->sh_type = sh_type;
3335 else if (this_hdr->sh_type == SHT_NOBITS
3336 && sh_type == SHT_PROGBITS
3337 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 3338 {
98ece1b3
AM
3339 /* Warn if we are changing a NOBITS section to PROGBITS, but
3340 allow the link to proceed. This can happen when users link
3341 non-bss input sections to bss output sections, or emit data
3342 to a bss output section via a linker script. */
4eca0228 3343 _bfd_error_handler
871b3ab2 3344 (_("warning: section `%pA' type changed to PROGBITS"), asect);
98ece1b3 3345 this_hdr->sh_type = sh_type;
3cddba1e
L
3346 }
3347
2f89ff8d 3348 switch (this_hdr->sh_type)
252b5132 3349 {
2f89ff8d 3350 default:
2f89ff8d
L
3351 break;
3352
3353 case SHT_STRTAB:
2f89ff8d
L
3354 case SHT_NOTE:
3355 case SHT_NOBITS:
3356 case SHT_PROGBITS:
3357 break;
606851fb
AM
3358
3359 case SHT_INIT_ARRAY:
3360 case SHT_FINI_ARRAY:
3361 case SHT_PREINIT_ARRAY:
3362 this_hdr->sh_entsize = bed->s->arch_size / 8;
3363 break;
2f89ff8d
L
3364
3365 case SHT_HASH:
c7ac6ff8 3366 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 3367 break;
5de3bf90 3368
2f89ff8d 3369 case SHT_DYNSYM:
252b5132 3370 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
3371 break;
3372
3373 case SHT_DYNAMIC:
252b5132 3374 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
3375 break;
3376
3377 case SHT_RELA:
3378 if (get_elf_backend_data (abfd)->may_use_rela_p)
3379 this_hdr->sh_entsize = bed->s->sizeof_rela;
3380 break;
3381
3382 case SHT_REL:
3383 if (get_elf_backend_data (abfd)->may_use_rel_p)
3384 this_hdr->sh_entsize = bed->s->sizeof_rel;
3385 break;
3386
3387 case SHT_GNU_versym:
252b5132 3388 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
3389 break;
3390
3391 case SHT_GNU_verdef:
252b5132
RH
3392 this_hdr->sh_entsize = 0;
3393 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3394 cverdefs. The linker will set cverdefs, but sh_info will be
3395 zero. */
252b5132
RH
3396 if (this_hdr->sh_info == 0)
3397 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3398 else
3399 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3400 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
3401 break;
3402
3403 case SHT_GNU_verneed:
252b5132
RH
3404 this_hdr->sh_entsize = 0;
3405 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3406 cverrefs. The linker will set cverrefs, but sh_info will be
3407 zero. */
252b5132
RH
3408 if (this_hdr->sh_info == 0)
3409 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3410 else
3411 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3412 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
3413 break;
3414
3415 case SHT_GROUP:
1783205a 3416 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 3417 break;
fdc90cb4
JJ
3418
3419 case SHT_GNU_HASH:
3420 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3421 break;
dbb410c3 3422 }
252b5132
RH
3423
3424 if ((asect->flags & SEC_ALLOC) != 0)
3425 this_hdr->sh_flags |= SHF_ALLOC;
3426 if ((asect->flags & SEC_READONLY) == 0)
3427 this_hdr->sh_flags |= SHF_WRITE;
3428 if ((asect->flags & SEC_CODE) != 0)
3429 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
3430 if ((asect->flags & SEC_MERGE) != 0)
3431 {
3432 this_hdr->sh_flags |= SHF_MERGE;
3433 this_hdr->sh_entsize = asect->entsize;
f5fa8ca2 3434 }
84865015
NC
3435 if ((asect->flags & SEC_STRINGS) != 0)
3436 this_hdr->sh_flags |= SHF_STRINGS;
1126897b 3437 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 3438 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 3439 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
3440 {
3441 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
3442 if (asect->size == 0
3443 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 3444 {
3a800eb9 3445 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 3446
704afa60 3447 this_hdr->sh_size = 0;
3a800eb9
AM
3448 if (o != NULL)
3449 {
704afa60 3450 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
3451 if (this_hdr->sh_size != 0)
3452 this_hdr->sh_type = SHT_NOBITS;
3453 }
704afa60
JJ
3454 }
3455 }
18ae9cc1
L
3456 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3457 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 3458
d4730f92
BS
3459 /* If the section has relocs, set up a section header for the
3460 SHT_REL[A] section. If two relocation sections are required for
3461 this section, it is up to the processor-specific back-end to
3462 create the other. */
3463 if ((asect->flags & SEC_RELOC) != 0)
3464 {
3465 /* When doing a relocatable link, create both REL and RELA sections if
3466 needed. */
3467 if (arg->link_info
3468 /* Do the normal setup if we wouldn't create any sections here. */
3469 && esd->rel.count + esd->rela.count > 0
0e1862bb
L
3470 && (bfd_link_relocatable (arg->link_info)
3471 || arg->link_info->emitrelocations))
d4730f92
BS
3472 {
3473 if (esd->rel.count && esd->rel.hdr == NULL
28e07a05 3474 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name,
db4677b8 3475 FALSE, delay_st_name_p))
d4730f92
BS
3476 {
3477 arg->failed = TRUE;
3478 return;
3479 }
3480 if (esd->rela.count && esd->rela.hdr == NULL
28e07a05 3481 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name,
db4677b8 3482 TRUE, delay_st_name_p))
d4730f92
BS
3483 {
3484 arg->failed = TRUE;
3485 return;
3486 }
3487 }
3488 else if (!_bfd_elf_init_reloc_shdr (abfd,
3489 (asect->use_rela_p
3490 ? &esd->rela : &esd->rel),
f6fe1ccd 3491 name,
3e19fb8f
L
3492 asect->use_rela_p,
3493 delay_st_name_p))
db4677b8 3494 {
d4730f92 3495 arg->failed = TRUE;
db4677b8
AM
3496 return;
3497 }
d4730f92
BS
3498 }
3499
252b5132 3500 /* Check for processor-specific section types. */
0414f35b 3501 sh_type = this_hdr->sh_type;
e1fddb6b
AO
3502 if (bed->elf_backend_fake_sections
3503 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
db4677b8
AM
3504 {
3505 arg->failed = TRUE;
3506 return;
3507 }
252b5132 3508
42bb2e33 3509 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
3510 {
3511 /* Don't change the header type from NOBITS if we are being
42bb2e33 3512 called for objcopy --only-keep-debug. */
0414f35b
AM
3513 this_hdr->sh_type = sh_type;
3514 }
252b5132
RH
3515}
3516
bcacc0f5
AM
3517/* Fill in the contents of a SHT_GROUP section. Called from
3518 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3519 when ELF targets use the generic linker, ld. Called for ld -r
3520 from bfd_elf_final_link. */
dbb410c3 3521
1126897b 3522void
217aa764 3523bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 3524{
a50b1753 3525 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 3526 asection *elt, *first;
dbb410c3 3527 unsigned char *loc;
b34976b6 3528 bfd_boolean gas;
dbb410c3 3529
7e4111ad
L
3530 /* Ignore linker created group section. See elfNN_ia64_object_p in
3531 elfxx-ia64.c. */
ce5aecf8
AM
3532 if ((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP
3533 || sec->size == 0
dbb410c3
AM
3534 || *failedptr)
3535 return;
3536
bcacc0f5
AM
3537 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3538 {
3539 unsigned long symindx = 0;
3540
3541 /* elf_group_id will have been set up by objcopy and the
3542 generic linker. */
3543 if (elf_group_id (sec) != NULL)
3544 symindx = elf_group_id (sec)->udata.i;
1126897b 3545
bcacc0f5
AM
3546 if (symindx == 0)
3547 {
3548 /* If called from the assembler, swap_out_syms will have set up
3549 elf_section_syms. */
3550 BFD_ASSERT (elf_section_syms (abfd) != NULL);
3551 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3552 }
3553 elf_section_data (sec)->this_hdr.sh_info = symindx;
3554 }
3555 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 3556 {
bcacc0f5
AM
3557 /* The ELF backend linker sets sh_info to -2 when the group
3558 signature symbol is global, and thus the index can't be
3559 set until all local symbols are output. */
53720c49
AM
3560 asection *igroup;
3561 struct bfd_elf_section_data *sec_data;
3562 unsigned long symndx;
3563 unsigned long extsymoff;
bcacc0f5
AM
3564 struct elf_link_hash_entry *h;
3565
53720c49
AM
3566 /* The point of this little dance to the first SHF_GROUP section
3567 then back to the SHT_GROUP section is that this gets us to
3568 the SHT_GROUP in the input object. */
3569 igroup = elf_sec_group (elf_next_in_group (sec));
3570 sec_data = elf_section_data (igroup);
3571 symndx = sec_data->this_hdr.sh_info;
3572 extsymoff = 0;
bcacc0f5
AM
3573 if (!elf_bad_symtab (igroup->owner))
3574 {
3575 Elf_Internal_Shdr *symtab_hdr;
3576
3577 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3578 extsymoff = symtab_hdr->sh_info;
3579 }
3580 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3581 while (h->root.type == bfd_link_hash_indirect
3582 || h->root.type == bfd_link_hash_warning)
3583 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3584
3585 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 3586 }
dbb410c3 3587
1126897b 3588 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 3589 gas = TRUE;
dbb410c3
AM
3590 if (sec->contents == NULL)
3591 {
b34976b6 3592 gas = FALSE;
a50b1753 3593 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
3594
3595 /* Arrange for the section to be written out. */
3596 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
3597 if (sec->contents == NULL)
3598 {
b34976b6 3599 *failedptr = TRUE;
dbb410c3
AM
3600 return;
3601 }
3602 }
3603
eea6121a 3604 loc = sec->contents + sec->size;
dbb410c3 3605
9dce4196
AM
3606 /* Get the pointer to the first section in the group that gas
3607 squirreled away here. objcopy arranges for this to be set to the
3608 start of the input section group. */
3609 first = elt = elf_next_in_group (sec);
dbb410c3
AM
3610
3611 /* First element is a flag word. Rest of section is elf section
3612 indices for all the sections of the group. Write them backwards
3613 just to keep the group in the same order as given in .section
3614 directives, not that it matters. */
3615 while (elt != NULL)
3616 {
9dce4196 3617 asection *s;
9dce4196 3618
9dce4196 3619 s = elt;
415f38a6
AM
3620 if (!gas)
3621 s = s->output_section;
3622 if (s != NULL
3623 && !bfd_is_abs_section (s))
01e1a5bc 3624 {
db4677b8 3625 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
28e07a05
AM
3626 struct bfd_elf_section_data *input_elf_sec = elf_section_data (elt);
3627
3628 if (elf_sec->rel.hdr != NULL
3629 && (gas
3630 || (input_elf_sec->rel.hdr != NULL
3631 && input_elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0))
db4677b8 3632 {
28e07a05 3633 elf_sec->rel.hdr->sh_flags |= SHF_GROUP;
db4677b8
AM
3634 loc -= 4;
3635 H_PUT_32 (abfd, elf_sec->rel.idx, loc);
3636 }
28e07a05
AM
3637 if (elf_sec->rela.hdr != NULL
3638 && (gas
3639 || (input_elf_sec->rela.hdr != NULL
3640 && input_elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0))
db4677b8 3641 {
28e07a05 3642 elf_sec->rela.hdr->sh_flags |= SHF_GROUP;
db4677b8
AM
3643 loc -= 4;
3644 H_PUT_32 (abfd, elf_sec->rela.idx, loc);
3645 }
01e1a5bc 3646 loc -= 4;
db4677b8 3647 H_PUT_32 (abfd, elf_sec->this_idx, loc);
01e1a5bc 3648 }
945906ff 3649 elt = elf_next_in_group (elt);
9dce4196
AM
3650 if (elt == first)
3651 break;
dbb410c3
AM
3652 }
3653
7bdf4127
AB
3654 loc -= 4;
3655 BFD_ASSERT (loc == sec->contents);
dbb410c3 3656
9dce4196 3657 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
3658}
3659
bce964aa
AM
3660/* Given NAME, the name of a relocation section stripped of its
3661 .rel/.rela prefix, return the section in ABFD to which the
3662 relocations apply. */
bd53a53a
L
3663
3664asection *
bce964aa
AM
3665_bfd_elf_plt_get_reloc_section (bfd *abfd, const char *name)
3666{
3667 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3668 section likely apply to .got.plt or .got section. */
3669 if (get_elf_backend_data (abfd)->want_got_plt
3670 && strcmp (name, ".plt") == 0)
3671 {
3672 asection *sec;
3673
3674 name = ".got.plt";
3675 sec = bfd_get_section_by_name (abfd, name);
3676 if (sec != NULL)
3677 return sec;
3678 name = ".got";
3679 }
3680
3681 return bfd_get_section_by_name (abfd, name);
3682}
3683
3684/* Return the section to which RELOC_SEC applies. */
3685
3686static asection *
3687elf_get_reloc_section (asection *reloc_sec)
bd53a53a
L
3688{
3689 const char *name;
3690 unsigned int type;
3691 bfd *abfd;
bce964aa 3692 const struct elf_backend_data *bed;
bd53a53a
L
3693
3694 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3695 if (type != SHT_REL && type != SHT_RELA)
3696 return NULL;
3697
3698 /* We look up the section the relocs apply to by name. */
3699 name = reloc_sec->name;
bce964aa
AM
3700 if (strncmp (name, ".rel", 4) != 0)
3701 return NULL;
3702 name += 4;
3703 if (type == SHT_RELA && *name++ != 'a')
3704 return NULL;
bd53a53a 3705
bd53a53a 3706 abfd = reloc_sec->owner;
bce964aa
AM
3707 bed = get_elf_backend_data (abfd);
3708 return bed->get_reloc_section (abfd, name);
bd53a53a
L
3709}
3710
252b5132
RH
3711/* Assign all ELF section numbers. The dummy first section is handled here
3712 too. The link/info pointers for the standard section types are filled
3713 in here too, while we're at it. */
3714
b34976b6 3715static bfd_boolean
da9f89d4 3716assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
3717{
3718 struct elf_obj_tdata *t = elf_tdata (abfd);
3719 asection *sec;
3e19fb8f 3720 unsigned int section_number;
252b5132 3721 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 3722 struct bfd_elf_section_data *d;
3516e984 3723 bfd_boolean need_symtab;
252b5132
RH
3724
3725 section_number = 1;
3726
2b0f7ef9
JJ
3727 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3728
da9f89d4 3729 /* SHT_GROUP sections are in relocatable files only. */
7bdf4127 3730 if (link_info == NULL || !link_info->resolve_section_groups)
252b5132 3731 {
ef53be89 3732 size_t reloc_count = 0;
14f2c699 3733
da9f89d4 3734 /* Put SHT_GROUP sections first. */
04dd1667 3735 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 3736 {
5daa8fe7 3737 d = elf_section_data (sec);
da9f89d4
L
3738
3739 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 3740 {
5daa8fe7 3741 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
3742 {
3743 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 3744 bfd_section_list_remove (abfd, sec);
da9f89d4 3745 abfd->section_count--;
da9f89d4 3746 }
08a40648 3747 else
4fbb74a6 3748 d->this_idx = section_number++;
da9f89d4 3749 }
14f2c699
L
3750
3751 /* Count relocations. */
3752 reloc_count += sec->reloc_count;
47cc2cf5 3753 }
14f2c699
L
3754
3755 /* Clear HAS_RELOC if there are no relocations. */
3756 if (reloc_count == 0)
3757 abfd->flags &= ~HAS_RELOC;
47cc2cf5
PB
3758 }
3759
3760 for (sec = abfd->sections; sec; sec = sec->next)
3761 {
3762 d = elf_section_data (sec);
3763
3764 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 3765 d->this_idx = section_number++;
3e19fb8f
L
3766 if (d->this_hdr.sh_name != (unsigned int) -1)
3767 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 3768 if (d->rel.hdr)
2b0f7ef9 3769 {
d4730f92 3770 d->rel.idx = section_number++;
3e19fb8f
L
3771 if (d->rel.hdr->sh_name != (unsigned int) -1)
3772 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 3773 }
d4730f92
BS
3774 else
3775 d->rel.idx = 0;
23bc299b 3776
d4730f92 3777 if (d->rela.hdr)
2b0f7ef9 3778 {
d4730f92 3779 d->rela.idx = section_number++;
3e19fb8f
L
3780 if (d->rela.hdr->sh_name != (unsigned int) -1)
3781 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 3782 }
23bc299b 3783 else
d4730f92 3784 d->rela.idx = 0;
252b5132
RH
3785 }
3786
3516e984
L
3787 need_symtab = (bfd_get_symcount (abfd) > 0
3788 || (link_info == NULL
3789 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3790 == HAS_RELOC)));
3791 if (need_symtab)
252b5132 3792 {
12bd6957 3793 elf_onesymtab (abfd) = section_number++;
2b0f7ef9 3794 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 3795 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 3796 {
7a6e0d89 3797 elf_section_list *entry;
6a40cf0c
NC
3798
3799 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3800
7a6e0d89 3801 entry = bfd_zalloc (abfd, sizeof (*entry));
6a40cf0c
NC
3802 entry->ndx = section_number++;
3803 elf_symtab_shndx_list (abfd) = entry;
3804 entry->hdr.sh_name
9ad5cbcf 3805 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3806 ".symtab_shndx", FALSE);
6a40cf0c 3807 if (entry->hdr.sh_name == (unsigned int) -1)
b34976b6 3808 return FALSE;
9ad5cbcf 3809 }
12bd6957 3810 elf_strtab_sec (abfd) = section_number++;
2b0f7ef9 3811 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3812 }
3813
dd905818
NC
3814 elf_shstrtab_sec (abfd) = section_number++;
3815 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3816 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3817
1c52a645
L
3818 if (section_number >= SHN_LORESERVE)
3819 {
695344c0 3820 /* xgettext:c-format */
871b3ab2 3821 _bfd_error_handler (_("%pB: too many sections: %u"),
1c52a645
L
3822 abfd, section_number);
3823 return FALSE;
3824 }
3825
9ad5cbcf 3826 elf_numsections (abfd) = section_number;
252b5132
RH
3827 elf_elfheader (abfd)->e_shnum = section_number;
3828
3829 /* Set up the list of section header pointers, in agreement with the
3830 indices. */
a50b1753 3831 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
07d6d2b8 3832 sizeof (Elf_Internal_Shdr *));
252b5132 3833 if (i_shdrp == NULL)
b34976b6 3834 return FALSE;
252b5132 3835
a50b1753 3836 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
07d6d2b8 3837 sizeof (Elf_Internal_Shdr));
252b5132
RH
3838 if (i_shdrp[0] == NULL)
3839 {
3840 bfd_release (abfd, i_shdrp);
b34976b6 3841 return FALSE;
252b5132 3842 }
252b5132
RH
3843
3844 elf_elfsections (abfd) = i_shdrp;
3845
12bd6957 3846 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3516e984 3847 if (need_symtab)
252b5132 3848 {
12bd6957 3849 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
4fbb74a6 3850 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf 3851 {
6a40cf0c
NC
3852 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3853 BFD_ASSERT (entry != NULL);
3854 i_shdrp[entry->ndx] = & entry->hdr;
3855 entry->hdr.sh_link = elf_onesymtab (abfd);
9ad5cbcf 3856 }
12bd6957
AM
3857 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3858 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
252b5132 3859 }
38ce5b11 3860
252b5132
RH
3861 for (sec = abfd->sections; sec; sec = sec->next)
3862 {
252b5132 3863 asection *s;
252b5132 3864
91d6fa6a
NC
3865 d = elf_section_data (sec);
3866
252b5132 3867 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3868 if (d->rel.idx != 0)
3869 i_shdrp[d->rel.idx] = d->rel.hdr;
3870 if (d->rela.idx != 0)
3871 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3872
3873 /* Fill in the sh_link and sh_info fields while we're at it. */
3874
3875 /* sh_link of a reloc section is the section index of the symbol
3876 table. sh_info is the section index of the section to which
3877 the relocation entries apply. */
d4730f92 3878 if (d->rel.idx != 0)
252b5132 3879 {
12bd6957 3880 d->rel.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3881 d->rel.hdr->sh_info = d->this_idx;
9ef5d938 3882 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
252b5132 3883 }
d4730f92 3884 if (d->rela.idx != 0)
23bc299b 3885 {
12bd6957 3886 d->rela.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3887 d->rela.hdr->sh_info = d->this_idx;
9ef5d938 3888 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
23bc299b 3889 }
252b5132 3890
38ce5b11
L
3891 /* We need to set up sh_link for SHF_LINK_ORDER. */
3892 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3893 {
3894 s = elf_linked_to_section (sec);
3895 if (s)
38ce5b11 3896 {
f2876037 3897 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3898 if (link_info != NULL)
38ce5b11 3899 {
f2876037 3900 /* Check discarded linkonce section. */
dbaa2011 3901 if (discarded_section (s))
38ce5b11 3902 {
ccd2ec6a 3903 asection *kept;
4eca0228 3904 _bfd_error_handler
695344c0 3905 /* xgettext:c-format */
871b3ab2
AM
3906 (_("%pB: sh_link of section `%pA' points to"
3907 " discarded section `%pA' of `%pB'"),
ccd2ec6a
L
3908 abfd, d->this_hdr.bfd_section,
3909 s, s->owner);
3910 /* Point to the kept section if it has the same
3911 size as the discarded one. */
c0f00686 3912 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3913 if (kept == NULL)
185d09ad 3914 {
ccd2ec6a
L
3915 bfd_set_error (bfd_error_bad_value);
3916 return FALSE;
185d09ad 3917 }
ccd2ec6a 3918 s = kept;
38ce5b11 3919 }
e424ecc8 3920
ccd2ec6a
L
3921 s = s->output_section;
3922 BFD_ASSERT (s != NULL);
38ce5b11 3923 }
f2876037
L
3924 else
3925 {
3926 /* Handle objcopy. */
3927 if (s->output_section == NULL)
3928 {
4eca0228 3929 _bfd_error_handler
695344c0 3930 /* xgettext:c-format */
871b3ab2
AM
3931 (_("%pB: sh_link of section `%pA' points to"
3932 " removed section `%pA' of `%pB'"),
f2876037
L
3933 abfd, d->this_hdr.bfd_section, s, s->owner);
3934 bfd_set_error (bfd_error_bad_value);
3935 return FALSE;
3936 }
3937 s = s->output_section;
3938 }
ccd2ec6a
L
3939 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3940 }
3941 else
3942 {
3943 /* PR 290:
3944 The Intel C compiler generates SHT_IA_64_UNWIND with
3945 SHF_LINK_ORDER. But it doesn't set the sh_link or
3946 sh_info fields. Hence we could get the situation
08a40648 3947 where s is NULL. */
ccd2ec6a
L
3948 const struct elf_backend_data *bed
3949 = get_elf_backend_data (abfd);
3950 if (bed->link_order_error_handler)
3951 bed->link_order_error_handler
695344c0 3952 /* xgettext:c-format */
871b3ab2 3953 (_("%pB: warning: sh_link not set for section `%pA'"),
ccd2ec6a 3954 abfd, sec);
38ce5b11
L
3955 }
3956 }
3957
252b5132
RH
3958 switch (d->this_hdr.sh_type)
3959 {
3960 case SHT_REL:
3961 case SHT_RELA:
3962 /* A reloc section which we are treating as a normal BFD
3963 section. sh_link is the section index of the symbol
3964 table. sh_info is the section index of the section to
3965 which the relocation entries apply. We assume that an
3966 allocated reloc section uses the dynamic symbol table.
3967 FIXME: How can we be sure? */
3968 s = bfd_get_section_by_name (abfd, ".dynsym");
3969 if (s != NULL)
3970 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3971
bce964aa 3972 s = elf_get_reloc_section (sec);
252b5132 3973 if (s != NULL)
9ef5d938
L
3974 {
3975 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3976 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3977 }
252b5132
RH
3978 break;
3979
3980 case SHT_STRTAB:
3981 /* We assume that a section named .stab*str is a stabs
3982 string section. We look for a section with the same name
3983 but without the trailing ``str'', and set its sh_link
3984 field to point to this section. */
0112cd26 3985 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3986 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3987 {
3988 size_t len;
3989 char *alc;
3990
3991 len = strlen (sec->name);
a50b1753 3992 alc = (char *) bfd_malloc (len - 2);
252b5132 3993 if (alc == NULL)
b34976b6 3994 return FALSE;
d4c88bbb 3995 memcpy (alc, sec->name, len - 3);
252b5132
RH
3996 alc[len - 3] = '\0';
3997 s = bfd_get_section_by_name (abfd, alc);
3998 free (alc);
3999 if (s != NULL)
4000 {
4001 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
4002
4003 /* This is a .stab section. */
0594c12d
AM
4004 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
4005 elf_section_data (s)->this_hdr.sh_entsize
4006 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
4007 }
4008 }
4009 break;
4010
4011 case SHT_DYNAMIC:
4012 case SHT_DYNSYM:
4013 case SHT_GNU_verneed:
4014 case SHT_GNU_verdef:
4015 /* sh_link is the section header index of the string table
4016 used for the dynamic entries, or the symbol table, or the
4017 version strings. */
4018 s = bfd_get_section_by_name (abfd, ".dynstr");
4019 if (s != NULL)
4020 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4021 break;
4022
7f1204bb
JJ
4023 case SHT_GNU_LIBLIST:
4024 /* sh_link is the section header index of the prelink library
08a40648
AM
4025 list used for the dynamic entries, or the symbol table, or
4026 the version strings. */
7f1204bb
JJ
4027 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
4028 ? ".dynstr" : ".gnu.libstr");
4029 if (s != NULL)
4030 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4031 break;
4032
252b5132 4033 case SHT_HASH:
fdc90cb4 4034 case SHT_GNU_HASH:
252b5132
RH
4035 case SHT_GNU_versym:
4036 /* sh_link is the section header index of the symbol table
4037 this hash table or version table is for. */
4038 s = bfd_get_section_by_name (abfd, ".dynsym");
4039 if (s != NULL)
4040 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4041 break;
dbb410c3
AM
4042
4043 case SHT_GROUP:
12bd6957 4044 d->this_hdr.sh_link = elf_onesymtab (abfd);
252b5132
RH
4045 }
4046 }
4047
3e19fb8f
L
4048 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
4049 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
4050 debug section name from .debug_* to .zdebug_* if needed. */
4051
b34976b6 4052 return TRUE;
252b5132
RH
4053}
4054
5372391b 4055static bfd_boolean
217aa764 4056sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
4057{
4058 /* If the backend has a special mapping, use it. */
9c5bfbb7 4059 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
4060 if (bed->elf_backend_sym_is_global)
4061 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 4062
e47bf690 4063 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
e6f7f6d1
AM
4064 || bfd_is_und_section (bfd_asymbol_section (sym))
4065 || bfd_is_com_section (bfd_asymbol_section (sym)));
252b5132
RH
4066}
4067
76359541
TP
4068/* Filter global symbols of ABFD to include in the import library. All
4069 SYMCOUNT symbols of ABFD can be examined from their pointers in
4070 SYMS. Pointers of symbols to keep should be stored contiguously at
4071 the beginning of that array.
4072
4073 Returns the number of symbols to keep. */
4074
4075unsigned int
4076_bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
4077 asymbol **syms, long symcount)
4078{
4079 long src_count, dst_count = 0;
4080
4081 for (src_count = 0; src_count < symcount; src_count++)
4082 {
4083 asymbol *sym = syms[src_count];
4084 char *name = (char *) bfd_asymbol_name (sym);
4085 struct bfd_link_hash_entry *h;
4086
4087 if (!sym_is_global (abfd, sym))
4088 continue;
4089
4090 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, FALSE);
5df1bc57
AM
4091 if (h == NULL)
4092 continue;
76359541
TP
4093 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
4094 continue;
76359541
TP
4095 if (h->linker_def || h->ldscript_def)
4096 continue;
4097
4098 syms[dst_count++] = sym;
4099 }
4100
4101 syms[dst_count] = NULL;
4102
4103 return dst_count;
4104}
4105
5372391b 4106/* Don't output section symbols for sections that are not going to be
c6d8cab4 4107 output, that are duplicates or there is no BFD section. */
5372391b
AM
4108
4109static bfd_boolean
4110ignore_section_sym (bfd *abfd, asymbol *sym)
4111{
c6d8cab4
L
4112 elf_symbol_type *type_ptr;
4113
db0c309f
NC
4114 if (sym == NULL)
4115 return FALSE;
4116
c6d8cab4
L
4117 if ((sym->flags & BSF_SECTION_SYM) == 0)
4118 return FALSE;
4119
db0c309f
NC
4120 if (sym->section == NULL)
4121 return TRUE;
4122
c6d8cab4
L
4123 type_ptr = elf_symbol_from (abfd, sym);
4124 return ((type_ptr != NULL
4125 && type_ptr->internal_elf_sym.st_shndx != 0
4126 && bfd_is_abs_section (sym->section))
4127 || !(sym->section->owner == abfd
db0c309f
NC
4128 || (sym->section->output_section != NULL
4129 && sym->section->output_section->owner == abfd
2633a79c
AM
4130 && sym->section->output_offset == 0)
4131 || bfd_is_abs_section (sym->section)));
5372391b
AM
4132}
4133
2633a79c
AM
4134/* Map symbol from it's internal number to the external number, moving
4135 all local symbols to be at the head of the list. */
4136
b34976b6 4137static bfd_boolean
12bd6957 4138elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
252b5132 4139{
dc810e39 4140 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
4141 asymbol **syms = bfd_get_outsymbols (abfd);
4142 asymbol **sect_syms;
dc810e39
AM
4143 unsigned int num_locals = 0;
4144 unsigned int num_globals = 0;
4145 unsigned int num_locals2 = 0;
4146 unsigned int num_globals2 = 0;
7292b3ac 4147 unsigned int max_index = 0;
dc810e39 4148 unsigned int idx;
252b5132
RH
4149 asection *asect;
4150 asymbol **new_syms;
252b5132
RH
4151
4152#ifdef DEBUG
4153 fprintf (stderr, "elf_map_symbols\n");
4154 fflush (stderr);
4155#endif
4156
252b5132
RH
4157 for (asect = abfd->sections; asect; asect = asect->next)
4158 {
4159 if (max_index < asect->index)
4160 max_index = asect->index;
4161 }
4162
4163 max_index++;
a50b1753 4164 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 4165 if (sect_syms == NULL)
b34976b6 4166 return FALSE;
252b5132 4167 elf_section_syms (abfd) = sect_syms;
4e89ac30 4168 elf_num_section_syms (abfd) = max_index;
252b5132 4169
079e9a2f
AM
4170 /* Init sect_syms entries for any section symbols we have already
4171 decided to output. */
252b5132
RH
4172 for (idx = 0; idx < symcount; idx++)
4173 {
dc810e39 4174 asymbol *sym = syms[idx];
c044fabd 4175
252b5132 4176 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 4177 && sym->value == 0
2633a79c
AM
4178 && !ignore_section_sym (abfd, sym)
4179 && !bfd_is_abs_section (sym->section))
252b5132 4180 {
5372391b 4181 asection *sec = sym->section;
252b5132 4182
5372391b
AM
4183 if (sec->owner != abfd)
4184 sec = sec->output_section;
252b5132 4185
5372391b 4186 sect_syms[sec->index] = syms[idx];
252b5132
RH
4187 }
4188 }
4189
252b5132
RH
4190 /* Classify all of the symbols. */
4191 for (idx = 0; idx < symcount; idx++)
4192 {
2633a79c 4193 if (sym_is_global (abfd, syms[idx]))
252b5132 4194 num_globals++;
2633a79c
AM
4195 else if (!ignore_section_sym (abfd, syms[idx]))
4196 num_locals++;
252b5132 4197 }
079e9a2f 4198
5372391b 4199 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
4200 sections will already have a section symbol in outsymbols, but
4201 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4202 at least in that case. */
252b5132
RH
4203 for (asect = abfd->sections; asect; asect = asect->next)
4204 {
079e9a2f 4205 if (sect_syms[asect->index] == NULL)
252b5132 4206 {
079e9a2f 4207 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
4208 num_locals++;
4209 else
4210 num_globals++;
252b5132
RH
4211 }
4212 }
4213
4214 /* Now sort the symbols so the local symbols are first. */
a50b1753 4215 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
07d6d2b8 4216 sizeof (asymbol *));
dc810e39 4217
252b5132 4218 if (new_syms == NULL)
b34976b6 4219 return FALSE;
252b5132
RH
4220
4221 for (idx = 0; idx < symcount; idx++)
4222 {
4223 asymbol *sym = syms[idx];
dc810e39 4224 unsigned int i;
252b5132 4225
2633a79c
AM
4226 if (sym_is_global (abfd, sym))
4227 i = num_locals + num_globals2++;
4228 else if (!ignore_section_sym (abfd, sym))
252b5132
RH
4229 i = num_locals2++;
4230 else
2633a79c 4231 continue;
252b5132
RH
4232 new_syms[i] = sym;
4233 sym->udata.i = i + 1;
4234 }
4235 for (asect = abfd->sections; asect; asect = asect->next)
4236 {
079e9a2f 4237 if (sect_syms[asect->index] == NULL)
252b5132 4238 {
079e9a2f 4239 asymbol *sym = asect->symbol;
dc810e39 4240 unsigned int i;
252b5132 4241
079e9a2f 4242 sect_syms[asect->index] = sym;
252b5132
RH
4243 if (!sym_is_global (abfd, sym))
4244 i = num_locals2++;
4245 else
4246 i = num_locals + num_globals2++;
4247 new_syms[i] = sym;
4248 sym->udata.i = i + 1;
4249 }
4250 }
4251
4252 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4253
12bd6957 4254 *pnum_locals = num_locals;
b34976b6 4255 return TRUE;
252b5132
RH
4256}
4257
4258/* Align to the maximum file alignment that could be required for any
4259 ELF data structure. */
4260
268b6b39 4261static inline file_ptr
217aa764 4262align_file_position (file_ptr off, int align)
252b5132
RH
4263{
4264 return (off + align - 1) & ~(align - 1);
4265}
4266
4267/* Assign a file position to a section, optionally aligning to the
4268 required section alignment. */
4269
217aa764
AM
4270file_ptr
4271_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4272 file_ptr offset,
4273 bfd_boolean align)
252b5132 4274{
72de5009
AM
4275 if (align && i_shdrp->sh_addralign > 1)
4276 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
4277 i_shdrp->sh_offset = offset;
4278 if (i_shdrp->bfd_section != NULL)
4279 i_shdrp->bfd_section->filepos = offset;
4280 if (i_shdrp->sh_type != SHT_NOBITS)
4281 offset += i_shdrp->sh_size;
4282 return offset;
4283}
4284
4285/* Compute the file positions we are going to put the sections at, and
4286 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4287 is not NULL, this is being called by the ELF backend linker. */
4288
b34976b6 4289bfd_boolean
217aa764
AM
4290_bfd_elf_compute_section_file_positions (bfd *abfd,
4291 struct bfd_link_info *link_info)
252b5132 4292{
9c5bfbb7 4293 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 4294 struct fake_section_arg fsargs;
b34976b6 4295 bfd_boolean failed;
ef10c3ac 4296 struct elf_strtab_hash *strtab = NULL;
252b5132 4297 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 4298 bfd_boolean need_symtab;
252b5132
RH
4299
4300 if (abfd->output_has_begun)
b34976b6 4301 return TRUE;
252b5132
RH
4302
4303 /* Do any elf backend specific processing first. */
4304 if (bed->elf_backend_begin_write_processing)
4305 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4306
ed7e9d0b 4307 if (!(*bed->elf_backend_init_file_header) (abfd, link_info))
b34976b6 4308 return FALSE;
252b5132 4309
d4730f92
BS
4310 fsargs.failed = FALSE;
4311 fsargs.link_info = link_info;
4312 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4313 if (fsargs.failed)
b34976b6 4314 return FALSE;
252b5132 4315
da9f89d4 4316 if (!assign_section_numbers (abfd, link_info))
b34976b6 4317 return FALSE;
252b5132
RH
4318
4319 /* The backend linker builds symbol table information itself. */
3516e984
L
4320 need_symtab = (link_info == NULL
4321 && (bfd_get_symcount (abfd) > 0
4322 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4323 == HAS_RELOC)));
4324 if (need_symtab)
252b5132
RH
4325 {
4326 /* Non-zero if doing a relocatable link. */
4327 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4328
4329 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 4330 return FALSE;
252b5132
RH
4331 }
4332
d4730f92 4333 failed = FALSE;
1126897b 4334 if (link_info == NULL)
dbb410c3 4335 {
1126897b 4336 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 4337 if (failed)
b34976b6 4338 return FALSE;
dbb410c3
AM
4339 }
4340
252b5132 4341 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
ed7e9d0b 4342 /* sh_name was set in init_file_header. */
252b5132 4343 shstrtab_hdr->sh_type = SHT_STRTAB;
84865015 4344 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
252b5132 4345 shstrtab_hdr->sh_addr = 0;
946748d5 4346 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4347 shstrtab_hdr->sh_entsize = 0;
4348 shstrtab_hdr->sh_link = 0;
4349 shstrtab_hdr->sh_info = 0;
3e19fb8f 4350 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4351 shstrtab_hdr->sh_addralign = 1;
4352
c84fca4d 4353 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 4354 return FALSE;
252b5132 4355
3516e984 4356 if (need_symtab)
252b5132
RH
4357 {
4358 file_ptr off;
4359 Elf_Internal_Shdr *hdr;
4360
12bd6957 4361 off = elf_next_file_pos (abfd);
252b5132 4362
6a40cf0c 4363 hdr = & elf_symtab_hdr (abfd);
b34976b6 4364 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4365
6a40cf0c
NC
4366 if (elf_symtab_shndx_list (abfd) != NULL)
4367 {
4368 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4369 if (hdr->sh_size != 0)
4370 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4371 /* FIXME: What about other symtab_shndx sections in the list ? */
4372 }
9ad5cbcf 4373
252b5132 4374 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 4375 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4376
12bd6957 4377 elf_next_file_pos (abfd) = off;
252b5132
RH
4378
4379 /* Now that we know where the .strtab section goes, write it
08a40648 4380 out. */
252b5132 4381 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
ef10c3ac 4382 || ! _bfd_elf_strtab_emit (abfd, strtab))
b34976b6 4383 return FALSE;
ef10c3ac 4384 _bfd_elf_strtab_free (strtab);
252b5132
RH
4385 }
4386
b34976b6 4387 abfd->output_has_begun = TRUE;
252b5132 4388
b34976b6 4389 return TRUE;
252b5132
RH
4390}
4391
8ded5a0f
AM
4392/* Make an initial estimate of the size of the program header. If we
4393 get the number wrong here, we'll redo section placement. */
4394
4395static bfd_size_type
4396get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4397{
4398 size_t segs;
4399 asection *s;
2b05f1b7 4400 const struct elf_backend_data *bed;
8ded5a0f
AM
4401
4402 /* Assume we will need exactly two PT_LOAD segments: one for text
4403 and one for data. */
4404 segs = 2;
4405
4406 s = bfd_get_section_by_name (abfd, ".interp");
1b9e270b 4407 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
8ded5a0f
AM
4408 {
4409 /* If we have a loadable interpreter section, we need a
4410 PT_INTERP segment. In this case, assume we also need a
4411 PT_PHDR segment, although that may not be true for all
4412 targets. */
e9a38e0f 4413 segs += 2;
8ded5a0f
AM
4414 }
4415
4416 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4417 {
4418 /* We need a PT_DYNAMIC segment. */
4419 ++segs;
f210dcff 4420 }
08a40648 4421
ceae84aa 4422 if (info != NULL && info->relro)
f210dcff
L
4423 {
4424 /* We need a PT_GNU_RELRO segment. */
4425 ++segs;
8ded5a0f
AM
4426 }
4427
12bd6957 4428 if (elf_eh_frame_hdr (abfd))
8ded5a0f
AM
4429 {
4430 /* We need a PT_GNU_EH_FRAME segment. */
4431 ++segs;
4432 }
4433
12bd6957 4434 if (elf_stack_flags (abfd))
8ded5a0f 4435 {
2b05f1b7
L
4436 /* We need a PT_GNU_STACK segment. */
4437 ++segs;
4438 }
94b11780 4439
0a59decb
L
4440 s = bfd_get_section_by_name (abfd,
4441 NOTE_GNU_PROPERTY_SECTION_NAME);
4442 if (s != NULL && s->size != 0)
4443 {
4444 /* We need a PT_GNU_PROPERTY segment. */
4445 ++segs;
4446 }
4447
2b05f1b7
L
4448 for (s = abfd->sections; s != NULL; s = s->next)
4449 {
8ded5a0f 4450 if ((s->flags & SEC_LOAD) != 0
23e463ed 4451 && elf_section_type (s) == SHT_NOTE)
8ded5a0f 4452 {
23e463ed 4453 unsigned int alignment_power;
8ded5a0f
AM
4454 /* We need a PT_NOTE segment. */
4455 ++segs;
23e463ed
L
4456 /* Try to create just one PT_NOTE segment for all adjacent
4457 loadable SHT_NOTE sections. gABI requires that within a
4458 PT_NOTE segment (and also inside of each SHT_NOTE section)
4459 each note should have the same alignment. So we check
4460 whether the sections are correctly aligned. */
4461 alignment_power = s->alignment_power;
4462 while (s->next != NULL
4463 && s->next->alignment_power == alignment_power
4464 && (s->next->flags & SEC_LOAD) != 0
4465 && elf_section_type (s->next) == SHT_NOTE)
4466 s = s->next;
8ded5a0f
AM
4467 }
4468 }
4469
4470 for (s = abfd->sections; s != NULL; s = s->next)
4471 {
4472 if (s->flags & SEC_THREAD_LOCAL)
4473 {
4474 /* We need a PT_TLS segment. */
4475 ++segs;
4476 break;
4477 }
4478 }
4479
2b05f1b7 4480 bed = get_elf_backend_data (abfd);
a91e1603 4481
df3a023b
AM
4482 if ((abfd->flags & D_PAGED) != 0
4483 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
4484 {
4485 /* Add a PT_GNU_MBIND segment for each mbind section. */
4486 unsigned int page_align_power = bfd_log2 (bed->commonpagesize);
4487 for (s = abfd->sections; s != NULL; s = s->next)
4488 if (elf_section_flags (s) & SHF_GNU_MBIND)
4489 {
4490 if (elf_section_data (s)->this_hdr.sh_info > PT_GNU_MBIND_NUM)
4491 {
4492 _bfd_error_handler
4493 /* xgettext:c-format */
4494 (_("%pB: GNU_MBIND section `%pA' has invalid "
4495 "sh_info field: %d"),
4496 abfd, s, elf_section_data (s)->this_hdr.sh_info);
4497 continue;
4498 }
4499 /* Align mbind section to page size. */
4500 if (s->alignment_power < page_align_power)
4501 s->alignment_power = page_align_power;
4502 segs ++;
4503 }
4504 }
4505
4506 /* Let the backend count up any program headers it might need. */
4507 if (bed->elf_backend_additional_program_headers)
8ded5a0f
AM
4508 {
4509 int a;
4510
4511 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4512 if (a == -1)
4513 abort ();
4514 segs += a;
4515 }
4516
4517 return segs * bed->s->sizeof_phdr;
4518}
4519
2ea37f1c
NC
4520/* Find the segment that contains the output_section of section. */
4521
4522Elf_Internal_Phdr *
4523_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4524{
4525 struct elf_segment_map *m;
4526 Elf_Internal_Phdr *p;
4527
12bd6957 4528 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
2ea37f1c
NC
4529 m != NULL;
4530 m = m->next, p++)
4531 {
4532 int i;
4533
4534 for (i = m->count - 1; i >= 0; i--)
4535 if (m->sections[i] == section)
4536 return p;
4537 }
4538
4539 return NULL;
4540}
4541
252b5132
RH
4542/* Create a mapping from a set of sections to a program segment. */
4543
217aa764
AM
4544static struct elf_segment_map *
4545make_mapping (bfd *abfd,
4546 asection **sections,
4547 unsigned int from,
4548 unsigned int to,
4549 bfd_boolean phdr)
252b5132
RH
4550{
4551 struct elf_segment_map *m;
4552 unsigned int i;
4553 asection **hdrpp;
dc810e39 4554 bfd_size_type amt;
252b5132 4555
00bee008
AM
4556 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
4557 amt += (to - from) * sizeof (asection *);
a50b1753 4558 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4559 if (m == NULL)
4560 return NULL;
4561 m->next = NULL;
4562 m->p_type = PT_LOAD;
4563 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4564 m->sections[i - from] = *hdrpp;
4565 m->count = to - from;
4566
4567 if (from == 0 && phdr)
4568 {
4569 /* Include the headers in the first PT_LOAD segment. */
4570 m->includes_filehdr = 1;
4571 m->includes_phdrs = 1;
4572 }
4573
4574 return m;
4575}
4576
229fcec5
MM
4577/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4578 on failure. */
4579
4580struct elf_segment_map *
4581_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4582{
4583 struct elf_segment_map *m;
4584
a50b1753 4585 m = (struct elf_segment_map *) bfd_zalloc (abfd,
07d6d2b8 4586 sizeof (struct elf_segment_map));
229fcec5
MM
4587 if (m == NULL)
4588 return NULL;
4589 m->next = NULL;
4590 m->p_type = PT_DYNAMIC;
4591 m->count = 1;
4592 m->sections[0] = dynsec;
08a40648 4593
229fcec5
MM
4594 return m;
4595}
4596
8ded5a0f 4597/* Possibly add or remove segments from the segment map. */
252b5132 4598
b34976b6 4599static bfd_boolean
3dea8fca
AM
4600elf_modify_segment_map (bfd *abfd,
4601 struct bfd_link_info *info,
4602 bfd_boolean remove_empty_load)
252b5132 4603{
252e386e 4604 struct elf_segment_map **m;
8ded5a0f 4605 const struct elf_backend_data *bed;
252b5132 4606
8ded5a0f
AM
4607 /* The placement algorithm assumes that non allocated sections are
4608 not in PT_LOAD segments. We ensure this here by removing such
4609 sections from the segment map. We also remove excluded
252e386e
AM
4610 sections. Finally, any PT_LOAD segment without sections is
4611 removed. */
12bd6957 4612 m = &elf_seg_map (abfd);
252e386e 4613 while (*m)
8ded5a0f
AM
4614 {
4615 unsigned int i, new_count;
252b5132 4616
252e386e 4617 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 4618 {
252e386e
AM
4619 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4620 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4621 || (*m)->p_type != PT_LOAD))
8ded5a0f 4622 {
252e386e
AM
4623 (*m)->sections[new_count] = (*m)->sections[i];
4624 new_count++;
8ded5a0f
AM
4625 }
4626 }
252e386e 4627 (*m)->count = new_count;
252b5132 4628
1a9ccd70
NC
4629 if (remove_empty_load
4630 && (*m)->p_type == PT_LOAD
4631 && (*m)->count == 0
4632 && !(*m)->includes_phdrs)
252e386e
AM
4633 *m = (*m)->next;
4634 else
4635 m = &(*m)->next;
8ded5a0f 4636 }
252b5132 4637
8ded5a0f
AM
4638 bed = get_elf_backend_data (abfd);
4639 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 4640 {
252e386e 4641 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 4642 return FALSE;
252b5132 4643 }
252b5132 4644
8ded5a0f
AM
4645 return TRUE;
4646}
252b5132 4647
dbc88fc1
AM
4648#define IS_TBSS(s) \
4649 ((s->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) == SEC_THREAD_LOCAL)
4650
8ded5a0f 4651/* Set up a mapping from BFD sections to program segments. */
252b5132 4652
8ded5a0f
AM
4653bfd_boolean
4654_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4655{
4656 unsigned int count;
4657 struct elf_segment_map *m;
4658 asection **sections = NULL;
4659 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 4660 bfd_boolean no_user_phdrs;
252b5132 4661
12bd6957 4662 no_user_phdrs = elf_seg_map (abfd) == NULL;
d324f6d6
RM
4663
4664 if (info != NULL)
4665 info->user_phdrs = !no_user_phdrs;
4666
3dea8fca 4667 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 4668 {
8ded5a0f
AM
4669 asection *s;
4670 unsigned int i;
4671 struct elf_segment_map *mfirst;
4672 struct elf_segment_map **pm;
4673 asection *last_hdr;
4674 bfd_vma last_size;
00bee008 4675 unsigned int hdr_index;
8ded5a0f
AM
4676 bfd_vma maxpagesize;
4677 asection **hdrpp;
64029e93 4678 bfd_boolean phdr_in_segment;
8ded5a0f 4679 bfd_boolean writable;
2888249f 4680 bfd_boolean executable;
8ded5a0f
AM
4681 int tls_count = 0;
4682 asection *first_tls = NULL;
a91e1603 4683 asection *first_mbind = NULL;
8ded5a0f
AM
4684 asection *dynsec, *eh_frame_hdr;
4685 bfd_size_type amt;
8d06853e 4686 bfd_vma addr_mask, wrap_to = 0;
64029e93 4687 bfd_size_type phdr_size;
252b5132 4688
8ded5a0f 4689 /* Select the allocated sections, and sort them. */
252b5132 4690
a50b1753 4691 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
07d6d2b8 4692 sizeof (asection *));
8ded5a0f 4693 if (sections == NULL)
252b5132 4694 goto error_return;
252b5132 4695
8d06853e
AM
4696 /* Calculate top address, avoiding undefined behaviour of shift
4697 left operator when shift count is equal to size of type
4698 being shifted. */
4699 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4700 addr_mask = (addr_mask << 1) + 1;
4701
8ded5a0f
AM
4702 i = 0;
4703 for (s = abfd->sections; s != NULL; s = s->next)
4704 {
4705 if ((s->flags & SEC_ALLOC) != 0)
4706 {
48db3297
AM
4707 /* target_index is unused until bfd_elf_final_link
4708 starts output of section symbols. Use it to make
4709 qsort stable. */
4710 s->target_index = i;
8ded5a0f
AM
4711 sections[i] = s;
4712 ++i;
8d06853e
AM
4713 /* A wrapping section potentially clashes with header. */
4714 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
4715 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
4716 }
4717 }
4718 BFD_ASSERT (i <= bfd_count_sections (abfd));
4719 count = i;
252b5132 4720
8ded5a0f 4721 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 4722
64029e93
AM
4723 phdr_size = elf_program_header_size (abfd);
4724 if (phdr_size == (bfd_size_type) -1)
4725 phdr_size = get_program_header_size (abfd, info);
4726 phdr_size += bed->s->sizeof_ehdr;
4727 maxpagesize = bed->maxpagesize;
4728 if (maxpagesize == 0)
4729 maxpagesize = 1;
4730 phdr_in_segment = info != NULL && info->load_phdrs;
4731 if (count != 0
4732 && (((sections[0]->lma & addr_mask) & (maxpagesize - 1))
4733 >= (phdr_size & (maxpagesize - 1))))
4734 /* For compatibility with old scripts that may not be using
4735 SIZEOF_HEADERS, add headers when it looks like space has
4736 been left for them. */
4737 phdr_in_segment = TRUE;
252b5132 4738
64029e93 4739 /* Build the mapping. */
8ded5a0f
AM
4740 mfirst = NULL;
4741 pm = &mfirst;
252b5132 4742
8ded5a0f
AM
4743 /* If we have a .interp section, then create a PT_PHDR segment for
4744 the program headers and a PT_INTERP segment for the .interp
4745 section. */
4746 s = bfd_get_section_by_name (abfd, ".interp");
1b9e270b 4747 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
8ded5a0f
AM
4748 {
4749 amt = sizeof (struct elf_segment_map);
a50b1753 4750 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4751 if (m == NULL)
4752 goto error_return;
4753 m->next = NULL;
4754 m->p_type = PT_PHDR;
f882209d 4755 m->p_flags = PF_R;
8ded5a0f
AM
4756 m->p_flags_valid = 1;
4757 m->includes_phdrs = 1;
64029e93 4758 phdr_in_segment = TRUE;
8ded5a0f
AM
4759 *pm = m;
4760 pm = &m->next;
252b5132 4761
8ded5a0f 4762 amt = sizeof (struct elf_segment_map);
a50b1753 4763 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4764 if (m == NULL)
4765 goto error_return;
4766 m->next = NULL;
4767 m->p_type = PT_INTERP;
4768 m->count = 1;
4769 m->sections[0] = s;
4770
4771 *pm = m;
4772 pm = &m->next;
252b5132 4773 }
8ded5a0f
AM
4774
4775 /* Look through the sections. We put sections in the same program
4776 segment when the start of the second section can be placed within
4777 a few bytes of the end of the first section. */
4778 last_hdr = NULL;
4779 last_size = 0;
00bee008 4780 hdr_index = 0;
8ded5a0f 4781 writable = FALSE;
2888249f 4782 executable = FALSE;
8ded5a0f
AM
4783 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4784 if (dynsec != NULL
4785 && (dynsec->flags & SEC_LOAD) == 0)
4786 dynsec = NULL;
4787
64029e93
AM
4788 if ((abfd->flags & D_PAGED) == 0)
4789 phdr_in_segment = FALSE;
4790
8ded5a0f
AM
4791 /* Deal with -Ttext or something similar such that the first section
4792 is not adjacent to the program headers. This is an
4793 approximation, since at this point we don't know exactly how many
4794 program headers we will need. */
64029e93 4795 if (phdr_in_segment && count > 0)
252b5132 4796 {
64029e93
AM
4797 bfd_vma phdr_lma;
4798 bfd_boolean separate_phdr = FALSE;
4799
4800 phdr_lma = (sections[0]->lma - phdr_size) & addr_mask & -maxpagesize;
4801 if (info != NULL
4802 && info->separate_code
4803 && (sections[0]->flags & SEC_CODE) != 0)
1a9ccd70 4804 {
64029e93
AM
4805 /* If data sections should be separate from code and
4806 thus not executable, and the first section is
4807 executable then put the file and program headers in
4808 their own PT_LOAD. */
4809 separate_phdr = TRUE;
4810 if ((((phdr_lma + phdr_size - 1) & addr_mask & -maxpagesize)
4811 == (sections[0]->lma & addr_mask & -maxpagesize)))
4812 {
4813 /* The file and program headers are currently on the
4814 same page as the first section. Put them on the
4815 previous page if we can. */
4816 if (phdr_lma >= maxpagesize)
4817 phdr_lma -= maxpagesize;
4818 else
4819 separate_phdr = FALSE;
4820 }
4821 }
4822 if ((sections[0]->lma & addr_mask) < phdr_lma
4823 || (sections[0]->lma & addr_mask) < phdr_size)
4824 /* If file and program headers would be placed at the end
4825 of memory then it's probably better to omit them. */
4826 phdr_in_segment = FALSE;
4827 else if (phdr_lma < wrap_to)
4828 /* If a section wraps around to where we'll be placing
4829 file and program headers, then the headers will be
4830 overwritten. */
4831 phdr_in_segment = FALSE;
4832 else if (separate_phdr)
4833 {
4834 m = make_mapping (abfd, sections, 0, 0, phdr_in_segment);
4835 if (m == NULL)
4836 goto error_return;
4837 m->p_paddr = phdr_lma;
4838 m->p_vaddr_offset
4839 = (sections[0]->vma - phdr_size) & addr_mask & -maxpagesize;
4840 m->p_paddr_valid = 1;
4841 *pm = m;
4842 pm = &m->next;
4843 phdr_in_segment = FALSE;
1a9ccd70 4844 }
252b5132
RH
4845 }
4846
8ded5a0f 4847 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 4848 {
8ded5a0f
AM
4849 asection *hdr;
4850 bfd_boolean new_segment;
4851
4852 hdr = *hdrpp;
4853
4854 /* See if this section and the last one will fit in the same
4855 segment. */
4856
4857 if (last_hdr == NULL)
4858 {
4859 /* If we don't have a segment yet, then we don't need a new
4860 one (we build the last one after this loop). */
4861 new_segment = FALSE;
4862 }
4863 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4864 {
4865 /* If this section has a different relation between the
4866 virtual address and the load address, then we need a new
4867 segment. */
4868 new_segment = TRUE;
4869 }
b5599592
AM
4870 else if (hdr->lma < last_hdr->lma + last_size
4871 || last_hdr->lma + last_size < last_hdr->lma)
4872 {
4873 /* If this section has a load address that makes it overlap
4874 the previous section, then we need a new segment. */
4875 new_segment = TRUE;
4876 }
76cb3a89
AM
4877 else if ((abfd->flags & D_PAGED) != 0
4878 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4879 == (hdr->lma & -maxpagesize)))
4880 {
4881 /* If we are demand paged then we can't map two disk
4882 pages onto the same memory page. */
4883 new_segment = FALSE;
4884 }
39948a60
NC
4885 /* In the next test we have to be careful when last_hdr->lma is close
4886 to the end of the address space. If the aligned address wraps
4887 around to the start of the address space, then there are no more
4888 pages left in memory and it is OK to assume that the current
4889 section can be included in the current segment. */
76cb3a89
AM
4890 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4891 + maxpagesize > last_hdr->lma)
4892 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4893 + maxpagesize <= hdr->lma))
8ded5a0f
AM
4894 {
4895 /* If putting this section in this segment would force us to
4896 skip a page in the segment, then we need a new segment. */
4897 new_segment = TRUE;
4898 }
4899 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
76cb3a89 4900 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
8ded5a0f 4901 {
e5654c0f
AM
4902 /* We don't want to put a loaded section after a
4903 nonloaded (ie. bss style) section in the same segment
4904 as that will force the non-loaded section to be loaded.
76cb3a89 4905 Consider .tbss sections as loaded for this purpose. */
8ded5a0f
AM
4906 new_segment = TRUE;
4907 }
4908 else if ((abfd->flags & D_PAGED) == 0)
4909 {
4910 /* If the file is not demand paged, which means that we
4911 don't require the sections to be correctly aligned in the
4912 file, then there is no other reason for a new segment. */
4913 new_segment = FALSE;
4914 }
2888249f
L
4915 else if (info != NULL
4916 && info->separate_code
4917 && executable != ((hdr->flags & SEC_CODE) != 0))
4918 {
4919 new_segment = TRUE;
4920 }
8ded5a0f 4921 else if (! writable
76cb3a89 4922 && (hdr->flags & SEC_READONLY) == 0)
8ded5a0f
AM
4923 {
4924 /* We don't want to put a writable section in a read only
76cb3a89 4925 segment. */
8ded5a0f
AM
4926 new_segment = TRUE;
4927 }
4928 else
4929 {
4930 /* Otherwise, we can use the same segment. */
4931 new_segment = FALSE;
4932 }
4933
2889e75b 4934 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
4935 if (last_hdr != NULL
4936 && info != NULL
4937 && info->callbacks->override_segment_assignment != NULL)
4938 new_segment
4939 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4940 last_hdr,
4941 new_segment);
2889e75b 4942
8ded5a0f
AM
4943 if (! new_segment)
4944 {
4945 if ((hdr->flags & SEC_READONLY) == 0)
4946 writable = TRUE;
2888249f
L
4947 if ((hdr->flags & SEC_CODE) != 0)
4948 executable = TRUE;
8ded5a0f
AM
4949 last_hdr = hdr;
4950 /* .tbss sections effectively have zero size. */
dbc88fc1 4951 last_size = !IS_TBSS (hdr) ? hdr->size : 0;
8ded5a0f
AM
4952 continue;
4953 }
4954
4955 /* We need a new program segment. We must create a new program
00bee008 4956 header holding all the sections from hdr_index until hdr. */
8ded5a0f 4957
00bee008 4958 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
8ded5a0f
AM
4959 if (m == NULL)
4960 goto error_return;
4961
4962 *pm = m;
4963 pm = &m->next;
4964
252b5132 4965 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 4966 writable = TRUE;
8ded5a0f
AM
4967 else
4968 writable = FALSE;
4969
2888249f
L
4970 if ((hdr->flags & SEC_CODE) == 0)
4971 executable = FALSE;
4972 else
4973 executable = TRUE;
4974
baaff79e
JJ
4975 last_hdr = hdr;
4976 /* .tbss sections effectively have zero size. */
dbc88fc1 4977 last_size = !IS_TBSS (hdr) ? hdr->size : 0;
00bee008 4978 hdr_index = i;
8ded5a0f 4979 phdr_in_segment = FALSE;
252b5132
RH
4980 }
4981
86b2281f
AM
4982 /* Create a final PT_LOAD program segment, but not if it's just
4983 for .tbss. */
4984 if (last_hdr != NULL
00bee008 4985 && (i - hdr_index != 1
dbc88fc1 4986 || !IS_TBSS (last_hdr)))
8ded5a0f 4987 {
00bee008 4988 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
8ded5a0f
AM
4989 if (m == NULL)
4990 goto error_return;
252b5132 4991
8ded5a0f
AM
4992 *pm = m;
4993 pm = &m->next;
4994 }
252b5132 4995
8ded5a0f
AM
4996 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4997 if (dynsec != NULL)
4998 {
4999 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
5000 if (m == NULL)
5001 goto error_return;
5002 *pm = m;
5003 pm = &m->next;
5004 }
252b5132 5005
23e463ed 5006 /* For each batch of consecutive loadable SHT_NOTE sections,
1c5265b5
JJ
5007 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
5008 because if we link together nonloadable .note sections and
5009 loadable .note sections, we will generate two .note sections
23e463ed 5010 in the output file. */
8ded5a0f
AM
5011 for (s = abfd->sections; s != NULL; s = s->next)
5012 {
5013 if ((s->flags & SEC_LOAD) != 0
23e463ed 5014 && elf_section_type (s) == SHT_NOTE)
8ded5a0f 5015 {
1c5265b5 5016 asection *s2;
23e463ed 5017 unsigned int alignment_power = s->alignment_power;
91d6fa6a
NC
5018
5019 count = 1;
23e463ed
L
5020 for (s2 = s; s2->next != NULL; s2 = s2->next)
5021 {
5022 if (s2->next->alignment_power == alignment_power
5023 && (s2->next->flags & SEC_LOAD) != 0
5024 && elf_section_type (s2->next) == SHT_NOTE
5025 && align_power (s2->lma + s2->size,
5026 alignment_power)
5027 == s2->next->lma)
5028 count++;
5029 else
5030 break;
5031 }
00bee008
AM
5032 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5033 amt += count * sizeof (asection *);
a50b1753 5034 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
5035 if (m == NULL)
5036 goto error_return;
5037 m->next = NULL;
5038 m->p_type = PT_NOTE;
1c5265b5
JJ
5039 m->count = count;
5040 while (count > 1)
5041 {
5042 m->sections[m->count - count--] = s;
5043 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5044 s = s->next;
5045 }
5046 m->sections[m->count - 1] = s;
5047 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
5048 *pm = m;
5049 pm = &m->next;
5050 }
5051 if (s->flags & SEC_THREAD_LOCAL)
5052 {
5053 if (! tls_count)
5054 first_tls = s;
5055 tls_count++;
5056 }
a91e1603
L
5057 if (first_mbind == NULL
5058 && (elf_section_flags (s) & SHF_GNU_MBIND) != 0)
5059 first_mbind = s;
8ded5a0f 5060 }
252b5132 5061
8ded5a0f
AM
5062 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
5063 if (tls_count > 0)
5064 {
00bee008
AM
5065 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5066 amt += tls_count * sizeof (asection *);
a50b1753 5067 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
5068 if (m == NULL)
5069 goto error_return;
5070 m->next = NULL;
5071 m->p_type = PT_TLS;
5072 m->count = tls_count;
5073 /* Mandated PF_R. */
5074 m->p_flags = PF_R;
5075 m->p_flags_valid = 1;
d923cae0 5076 s = first_tls;
91d6fa6a 5077 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f 5078 {
d923cae0
L
5079 if ((s->flags & SEC_THREAD_LOCAL) == 0)
5080 {
5081 _bfd_error_handler
871b3ab2 5082 (_("%pB: TLS sections are not adjacent:"), abfd);
d923cae0
L
5083 s = first_tls;
5084 i = 0;
5085 while (i < (unsigned int) tls_count)
5086 {
5087 if ((s->flags & SEC_THREAD_LOCAL) != 0)
5088 {
871b3ab2 5089 _bfd_error_handler (_(" TLS: %pA"), s);
d923cae0
L
5090 i++;
5091 }
5092 else
871b3ab2 5093 _bfd_error_handler (_(" non-TLS: %pA"), s);
d923cae0
L
5094 s = s->next;
5095 }
5096 bfd_set_error (bfd_error_bad_value);
5097 goto error_return;
5098 }
5099 m->sections[i] = s;
5100 s = s->next;
8ded5a0f 5101 }
252b5132 5102
8ded5a0f
AM
5103 *pm = m;
5104 pm = &m->next;
5105 }
252b5132 5106
df3a023b
AM
5107 if (first_mbind
5108 && (abfd->flags & D_PAGED) != 0
5109 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
a91e1603
L
5110 for (s = first_mbind; s != NULL; s = s->next)
5111 if ((elf_section_flags (s) & SHF_GNU_MBIND) != 0
df3a023b 5112 && elf_section_data (s)->this_hdr.sh_info <= PT_GNU_MBIND_NUM)
a91e1603
L
5113 {
5114 /* Mandated PF_R. */
5115 unsigned long p_flags = PF_R;
5116 if ((s->flags & SEC_READONLY) == 0)
5117 p_flags |= PF_W;
5118 if ((s->flags & SEC_CODE) != 0)
5119 p_flags |= PF_X;
5120
5121 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5122 m = bfd_zalloc (abfd, amt);
5123 if (m == NULL)
5124 goto error_return;
5125 m->next = NULL;
5126 m->p_type = (PT_GNU_MBIND_LO
5127 + elf_section_data (s)->this_hdr.sh_info);
5128 m->count = 1;
5129 m->p_flags_valid = 1;
5130 m->sections[0] = s;
5131 m->p_flags = p_flags;
5132
5133 *pm = m;
5134 pm = &m->next;
5135 }
5136
0a59decb
L
5137 s = bfd_get_section_by_name (abfd,
5138 NOTE_GNU_PROPERTY_SECTION_NAME);
5139 if (s != NULL && s->size != 0)
5140 {
5141 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5142 m = bfd_zalloc (abfd, amt);
5143 if (m == NULL)
5144 goto error_return;
5145 m->next = NULL;
5146 m->p_type = PT_GNU_PROPERTY;
5147 m->count = 1;
5148 m->p_flags_valid = 1;
5149 m->sections[0] = s;
5150 m->p_flags = PF_R;
5151 *pm = m;
5152 pm = &m->next;
5153 }
5154
8ded5a0f
AM
5155 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
5156 segment. */
12bd6957 5157 eh_frame_hdr = elf_eh_frame_hdr (abfd);
8ded5a0f
AM
5158 if (eh_frame_hdr != NULL
5159 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 5160 {
dc810e39 5161 amt = sizeof (struct elf_segment_map);
a50b1753 5162 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
5163 if (m == NULL)
5164 goto error_return;
5165 m->next = NULL;
8ded5a0f 5166 m->p_type = PT_GNU_EH_FRAME;
252b5132 5167 m->count = 1;
8ded5a0f 5168 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
5169
5170 *pm = m;
5171 pm = &m->next;
5172 }
13ae64f3 5173
12bd6957 5174 if (elf_stack_flags (abfd))
13ae64f3 5175 {
8ded5a0f 5176 amt = sizeof (struct elf_segment_map);
a50b1753 5177 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
5178 if (m == NULL)
5179 goto error_return;
5180 m->next = NULL;
2b05f1b7 5181 m->p_type = PT_GNU_STACK;
12bd6957 5182 m->p_flags = elf_stack_flags (abfd);
04c3a755 5183 m->p_align = bed->stack_align;
8ded5a0f 5184 m->p_flags_valid = 1;
04c3a755
NS
5185 m->p_align_valid = m->p_align != 0;
5186 if (info->stacksize > 0)
5187 {
5188 m->p_size = info->stacksize;
5189 m->p_size_valid = 1;
5190 }
252b5132 5191
8ded5a0f
AM
5192 *pm = m;
5193 pm = &m->next;
5194 }
65765700 5195
ceae84aa 5196 if (info != NULL && info->relro)
8ded5a0f 5197 {
f210dcff
L
5198 for (m = mfirst; m != NULL; m = m->next)
5199 {
3832a4d8
AM
5200 if (m->p_type == PT_LOAD
5201 && m->count != 0
5202 && m->sections[0]->vma >= info->relro_start
5203 && m->sections[0]->vma < info->relro_end)
f210dcff 5204 {
3832a4d8
AM
5205 i = m->count;
5206 while (--i != (unsigned) -1)
5207 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
5208 == (SEC_LOAD | SEC_HAS_CONTENTS))
5209 break;
5210
43a8475c 5211 if (i != (unsigned) -1)
f210dcff
L
5212 break;
5213 }
be01b344 5214 }
f210dcff
L
5215
5216 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
5217 if (m != NULL)
5218 {
5219 amt = sizeof (struct elf_segment_map);
a50b1753 5220 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
5221 if (m == NULL)
5222 goto error_return;
5223 m->next = NULL;
5224 m->p_type = PT_GNU_RELRO;
f210dcff
L
5225 *pm = m;
5226 pm = &m->next;
5227 }
8ded5a0f 5228 }
9ee5e499 5229
8ded5a0f 5230 free (sections);
12bd6957 5231 elf_seg_map (abfd) = mfirst;
9ee5e499
JJ
5232 }
5233
3dea8fca 5234 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 5235 return FALSE;
8c37241b 5236
12bd6957 5237 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
8ded5a0f 5238 ++count;
12bd6957 5239 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
252b5132 5240
b34976b6 5241 return TRUE;
252b5132
RH
5242
5243 error_return:
5244 if (sections != NULL)
5245 free (sections);
b34976b6 5246 return FALSE;
252b5132
RH
5247}
5248
5249/* Sort sections by address. */
5250
5251static int
217aa764 5252elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
5253{
5254 const asection *sec1 = *(const asection **) arg1;
5255 const asection *sec2 = *(const asection **) arg2;
eecdbe52 5256 bfd_size_type size1, size2;
252b5132
RH
5257
5258 /* Sort by LMA first, since this is the address used to
5259 place the section into a segment. */
5260 if (sec1->lma < sec2->lma)
5261 return -1;
5262 else if (sec1->lma > sec2->lma)
5263 return 1;
5264
5265 /* Then sort by VMA. Normally the LMA and the VMA will be
5266 the same, and this will do nothing. */
5267 if (sec1->vma < sec2->vma)
5268 return -1;
5269 else if (sec1->vma > sec2->vma)
5270 return 1;
5271
5272 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
5273
07c6e936 5274#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
5275
5276 if (TOEND (sec1))
5277 {
48db3297 5278 if (!TOEND (sec2))
252b5132
RH
5279 return 1;
5280 }
00a7cdc5 5281 else if (TOEND (sec2))
252b5132
RH
5282 return -1;
5283
5284#undef TOEND
5285
00a7cdc5
NC
5286 /* Sort by size, to put zero sized sections
5287 before others at the same address. */
252b5132 5288
eea6121a
AM
5289 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
5290 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
5291
5292 if (size1 < size2)
252b5132 5293 return -1;
eecdbe52 5294 if (size1 > size2)
252b5132
RH
5295 return 1;
5296
5297 return sec1->target_index - sec2->target_index;
5298}
5299
30fe1832
AM
5300/* This qsort comparison functions sorts PT_LOAD segments first and
5301 by p_paddr, for assign_file_positions_for_load_sections. */
5302
5303static int
5304elf_sort_segments (const void *arg1, const void *arg2)
5305{
5306 const struct elf_segment_map *m1 = *(const struct elf_segment_map **) arg1;
5307 const struct elf_segment_map *m2 = *(const struct elf_segment_map **) arg2;
5308
5309 if (m1->p_type != m2->p_type)
5310 {
5311 if (m1->p_type == PT_NULL)
5312 return 1;
5313 if (m2->p_type == PT_NULL)
5314 return -1;
5315 return m1->p_type < m2->p_type ? -1 : 1;
5316 }
5317 if (m1->includes_filehdr != m2->includes_filehdr)
5318 return m1->includes_filehdr ? -1 : 1;
5319 if (m1->no_sort_lma != m2->no_sort_lma)
5320 return m1->no_sort_lma ? -1 : 1;
5321 if (m1->p_type == PT_LOAD && !m1->no_sort_lma)
5322 {
5323 bfd_vma lma1, lma2;
5324 lma1 = 0;
5325 if (m1->p_paddr_valid)
5326 lma1 = m1->p_paddr;
5327 else if (m1->count != 0)
5328 lma1 = m1->sections[0]->lma + m1->p_vaddr_offset;
5329 lma2 = 0;
5330 if (m2->p_paddr_valid)
5331 lma2 = m2->p_paddr;
5332 else if (m2->count != 0)
5333 lma2 = m2->sections[0]->lma + m2->p_vaddr_offset;
5334 if (lma1 != lma2)
5335 return lma1 < lma2 ? -1 : 1;
5336 }
5337 if (m1->idx != m2->idx)
5338 return m1->idx < m2->idx ? -1 : 1;
5339 return 0;
5340}
5341
340b6d91
AC
5342/* Ian Lance Taylor writes:
5343
5344 We shouldn't be using % with a negative signed number. That's just
5345 not good. We have to make sure either that the number is not
5346 negative, or that the number has an unsigned type. When the types
5347 are all the same size they wind up as unsigned. When file_ptr is a
5348 larger signed type, the arithmetic winds up as signed long long,
5349 which is wrong.
5350
5351 What we're trying to say here is something like ``increase OFF by
5352 the least amount that will cause it to be equal to the VMA modulo
5353 the page size.'' */
5354/* In other words, something like:
5355
5356 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5357 off_offset = off % bed->maxpagesize;
5358 if (vma_offset < off_offset)
5359 adjustment = vma_offset + bed->maxpagesize - off_offset;
5360 else
5361 adjustment = vma_offset - off_offset;
08a40648 5362
de194d85 5363 which can be collapsed into the expression below. */
340b6d91
AC
5364
5365static file_ptr
5366vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5367{
dc9155b2
NC
5368 /* PR binutils/16199: Handle an alignment of zero. */
5369 if (maxpagesize == 0)
5370 maxpagesize = 1;
340b6d91
AC
5371 return ((vma - off) % maxpagesize);
5372}
5373
6d33f217
L
5374static void
5375print_segment_map (const struct elf_segment_map *m)
5376{
5377 unsigned int j;
5378 const char *pt = get_segment_type (m->p_type);
5379 char buf[32];
5380
5381 if (pt == NULL)
5382 {
5383 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5384 sprintf (buf, "LOPROC+%7.7x",
5385 (unsigned int) (m->p_type - PT_LOPROC));
5386 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5387 sprintf (buf, "LOOS+%7.7x",
5388 (unsigned int) (m->p_type - PT_LOOS));
5389 else
5390 snprintf (buf, sizeof (buf), "%8.8x",
5391 (unsigned int) m->p_type);
5392 pt = buf;
5393 }
4a97a0e5 5394 fflush (stdout);
6d33f217
L
5395 fprintf (stderr, "%s:", pt);
5396 for (j = 0; j < m->count; j++)
5397 fprintf (stderr, " %s", m->sections [j]->name);
5398 putc ('\n',stderr);
4a97a0e5 5399 fflush (stderr);
6d33f217
L
5400}
5401
32812159
AM
5402static bfd_boolean
5403write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5404{
5405 void *buf;
5406 bfd_boolean ret;
5407
5408 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5409 return FALSE;
5410 buf = bfd_zmalloc (len);
5411 if (buf == NULL)
5412 return FALSE;
5413 ret = bfd_bwrite (buf, len, abfd) == len;
5414 free (buf);
5415 return ret;
5416}
5417
252b5132
RH
5418/* Assign file positions to the sections based on the mapping from
5419 sections to segments. This function also sets up some fields in
f3520d2f 5420 the file header. */
252b5132 5421
b34976b6 5422static bfd_boolean
f3520d2f
AM
5423assign_file_positions_for_load_sections (bfd *abfd,
5424 struct bfd_link_info *link_info)
252b5132
RH
5425{
5426 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5427 struct elf_segment_map *m;
30fe1832 5428 struct elf_segment_map *phdr_load_seg;
252b5132 5429 Elf_Internal_Phdr *phdrs;
252b5132 5430 Elf_Internal_Phdr *p;
02bf8d82 5431 file_ptr off;
3f570048 5432 bfd_size_type maxpagesize;
30fe1832 5433 unsigned int alloc, actual;
0920dee7 5434 unsigned int i, j;
30fe1832 5435 struct elf_segment_map **sorted_seg_map;
252b5132 5436
e36284ab 5437 if (link_info == NULL
ceae84aa 5438 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 5439 return FALSE;
252b5132 5440
8ded5a0f 5441 alloc = 0;
12bd6957 5442 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
30fe1832 5443 m->idx = alloc++;
252b5132 5444
82f2dbf7
NC
5445 if (alloc)
5446 {
5447 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5448 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5449 }
5450 else
5451 {
5452 /* PR binutils/12467. */
5453 elf_elfheader (abfd)->e_phoff = 0;
5454 elf_elfheader (abfd)->e_phentsize = 0;
5455 }
d324f6d6 5456
8ded5a0f 5457 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 5458
12bd6957 5459 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
30fe1832
AM
5460 {
5461 actual = alloc;
5462 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
5463 }
8ded5a0f 5464 else
30fe1832
AM
5465 {
5466 actual = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
5467 BFD_ASSERT (elf_program_header_size (abfd)
5468 == actual * bed->s->sizeof_phdr);
5469 BFD_ASSERT (actual >= alloc);
5470 }
252b5132
RH
5471
5472 if (alloc == 0)
f3520d2f 5473 {
12bd6957 5474 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
8ded5a0f 5475 return TRUE;
f3520d2f 5476 }
252b5132 5477
12bd6957 5478 /* We're writing the size in elf_program_header_size (abfd),
57268894
HPN
5479 see assign_file_positions_except_relocs, so make sure we have
5480 that amount allocated, with trailing space cleared.
12bd6957
AM
5481 The variable alloc contains the computed need, while
5482 elf_program_header_size (abfd) contains the size used for the
57268894
HPN
5483 layout.
5484 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5485 where the layout is forced to according to a larger size in the
5486 last iterations for the testcase ld-elf/header. */
30fe1832
AM
5487 phdrs = bfd_zalloc (abfd, (actual * sizeof (*phdrs)
5488 + alloc * sizeof (*sorted_seg_map)));
5489 sorted_seg_map = (struct elf_segment_map **) (phdrs + actual);
f3520d2f 5490 elf_tdata (abfd)->phdr = phdrs;
252b5132 5491 if (phdrs == NULL)
b34976b6 5492 return FALSE;
252b5132 5493
30fe1832 5494 for (m = elf_seg_map (abfd), j = 0; m != NULL; m = m->next, j++)
252b5132 5495 {
30fe1832 5496 sorted_seg_map[j] = m;
252b5132 5497 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 5498 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
5499 not be done to the PT_NOTE section of a corefile, which may
5500 contain several pseudo-sections artificially created by bfd.
5501 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
5502 if (m->count > 1
5503 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 5504 && m->p_type == PT_NOTE))
48db3297
AM
5505 {
5506 for (i = 0; i < m->count; i++)
5507 m->sections[i]->target_index = i;
5508 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5509 elf_sort_sections);
5510 }
30fe1832
AM
5511 }
5512 if (alloc > 1)
5513 qsort (sorted_seg_map, alloc, sizeof (*sorted_seg_map),
5514 elf_sort_segments);
5515
5516 maxpagesize = 1;
5517 if ((abfd->flags & D_PAGED) != 0)
5518 maxpagesize = bed->maxpagesize;
5519
5520 /* Sections must map to file offsets past the ELF file header. */
5521 off = bed->s->sizeof_ehdr;
5522 /* And if one of the PT_LOAD headers doesn't include the program
5523 headers then we'll be mapping program headers in the usual
5524 position after the ELF file header. */
5525 phdr_load_seg = NULL;
5526 for (j = 0; j < alloc; j++)
5527 {
5528 m = sorted_seg_map[j];
5529 if (m->p_type != PT_LOAD)
5530 break;
5531 if (m->includes_phdrs)
5532 {
5533 phdr_load_seg = m;
5534 break;
5535 }
5536 }
5537 if (phdr_load_seg == NULL)
5538 off += actual * bed->s->sizeof_phdr;
5539
5540 for (j = 0; j < alloc; j++)
5541 {
5542 asection **secpp;
5543 bfd_vma off_adjust;
5544 bfd_boolean no_contents;
252b5132 5545
b301b248
AM
5546 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5547 number of sections with contents contributing to both p_filesz
5548 and p_memsz, followed by a number of sections with no contents
5549 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 5550 available file offset for PT_LOAD and PT_NOTE segments. */
30fe1832
AM
5551 m = sorted_seg_map[j];
5552 p = phdrs + m->idx;
252b5132 5553 p->p_type = m->p_type;
28a7f3e7 5554 p->p_flags = m->p_flags;
252b5132 5555
3f570048 5556 if (m->count == 0)
5d695627 5557 p->p_vaddr = m->p_vaddr_offset;
3f570048 5558 else
5d695627 5559 p->p_vaddr = m->sections[0]->vma + m->p_vaddr_offset;
3f570048
AM
5560
5561 if (m->p_paddr_valid)
5562 p->p_paddr = m->p_paddr;
5563 else if (m->count == 0)
5564 p->p_paddr = 0;
5565 else
5d695627 5566 p->p_paddr = m->sections[0]->lma + m->p_vaddr_offset;
3f570048
AM
5567
5568 if (p->p_type == PT_LOAD
5569 && (abfd->flags & D_PAGED) != 0)
5570 {
5571 /* p_align in demand paged PT_LOAD segments effectively stores
5572 the maximum page size. When copying an executable with
5573 objcopy, we set m->p_align from the input file. Use this
5574 value for maxpagesize rather than bed->maxpagesize, which
5575 may be different. Note that we use maxpagesize for PT_TLS
5576 segment alignment later in this function, so we are relying
5577 on at least one PT_LOAD segment appearing before a PT_TLS
5578 segment. */
5579 if (m->p_align_valid)
5580 maxpagesize = m->p_align;
5581
5582 p->p_align = maxpagesize;
5583 }
3271a814
NS
5584 else if (m->p_align_valid)
5585 p->p_align = m->p_align;
e970b90a
DJ
5586 else if (m->count == 0)
5587 p->p_align = 1 << bed->s->log_file_align;
30fe1832
AM
5588
5589 if (m == phdr_load_seg)
5590 {
5591 if (!m->includes_filehdr)
5592 p->p_offset = off;
5593 off += actual * bed->s->sizeof_phdr;
5594 }
3f570048 5595
bf988460
AM
5596 no_contents = FALSE;
5597 off_adjust = 0;
252b5132 5598 if (p->p_type == PT_LOAD
b301b248 5599 && m->count > 0)
252b5132 5600 {
b301b248 5601 bfd_size_type align;
a49e53ed 5602 unsigned int align_power = 0;
b301b248 5603
3271a814
NS
5604 if (m->p_align_valid)
5605 align = p->p_align;
5606 else
252b5132 5607 {
3271a814
NS
5608 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5609 {
5610 unsigned int secalign;
08a40648 5611
fd361982 5612 secalign = bfd_section_alignment (*secpp);
3271a814
NS
5613 if (secalign > align_power)
5614 align_power = secalign;
5615 }
5616 align = (bfd_size_type) 1 << align_power;
5617 if (align < maxpagesize)
5618 align = maxpagesize;
b301b248 5619 }
252b5132 5620
02bf8d82
AM
5621 for (i = 0; i < m->count; i++)
5622 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5623 /* If we aren't making room for this section, then
5624 it must be SHT_NOBITS regardless of what we've
5625 set via struct bfd_elf_special_section. */
5626 elf_section_type (m->sections[i]) = SHT_NOBITS;
5627
bf988460 5628 /* Find out whether this segment contains any loadable
aea274d3
AM
5629 sections. */
5630 no_contents = TRUE;
5631 for (i = 0; i < m->count; i++)
5632 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5633 {
5634 no_contents = FALSE;
5635 break;
5636 }
bf988460 5637
85cfcbfb 5638 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
a8c75b76
AM
5639
5640 /* Broken hardware and/or kernel require that files do not
5641 map the same page with different permissions on some hppa
5642 processors. */
30fe1832
AM
5643 if (j != 0
5644 && (abfd->flags & D_PAGED) != 0
a8c75b76
AM
5645 && bed->no_page_alias
5646 && (off & (maxpagesize - 1)) != 0
5647 && (off & -maxpagesize) == ((off + off_adjust) & -maxpagesize))
5648 off_adjust += maxpagesize;
bf988460
AM
5649 off += off_adjust;
5650 if (no_contents)
5651 {
5652 /* We shouldn't need to align the segment on disk since
5653 the segment doesn't need file space, but the gABI
5654 arguably requires the alignment and glibc ld.so
5655 checks it. So to comply with the alignment
5656 requirement but not waste file space, we adjust
5657 p_offset for just this segment. (OFF_ADJUST is
5658 subtracted from OFF later.) This may put p_offset
5659 past the end of file, but that shouldn't matter. */
5660 }
5661 else
5662 off_adjust = 0;
252b5132 5663 }
b1a6d0b1
NC
5664 /* Make sure the .dynamic section is the first section in the
5665 PT_DYNAMIC segment. */
5666 else if (p->p_type == PT_DYNAMIC
5667 && m->count > 1
5668 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5669 {
5670 _bfd_error_handler
871b3ab2 5671 (_("%pB: The first section in the PT_DYNAMIC segment"
63a5468a 5672 " is not the .dynamic section"),
b301b248 5673 abfd);
b1a6d0b1
NC
5674 bfd_set_error (bfd_error_bad_value);
5675 return FALSE;
5676 }
3f001e84
JK
5677 /* Set the note section type to SHT_NOTE. */
5678 else if (p->p_type == PT_NOTE)
5679 for (i = 0; i < m->count; i++)
5680 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 5681
252b5132
RH
5682 if (m->includes_filehdr)
5683 {
bf988460 5684 if (!m->p_flags_valid)
252b5132 5685 p->p_flags |= PF_R;
252b5132
RH
5686 p->p_filesz = bed->s->sizeof_ehdr;
5687 p->p_memsz = bed->s->sizeof_ehdr;
30fe1832 5688 if (p->p_type == PT_LOAD)
252b5132 5689 {
30fe1832 5690 if (m->count > 0)
252b5132 5691 {
30fe1832
AM
5692 if (p->p_vaddr < (bfd_vma) off
5693 || (!m->p_paddr_valid
5694 && p->p_paddr < (bfd_vma) off))
5695 {
5696 _bfd_error_handler
5697 (_("%pB: not enough room for program headers,"
5698 " try linking with -N"),
5699 abfd);
5700 bfd_set_error (bfd_error_bad_value);
5701 return FALSE;
5702 }
5703 p->p_vaddr -= off;
5704 if (!m->p_paddr_valid)
5705 p->p_paddr -= off;
252b5132 5706 }
30fe1832
AM
5707 }
5708 else if (sorted_seg_map[0]->includes_filehdr)
5709 {
5710 Elf_Internal_Phdr *filehdr = phdrs + sorted_seg_map[0]->idx;
5711 p->p_vaddr = filehdr->p_vaddr;
bf988460 5712 if (!m->p_paddr_valid)
30fe1832 5713 p->p_paddr = filehdr->p_paddr;
252b5132 5714 }
252b5132
RH
5715 }
5716
5717 if (m->includes_phdrs)
5718 {
bf988460 5719 if (!m->p_flags_valid)
252b5132 5720 p->p_flags |= PF_R;
30fe1832
AM
5721 p->p_filesz += actual * bed->s->sizeof_phdr;
5722 p->p_memsz += actual * bed->s->sizeof_phdr;
f3520d2f 5723 if (!m->includes_filehdr)
252b5132 5724 {
30fe1832 5725 if (p->p_type == PT_LOAD)
252b5132 5726 {
30fe1832
AM
5727 elf_elfheader (abfd)->e_phoff = p->p_offset;
5728 if (m->count > 0)
5729 {
5730 p->p_vaddr -= off - p->p_offset;
5731 if (!m->p_paddr_valid)
5732 p->p_paddr -= off - p->p_offset;
5733 }
5734 }
5735 else if (phdr_load_seg != NULL)
5736 {
5737 Elf_Internal_Phdr *phdr = phdrs + phdr_load_seg->idx;
5738 bfd_vma phdr_off = 0;
5739 if (phdr_load_seg->includes_filehdr)
5740 phdr_off = bed->s->sizeof_ehdr;
5741 p->p_vaddr = phdr->p_vaddr + phdr_off;
bf988460 5742 if (!m->p_paddr_valid)
30fe1832
AM
5743 p->p_paddr = phdr->p_paddr + phdr_off;
5744 p->p_offset = phdr->p_offset + phdr_off;
252b5132 5745 }
30fe1832
AM
5746 else
5747 p->p_offset = bed->s->sizeof_ehdr;
2b0bc088 5748 }
252b5132
RH
5749 }
5750
5751 if (p->p_type == PT_LOAD
5752 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5753 {
bf988460 5754 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 5755 p->p_offset = off;
252b5132
RH
5756 else
5757 {
5758 file_ptr adjust;
5759
5760 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
5761 if (!no_contents)
5762 p->p_filesz += adjust;
252b5132
RH
5763 p->p_memsz += adjust;
5764 }
5765 }
5766
1ea63fd2
AM
5767 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5768 maps. Set filepos for sections in PT_LOAD segments, and in
5769 core files, for sections in PT_NOTE segments.
5770 assign_file_positions_for_non_load_sections will set filepos
5771 for other sections and update p_filesz for other segments. */
252b5132
RH
5772 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5773 {
5774 asection *sec;
252b5132 5775 bfd_size_type align;
627b32bc 5776 Elf_Internal_Shdr *this_hdr;
252b5132
RH
5777
5778 sec = *secpp;
02bf8d82 5779 this_hdr = &elf_section_data (sec)->this_hdr;
fd361982 5780 align = (bfd_size_type) 1 << bfd_section_alignment (sec);
252b5132 5781
88967714
AM
5782 if ((p->p_type == PT_LOAD
5783 || p->p_type == PT_TLS)
5784 && (this_hdr->sh_type != SHT_NOBITS
5785 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5786 && ((this_hdr->sh_flags & SHF_TLS) == 0
5787 || p->p_type == PT_TLS))))
252b5132 5788 {
b5599592
AM
5789 bfd_vma p_start = p->p_paddr;
5790 bfd_vma p_end = p_start + p->p_memsz;
5791 bfd_vma s_start = sec->lma;
5792 bfd_vma adjust = s_start - p_end;
252b5132 5793
a2d1e028
L
5794 if (adjust != 0
5795 && (s_start < p_end
5796 || p_end < p_start))
252b5132 5797 {
4eca0228 5798 _bfd_error_handler
695344c0 5799 /* xgettext:c-format */
2dcf00ce
AM
5800 (_("%pB: section %pA lma %#" PRIx64 " adjusted to %#" PRIx64),
5801 abfd, sec, (uint64_t) s_start, (uint64_t) p_end);
88967714 5802 adjust = 0;
b5599592 5803 sec->lma = p_end;
1cfb7d1e 5804 }
3ac9b6c9 5805 p->p_memsz += adjust;
1cfb7d1e 5806
88967714
AM
5807 if (this_hdr->sh_type != SHT_NOBITS)
5808 {
30fe1832 5809 if (p->p_type == PT_LOAD)
32812159 5810 {
30fe1832
AM
5811 if (p->p_filesz + adjust < p->p_memsz)
5812 {
5813 /* We have a PROGBITS section following NOBITS ones.
5814 Allocate file space for the NOBITS section(s) and
5815 zero it. */
5816 adjust = p->p_memsz - p->p_filesz;
5817 if (!write_zeros (abfd, off, adjust))
5818 return FALSE;
5819 }
5820 off += adjust;
32812159 5821 }
88967714 5822 p->p_filesz += adjust;
252b5132 5823 }
252b5132
RH
5824 }
5825
5826 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5827 {
b301b248
AM
5828 /* The section at i == 0 is the one that actually contains
5829 everything. */
4a938328
MS
5830 if (i == 0)
5831 {
627b32bc 5832 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
5833 off += this_hdr->sh_size;
5834 p->p_filesz = this_hdr->sh_size;
b301b248
AM
5835 p->p_memsz = 0;
5836 p->p_align = 1;
252b5132 5837 }
4a938328 5838 else
252b5132 5839 {
b301b248 5840 /* The rest are fake sections that shouldn't be written. */
252b5132 5841 sec->filepos = 0;
eea6121a 5842 sec->size = 0;
b301b248
AM
5843 sec->flags = 0;
5844 continue;
252b5132 5845 }
252b5132
RH
5846 }
5847 else
5848 {
1e951488 5849 if (p->p_type == PT_LOAD)
b301b248 5850 {
1e951488
AM
5851 this_hdr->sh_offset = sec->filepos = off;
5852 if (this_hdr->sh_type != SHT_NOBITS)
5853 off += this_hdr->sh_size;
5854 }
5855 else if (this_hdr->sh_type == SHT_NOBITS
5856 && (this_hdr->sh_flags & SHF_TLS) != 0
5857 && this_hdr->sh_offset == 0)
5858 {
5859 /* This is a .tbss section that didn't get a PT_LOAD.
5860 (See _bfd_elf_map_sections_to_segments "Create a
5861 final PT_LOAD".) Set sh_offset to the value it
5862 would have if we had created a zero p_filesz and
5863 p_memsz PT_LOAD header for the section. This
5864 also makes the PT_TLS header have the same
5865 p_offset value. */
5866 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5867 off, align);
5868 this_hdr->sh_offset = sec->filepos = off + adjust;
b301b248 5869 }
252b5132 5870
02bf8d82 5871 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 5872 {
6a3cd2b4 5873 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
5874 /* A load section without SHF_ALLOC is something like
5875 a note section in a PT_NOTE segment. These take
5876 file space but are not loaded into memory. */
5877 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 5878 p->p_memsz += this_hdr->sh_size;
b301b248 5879 }
6a3cd2b4 5880 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 5881 {
6a3cd2b4
AM
5882 if (p->p_type == PT_TLS)
5883 p->p_memsz += this_hdr->sh_size;
5884
5885 /* .tbss is special. It doesn't contribute to p_memsz of
5886 normal segments. */
5887 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5888 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
5889 }
5890
b10a8ae0
L
5891 if (align > p->p_align
5892 && !m->p_align_valid
5893 && (p->p_type != PT_LOAD
5894 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
5895 p->p_align = align;
5896 }
5897
bf988460 5898 if (!m->p_flags_valid)
252b5132
RH
5899 {
5900 p->p_flags |= PF_R;
02bf8d82 5901 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 5902 p->p_flags |= PF_X;
02bf8d82 5903 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
5904 p->p_flags |= PF_W;
5905 }
5906 }
43a8475c 5907
bf988460 5908 off -= off_adjust;
0920dee7 5909
30fe1832
AM
5910 /* PR ld/20815 - Check that the program header segment, if
5911 present, will be loaded into memory. */
5912 if (p->p_type == PT_PHDR
5913 && phdr_load_seg == NULL
5914 && !(bed->elf_backend_allow_non_load_phdr != NULL
5915 && bed->elf_backend_allow_non_load_phdr (abfd, phdrs, alloc)))
5916 {
5917 /* The fix for this error is usually to edit the linker script being
5918 used and set up the program headers manually. Either that or
5919 leave room for the headers at the start of the SECTIONS. */
5920 _bfd_error_handler (_("%pB: error: PHDR segment not covered"
5921 " by LOAD segment"),
5922 abfd);
5923 return FALSE;
5924 }
5925
7c928300
AM
5926 /* Check that all sections are in a PT_LOAD segment.
5927 Don't check funky gdb generated core files. */
5928 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
5929 {
5930 bfd_boolean check_vma = TRUE;
5931
5932 for (i = 1; i < m->count; i++)
5933 if (m->sections[i]->vma == m->sections[i - 1]->vma
5934 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5935 ->this_hdr), p) != 0
5936 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5937 ->this_hdr), p) != 0)
0920dee7 5938 {
9a83a553
AM
5939 /* Looks like we have overlays packed into the segment. */
5940 check_vma = FALSE;
5941 break;
0920dee7 5942 }
9a83a553
AM
5943
5944 for (i = 0; i < m->count; i++)
5945 {
5946 Elf_Internal_Shdr *this_hdr;
5947 asection *sec;
5948
5949 sec = m->sections[i];
5950 this_hdr = &(elf_section_data(sec)->this_hdr);
86b2281f
AM
5951 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5952 && !ELF_TBSS_SPECIAL (this_hdr, p))
9a83a553 5953 {
4eca0228 5954 _bfd_error_handler
695344c0 5955 /* xgettext:c-format */
871b3ab2 5956 (_("%pB: section `%pA' can't be allocated in segment %d"),
9a83a553
AM
5957 abfd, sec, j);
5958 print_segment_map (m);
5959 }
5960 }
5961 }
252b5132
RH
5962 }
5963
12bd6957 5964 elf_next_file_pos (abfd) = off;
30fe1832
AM
5965
5966 if (link_info != NULL
5967 && phdr_load_seg != NULL
5968 && phdr_load_seg->includes_filehdr)
5969 {
5970 /* There is a segment that contains both the file headers and the
5971 program headers, so provide a symbol __ehdr_start pointing there.
5972 A program can use this to examine itself robustly. */
5973
5974 struct elf_link_hash_entry *hash
5975 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5976 FALSE, FALSE, TRUE);
5977 /* If the symbol was referenced and not defined, define it. */
5978 if (hash != NULL
5979 && (hash->root.type == bfd_link_hash_new
5980 || hash->root.type == bfd_link_hash_undefined
5981 || hash->root.type == bfd_link_hash_undefweak
5982 || hash->root.type == bfd_link_hash_common))
5983 {
5984 asection *s = NULL;
5985 bfd_vma filehdr_vaddr = phdrs[phdr_load_seg->idx].p_vaddr;
5986
5987 if (phdr_load_seg->count != 0)
5988 /* The segment contains sections, so use the first one. */
5989 s = phdr_load_seg->sections[0];
5990 else
5991 /* Use the first (i.e. lowest-addressed) section in any segment. */
5992 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
5993 if (m->p_type == PT_LOAD && m->count != 0)
5994 {
5995 s = m->sections[0];
5996 break;
5997 }
5998
5999 if (s != NULL)
6000 {
6001 hash->root.u.def.value = filehdr_vaddr - s->vma;
6002 hash->root.u.def.section = s;
6003 }
6004 else
6005 {
6006 hash->root.u.def.value = filehdr_vaddr;
6007 hash->root.u.def.section = bfd_abs_section_ptr;
6008 }
6009
6010 hash->root.type = bfd_link_hash_defined;
6011 hash->def_regular = 1;
6012 hash->non_elf = 0;
6013 }
6014 }
6015
f3520d2f
AM
6016 return TRUE;
6017}
6018
1faa385f
NC
6019/* Determine if a bfd is a debuginfo file. Unfortunately there
6020 is no defined method for detecting such files, so we have to
6021 use heuristics instead. */
6022
6023bfd_boolean
6024is_debuginfo_file (bfd *abfd)
6025{
6026 if (abfd == NULL || bfd_get_flavour (abfd) != bfd_target_elf_flavour)
6027 return FALSE;
6028
6029 Elf_Internal_Shdr **start_headers = elf_elfsections (abfd);
6030 Elf_Internal_Shdr **end_headers = start_headers + elf_numsections (abfd);
6031 Elf_Internal_Shdr **headerp;
6032
6033 for (headerp = start_headers; headerp < end_headers; headerp ++)
6034 {
6035 Elf_Internal_Shdr *header = * headerp;
6036
6037 /* Debuginfo files do not have any allocated SHT_PROGBITS sections.
6038 The only allocated sections are SHT_NOBITS or SHT_NOTES. */
6039 if ((header->sh_flags & SHF_ALLOC) == SHF_ALLOC
6040 && header->sh_type != SHT_NOBITS
6041 && header->sh_type != SHT_NOTE)
6042 return FALSE;
6043 }
6044
6045 return TRUE;
6046}
6047
1ff6de03
NA
6048/* Assign file positions for the other sections, except for compressed debugging
6049 and other sections assigned in _bfd_elf_assign_file_positions_for_non_load(). */
f3520d2f
AM
6050
6051static bfd_boolean
6052assign_file_positions_for_non_load_sections (bfd *abfd,
6053 struct bfd_link_info *link_info)
6054{
6055 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6056 Elf_Internal_Shdr **i_shdrpp;
e06efbf1 6057 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
f3520d2f
AM
6058 Elf_Internal_Phdr *phdrs;
6059 Elf_Internal_Phdr *p;
6060 struct elf_segment_map *m;
f3520d2f 6061 file_ptr off;
f3520d2f 6062
5c182d5f 6063 i_shdrpp = elf_elfsections (abfd);
e06efbf1 6064 end_hdrpp = i_shdrpp + elf_numsections (abfd);
12bd6957 6065 off = elf_next_file_pos (abfd);
e06efbf1 6066 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
5c182d5f 6067 {
5c182d5f
AM
6068 Elf_Internal_Shdr *hdr;
6069
6070 hdr = *hdrpp;
6071 if (hdr->bfd_section != NULL
252e386e
AM
6072 && (hdr->bfd_section->filepos != 0
6073 || (hdr->sh_type == SHT_NOBITS
6074 && hdr->contents == NULL)))
627b32bc 6075 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
6076 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
6077 {
1faa385f
NC
6078 if (hdr->sh_size != 0
6079 /* PR 24717 - debuginfo files are known to be not strictly
6080 compliant with the ELF standard. In particular they often
6081 have .note.gnu.property sections that are outside of any
6082 loadable segment. This is not a problem for such files,
6083 so do not warn about them. */
6084 && ! is_debuginfo_file (abfd))
4eca0228 6085 _bfd_error_handler
695344c0 6086 /* xgettext:c-format */
871b3ab2 6087 (_("%pB: warning: allocated section `%s' not in segment"),
e8d2ba53
AM
6088 abfd,
6089 (hdr->bfd_section == NULL
6090 ? "*unknown*"
6091 : hdr->bfd_section->name));
3ba71138
L
6092 /* We don't need to page align empty sections. */
6093 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
6094 off += vma_page_aligned_bias (hdr->sh_addr, off,
6095 bed->maxpagesize);
6096 else
6097 off += vma_page_aligned_bias (hdr->sh_addr, off,
6098 hdr->sh_addralign);
6099 off = _bfd_elf_assign_file_position_for_section (hdr, off,
6100 FALSE);
6101 }
6102 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6103 && hdr->bfd_section == NULL)
1ff6de03
NA
6104 /* We don't know the offset of these sections yet: their size has
6105 not been decided. */
0ce398f1 6106 || (hdr->bfd_section != NULL
1ff6de03
NA
6107 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6108 || (bfd_section_is_ctf (hdr->bfd_section)
6109 && abfd->is_linker_output)))
12bd6957 6110 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6a40cf0c
NC
6111 || (elf_symtab_shndx_list (abfd) != NULL
6112 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
6113 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
6114 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
5c182d5f
AM
6115 hdr->sh_offset = -1;
6116 else
6117 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f 6118 }
30fe1832 6119 elf_next_file_pos (abfd) = off;
5c182d5f 6120
252b5132
RH
6121 /* Now that we have set the section file positions, we can set up
6122 the file positions for the non PT_LOAD segments. */
f3520d2f 6123 phdrs = elf_tdata (abfd)->phdr;
12bd6957 6124 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
252b5132 6125 {
129af99f 6126 if (p->p_type == PT_GNU_RELRO)
252b5132 6127 {
f2731e0c 6128 bfd_vma start, end;
01f7e10c 6129 bfd_boolean ok;
1ea63fd2 6130
129af99f 6131 if (link_info != NULL)
8c37241b 6132 {
129af99f 6133 /* During linking the range of the RELRO segment is passed
f2731e0c
AM
6134 in link_info. Note that there may be padding between
6135 relro_start and the first RELRO section. */
6136 start = link_info->relro_start;
6137 end = link_info->relro_end;
6138 }
6139 else if (m->count != 0)
6140 {
6141 if (!m->p_size_valid)
6142 abort ();
6143 start = m->sections[0]->vma;
6144 end = start + m->p_size;
6145 }
6146 else
6147 {
6148 start = 0;
6149 end = 0;
6150 }
6151
01f7e10c 6152 ok = FALSE;
f2731e0c
AM
6153 if (start < end)
6154 {
6155 struct elf_segment_map *lm;
6156 const Elf_Internal_Phdr *lp;
6157 unsigned int i;
6158
6159 /* Find a LOAD segment containing a section in the RELRO
6160 segment. */
12bd6957 6161 for (lm = elf_seg_map (abfd), lp = phdrs;
3146fac4
AM
6162 lm != NULL;
6163 lm = lm->next, lp++)
8c37241b
JJ
6164 {
6165 if (lp->p_type == PT_LOAD
3146fac4 6166 && lm->count != 0
dbc88fc1
AM
6167 && (lm->sections[lm->count - 1]->vma
6168 + (!IS_TBSS (lm->sections[lm->count - 1])
6169 ? lm->sections[lm->count - 1]->size
6170 : 0)) > start
f2731e0c 6171 && lm->sections[0]->vma < end)
8c37241b
JJ
6172 break;
6173 }
f2731e0c 6174
01f7e10c 6175 if (lm != NULL)
129af99f 6176 {
01f7e10c
AM
6177 /* Find the section starting the RELRO segment. */
6178 for (i = 0; i < lm->count; i++)
6179 {
6180 asection *s = lm->sections[i];
6181 if (s->vma >= start
6182 && s->vma < end
6183 && s->size != 0)
6184 break;
6185 }
6186
6187 if (i < lm->count)
6188 {
6189 p->p_vaddr = lm->sections[i]->vma;
6190 p->p_paddr = lm->sections[i]->lma;
6191 p->p_offset = lm->sections[i]->filepos;
6192 p->p_memsz = end - p->p_vaddr;
6193 p->p_filesz = p->p_memsz;
6194
6195 /* The RELRO segment typically ends a few bytes
6196 into .got.plt but other layouts are possible.
6197 In cases where the end does not match any
6198 loaded section (for instance is in file
6199 padding), trim p_filesz back to correspond to
6200 the end of loaded section contents. */
6201 if (p->p_filesz > lp->p_vaddr + lp->p_filesz - p->p_vaddr)
6202 p->p_filesz = lp->p_vaddr + lp->p_filesz - p->p_vaddr;
6203
6204 /* Preserve the alignment and flags if they are
6205 valid. The gold linker generates RW/4 for
6206 the PT_GNU_RELRO section. It is better for
6207 objcopy/strip to honor these attributes
6208 otherwise gdb will choke when using separate
6209 debug files. */
6210 if (!m->p_align_valid)
6211 p->p_align = 1;
6212 if (!m->p_flags_valid)
6213 p->p_flags = PF_R;
6214 ok = TRUE;
6215 }
129af99f 6216 }
b84a33b5 6217 }
01f7e10c
AM
6218 if (link_info != NULL)
6219 BFD_ASSERT (ok);
6220 if (!ok)
6221 memset (p, 0, sizeof *p);
129af99f 6222 }
04c3a755
NS
6223 else if (p->p_type == PT_GNU_STACK)
6224 {
6225 if (m->p_size_valid)
6226 p->p_memsz = m->p_size;
6227 }
129af99f
AS
6228 else if (m->count != 0)
6229 {
e06efbf1 6230 unsigned int i;
1a9ccd70 6231
129af99f
AS
6232 if (p->p_type != PT_LOAD
6233 && (p->p_type != PT_NOTE
6234 || bfd_get_format (abfd) != bfd_core))
6235 {
1a9ccd70
NC
6236 /* A user specified segment layout may include a PHDR
6237 segment that overlaps with a LOAD segment... */
6238 if (p->p_type == PT_PHDR)
6239 {
6240 m->count = 0;
6241 continue;
6242 }
6243
c86934ce
NC
6244 if (m->includes_filehdr || m->includes_phdrs)
6245 {
b1fa9dd6 6246 /* PR 17512: file: 2195325e. */
4eca0228 6247 _bfd_error_handler
871b3ab2 6248 (_("%pB: error: non-load segment %d includes file header "
76cfced5
AM
6249 "and/or program header"),
6250 abfd, (int) (p - phdrs));
c86934ce
NC
6251 return FALSE;
6252 }
129af99f 6253
86b2281f 6254 p->p_filesz = 0;
129af99f 6255 p->p_offset = m->sections[0]->filepos;
86b2281f
AM
6256 for (i = m->count; i-- != 0;)
6257 {
6258 asection *sect = m->sections[i];
6259 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
6260 if (hdr->sh_type != SHT_NOBITS)
6261 {
6262 p->p_filesz = (sect->filepos - m->sections[0]->filepos
6263 + hdr->sh_size);
6264 break;
6265 }
6266 }
129af99f
AS
6267 }
6268 }
252b5132
RH
6269 }
6270
b34976b6 6271 return TRUE;
252b5132
RH
6272}
6273
6a40cf0c
NC
6274static elf_section_list *
6275find_section_in_list (unsigned int i, elf_section_list * list)
6276{
6277 for (;list != NULL; list = list->next)
6278 if (list->ndx == i)
6279 break;
6280 return list;
6281}
6282
252b5132
RH
6283/* Work out the file positions of all the sections. This is called by
6284 _bfd_elf_compute_section_file_positions. All the section sizes and
6285 VMAs must be known before this is called.
6286
e0638f70 6287 Reloc sections come in two flavours: Those processed specially as
1ff6de03
NA
6288 "side-channel" data attached to a section to which they apply, and those that
6289 bfd doesn't process as relocations. The latter sort are stored in a normal
6290 bfd section by bfd_section_from_shdr. We don't consider the former sort
6291 here, unless they form part of the loadable image. Reloc sections not
6292 assigned here (and compressed debugging sections and CTF sections which
6293 nothing else in the file can rely upon) will be handled later by
e0638f70 6294 assign_file_positions_for_relocs.
252b5132
RH
6295
6296 We also don't set the positions of the .symtab and .strtab here. */
6297
b34976b6 6298static bfd_boolean
c84fca4d
AO
6299assign_file_positions_except_relocs (bfd *abfd,
6300 struct bfd_link_info *link_info)
252b5132 6301{
5c182d5f
AM
6302 struct elf_obj_tdata *tdata = elf_tdata (abfd);
6303 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
9c5bfbb7 6304 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6d6c25c8 6305 unsigned int alloc;
252b5132
RH
6306
6307 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
6308 && bfd_get_format (abfd) != bfd_core)
6309 {
5c182d5f
AM
6310 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
6311 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
6312 Elf_Internal_Shdr **hdrpp;
6313 unsigned int i;
a485e98e 6314 file_ptr off;
252b5132
RH
6315
6316 /* Start after the ELF header. */
6317 off = i_ehdrp->e_ehsize;
6318
6319 /* We are not creating an executable, which means that we are
6320 not creating a program header, and that the actual order of
6321 the sections in the file is unimportant. */
9ad5cbcf 6322 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
6323 {
6324 Elf_Internal_Shdr *hdr;
6325
6326 hdr = *hdrpp;
e0638f70
AM
6327 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6328 && hdr->bfd_section == NULL)
1ff6de03
NA
6329 /* Do not assign offsets for these sections yet: we don't know
6330 their sizes. */
0ce398f1 6331 || (hdr->bfd_section != NULL
1ff6de03
NA
6332 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6333 || (bfd_section_is_ctf (hdr->bfd_section)
6334 && abfd->is_linker_output)))
12bd6957 6335 || i == elf_onesymtab (abfd)
6a40cf0c
NC
6336 || (elf_symtab_shndx_list (abfd) != NULL
6337 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
6338 || i == elf_strtab_sec (abfd)
6339 || i == elf_shstrtab_sec (abfd))
252b5132
RH
6340 {
6341 hdr->sh_offset = -1;
252b5132 6342 }
9ad5cbcf 6343 else
b34976b6 6344 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 6345 }
a485e98e
AM
6346
6347 elf_next_file_pos (abfd) = off;
6d6c25c8 6348 elf_program_header_size (abfd) = 0;
252b5132
RH
6349 }
6350 else
6351 {
252b5132 6352 /* Assign file positions for the loaded sections based on the
08a40648 6353 assignment of sections to segments. */
f3520d2f
AM
6354 if (!assign_file_positions_for_load_sections (abfd, link_info))
6355 return FALSE;
6356
6357 /* And for non-load sections. */
6358 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
6359 return FALSE;
6d6c25c8 6360 }
f3520d2f 6361
6d6c25c8
AM
6362 if (!(*bed->elf_backend_modify_headers) (abfd, link_info))
6363 return FALSE;
1a9ccd70 6364
6d6c25c8
AM
6365 /* Write out the program headers. */
6366 alloc = i_ehdrp->e_phnum;
6367 if (alloc != 0)
6368 {
30fe1832 6369 if (bfd_seek (abfd, i_ehdrp->e_phoff, SEEK_SET) != 0
cd584857
NC
6370 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
6371 return FALSE;
252b5132
RH
6372 }
6373
b34976b6 6374 return TRUE;
252b5132
RH
6375}
6376
ed7e9d0b
AM
6377bfd_boolean
6378_bfd_elf_init_file_header (bfd *abfd,
6379 struct bfd_link_info *info ATTRIBUTE_UNUSED)
252b5132 6380{
3d540e93 6381 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 6382 struct elf_strtab_hash *shstrtab;
9c5bfbb7 6383 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
6384
6385 i_ehdrp = elf_elfheader (abfd);
252b5132 6386
2b0f7ef9 6387 shstrtab = _bfd_elf_strtab_init ();
252b5132 6388 if (shstrtab == NULL)
b34976b6 6389 return FALSE;
252b5132
RH
6390
6391 elf_shstrtab (abfd) = shstrtab;
6392
6393 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
6394 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
6395 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
6396 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
6397
6398 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
6399 i_ehdrp->e_ident[EI_DATA] =
6400 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
6401 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
6402
252b5132
RH
6403 if ((abfd->flags & DYNAMIC) != 0)
6404 i_ehdrp->e_type = ET_DYN;
6405 else if ((abfd->flags & EXEC_P) != 0)
6406 i_ehdrp->e_type = ET_EXEC;
6407 else if (bfd_get_format (abfd) == bfd_core)
6408 i_ehdrp->e_type = ET_CORE;
6409 else
6410 i_ehdrp->e_type = ET_REL;
6411
6412 switch (bfd_get_arch (abfd))
6413 {
6414 case bfd_arch_unknown:
6415 i_ehdrp->e_machine = EM_NONE;
6416 break;
aa4f99bb
AO
6417
6418 /* There used to be a long list of cases here, each one setting
6419 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6420 in the corresponding bfd definition. To avoid duplication,
6421 the switch was removed. Machines that need special handling
6422 can generally do it in elf_backend_final_write_processing(),
6423 unless they need the information earlier than the final write.
6424 Such need can generally be supplied by replacing the tests for
6425 e_machine with the conditions used to determine it. */
252b5132 6426 default:
9c5bfbb7
AM
6427 i_ehdrp->e_machine = bed->elf_machine_code;
6428 }
aa4f99bb 6429
252b5132
RH
6430 i_ehdrp->e_version = bed->s->ev_current;
6431 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
6432
c044fabd 6433 /* No program header, for now. */
252b5132
RH
6434 i_ehdrp->e_phoff = 0;
6435 i_ehdrp->e_phentsize = 0;
6436 i_ehdrp->e_phnum = 0;
6437
c044fabd 6438 /* Each bfd section is section header entry. */
252b5132
RH
6439 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6440 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6441
252b5132 6442 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 6443 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 6444 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 6445 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 6446 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 6447 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132 6448 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
17ca87fc 6449 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
252b5132 6450 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 6451 return FALSE;
252b5132 6452
b34976b6 6453 return TRUE;
252b5132
RH
6454}
6455
6d6c25c8
AM
6456/* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=.
6457
6458 FIXME: We used to have code here to sort the PT_LOAD segments into
6459 ascending order, as per the ELF spec. But this breaks some programs,
6460 including the Linux kernel. But really either the spec should be
6461 changed or the programs updated. */
6462
6463bfd_boolean
6464_bfd_elf_modify_headers (bfd *obfd, struct bfd_link_info *link_info)
6465{
6466 if (link_info != NULL && bfd_link_pie (link_info))
6467 {
6468 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (obfd);
6469 unsigned int num_segments = i_ehdrp->e_phnum;
6470 struct elf_obj_tdata *tdata = elf_tdata (obfd);
6471 Elf_Internal_Phdr *segment = tdata->phdr;
6472 Elf_Internal_Phdr *end_segment = &segment[num_segments];
6473
6474 /* Find the lowest p_vaddr in PT_LOAD segments. */
6475 bfd_vma p_vaddr = (bfd_vma) -1;
6476 for (; segment < end_segment; segment++)
6477 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
6478 p_vaddr = segment->p_vaddr;
6479
6480 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
6481 segments is non-zero. */
6482 if (p_vaddr)
6483 i_ehdrp->e_type = ET_EXEC;
6484 }
6485 return TRUE;
6486}
6487
252b5132 6488/* Assign file positions for all the reloc sections which are not part
a485e98e 6489 of the loadable file image, and the file position of section headers. */
252b5132 6490
0ce398f1
L
6491static bfd_boolean
6492_bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
252b5132
RH
6493{
6494 file_ptr off;
e06efbf1 6495 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
3e19fb8f 6496 Elf_Internal_Shdr *shdrp;
a485e98e
AM
6497 Elf_Internal_Ehdr *i_ehdrp;
6498 const struct elf_backend_data *bed;
252b5132 6499
12bd6957 6500 off = elf_next_file_pos (abfd);
252b5132 6501
e06efbf1
L
6502 shdrpp = elf_elfsections (abfd);
6503 end_shdrpp = shdrpp + elf_numsections (abfd);
6504 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
252b5132 6505 {
252b5132 6506 shdrp = *shdrpp;
0ce398f1
L
6507 if (shdrp->sh_offset == -1)
6508 {
3e19fb8f 6509 asection *sec = shdrp->bfd_section;
0ce398f1
L
6510 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
6511 || shdrp->sh_type == SHT_RELA);
1ff6de03 6512 bfd_boolean is_ctf = sec && bfd_section_is_ctf (sec);
0ce398f1 6513 if (is_rel
1ff6de03 6514 || is_ctf
3e19fb8f 6515 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
0ce398f1 6516 {
1ff6de03 6517 if (!is_rel && !is_ctf)
0ce398f1 6518 {
3e19fb8f
L
6519 const char *name = sec->name;
6520 struct bfd_elf_section_data *d;
6521
0ce398f1 6522 /* Compress DWARF debug sections. */
3e19fb8f 6523 if (!bfd_compress_section (abfd, sec,
0ce398f1
L
6524 shdrp->contents))
6525 return FALSE;
3e19fb8f
L
6526
6527 if (sec->compress_status == COMPRESS_SECTION_DONE
6528 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
6529 {
6530 /* If section is compressed with zlib-gnu, convert
6531 section name from .debug_* to .zdebug_*. */
6532 char *new_name
6533 = convert_debug_to_zdebug (abfd, name);
6534 if (new_name == NULL)
6535 return FALSE;
6536 name = new_name;
6537 }
dd905818 6538 /* Add section name to section name section. */
3e19fb8f
L
6539 if (shdrp->sh_name != (unsigned int) -1)
6540 abort ();
6541 shdrp->sh_name
6542 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6543 name, FALSE);
6544 d = elf_section_data (sec);
6545
dd905818 6546 /* Add reloc section name to section name section. */
3e19fb8f
L
6547 if (d->rel.hdr
6548 && !_bfd_elf_set_reloc_sh_name (abfd,
6549 d->rel.hdr,
6550 name, FALSE))
6551 return FALSE;
6552 if (d->rela.hdr
6553 && !_bfd_elf_set_reloc_sh_name (abfd,
6554 d->rela.hdr,
91cb26da 6555 name, TRUE))
3e19fb8f
L
6556 return FALSE;
6557
0ce398f1 6558 /* Update section size and contents. */
3e19fb8f
L
6559 shdrp->sh_size = sec->size;
6560 shdrp->contents = sec->contents;
0ce398f1
L
6561 shdrp->bfd_section->contents = NULL;
6562 }
1ff6de03
NA
6563 else if (is_ctf)
6564 {
6565 /* Update section size and contents. */
6566 shdrp->sh_size = sec->size;
6567 shdrp->contents = sec->contents;
6568 }
6569
0ce398f1
L
6570 off = _bfd_elf_assign_file_position_for_section (shdrp,
6571 off,
6572 TRUE);
6573 }
6574 }
252b5132
RH
6575 }
6576
3e19fb8f
L
6577 /* Place section name section after DWARF debug sections have been
6578 compressed. */
6579 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6580 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6581 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6582 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
6583
6584 /* Place the section headers. */
a485e98e
AM
6585 i_ehdrp = elf_elfheader (abfd);
6586 bed = get_elf_backend_data (abfd);
6587 off = align_file_position (off, 1 << bed->s->log_file_align);
6588 i_ehdrp->e_shoff = off;
6589 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
12bd6957 6590 elf_next_file_pos (abfd) = off;
0ce398f1
L
6591
6592 return TRUE;
252b5132
RH
6593}
6594
b34976b6 6595bfd_boolean
217aa764 6596_bfd_elf_write_object_contents (bfd *abfd)
252b5132 6597{
9c5bfbb7 6598 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6599 Elf_Internal_Shdr **i_shdrp;
b34976b6 6600 bfd_boolean failed;
9ad5cbcf 6601 unsigned int count, num_sec;
30e8ee25 6602 struct elf_obj_tdata *t;
252b5132
RH
6603
6604 if (! abfd->output_has_begun
217aa764 6605 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6606 return FALSE;
db727370
JL
6607 /* Do not rewrite ELF data when the BFD has been opened for update.
6608 abfd->output_has_begun was set to TRUE on opening, so creation of new
6609 sections, and modification of existing section sizes was restricted.
6610 This means the ELF header, program headers and section headers can't have
6611 changed.
6612 If the contents of any sections has been modified, then those changes have
6613 already been written to the BFD. */
6614 else if (abfd->direction == both_direction)
6615 {
6616 BFD_ASSERT (abfd->output_has_begun);
6617 return TRUE;
6618 }
252b5132
RH
6619
6620 i_shdrp = elf_elfsections (abfd);
252b5132 6621
b34976b6 6622 failed = FALSE;
252b5132
RH
6623 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6624 if (failed)
b34976b6 6625 return FALSE;
252b5132 6626
0ce398f1
L
6627 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6628 return FALSE;
252b5132 6629
c044fabd 6630 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
6631 num_sec = elf_numsections (abfd);
6632 for (count = 1; count < num_sec; count++)
252b5132 6633 {
3e19fb8f
L
6634 i_shdrp[count]->sh_name
6635 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6636 i_shdrp[count]->sh_name);
252b5132 6637 if (bed->elf_backend_section_processing)
75506100
MR
6638 if (!(*bed->elf_backend_section_processing) (abfd, i_shdrp[count]))
6639 return FALSE;
252b5132
RH
6640 if (i_shdrp[count]->contents)
6641 {
dc810e39
AM
6642 bfd_size_type amt = i_shdrp[count]->sh_size;
6643
252b5132 6644 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 6645 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 6646 return FALSE;
252b5132
RH
6647 }
6648 }
6649
6650 /* Write out the section header names. */
30e8ee25 6651 t = elf_tdata (abfd);
26ae6d5e 6652 if (elf_shstrtab (abfd) != NULL
30e8ee25 6653 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 6654 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 6655 return FALSE;
252b5132 6656
cc364be6
AM
6657 if (!(*bed->elf_backend_final_write_processing) (abfd))
6658 return FALSE;
252b5132 6659
ff59fc36
RM
6660 if (!bed->s->write_shdrs_and_ehdr (abfd))
6661 return FALSE;
6662
6663 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
c0355132
AM
6664 if (t->o->build_id.after_write_object_contents != NULL)
6665 return (*t->o->build_id.after_write_object_contents) (abfd);
ff59fc36
RM
6666
6667 return TRUE;
252b5132
RH
6668}
6669
b34976b6 6670bfd_boolean
217aa764 6671_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 6672{
c044fabd 6673 /* Hopefully this can be done just like an object file. */
252b5132
RH
6674 return _bfd_elf_write_object_contents (abfd);
6675}
c044fabd
KH
6676
6677/* Given a section, search the header to find them. */
6678
cb33740c 6679unsigned int
198beae2 6680_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 6681{
9c5bfbb7 6682 const struct elf_backend_data *bed;
91d6fa6a 6683 unsigned int sec_index;
252b5132 6684
9ad5cbcf
AM
6685 if (elf_section_data (asect) != NULL
6686 && elf_section_data (asect)->this_idx != 0)
6687 return elf_section_data (asect)->this_idx;
6688
6689 if (bfd_is_abs_section (asect))
91d6fa6a 6690 sec_index = SHN_ABS;
af746e92 6691 else if (bfd_is_com_section (asect))
91d6fa6a 6692 sec_index = SHN_COMMON;
af746e92 6693 else if (bfd_is_und_section (asect))
91d6fa6a 6694 sec_index = SHN_UNDEF;
af746e92 6695 else
91d6fa6a 6696 sec_index = SHN_BAD;
252b5132 6697
af746e92 6698 bed = get_elf_backend_data (abfd);
252b5132
RH
6699 if (bed->elf_backend_section_from_bfd_section)
6700 {
91d6fa6a 6701 int retval = sec_index;
9ad5cbcf 6702
af746e92
AM
6703 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6704 return retval;
252b5132
RH
6705 }
6706
91d6fa6a 6707 if (sec_index == SHN_BAD)
af746e92 6708 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 6709
91d6fa6a 6710 return sec_index;
252b5132
RH
6711}
6712
6713/* Given a BFD symbol, return the index in the ELF symbol table, or -1
6714 on error. */
6715
6716int
217aa764 6717_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
6718{
6719 asymbol *asym_ptr = *asym_ptr_ptr;
6720 int idx;
6721 flagword flags = asym_ptr->flags;
6722
6723 /* When gas creates relocations against local labels, it creates its
6724 own symbol for the section, but does put the symbol into the
6725 symbol chain, so udata is 0. When the linker is generating
6726 relocatable output, this section symbol may be for one of the
6727 input sections rather than the output section. */
6728 if (asym_ptr->udata.i == 0
6729 && (flags & BSF_SECTION_SYM)
6730 && asym_ptr->section)
6731 {
5372391b 6732 asection *sec;
252b5132
RH
6733 int indx;
6734
5372391b
AM
6735 sec = asym_ptr->section;
6736 if (sec->owner != abfd && sec->output_section != NULL)
6737 sec = sec->output_section;
6738 if (sec->owner == abfd
6739 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 6740 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
6741 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
6742 }
6743
6744 idx = asym_ptr->udata.i;
6745
6746 if (idx == 0)
6747 {
6748 /* This case can occur when using --strip-symbol on a symbol
08a40648 6749 which is used in a relocation entry. */
4eca0228 6750 _bfd_error_handler
695344c0 6751 /* xgettext:c-format */
871b3ab2 6752 (_("%pB: symbol `%s' required but not present"),
d003868e 6753 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
6754 bfd_set_error (bfd_error_no_symbols);
6755 return -1;
6756 }
6757
6758#if DEBUG & 4
6759 {
6760 fprintf (stderr,
cd9af601
AM
6761 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8x\n",
6762 (long) asym_ptr, asym_ptr->name, idx, flags);
252b5132
RH
6763 fflush (stderr);
6764 }
6765#endif
6766
6767 return idx;
6768}
6769
84d1d650 6770/* Rewrite program header information. */
252b5132 6771
b34976b6 6772static bfd_boolean
84d1d650 6773rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 6774{
b34976b6
AM
6775 Elf_Internal_Ehdr *iehdr;
6776 struct elf_segment_map *map;
6777 struct elf_segment_map *map_first;
6778 struct elf_segment_map **pointer_to_map;
6779 Elf_Internal_Phdr *segment;
6780 asection *section;
6781 unsigned int i;
6782 unsigned int num_segments;
6783 bfd_boolean phdr_included = FALSE;
5c44b38e 6784 bfd_boolean p_paddr_valid;
b34976b6
AM
6785 bfd_vma maxpagesize;
6786 struct elf_segment_map *phdr_adjust_seg = NULL;
6787 unsigned int phdr_adjust_num = 0;
9c5bfbb7 6788 const struct elf_backend_data *bed;
bc67d8a6 6789
caf47ea6 6790 bed = get_elf_backend_data (ibfd);
252b5132
RH
6791 iehdr = elf_elfheader (ibfd);
6792
bc67d8a6 6793 map_first = NULL;
c044fabd 6794 pointer_to_map = &map_first;
252b5132
RH
6795
6796 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
6797 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6798
6799 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
6800#define SEGMENT_END(segment, start) \
6801 (start + (segment->p_memsz > segment->p_filesz \
6802 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 6803
eecdbe52
JJ
6804#define SECTION_SIZE(section, segment) \
6805 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6806 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 6807 ? section->size : 0)
eecdbe52 6808
b34976b6 6809 /* Returns TRUE if the given section is contained within
bc67d8a6 6810 the given segment. VMA addresses are compared. */
aecc8f8a
AM
6811#define IS_CONTAINED_BY_VMA(section, segment) \
6812 (section->vma >= segment->p_vaddr \
eecdbe52 6813 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 6814 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 6815
b34976b6 6816 /* Returns TRUE if the given section is contained within
bc67d8a6 6817 the given segment. LMA addresses are compared. */
aecc8f8a
AM
6818#define IS_CONTAINED_BY_LMA(section, segment, base) \
6819 (section->lma >= base \
beab4532 6820 && (section->lma + SECTION_SIZE (section, segment) >= section->lma) \
eecdbe52 6821 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 6822 <= SEGMENT_END (segment, base)))
252b5132 6823
0efc80c8
L
6824 /* Handle PT_NOTE segment. */
6825#define IS_NOTE(p, s) \
aecc8f8a 6826 (p->p_type == PT_NOTE \
0efc80c8 6827 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 6828 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6829 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6830 <= p->p_offset + p->p_filesz))
252b5132 6831
0efc80c8
L
6832 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6833 etc. */
6834#define IS_COREFILE_NOTE(p, s) \
6835 (IS_NOTE (p, s) \
6836 && bfd_get_format (ibfd) == bfd_core \
6837 && s->vma == 0 \
6838 && s->lma == 0)
6839
252b5132
RH
6840 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6841 linker, which generates a PT_INTERP section with p_vaddr and
6842 p_memsz set to 0. */
aecc8f8a
AM
6843#define IS_SOLARIS_PT_INTERP(p, s) \
6844 (p->p_vaddr == 0 \
6845 && p->p_paddr == 0 \
6846 && p->p_memsz == 0 \
6847 && p->p_filesz > 0 \
6848 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 6849 && s->size > 0 \
aecc8f8a 6850 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6851 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6852 <= p->p_offset + p->p_filesz))
5c440b1e 6853
bc67d8a6
NC
6854 /* Decide if the given section should be included in the given segment.
6855 A section will be included if:
f5ffc919 6856 1. It is within the address space of the segment -- we use the LMA
08a40648 6857 if that is set for the segment and the VMA otherwise,
0efc80c8 6858 2. It is an allocated section or a NOTE section in a PT_NOTE
d324f6d6 6859 segment.
bc67d8a6 6860 3. There is an output section associated with it,
eecdbe52 6861 4. The section has not already been allocated to a previous segment.
2b05f1b7 6862 5. PT_GNU_STACK segments do not include any sections.
03394ac9 6863 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
6864 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6865 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 6866 (with the possible exception of .dynamic). */
9f17e2a6 6867#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
6868 ((((segment->p_paddr \
6869 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
6870 : IS_CONTAINED_BY_VMA (section, segment)) \
6871 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 6872 || IS_NOTE (segment, section)) \
2b05f1b7
L
6873 && segment->p_type != PT_GNU_STACK \
6874 && (segment->p_type != PT_TLS \
6875 || (section->flags & SEC_THREAD_LOCAL)) \
6876 && (segment->p_type == PT_LOAD \
6877 || segment->p_type == PT_TLS \
6878 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6879 && (segment->p_type != PT_DYNAMIC \
6880 || SECTION_SIZE (section, segment) > 0 \
6881 || (segment->p_paddr \
6882 ? segment->p_paddr != section->lma \
6883 : segment->p_vaddr != section->vma) \
fd361982 6884 || (strcmp (bfd_section_name (section), ".dynamic") == 0)) \
9933dc52 6885 && (segment->p_type != PT_LOAD || !section->segment_mark))
bc67d8a6 6886
9f17e2a6
L
6887/* If the output section of a section in the input segment is NULL,
6888 it is removed from the corresponding output segment. */
6889#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
6890 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
6891 && section->output_section != NULL)
6892
b34976b6 6893 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
6894#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6895 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6896
6897 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6898 their VMA address ranges and their LMA address ranges overlap.
6899 It is possible to have overlapping VMA ranges without overlapping LMA
6900 ranges. RedBoot images for example can have both .data and .bss mapped
6901 to the same VMA range, but with the .data section mapped to a different
6902 LMA. */
aecc8f8a 6903#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 6904 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 6905 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 6906 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 6907 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
6908
6909 /* Initialise the segment mark field. */
6910 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 6911 section->segment_mark = FALSE;
bc67d8a6 6912
5c44b38e
AM
6913 /* The Solaris linker creates program headers in which all the
6914 p_paddr fields are zero. When we try to objcopy or strip such a
6915 file, we get confused. Check for this case, and if we find it
6916 don't set the p_paddr_valid fields. */
6917 p_paddr_valid = FALSE;
6918 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6919 i < num_segments;
6920 i++, segment++)
6921 if (segment->p_paddr != 0)
6922 {
6923 p_paddr_valid = TRUE;
6924 break;
6925 }
6926
252b5132 6927 /* Scan through the segments specified in the program header
bc67d8a6 6928 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 6929 in the loadable segments. These can be created by weird
aecc8f8a 6930 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
6931 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6932 i < num_segments;
c044fabd 6933 i++, segment++)
252b5132 6934 {
252b5132 6935 unsigned int j;
c044fabd 6936 Elf_Internal_Phdr *segment2;
252b5132 6937
aecc8f8a
AM
6938 if (segment->p_type == PT_INTERP)
6939 for (section = ibfd->sections; section; section = section->next)
6940 if (IS_SOLARIS_PT_INTERP (segment, section))
6941 {
6942 /* Mininal change so that the normal section to segment
4cc11e76 6943 assignment code will work. */
aecc8f8a
AM
6944 segment->p_vaddr = section->vma;
6945 break;
6946 }
6947
bc67d8a6 6948 if (segment->p_type != PT_LOAD)
b10a8ae0
L
6949 {
6950 /* Remove PT_GNU_RELRO segment. */
6951 if (segment->p_type == PT_GNU_RELRO)
6952 segment->p_type = PT_NULL;
6953 continue;
6954 }
c044fabd 6955
bc67d8a6 6956 /* Determine if this segment overlaps any previous segments. */
0067a569 6957 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
6958 {
6959 bfd_signed_vma extra_length;
c044fabd 6960
bc67d8a6 6961 if (segment2->p_type != PT_LOAD
0067a569 6962 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 6963 continue;
c044fabd 6964
bc67d8a6
NC
6965 /* Merge the two segments together. */
6966 if (segment2->p_vaddr < segment->p_vaddr)
6967 {
c044fabd 6968 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 6969 SEGMENT. */
0067a569
AM
6970 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
6971 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 6972
bc67d8a6
NC
6973 if (extra_length > 0)
6974 {
0067a569 6975 segment2->p_memsz += extra_length;
bc67d8a6
NC
6976 segment2->p_filesz += extra_length;
6977 }
c044fabd 6978
bc67d8a6 6979 segment->p_type = PT_NULL;
c044fabd 6980
bc67d8a6
NC
6981 /* Since we have deleted P we must restart the outer loop. */
6982 i = 0;
6983 segment = elf_tdata (ibfd)->phdr;
6984 break;
6985 }
6986 else
6987 {
c044fabd 6988 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 6989 SEGMENT2. */
0067a569
AM
6990 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
6991 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 6992
bc67d8a6
NC
6993 if (extra_length > 0)
6994 {
0067a569 6995 segment->p_memsz += extra_length;
bc67d8a6
NC
6996 segment->p_filesz += extra_length;
6997 }
c044fabd 6998
bc67d8a6
NC
6999 segment2->p_type = PT_NULL;
7000 }
7001 }
7002 }
c044fabd 7003
bc67d8a6
NC
7004 /* The second scan attempts to assign sections to segments. */
7005 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7006 i < num_segments;
0067a569 7007 i++, segment++)
bc67d8a6 7008 {
0067a569
AM
7009 unsigned int section_count;
7010 asection **sections;
7011 asection *output_section;
7012 unsigned int isec;
9933dc52
AM
7013 asection *matching_lma;
7014 asection *suggested_lma;
0067a569 7015 unsigned int j;
dc810e39 7016 bfd_size_type amt;
0067a569 7017 asection *first_section;
bc67d8a6
NC
7018
7019 if (segment->p_type == PT_NULL)
7020 continue;
c044fabd 7021
9f17e2a6 7022 first_section = NULL;
bc67d8a6 7023 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
7024 for (section = ibfd->sections, section_count = 0;
7025 section != NULL;
7026 section = section->next)
9f17e2a6
L
7027 {
7028 /* Find the first section in the input segment, which may be
7029 removed from the corresponding output segment. */
7030 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
7031 {
7032 if (first_section == NULL)
7033 first_section = section;
7034 if (section->output_section != NULL)
7035 ++section_count;
7036 }
7037 }
811072d8 7038
b5f852ea
NC
7039 /* Allocate a segment map big enough to contain
7040 all of the sections we have selected. */
00bee008
AM
7041 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7042 amt += (bfd_size_type) section_count * sizeof (asection *);
a50b1753 7043 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 7044 if (map == NULL)
b34976b6 7045 return FALSE;
252b5132
RH
7046
7047 /* Initialise the fields of the segment map. Default to
7048 using the physical address of the segment in the input BFD. */
0067a569
AM
7049 map->next = NULL;
7050 map->p_type = segment->p_type;
7051 map->p_flags = segment->p_flags;
bc67d8a6 7052 map->p_flags_valid = 1;
55d55ac7 7053
9f17e2a6
L
7054 /* If the first section in the input segment is removed, there is
7055 no need to preserve segment physical address in the corresponding
7056 output segment. */
945c025a 7057 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
7058 {
7059 map->p_paddr = segment->p_paddr;
5c44b38e 7060 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 7061 }
252b5132
RH
7062
7063 /* Determine if this segment contains the ELF file header
7064 and if it contains the program headers themselves. */
bc67d8a6
NC
7065 map->includes_filehdr = (segment->p_offset == 0
7066 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 7067 map->includes_phdrs = 0;
252b5132 7068
0067a569 7069 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 7070 {
bc67d8a6
NC
7071 map->includes_phdrs =
7072 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7073 && (segment->p_offset + segment->p_filesz
252b5132
RH
7074 >= ((bfd_vma) iehdr->e_phoff
7075 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 7076
bc67d8a6 7077 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 7078 phdr_included = TRUE;
252b5132
RH
7079 }
7080
bc67d8a6 7081 if (section_count == 0)
252b5132
RH
7082 {
7083 /* Special segments, such as the PT_PHDR segment, may contain
7084 no sections, but ordinary, loadable segments should contain
1ed89aa9 7085 something. They are allowed by the ELF spec however, so only
07d6d2b8 7086 a warning is produced.
f98450c6
NC
7087 There is however the valid use case of embedded systems which
7088 have segments with p_filesz of 0 and a p_memsz > 0 to initialize
7089 flash memory with zeros. No warning is shown for that case. */
7090 if (segment->p_type == PT_LOAD
7091 && (segment->p_filesz > 0 || segment->p_memsz == 0))
7092 /* xgettext:c-format */
9793eb77
AM
7093 _bfd_error_handler
7094 (_("%pB: warning: empty loadable segment detected"
7095 " at vaddr=%#" PRIx64 ", is this intentional?"),
7096 ibfd, (uint64_t) segment->p_vaddr);
252b5132 7097
5d695627 7098 map->p_vaddr_offset = segment->p_vaddr;
bc67d8a6 7099 map->count = 0;
c044fabd
KH
7100 *pointer_to_map = map;
7101 pointer_to_map = &map->next;
252b5132
RH
7102
7103 continue;
7104 }
7105
7106 /* Now scan the sections in the input BFD again and attempt
7107 to add their corresponding output sections to the segment map.
7108 The problem here is how to handle an output section which has
7109 been moved (ie had its LMA changed). There are four possibilities:
7110
7111 1. None of the sections have been moved.
7112 In this case we can continue to use the segment LMA from the
7113 input BFD.
7114
7115 2. All of the sections have been moved by the same amount.
7116 In this case we can change the segment's LMA to match the LMA
7117 of the first section.
7118
7119 3. Some of the sections have been moved, others have not.
7120 In this case those sections which have not been moved can be
7121 placed in the current segment which will have to have its size,
7122 and possibly its LMA changed, and a new segment or segments will
7123 have to be created to contain the other sections.
7124
b5f852ea 7125 4. The sections have been moved, but not by the same amount.
252b5132
RH
7126 In this case we can change the segment's LMA to match the LMA
7127 of the first section and we will have to create a new segment
7128 or segments to contain the other sections.
7129
7130 In order to save time, we allocate an array to hold the section
7131 pointers that we are interested in. As these sections get assigned
7132 to a segment, they are removed from this array. */
7133
a50b1753 7134 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 7135 if (sections == NULL)
b34976b6 7136 return FALSE;
252b5132
RH
7137
7138 /* Step One: Scan for segment vs section LMA conflicts.
7139 Also add the sections to the section array allocated above.
7140 Also add the sections to the current segment. In the common
7141 case, where the sections have not been moved, this means that
7142 we have completely filled the segment, and there is nothing
7143 more to do. */
252b5132 7144 isec = 0;
9933dc52
AM
7145 matching_lma = NULL;
7146 suggested_lma = NULL;
252b5132 7147
461c4b2e 7148 for (section = first_section, j = 0;
bc67d8a6
NC
7149 section != NULL;
7150 section = section->next)
252b5132 7151 {
caf47ea6 7152 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 7153 {
bc67d8a6
NC
7154 output_section = section->output_section;
7155
0067a569 7156 sections[j++] = section;
252b5132
RH
7157
7158 /* The Solaris native linker always sets p_paddr to 0.
7159 We try to catch that case here, and set it to the
5e8d7549
NC
7160 correct value. Note - some backends require that
7161 p_paddr be left as zero. */
5c44b38e 7162 if (!p_paddr_valid
4455705d 7163 && segment->p_vaddr != 0
0067a569 7164 && !bed->want_p_paddr_set_to_zero
252b5132 7165 && isec == 0
bc67d8a6 7166 && output_section->lma != 0
9933dc52
AM
7167 && (align_power (segment->p_vaddr
7168 + (map->includes_filehdr
7169 ? iehdr->e_ehsize : 0)
7170 + (map->includes_phdrs
7171 ? iehdr->e_phnum * iehdr->e_phentsize
7172 : 0),
7173 output_section->alignment_power)
7174 == output_section->vma))
bc67d8a6 7175 map->p_paddr = segment->p_vaddr;
252b5132
RH
7176
7177 /* Match up the physical address of the segment with the
7178 LMA address of the output section. */
bc67d8a6 7179 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 7180 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
7181 || (bed->want_p_paddr_set_to_zero
7182 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 7183 {
9933dc52
AM
7184 if (matching_lma == NULL
7185 || output_section->lma < matching_lma->lma)
7186 matching_lma = output_section;
252b5132
RH
7187
7188 /* We assume that if the section fits within the segment
bc67d8a6 7189 then it does not overlap any other section within that
252b5132 7190 segment. */
0067a569
AM
7191 map->sections[isec++] = output_section;
7192 }
9933dc52
AM
7193 else if (suggested_lma == NULL)
7194 suggested_lma = output_section;
147d51c2
L
7195
7196 if (j == section_count)
7197 break;
252b5132
RH
7198 }
7199 }
7200
bc67d8a6 7201 BFD_ASSERT (j == section_count);
252b5132
RH
7202
7203 /* Step Two: Adjust the physical address of the current segment,
7204 if necessary. */
bc67d8a6 7205 if (isec == section_count)
252b5132
RH
7206 {
7207 /* All of the sections fitted within the segment as currently
7208 specified. This is the default case. Add the segment to
7209 the list of built segments and carry on to process the next
7210 program header in the input BFD. */
bc67d8a6 7211 map->count = section_count;
c044fabd
KH
7212 *pointer_to_map = map;
7213 pointer_to_map = &map->next;
08a40648 7214
5c44b38e 7215 if (p_paddr_valid
30fe1832
AM
7216 && !bed->want_p_paddr_set_to_zero)
7217 {
7218 bfd_vma hdr_size = 0;
7219 if (map->includes_filehdr)
7220 hdr_size = iehdr->e_ehsize;
7221 if (map->includes_phdrs)
7222 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7223
7224 /* Account for padding before the first section in the
7225 segment. */
7226 map->p_vaddr_offset = map->p_paddr + hdr_size - matching_lma->lma;
7227 }
08a40648 7228
252b5132
RH
7229 free (sections);
7230 continue;
7231 }
252b5132
RH
7232 else
7233 {
9933dc52
AM
7234 /* Change the current segment's physical address to match
7235 the LMA of the first section that fitted, or if no
7236 section fitted, the first section. */
7237 if (matching_lma == NULL)
7238 matching_lma = suggested_lma;
7239
7240 map->p_paddr = matching_lma->lma;
72730e0c 7241
bc67d8a6
NC
7242 /* Offset the segment physical address from the lma
7243 to allow for space taken up by elf headers. */
9933dc52 7244 if (map->includes_phdrs)
010c8431 7245 {
9933dc52
AM
7246 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
7247
7248 /* iehdr->e_phnum is just an estimate of the number
7249 of program headers that we will need. Make a note
7250 here of the number we used and the segment we chose
7251 to hold these headers, so that we can adjust the
7252 offset when we know the correct value. */
7253 phdr_adjust_num = iehdr->e_phnum;
7254 phdr_adjust_seg = map;
010c8431 7255 }
252b5132 7256
9933dc52 7257 if (map->includes_filehdr)
bc67d8a6 7258 {
9933dc52
AM
7259 bfd_vma align = (bfd_vma) 1 << matching_lma->alignment_power;
7260 map->p_paddr -= iehdr->e_ehsize;
7261 /* We've subtracted off the size of headers from the
7262 first section lma, but there may have been some
7263 alignment padding before that section too. Try to
7264 account for that by adjusting the segment lma down to
7265 the same alignment. */
7266 if (segment->p_align != 0 && segment->p_align < align)
7267 align = segment->p_align;
7268 map->p_paddr &= -align;
bc67d8a6 7269 }
252b5132
RH
7270 }
7271
7272 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 7273 those that fit to the current segment and removing them from the
252b5132
RH
7274 sections array; but making sure not to leave large gaps. Once all
7275 possible sections have been assigned to the current segment it is
7276 added to the list of built segments and if sections still remain
7277 to be assigned, a new segment is constructed before repeating
7278 the loop. */
7279 isec = 0;
7280 do
7281 {
bc67d8a6 7282 map->count = 0;
9933dc52 7283 suggested_lma = NULL;
252b5132
RH
7284
7285 /* Fill the current segment with sections that fit. */
bc67d8a6 7286 for (j = 0; j < section_count; j++)
252b5132 7287 {
bc67d8a6 7288 section = sections[j];
252b5132 7289
bc67d8a6 7290 if (section == NULL)
252b5132
RH
7291 continue;
7292
bc67d8a6 7293 output_section = section->output_section;
252b5132 7294
bc67d8a6 7295 BFD_ASSERT (output_section != NULL);
c044fabd 7296
bc67d8a6
NC
7297 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
7298 || IS_COREFILE_NOTE (segment, section))
252b5132 7299 {
bc67d8a6 7300 if (map->count == 0)
252b5132
RH
7301 {
7302 /* If the first section in a segment does not start at
bc67d8a6
NC
7303 the beginning of the segment, then something is
7304 wrong. */
9933dc52
AM
7305 if (align_power (map->p_paddr
7306 + (map->includes_filehdr
7307 ? iehdr->e_ehsize : 0)
7308 + (map->includes_phdrs
7309 ? iehdr->e_phnum * iehdr->e_phentsize
7310 : 0),
7311 output_section->alignment_power)
7312 != output_section->lma)
9aea1e31 7313 goto sorry;
252b5132
RH
7314 }
7315 else
7316 {
0067a569 7317 asection *prev_sec;
252b5132 7318
bc67d8a6 7319 prev_sec = map->sections[map->count - 1];
252b5132
RH
7320
7321 /* If the gap between the end of the previous section
bc67d8a6
NC
7322 and the start of this section is more than
7323 maxpagesize then we need to start a new segment. */
eea6121a 7324 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 7325 maxpagesize)
caf47ea6 7326 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 7327 || (prev_sec->lma + prev_sec->size
079e9a2f 7328 > output_section->lma))
252b5132 7329 {
9933dc52
AM
7330 if (suggested_lma == NULL)
7331 suggested_lma = output_section;
252b5132
RH
7332
7333 continue;
7334 }
7335 }
7336
bc67d8a6 7337 map->sections[map->count++] = output_section;
252b5132
RH
7338 ++isec;
7339 sections[j] = NULL;
9933dc52
AM
7340 if (segment->p_type == PT_LOAD)
7341 section->segment_mark = TRUE;
0067a569 7342 }
9933dc52
AM
7343 else if (suggested_lma == NULL)
7344 suggested_lma = output_section;
252b5132
RH
7345 }
7346
beab4532
NC
7347 /* PR 23932. A corrupt input file may contain sections that cannot
7348 be assigned to any segment - because for example they have a
7349 negative size - or segments that do not contain any sections. */
7350 if (map->count == 0)
7351 {
9aea1e31
AM
7352 sorry:
7353 bfd_set_error (bfd_error_sorry);
beab4532
NC
7354 free (sections);
7355 return FALSE;
7356 }
252b5132
RH
7357
7358 /* Add the current segment to the list of built segments. */
c044fabd
KH
7359 *pointer_to_map = map;
7360 pointer_to_map = &map->next;
252b5132 7361
bc67d8a6 7362 if (isec < section_count)
252b5132
RH
7363 {
7364 /* We still have not allocated all of the sections to
7365 segments. Create a new segment here, initialise it
7366 and carry on looping. */
00bee008
AM
7367 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7368 amt += (bfd_size_type) section_count * sizeof (asection *);
5964fc3a 7369 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 7370 if (map == NULL)
5ed6aba4
NC
7371 {
7372 free (sections);
7373 return FALSE;
7374 }
252b5132
RH
7375
7376 /* Initialise the fields of the segment map. Set the physical
7377 physical address to the LMA of the first section that has
7378 not yet been assigned. */
0067a569
AM
7379 map->next = NULL;
7380 map->p_type = segment->p_type;
7381 map->p_flags = segment->p_flags;
7382 map->p_flags_valid = 1;
9933dc52 7383 map->p_paddr = suggested_lma->lma;
5c44b38e 7384 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 7385 map->includes_filehdr = 0;
0067a569 7386 map->includes_phdrs = 0;
252b5132
RH
7387 }
7388 }
bc67d8a6 7389 while (isec < section_count);
252b5132
RH
7390
7391 free (sections);
7392 }
7393
12bd6957 7394 elf_seg_map (obfd) = map_first;
bc67d8a6
NC
7395
7396 /* If we had to estimate the number of program headers that were
9ad5cbcf 7397 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
7398 the offset if necessary. */
7399 if (phdr_adjust_seg != NULL)
7400 {
7401 unsigned int count;
c044fabd 7402
bc67d8a6 7403 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 7404 count++;
252b5132 7405
bc67d8a6
NC
7406 if (count > phdr_adjust_num)
7407 phdr_adjust_seg->p_paddr
7408 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
9933dc52
AM
7409
7410 for (map = map_first; map != NULL; map = map->next)
7411 if (map->p_type == PT_PHDR)
7412 {
7413 bfd_vma adjust
7414 = phdr_adjust_seg->includes_filehdr ? iehdr->e_ehsize : 0;
7415 map->p_paddr = phdr_adjust_seg->p_paddr + adjust;
7416 break;
7417 }
bc67d8a6 7418 }
c044fabd 7419
bc67d8a6 7420#undef SEGMENT_END
eecdbe52 7421#undef SECTION_SIZE
bc67d8a6
NC
7422#undef IS_CONTAINED_BY_VMA
7423#undef IS_CONTAINED_BY_LMA
0efc80c8 7424#undef IS_NOTE
252b5132 7425#undef IS_COREFILE_NOTE
bc67d8a6 7426#undef IS_SOLARIS_PT_INTERP
9f17e2a6 7427#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
7428#undef INCLUDE_SECTION_IN_SEGMENT
7429#undef SEGMENT_AFTER_SEGMENT
7430#undef SEGMENT_OVERLAPS
b34976b6 7431 return TRUE;
252b5132
RH
7432}
7433
84d1d650
L
7434/* Copy ELF program header information. */
7435
7436static bfd_boolean
7437copy_elf_program_header (bfd *ibfd, bfd *obfd)
7438{
7439 Elf_Internal_Ehdr *iehdr;
7440 struct elf_segment_map *map;
7441 struct elf_segment_map *map_first;
7442 struct elf_segment_map **pointer_to_map;
7443 Elf_Internal_Phdr *segment;
7444 unsigned int i;
7445 unsigned int num_segments;
7446 bfd_boolean phdr_included = FALSE;
88967714 7447 bfd_boolean p_paddr_valid;
84d1d650
L
7448
7449 iehdr = elf_elfheader (ibfd);
7450
7451 map_first = NULL;
7452 pointer_to_map = &map_first;
7453
88967714
AM
7454 /* If all the segment p_paddr fields are zero, don't set
7455 map->p_paddr_valid. */
7456 p_paddr_valid = FALSE;
84d1d650 7457 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
7458 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7459 i < num_segments;
7460 i++, segment++)
7461 if (segment->p_paddr != 0)
7462 {
7463 p_paddr_valid = TRUE;
7464 break;
7465 }
7466
84d1d650
L
7467 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7468 i < num_segments;
7469 i++, segment++)
7470 {
7471 asection *section;
7472 unsigned int section_count;
7473 bfd_size_type amt;
7474 Elf_Internal_Shdr *this_hdr;
53020534 7475 asection *first_section = NULL;
a76e6f2f 7476 asection *lowest_section;
84d1d650 7477
84d1d650
L
7478 /* Compute how many sections are in this segment. */
7479 for (section = ibfd->sections, section_count = 0;
7480 section != NULL;
7481 section = section->next)
7482 {
7483 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7484 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 7485 {
a76e6f2f
AM
7486 if (first_section == NULL)
7487 first_section = section;
3271a814
NS
7488 section_count++;
7489 }
84d1d650
L
7490 }
7491
7492 /* Allocate a segment map big enough to contain
7493 all of the sections we have selected. */
00bee008
AM
7494 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7495 amt += (bfd_size_type) section_count * sizeof (asection *);
a50b1753 7496 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
7497 if (map == NULL)
7498 return FALSE;
7499
7500 /* Initialize the fields of the output segment map with the
7501 input segment. */
7502 map->next = NULL;
7503 map->p_type = segment->p_type;
7504 map->p_flags = segment->p_flags;
7505 map->p_flags_valid = 1;
7506 map->p_paddr = segment->p_paddr;
88967714 7507 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
7508 map->p_align = segment->p_align;
7509 map->p_align_valid = 1;
3271a814 7510 map->p_vaddr_offset = 0;
84d1d650 7511
04c3a755
NS
7512 if (map->p_type == PT_GNU_RELRO
7513 || map->p_type == PT_GNU_STACK)
b10a8ae0
L
7514 {
7515 /* The PT_GNU_RELRO segment may contain the first a few
7516 bytes in the .got.plt section even if the whole .got.plt
7517 section isn't in the PT_GNU_RELRO segment. We won't
04c3a755
NS
7518 change the size of the PT_GNU_RELRO segment.
7519 Similarly, PT_GNU_STACK size is significant on uclinux
7520 systems. */
9433b9b1 7521 map->p_size = segment->p_memsz;
b10a8ae0
L
7522 map->p_size_valid = 1;
7523 }
7524
84d1d650
L
7525 /* Determine if this segment contains the ELF file header
7526 and if it contains the program headers themselves. */
7527 map->includes_filehdr = (segment->p_offset == 0
7528 && segment->p_filesz >= iehdr->e_ehsize);
7529
7530 map->includes_phdrs = 0;
7531 if (! phdr_included || segment->p_type != PT_LOAD)
7532 {
7533 map->includes_phdrs =
7534 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7535 && (segment->p_offset + segment->p_filesz
7536 >= ((bfd_vma) iehdr->e_phoff
7537 + iehdr->e_phnum * iehdr->e_phentsize)));
7538
7539 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7540 phdr_included = TRUE;
7541 }
7542
bbefd0a9 7543 lowest_section = NULL;
84d1d650
L
7544 if (section_count != 0)
7545 {
7546 unsigned int isec = 0;
7547
53020534 7548 for (section = first_section;
84d1d650
L
7549 section != NULL;
7550 section = section->next)
7551 {
7552 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7553 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
7554 {
7555 map->sections[isec++] = section->output_section;
a76e6f2f
AM
7556 if ((section->flags & SEC_ALLOC) != 0)
7557 {
7558 bfd_vma seg_off;
7559
bbefd0a9
AM
7560 if (lowest_section == NULL
7561 || section->lma < lowest_section->lma)
fb8a5684
AM
7562 lowest_section = section;
7563
a76e6f2f
AM
7564 /* Section lmas are set up from PT_LOAD header
7565 p_paddr in _bfd_elf_make_section_from_shdr.
7566 If this header has a p_paddr that disagrees
7567 with the section lma, flag the p_paddr as
7568 invalid. */
7569 if ((section->flags & SEC_LOAD) != 0)
7570 seg_off = this_hdr->sh_offset - segment->p_offset;
7571 else
7572 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7573 if (section->lma - segment->p_paddr != seg_off)
7574 map->p_paddr_valid = FALSE;
7575 }
53020534
L
7576 if (isec == section_count)
7577 break;
7578 }
84d1d650
L
7579 }
7580 }
7581
5d695627
AM
7582 if (section_count == 0)
7583 map->p_vaddr_offset = segment->p_vaddr;
30fe1832
AM
7584 else if (map->p_paddr_valid)
7585 {
7586 /* Account for padding before the first section in the segment. */
7587 bfd_vma hdr_size = 0;
7588 if (map->includes_filehdr)
7589 hdr_size = iehdr->e_ehsize;
7590 if (map->includes_phdrs)
7591 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7592
7593 map->p_vaddr_offset = (map->p_paddr + hdr_size
7594 - (lowest_section ? lowest_section->lma : 0));
7595 }
a76e6f2f 7596
84d1d650
L
7597 map->count = section_count;
7598 *pointer_to_map = map;
7599 pointer_to_map = &map->next;
7600 }
7601
12bd6957 7602 elf_seg_map (obfd) = map_first;
84d1d650
L
7603 return TRUE;
7604}
7605
7606/* Copy private BFD data. This copies or rewrites ELF program header
7607 information. */
7608
7609static bfd_boolean
7610copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7611{
84d1d650
L
7612 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7613 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7614 return TRUE;
7615
7616 if (elf_tdata (ibfd)->phdr == NULL)
7617 return TRUE;
7618
7619 if (ibfd->xvec == obfd->xvec)
7620 {
cb3ff1e5
NC
7621 /* Check to see if any sections in the input BFD
7622 covered by ELF program header have changed. */
d55ce4e2 7623 Elf_Internal_Phdr *segment;
84d1d650
L
7624 asection *section, *osec;
7625 unsigned int i, num_segments;
7626 Elf_Internal_Shdr *this_hdr;
147d51c2
L
7627 const struct elf_backend_data *bed;
7628
7629 bed = get_elf_backend_data (ibfd);
7630
7631 /* Regenerate the segment map if p_paddr is set to 0. */
7632 if (bed->want_p_paddr_set_to_zero)
7633 goto rewrite;
84d1d650
L
7634
7635 /* Initialize the segment mark field. */
7636 for (section = obfd->sections; section != NULL;
7637 section = section->next)
7638 section->segment_mark = FALSE;
7639
7640 num_segments = elf_elfheader (ibfd)->e_phnum;
7641 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7642 i < num_segments;
7643 i++, segment++)
7644 {
5f6999aa
NC
7645 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7646 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7647 which severly confuses things, so always regenerate the segment
7648 map in this case. */
7649 if (segment->p_paddr == 0
7650 && segment->p_memsz == 0
7651 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 7652 goto rewrite;
5f6999aa 7653
84d1d650
L
7654 for (section = ibfd->sections;
7655 section != NULL; section = section->next)
7656 {
7657 /* We mark the output section so that we know it comes
7658 from the input BFD. */
7659 osec = section->output_section;
7660 if (osec)
7661 osec->segment_mark = TRUE;
7662
7663 /* Check if this section is covered by the segment. */
7664 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7665 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
7666 {
7667 /* FIXME: Check if its output section is changed or
7668 removed. What else do we need to check? */
7669 if (osec == NULL
7670 || section->flags != osec->flags
7671 || section->lma != osec->lma
7672 || section->vma != osec->vma
7673 || section->size != osec->size
7674 || section->rawsize != osec->rawsize
7675 || section->alignment_power != osec->alignment_power)
7676 goto rewrite;
7677 }
7678 }
7679 }
7680
cb3ff1e5 7681 /* Check to see if any output section do not come from the
84d1d650
L
7682 input BFD. */
7683 for (section = obfd->sections; section != NULL;
7684 section = section->next)
7685 {
535b785f 7686 if (!section->segment_mark)
84d1d650
L
7687 goto rewrite;
7688 else
7689 section->segment_mark = FALSE;
7690 }
7691
7692 return copy_elf_program_header (ibfd, obfd);
7693 }
7694
7695rewrite:
f1d85785
L
7696 if (ibfd->xvec == obfd->xvec)
7697 {
7698 /* When rewriting program header, set the output maxpagesize to
7699 the maximum alignment of input PT_LOAD segments. */
7700 Elf_Internal_Phdr *segment;
7701 unsigned int i;
7702 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7703 bfd_vma maxpagesize = 0;
7704
7705 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7706 i < num_segments;
7707 i++, segment++)
7708 if (segment->p_type == PT_LOAD
7709 && maxpagesize < segment->p_align)
c86934ce
NC
7710 {
7711 /* PR 17512: file: f17299af. */
7712 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
695344c0 7713 /* xgettext:c-format */
2dcf00ce
AM
7714 _bfd_error_handler (_("%pB: warning: segment alignment of %#"
7715 PRIx64 " is too large"),
7716 ibfd, (uint64_t) segment->p_align);
c86934ce
NC
7717 else
7718 maxpagesize = segment->p_align;
7719 }
f1d85785
L
7720
7721 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
7722 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
7723 }
7724
84d1d650
L
7725 return rewrite_elf_program_header (ibfd, obfd);
7726}
7727
ccd2ec6a
L
7728/* Initialize private output section information from input section. */
7729
7730bfd_boolean
7731_bfd_elf_init_private_section_data (bfd *ibfd,
7732 asection *isec,
7733 bfd *obfd,
7734 asection *osec,
7735 struct bfd_link_info *link_info)
7736
7737{
7738 Elf_Internal_Shdr *ihdr, *ohdr;
0e1862bb
L
7739 bfd_boolean final_link = (link_info != NULL
7740 && !bfd_link_relocatable (link_info));
ccd2ec6a
L
7741
7742 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7743 || obfd->xvec->flavour != bfd_target_elf_flavour)
7744 return TRUE;
7745
ba85c43e
NC
7746 BFD_ASSERT (elf_section_data (osec) != NULL);
7747
dfa7b0b8
AM
7748 /* For objcopy and relocatable link, don't copy the output ELF
7749 section type from input if the output BFD section flags have been
7750 set to something different. For a final link allow some flags
7751 that the linker clears to differ. */
42bb2e33 7752 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
7753 && (osec->flags == isec->flags
7754 || (final_link
7755 && ((osec->flags ^ isec->flags)
0814be7d 7756 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 7757 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
7758
7759 /* FIXME: Is this correct for all OS/PROC specific flags? */
7760 elf_section_flags (osec) |= (elf_section_flags (isec)
7761 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a 7762
a91e1603 7763 /* Copy sh_info from input for mbind section. */
df3a023b
AM
7764 if ((elf_tdata (ibfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0
7765 && elf_section_flags (isec) & SHF_GNU_MBIND)
a91e1603
L
7766 elf_section_data (osec)->this_hdr.sh_info
7767 = elf_section_data (isec)->this_hdr.sh_info;
7768
ccd2ec6a
L
7769 /* Set things up for objcopy and relocatable link. The output
7770 SHT_GROUP section will have its elf_next_in_group pointing back
7771 to the input group members. Ignore linker created group section.
7772 See elfNN_ia64_object_p in elfxx-ia64.c. */
7bdf4127
AB
7773 if ((link_info == NULL
7774 || !link_info->resolve_section_groups)
7775 && (elf_sec_group (isec) == NULL
7776 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0))
ccd2ec6a 7777 {
7bdf4127
AB
7778 if (elf_section_flags (isec) & SHF_GROUP)
7779 elf_section_flags (osec) |= SHF_GROUP;
7780 elf_next_in_group (osec) = elf_next_in_group (isec);
7781 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
7782 }
7783
7bdf4127
AB
7784 /* If not decompress, preserve SHF_COMPRESSED. */
7785 if (!final_link && (ibfd->flags & BFD_DECOMPRESS) == 0)
7786 elf_section_flags (osec) |= (elf_section_flags (isec)
7787 & SHF_COMPRESSED);
7788
ccd2ec6a
L
7789 ihdr = &elf_section_data (isec)->this_hdr;
7790
7791 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7792 don't use the output section of the linked-to section since it
7793 may be NULL at this point. */
7794 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7795 {
7796 ohdr = &elf_section_data (osec)->this_hdr;
7797 ohdr->sh_flags |= SHF_LINK_ORDER;
7798 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7799 }
7800
7801 osec->use_rela_p = isec->use_rela_p;
7802
7803 return TRUE;
7804}
7805
252b5132
RH
7806/* Copy private section information. This copies over the entsize
7807 field, and sometimes the info field. */
7808
b34976b6 7809bfd_boolean
217aa764
AM
7810_bfd_elf_copy_private_section_data (bfd *ibfd,
7811 asection *isec,
7812 bfd *obfd,
7813 asection *osec)
252b5132
RH
7814{
7815 Elf_Internal_Shdr *ihdr, *ohdr;
7816
7817 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7818 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 7819 return TRUE;
252b5132 7820
252b5132
RH
7821 ihdr = &elf_section_data (isec)->this_hdr;
7822 ohdr = &elf_section_data (osec)->this_hdr;
7823
7824 ohdr->sh_entsize = ihdr->sh_entsize;
7825
7826 if (ihdr->sh_type == SHT_SYMTAB
7827 || ihdr->sh_type == SHT_DYNSYM
7828 || ihdr->sh_type == SHT_GNU_verneed
7829 || ihdr->sh_type == SHT_GNU_verdef)
7830 ohdr->sh_info = ihdr->sh_info;
7831
ccd2ec6a
L
7832 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7833 NULL);
252b5132
RH
7834}
7835
d0bf826b
AM
7836/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7837 necessary if we are removing either the SHT_GROUP section or any of
7838 the group member sections. DISCARDED is the value that a section's
7839 output_section has if the section will be discarded, NULL when this
7840 function is called from objcopy, bfd_abs_section_ptr when called
7841 from the linker. */
80fccad2
BW
7842
7843bfd_boolean
d0bf826b 7844_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 7845{
30288845
AM
7846 asection *isec;
7847
30288845 7848 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 7849 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
7850 {
7851 asection *first = elf_next_in_group (isec);
7852 asection *s = first;
d0bf826b
AM
7853 bfd_size_type removed = 0;
7854
30288845
AM
7855 while (s != NULL)
7856 {
415f38a6
AM
7857 /* If this member section is being output but the
7858 SHT_GROUP section is not, then clear the group info
7859 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
7860 if (s->output_section != discarded
7861 && isec->output_section == discarded)
30288845
AM
7862 {
7863 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7864 elf_group_name (s->output_section) = NULL;
7865 }
415f38a6
AM
7866 /* Conversely, if the member section is not being output
7867 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
7868 else if (s->output_section == discarded
7869 && isec->output_section != discarded)
6e5e9d58
AM
7870 {
7871 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
7872 removed += 4;
7873 if (elf_sec->rel.hdr != NULL
7874 && (elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0)
7875 removed += 4;
7876 if (elf_sec->rela.hdr != NULL
7877 && (elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0)
7878 removed += 4;
7879 }
30288845
AM
7880 s = elf_next_in_group (s);
7881 if (s == first)
7882 break;
7883 }
d0bf826b
AM
7884 if (removed != 0)
7885 {
7886 if (discarded != NULL)
7887 {
7888 /* If we've been called for ld -r, then we need to
6e5e9d58 7889 adjust the input section size. */
d0bf826b
AM
7890 if (isec->rawsize == 0)
7891 isec->rawsize = isec->size;
7892 isec->size = isec->rawsize - removed;
6e5e9d58
AM
7893 if (isec->size <= 4)
7894 {
7895 isec->size = 0;
7896 isec->flags |= SEC_EXCLUDE;
7897 }
d0bf826b
AM
7898 }
7899 else
7900 {
7901 /* Adjust the output section size when called from
7902 objcopy. */
7903 isec->output_section->size -= removed;
6e5e9d58
AM
7904 if (isec->output_section->size <= 4)
7905 {
7906 isec->output_section->size = 0;
7907 isec->output_section->flags |= SEC_EXCLUDE;
7908 }
d0bf826b
AM
7909 }
7910 }
30288845
AM
7911 }
7912
80fccad2
BW
7913 return TRUE;
7914}
7915
d0bf826b
AM
7916/* Copy private header information. */
7917
7918bfd_boolean
7919_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
7920{
7921 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7922 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7923 return TRUE;
7924
7925 /* Copy over private BFD data if it has not already been copied.
7926 This must be done here, rather than in the copy_private_bfd_data
7927 entry point, because the latter is called after the section
7928 contents have been set, which means that the program headers have
7929 already been worked out. */
12bd6957 7930 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
d0bf826b
AM
7931 {
7932 if (! copy_private_bfd_data (ibfd, obfd))
7933 return FALSE;
7934 }
7935
7936 return _bfd_elf_fixup_group_sections (ibfd, NULL);
7937}
7938
252b5132
RH
7939/* Copy private symbol information. If this symbol is in a section
7940 which we did not map into a BFD section, try to map the section
7941 index correctly. We use special macro definitions for the mapped
7942 section indices; these definitions are interpreted by the
7943 swap_out_syms function. */
7944
9ad5cbcf
AM
7945#define MAP_ONESYMTAB (SHN_HIOS + 1)
7946#define MAP_DYNSYMTAB (SHN_HIOS + 2)
7947#define MAP_STRTAB (SHN_HIOS + 3)
7948#define MAP_SHSTRTAB (SHN_HIOS + 4)
7949#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 7950
b34976b6 7951bfd_boolean
217aa764
AM
7952_bfd_elf_copy_private_symbol_data (bfd *ibfd,
7953 asymbol *isymarg,
7954 bfd *obfd,
7955 asymbol *osymarg)
252b5132
RH
7956{
7957 elf_symbol_type *isym, *osym;
7958
7959 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7960 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 7961 return TRUE;
252b5132
RH
7962
7963 isym = elf_symbol_from (ibfd, isymarg);
7964 osym = elf_symbol_from (obfd, osymarg);
7965
7966 if (isym != NULL
8424d8f5 7967 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
7968 && osym != NULL
7969 && bfd_is_abs_section (isym->symbol.section))
7970 {
7971 unsigned int shndx;
7972
7973 shndx = isym->internal_elf_sym.st_shndx;
7974 if (shndx == elf_onesymtab (ibfd))
7975 shndx = MAP_ONESYMTAB;
7976 else if (shndx == elf_dynsymtab (ibfd))
7977 shndx = MAP_DYNSYMTAB;
12bd6957 7978 else if (shndx == elf_strtab_sec (ibfd))
252b5132 7979 shndx = MAP_STRTAB;
12bd6957 7980 else if (shndx == elf_shstrtab_sec (ibfd))
252b5132 7981 shndx = MAP_SHSTRTAB;
6a40cf0c 7982 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
9ad5cbcf 7983 shndx = MAP_SYM_SHNDX;
252b5132
RH
7984 osym->internal_elf_sym.st_shndx = shndx;
7985 }
7986
b34976b6 7987 return TRUE;
252b5132
RH
7988}
7989
7990/* Swap out the symbols. */
7991
b34976b6 7992static bfd_boolean
217aa764 7993swap_out_syms (bfd *abfd,
ef10c3ac 7994 struct elf_strtab_hash **sttp,
217aa764 7995 int relocatable_p)
252b5132 7996{
9c5bfbb7 7997 const struct elf_backend_data *bed;
079e9a2f
AM
7998 int symcount;
7999 asymbol **syms;
ef10c3ac 8000 struct elf_strtab_hash *stt;
079e9a2f 8001 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 8002 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 8003 Elf_Internal_Shdr *symstrtab_hdr;
ef10c3ac 8004 struct elf_sym_strtab *symstrtab;
f075ee0c
AM
8005 bfd_byte *outbound_syms;
8006 bfd_byte *outbound_shndx;
ef10c3ac
L
8007 unsigned long outbound_syms_index;
8008 unsigned long outbound_shndx_index;
079e9a2f 8009 int idx;
12bd6957 8010 unsigned int num_locals;
079e9a2f 8011 bfd_size_type amt;
174fd7f9 8012 bfd_boolean name_local_sections;
252b5132 8013
12bd6957 8014 if (!elf_map_symbols (abfd, &num_locals))
b34976b6 8015 return FALSE;
252b5132 8016
c044fabd 8017 /* Dump out the symtabs. */
ef10c3ac 8018 stt = _bfd_elf_strtab_init ();
079e9a2f 8019 if (stt == NULL)
b34976b6 8020 return FALSE;
252b5132 8021
079e9a2f
AM
8022 bed = get_elf_backend_data (abfd);
8023 symcount = bfd_get_symcount (abfd);
8024 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
8025 symtab_hdr->sh_type = SHT_SYMTAB;
8026 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
8027 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
12bd6957 8028 symtab_hdr->sh_info = num_locals + 1;
72de5009 8029 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
8030
8031 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
8032 symstrtab_hdr->sh_type = SHT_STRTAB;
8033
ef10c3ac 8034 /* Allocate buffer to swap out the .strtab section. */
7a6e0d89
AM
8035 symstrtab = (struct elf_sym_strtab *) bfd_malloc2 (symcount + 1,
8036 sizeof (*symstrtab));
ef10c3ac
L
8037 if (symstrtab == NULL)
8038 {
8039 _bfd_elf_strtab_free (stt);
8040 return FALSE;
8041 }
8042
a50b1753 8043 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
07d6d2b8 8044 bed->s->sizeof_sym);
079e9a2f 8045 if (outbound_syms == NULL)
5ed6aba4 8046 {
ef10c3ac
L
8047error_return:
8048 _bfd_elf_strtab_free (stt);
8049 free (symstrtab);
5ed6aba4
NC
8050 return FALSE;
8051 }
217aa764 8052 symtab_hdr->contents = outbound_syms;
ef10c3ac 8053 outbound_syms_index = 0;
252b5132 8054
9ad5cbcf 8055 outbound_shndx = NULL;
ef10c3ac 8056 outbound_shndx_index = 0;
6a40cf0c
NC
8057
8058 if (elf_symtab_shndx_list (abfd))
9ad5cbcf 8059 {
6a40cf0c
NC
8060 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
8061 if (symtab_shndx_hdr->sh_name != 0)
8062 {
8063 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
8064 outbound_shndx = (bfd_byte *)
8065 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
8066 if (outbound_shndx == NULL)
8067 goto error_return;
5ed6aba4 8068
6a40cf0c
NC
8069 symtab_shndx_hdr->contents = outbound_shndx;
8070 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
8071 symtab_shndx_hdr->sh_size = amt;
8072 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
8073 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
8074 }
8075 /* FIXME: What about any other headers in the list ? */
9ad5cbcf
AM
8076 }
8077
589e6347 8078 /* Now generate the data (for "contents"). */
079e9a2f
AM
8079 {
8080 /* Fill in zeroth symbol and swap it out. */
8081 Elf_Internal_Sym sym;
8082 sym.st_name = 0;
8083 sym.st_value = 0;
8084 sym.st_size = 0;
8085 sym.st_info = 0;
8086 sym.st_other = 0;
8087 sym.st_shndx = SHN_UNDEF;
35fc36a8 8088 sym.st_target_internal = 0;
ef10c3ac
L
8089 symstrtab[0].sym = sym;
8090 symstrtab[0].dest_index = outbound_syms_index;
8091 symstrtab[0].destshndx_index = outbound_shndx_index;
8092 outbound_syms_index++;
9ad5cbcf 8093 if (outbound_shndx != NULL)
ef10c3ac 8094 outbound_shndx_index++;
079e9a2f 8095 }
252b5132 8096
174fd7f9
RS
8097 name_local_sections
8098 = (bed->elf_backend_name_local_section_symbols
8099 && bed->elf_backend_name_local_section_symbols (abfd));
8100
079e9a2f 8101 syms = bfd_get_outsymbols (abfd);
ef10c3ac 8102 for (idx = 0; idx < symcount;)
252b5132 8103 {
252b5132 8104 Elf_Internal_Sym sym;
079e9a2f
AM
8105 bfd_vma value = syms[idx]->value;
8106 elf_symbol_type *type_ptr;
8107 flagword flags = syms[idx]->flags;
8108 int type;
252b5132 8109
174fd7f9
RS
8110 if (!name_local_sections
8111 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
8112 {
8113 /* Local section symbols have no name. */
ef10c3ac 8114 sym.st_name = (unsigned long) -1;
079e9a2f
AM
8115 }
8116 else
8117 {
ef10c3ac
L
8118 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
8119 to get the final offset for st_name. */
8120 sym.st_name
8121 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
8122 FALSE);
079e9a2f 8123 if (sym.st_name == (unsigned long) -1)
ef10c3ac 8124 goto error_return;
079e9a2f 8125 }
252b5132 8126
079e9a2f 8127 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 8128
079e9a2f
AM
8129 if ((flags & BSF_SECTION_SYM) == 0
8130 && bfd_is_com_section (syms[idx]->section))
8131 {
8132 /* ELF common symbols put the alignment into the `value' field,
8133 and the size into the `size' field. This is backwards from
8134 how BFD handles it, so reverse it here. */
8135 sym.st_size = value;
8136 if (type_ptr == NULL
8137 || type_ptr->internal_elf_sym.st_value == 0)
8138 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
8139 else
8140 sym.st_value = type_ptr->internal_elf_sym.st_value;
8141 sym.st_shndx = _bfd_elf_section_from_bfd_section
8142 (abfd, syms[idx]->section);
8143 }
8144 else
8145 {
8146 asection *sec = syms[idx]->section;
cb33740c 8147 unsigned int shndx;
252b5132 8148
079e9a2f
AM
8149 if (sec->output_section)
8150 {
8151 value += sec->output_offset;
8152 sec = sec->output_section;
8153 }
589e6347 8154
079e9a2f
AM
8155 /* Don't add in the section vma for relocatable output. */
8156 if (! relocatable_p)
8157 value += sec->vma;
8158 sym.st_value = value;
8159 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
8160
8161 if (bfd_is_abs_section (sec)
8162 && type_ptr != NULL
8163 && type_ptr->internal_elf_sym.st_shndx != 0)
8164 {
8165 /* This symbol is in a real ELF section which we did
8166 not create as a BFD section. Undo the mapping done
8167 by copy_private_symbol_data. */
8168 shndx = type_ptr->internal_elf_sym.st_shndx;
8169 switch (shndx)
8170 {
8171 case MAP_ONESYMTAB:
8172 shndx = elf_onesymtab (abfd);
8173 break;
8174 case MAP_DYNSYMTAB:
8175 shndx = elf_dynsymtab (abfd);
8176 break;
8177 case MAP_STRTAB:
12bd6957 8178 shndx = elf_strtab_sec (abfd);
079e9a2f
AM
8179 break;
8180 case MAP_SHSTRTAB:
12bd6957 8181 shndx = elf_shstrtab_sec (abfd);
079e9a2f 8182 break;
9ad5cbcf 8183 case MAP_SYM_SHNDX:
6a40cf0c
NC
8184 if (elf_symtab_shndx_list (abfd))
8185 shndx = elf_symtab_shndx_list (abfd)->ndx;
9ad5cbcf 8186 break;
079e9a2f 8187 default:
15bc576a 8188 shndx = SHN_ABS;
079e9a2f
AM
8189 break;
8190 }
8191 }
8192 else
8193 {
8194 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 8195
cb33740c 8196 if (shndx == SHN_BAD)
079e9a2f
AM
8197 {
8198 asection *sec2;
8199
8200 /* Writing this would be a hell of a lot easier if
8201 we had some decent documentation on bfd, and
8202 knew what to expect of the library, and what to
8203 demand of applications. For example, it
8204 appears that `objcopy' might not set the
8205 section of a symbol to be a section that is
8206 actually in the output file. */
8207 sec2 = bfd_get_section_by_name (abfd, sec->name);
5df1bc57
AM
8208 if (sec2 != NULL)
8209 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
8210 if (shndx == SHN_BAD)
589e6347 8211 {
695344c0 8212 /* xgettext:c-format */
9793eb77
AM
8213 _bfd_error_handler
8214 (_("unable to find equivalent output section"
8215 " for symbol '%s' from section '%s'"),
8216 syms[idx]->name ? syms[idx]->name : "<Local sym>",
8217 sec->name);
811072d8 8218 bfd_set_error (bfd_error_invalid_operation);
ef10c3ac 8219 goto error_return;
589e6347 8220 }
079e9a2f
AM
8221 }
8222 }
252b5132 8223
079e9a2f
AM
8224 sym.st_shndx = shndx;
8225 }
252b5132 8226
13ae64f3
JJ
8227 if ((flags & BSF_THREAD_LOCAL) != 0)
8228 type = STT_TLS;
d8045f23
NC
8229 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
8230 type = STT_GNU_IFUNC;
13ae64f3 8231 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
8232 type = STT_FUNC;
8233 else if ((flags & BSF_OBJECT) != 0)
8234 type = STT_OBJECT;
d9352518
DB
8235 else if ((flags & BSF_RELC) != 0)
8236 type = STT_RELC;
8237 else if ((flags & BSF_SRELC) != 0)
8238 type = STT_SRELC;
079e9a2f
AM
8239 else
8240 type = STT_NOTYPE;
252b5132 8241
13ae64f3
JJ
8242 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
8243 type = STT_TLS;
8244
589e6347 8245 /* Processor-specific types. */
079e9a2f
AM
8246 if (type_ptr != NULL
8247 && bed->elf_backend_get_symbol_type)
8248 type = ((*bed->elf_backend_get_symbol_type)
8249 (&type_ptr->internal_elf_sym, type));
252b5132 8250
079e9a2f
AM
8251 if (flags & BSF_SECTION_SYM)
8252 {
8253 if (flags & BSF_GLOBAL)
8254 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
8255 else
8256 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8257 }
8258 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 8259 {
b8871f35
L
8260 if (type != STT_TLS)
8261 {
8262 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
8263 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
8264 ? STT_COMMON : STT_OBJECT);
8265 else
8266 type = ((flags & BSF_ELF_COMMON) != 0
8267 ? STT_COMMON : STT_OBJECT);
8268 }
8269 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 8270 }
079e9a2f
AM
8271 else if (bfd_is_und_section (syms[idx]->section))
8272 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
8273 ? STB_WEAK
8274 : STB_GLOBAL),
8275 type);
8276 else if (flags & BSF_FILE)
8277 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
8278 else
8279 {
8280 int bind = STB_LOCAL;
252b5132 8281
079e9a2f
AM
8282 if (flags & BSF_LOCAL)
8283 bind = STB_LOCAL;
3e7a7d11
NC
8284 else if (flags & BSF_GNU_UNIQUE)
8285 bind = STB_GNU_UNIQUE;
079e9a2f
AM
8286 else if (flags & BSF_WEAK)
8287 bind = STB_WEAK;
8288 else if (flags & BSF_GLOBAL)
8289 bind = STB_GLOBAL;
252b5132 8290
079e9a2f
AM
8291 sym.st_info = ELF_ST_INFO (bind, type);
8292 }
252b5132 8293
079e9a2f 8294 if (type_ptr != NULL)
35fc36a8
RS
8295 {
8296 sym.st_other = type_ptr->internal_elf_sym.st_other;
8297 sym.st_target_internal
8298 = type_ptr->internal_elf_sym.st_target_internal;
8299 }
079e9a2f 8300 else
35fc36a8
RS
8301 {
8302 sym.st_other = 0;
8303 sym.st_target_internal = 0;
8304 }
252b5132 8305
ef10c3ac
L
8306 idx++;
8307 symstrtab[idx].sym = sym;
8308 symstrtab[idx].dest_index = outbound_syms_index;
8309 symstrtab[idx].destshndx_index = outbound_shndx_index;
8310
8311 outbound_syms_index++;
9ad5cbcf 8312 if (outbound_shndx != NULL)
ef10c3ac
L
8313 outbound_shndx_index++;
8314 }
8315
8316 /* Finalize the .strtab section. */
8317 _bfd_elf_strtab_finalize (stt);
8318
8319 /* Swap out the .strtab section. */
8320 for (idx = 0; idx <= symcount; idx++)
8321 {
8322 struct elf_sym_strtab *elfsym = &symstrtab[idx];
8323 if (elfsym->sym.st_name == (unsigned long) -1)
8324 elfsym->sym.st_name = 0;
8325 else
8326 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
8327 elfsym->sym.st_name);
8328 bed->s->swap_symbol_out (abfd, &elfsym->sym,
8329 (outbound_syms
8330 + (elfsym->dest_index
8331 * bed->s->sizeof_sym)),
8332 (outbound_shndx
8333 + (elfsym->destshndx_index
8334 * sizeof (Elf_External_Sym_Shndx))));
079e9a2f 8335 }
ef10c3ac 8336 free (symstrtab);
252b5132 8337
079e9a2f 8338 *sttp = stt;
ef10c3ac 8339 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
079e9a2f 8340 symstrtab_hdr->sh_type = SHT_STRTAB;
84865015 8341 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
079e9a2f
AM
8342 symstrtab_hdr->sh_addr = 0;
8343 symstrtab_hdr->sh_entsize = 0;
8344 symstrtab_hdr->sh_link = 0;
8345 symstrtab_hdr->sh_info = 0;
8346 symstrtab_hdr->sh_addralign = 1;
252b5132 8347
b34976b6 8348 return TRUE;
252b5132
RH
8349}
8350
8351/* Return the number of bytes required to hold the symtab vector.
8352
8353 Note that we base it on the count plus 1, since we will null terminate
8354 the vector allocated based on this size. However, the ELF symbol table
8355 always has a dummy entry as symbol #0, so it ends up even. */
8356
8357long
217aa764 8358_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132 8359{
3a551c7a 8360 bfd_size_type symcount;
252b5132
RH
8361 long symtab_size;
8362 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
8363
8364 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
3a551c7a
AM
8365 if (symcount >= LONG_MAX / sizeof (asymbol *))
8366 {
8367 bfd_set_error (bfd_error_file_too_big);
8368 return -1;
8369 }
b99d1833
AM
8370 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8371 if (symcount > 0)
8372 symtab_size -= sizeof (asymbol *);
252b5132
RH
8373
8374 return symtab_size;
8375}
8376
8377long
217aa764 8378_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132 8379{
3a551c7a 8380 bfd_size_type symcount;
252b5132
RH
8381 long symtab_size;
8382 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
8383
8384 if (elf_dynsymtab (abfd) == 0)
8385 {
8386 bfd_set_error (bfd_error_invalid_operation);
8387 return -1;
8388 }
8389
8390 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
3a551c7a
AM
8391 if (symcount >= LONG_MAX / sizeof (asymbol *))
8392 {
8393 bfd_set_error (bfd_error_file_too_big);
8394 return -1;
8395 }
b99d1833
AM
8396 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8397 if (symcount > 0)
8398 symtab_size -= sizeof (asymbol *);
252b5132
RH
8399
8400 return symtab_size;
8401}
8402
8403long
217aa764
AM
8404_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
8405 sec_ptr asect)
252b5132 8406{
242a1159 8407#if SIZEOF_LONG == SIZEOF_INT
7a6e0d89
AM
8408 if (asect->reloc_count >= LONG_MAX / sizeof (arelent *))
8409 {
8410 bfd_set_error (bfd_error_file_too_big);
8411 return -1;
8412 }
242a1159 8413#endif
252b5132
RH
8414 return (asect->reloc_count + 1) * sizeof (arelent *);
8415}
8416
8417/* Canonicalize the relocs. */
8418
8419long
217aa764
AM
8420_bfd_elf_canonicalize_reloc (bfd *abfd,
8421 sec_ptr section,
8422 arelent **relptr,
8423 asymbol **symbols)
252b5132
RH
8424{
8425 arelent *tblptr;
8426 unsigned int i;
9c5bfbb7 8427 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 8428
b34976b6 8429 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
8430 return -1;
8431
8432 tblptr = section->relocation;
8433 for (i = 0; i < section->reloc_count; i++)
8434 *relptr++ = tblptr++;
8435
8436 *relptr = NULL;
8437
8438 return section->reloc_count;
8439}
8440
8441long
6cee3f79 8442_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 8443{
9c5bfbb7 8444 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 8445 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
8446
8447 if (symcount >= 0)
ed48ec2e 8448 abfd->symcount = symcount;
252b5132
RH
8449 return symcount;
8450}
8451
8452long
217aa764
AM
8453_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
8454 asymbol **allocation)
252b5132 8455{
9c5bfbb7 8456 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 8457 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
8458
8459 if (symcount >= 0)
ed48ec2e 8460 abfd->dynsymcount = symcount;
1f70368c 8461 return symcount;
252b5132
RH
8462}
8463
8615f3f2
AM
8464/* Return the size required for the dynamic reloc entries. Any loadable
8465 section that was actually installed in the BFD, and has type SHT_REL
8466 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
8467 dynamic reloc section. */
252b5132
RH
8468
8469long
217aa764 8470_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132 8471{
3a551c7a 8472 bfd_size_type count;
252b5132
RH
8473 asection *s;
8474
8475 if (elf_dynsymtab (abfd) == 0)
8476 {
8477 bfd_set_error (bfd_error_invalid_operation);
8478 return -1;
8479 }
8480
3a551c7a 8481 count = 1;
252b5132 8482 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 8483 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
8484 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8485 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
3a551c7a
AM
8486 {
8487 count += s->size / elf_section_data (s)->this_hdr.sh_entsize;
8488 if (count > LONG_MAX / sizeof (arelent *))
8489 {
8490 bfd_set_error (bfd_error_file_too_big);
8491 return -1;
8492 }
8493 }
8494 return count * sizeof (arelent *);
252b5132
RH
8495}
8496
8615f3f2
AM
8497/* Canonicalize the dynamic relocation entries. Note that we return the
8498 dynamic relocations as a single block, although they are actually
8499 associated with particular sections; the interface, which was
8500 designed for SunOS style shared libraries, expects that there is only
8501 one set of dynamic relocs. Any loadable section that was actually
8502 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8503 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
8504
8505long
217aa764
AM
8506_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
8507 arelent **storage,
8508 asymbol **syms)
252b5132 8509{
217aa764 8510 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
8511 asection *s;
8512 long ret;
8513
8514 if (elf_dynsymtab (abfd) == 0)
8515 {
8516 bfd_set_error (bfd_error_invalid_operation);
8517 return -1;
8518 }
8519
8520 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
8521 ret = 0;
8522 for (s = abfd->sections; s != NULL; s = s->next)
8523 {
266b05cf 8524 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
8525 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8526 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8527 {
8528 arelent *p;
8529 long count, i;
8530
b34976b6 8531 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 8532 return -1;
eea6121a 8533 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
8534 p = s->relocation;
8535 for (i = 0; i < count; i++)
8536 *storage++ = p++;
8537 ret += count;
8538 }
8539 }
8540
8541 *storage = NULL;
8542
8543 return ret;
8544}
8545\f
8546/* Read in the version information. */
8547
b34976b6 8548bfd_boolean
fc0e6df6 8549_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
8550{
8551 bfd_byte *contents = NULL;
fc0e6df6
PB
8552 unsigned int freeidx = 0;
8553
8554 if (elf_dynverref (abfd) != 0)
8555 {
8556 Elf_Internal_Shdr *hdr;
8557 Elf_External_Verneed *everneed;
8558 Elf_Internal_Verneed *iverneed;
8559 unsigned int i;
d0fb9a8d 8560 bfd_byte *contents_end;
fc0e6df6
PB
8561
8562 hdr = &elf_tdata (abfd)->dynverref_hdr;
8563
bd61e135
AM
8564 if (hdr->sh_info == 0
8565 || hdr->sh_info > hdr->sh_size / sizeof (Elf_External_Verneed))
d0fb9a8d 8566 {
601a03ba 8567error_return_bad_verref:
4eca0228 8568 _bfd_error_handler
871b3ab2 8569 (_("%pB: .gnu.version_r invalid entry"), abfd);
601a03ba 8570 bfd_set_error (bfd_error_bad_value);
d0fb9a8d
JJ
8571error_return_verref:
8572 elf_tdata (abfd)->verref = NULL;
8573 elf_tdata (abfd)->cverrefs = 0;
8574 goto error_return;
8575 }
601a03ba 8576
7e56c51c
NC
8577 ufile_ptr filesize = bfd_get_file_size (abfd);
8578 if (filesize > 0 && filesize < hdr->sh_size)
8579 {
8580 /* PR 24708: Avoid attempts to allocate a ridiculous amount
8581 of memory. */
8582 bfd_set_error (bfd_error_no_memory);
8583 _bfd_error_handler
8584 /* xgettext:c-format */
8585 (_("error: %pB version reference section is too large (%#" PRIx64 " bytes)"),
8586 abfd, (uint64_t) hdr->sh_size);
8587 goto error_return_verref;
8588 }
601a03ba
AM
8589 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
8590 if (contents == NULL)
8591 goto error_return_verref;
8592
fc0e6df6
PB
8593 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
8594 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 8595 goto error_return_verref;
fc0e6df6 8596
601a03ba 8597 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
bd61e135 8598 bfd_alloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
601a03ba
AM
8599
8600 if (elf_tdata (abfd)->verref == NULL)
d0fb9a8d
JJ
8601 goto error_return_verref;
8602
8603 BFD_ASSERT (sizeof (Elf_External_Verneed)
8604 == sizeof (Elf_External_Vernaux));
8605 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
8606 everneed = (Elf_External_Verneed *) contents;
8607 iverneed = elf_tdata (abfd)->verref;
8608 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8609 {
8610 Elf_External_Vernaux *evernaux;
8611 Elf_Internal_Vernaux *ivernaux;
8612 unsigned int j;
8613
8614 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8615
8616 iverneed->vn_bfd = abfd;
8617
8618 iverneed->vn_filename =
8619 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8620 iverneed->vn_file);
8621 if (iverneed->vn_filename == NULL)
601a03ba 8622 goto error_return_bad_verref;
fc0e6df6 8623
d0fb9a8d
JJ
8624 if (iverneed->vn_cnt == 0)
8625 iverneed->vn_auxptr = NULL;
8626 else
8627 {
a50b1753 8628 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
07d6d2b8
AM
8629 bfd_alloc2 (abfd, iverneed->vn_cnt,
8630 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
8631 if (iverneed->vn_auxptr == NULL)
8632 goto error_return_verref;
8633 }
8634
8635 if (iverneed->vn_aux
8636 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8637 goto error_return_bad_verref;
fc0e6df6
PB
8638
8639 evernaux = ((Elf_External_Vernaux *)
8640 ((bfd_byte *) everneed + iverneed->vn_aux));
8641 ivernaux = iverneed->vn_auxptr;
8642 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8643 {
8644 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8645
8646 ivernaux->vna_nodename =
8647 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8648 ivernaux->vna_name);
8649 if (ivernaux->vna_nodename == NULL)
601a03ba 8650 goto error_return_bad_verref;
fc0e6df6 8651
25ff461f
AM
8652 if (ivernaux->vna_other > freeidx)
8653 freeidx = ivernaux->vna_other;
8654
8655 ivernaux->vna_nextptr = NULL;
8656 if (ivernaux->vna_next == 0)
8657 {
8658 iverneed->vn_cnt = j + 1;
8659 break;
8660 }
fc0e6df6
PB
8661 if (j + 1 < iverneed->vn_cnt)
8662 ivernaux->vna_nextptr = ivernaux + 1;
fc0e6df6 8663
d0fb9a8d
JJ
8664 if (ivernaux->vna_next
8665 > (size_t) (contents_end - (bfd_byte *) evernaux))
601a03ba 8666 goto error_return_bad_verref;
d0fb9a8d 8667
fc0e6df6
PB
8668 evernaux = ((Elf_External_Vernaux *)
8669 ((bfd_byte *) evernaux + ivernaux->vna_next));
fc0e6df6
PB
8670 }
8671
25ff461f
AM
8672 iverneed->vn_nextref = NULL;
8673 if (iverneed->vn_next == 0)
8674 break;
fc0e6df6
PB
8675 if (i + 1 < hdr->sh_info)
8676 iverneed->vn_nextref = iverneed + 1;
fc0e6df6 8677
d0fb9a8d
JJ
8678 if (iverneed->vn_next
8679 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8680 goto error_return_bad_verref;
d0fb9a8d 8681
fc0e6df6
PB
8682 everneed = ((Elf_External_Verneed *)
8683 ((bfd_byte *) everneed + iverneed->vn_next));
8684 }
25ff461f 8685 elf_tdata (abfd)->cverrefs = i;
fc0e6df6
PB
8686
8687 free (contents);
8688 contents = NULL;
8689 }
252b5132
RH
8690
8691 if (elf_dynverdef (abfd) != 0)
8692 {
8693 Elf_Internal_Shdr *hdr;
8694 Elf_External_Verdef *everdef;
8695 Elf_Internal_Verdef *iverdef;
f631889e
UD
8696 Elf_Internal_Verdef *iverdefarr;
8697 Elf_Internal_Verdef iverdefmem;
252b5132 8698 unsigned int i;
062e2358 8699 unsigned int maxidx;
d0fb9a8d 8700 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
8701
8702 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8703
601a03ba
AM
8704 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
8705 {
8706 error_return_bad_verdef:
4eca0228 8707 _bfd_error_handler
871b3ab2 8708 (_("%pB: .gnu.version_d invalid entry"), abfd);
601a03ba
AM
8709 bfd_set_error (bfd_error_bad_value);
8710 error_return_verdef:
8711 elf_tdata (abfd)->verdef = NULL;
8712 elf_tdata (abfd)->cverdefs = 0;
8713 goto error_return;
8714 }
8715
a50b1753 8716 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132 8717 if (contents == NULL)
601a03ba 8718 goto error_return_verdef;
252b5132 8719 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 8720 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
601a03ba 8721 goto error_return_verdef;
d0fb9a8d
JJ
8722
8723 BFD_ASSERT (sizeof (Elf_External_Verdef)
8724 >= sizeof (Elf_External_Verdaux));
8725 contents_end_def = contents + hdr->sh_size
8726 - sizeof (Elf_External_Verdef);
8727 contents_end_aux = contents + hdr->sh_size
8728 - sizeof (Elf_External_Verdaux);
8729
f631889e
UD
8730 /* We know the number of entries in the section but not the maximum
8731 index. Therefore we have to run through all entries and find
8732 the maximum. */
252b5132 8733 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
8734 maxidx = 0;
8735 for (i = 0; i < hdr->sh_info; ++i)
8736 {
8737 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8738
601a03ba
AM
8739 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
8740 goto error_return_bad_verdef;
062e2358
AM
8741 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
8742 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 8743
25ff461f
AM
8744 if (iverdefmem.vd_next == 0)
8745 break;
8746
d0fb9a8d
JJ
8747 if (iverdefmem.vd_next
8748 > (size_t) (contents_end_def - (bfd_byte *) everdef))
601a03ba 8749 goto error_return_bad_verdef;
d0fb9a8d 8750
f631889e
UD
8751 everdef = ((Elf_External_Verdef *)
8752 ((bfd_byte *) everdef + iverdefmem.vd_next));
8753 }
8754
fc0e6df6
PB
8755 if (default_imported_symver)
8756 {
8757 if (freeidx > maxidx)
8758 maxidx = ++freeidx;
8759 else
8760 freeidx = ++maxidx;
8761 }
201159ec 8762
601a03ba
AM
8763 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
8764 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e 8765 if (elf_tdata (abfd)->verdef == NULL)
601a03ba 8766 goto error_return_verdef;
f631889e
UD
8767
8768 elf_tdata (abfd)->cverdefs = maxidx;
8769
8770 everdef = (Elf_External_Verdef *) contents;
8771 iverdefarr = elf_tdata (abfd)->verdef;
8772 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
8773 {
8774 Elf_External_Verdaux *everdaux;
8775 Elf_Internal_Verdaux *iverdaux;
8776 unsigned int j;
8777
f631889e
UD
8778 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8779
d0fb9a8d 8780 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
601a03ba 8781 goto error_return_bad_verdef;
d0fb9a8d 8782
f631889e 8783 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
595bce75 8784 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
252b5132
RH
8785
8786 iverdef->vd_bfd = abfd;
8787
d0fb9a8d
JJ
8788 if (iverdef->vd_cnt == 0)
8789 iverdef->vd_auxptr = NULL;
8790 else
8791 {
a50b1753 8792 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
07d6d2b8
AM
8793 bfd_alloc2 (abfd, iverdef->vd_cnt,
8794 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
8795 if (iverdef->vd_auxptr == NULL)
8796 goto error_return_verdef;
8797 }
8798
8799 if (iverdef->vd_aux
8800 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
601a03ba 8801 goto error_return_bad_verdef;
252b5132
RH
8802
8803 everdaux = ((Elf_External_Verdaux *)
8804 ((bfd_byte *) everdef + iverdef->vd_aux));
8805 iverdaux = iverdef->vd_auxptr;
8806 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
8807 {
8808 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
8809
8810 iverdaux->vda_nodename =
8811 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8812 iverdaux->vda_name);
8813 if (iverdaux->vda_nodename == NULL)
601a03ba 8814 goto error_return_bad_verdef;
252b5132 8815
25ff461f
AM
8816 iverdaux->vda_nextptr = NULL;
8817 if (iverdaux->vda_next == 0)
8818 {
8819 iverdef->vd_cnt = j + 1;
8820 break;
8821 }
252b5132
RH
8822 if (j + 1 < iverdef->vd_cnt)
8823 iverdaux->vda_nextptr = iverdaux + 1;
252b5132 8824
d0fb9a8d
JJ
8825 if (iverdaux->vda_next
8826 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
601a03ba 8827 goto error_return_bad_verdef;
d0fb9a8d 8828
252b5132
RH
8829 everdaux = ((Elf_External_Verdaux *)
8830 ((bfd_byte *) everdaux + iverdaux->vda_next));
8831 }
8832
595bce75 8833 iverdef->vd_nodename = NULL;
d0fb9a8d
JJ
8834 if (iverdef->vd_cnt)
8835 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 8836
25ff461f
AM
8837 iverdef->vd_nextdef = NULL;
8838 if (iverdef->vd_next == 0)
8839 break;
d0fb9a8d 8840 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132 8841 iverdef->vd_nextdef = iverdef + 1;
252b5132
RH
8842
8843 everdef = ((Elf_External_Verdef *)
8844 ((bfd_byte *) everdef + iverdef->vd_next));
8845 }
8846
8847 free (contents);
8848 contents = NULL;
8849 }
fc0e6df6 8850 else if (default_imported_symver)
252b5132 8851 {
fc0e6df6
PB
8852 if (freeidx < 3)
8853 freeidx = 3;
8854 else
8855 freeidx++;
252b5132 8856
a50b1753 8857 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
07d6d2b8 8858 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 8859 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
8860 goto error_return;
8861
fc0e6df6
PB
8862 elf_tdata (abfd)->cverdefs = freeidx;
8863 }
252b5132 8864
fc0e6df6
PB
8865 /* Create a default version based on the soname. */
8866 if (default_imported_symver)
8867 {
8868 Elf_Internal_Verdef *iverdef;
8869 Elf_Internal_Verdaux *iverdaux;
252b5132 8870
5bb3703f 8871 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
252b5132 8872
fc0e6df6
PB
8873 iverdef->vd_version = VER_DEF_CURRENT;
8874 iverdef->vd_flags = 0;
8875 iverdef->vd_ndx = freeidx;
8876 iverdef->vd_cnt = 1;
252b5132 8877
fc0e6df6 8878 iverdef->vd_bfd = abfd;
252b5132 8879
fc0e6df6
PB
8880 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
8881 if (iverdef->vd_nodename == NULL)
d0fb9a8d 8882 goto error_return_verdef;
fc0e6df6 8883 iverdef->vd_nextdef = NULL;
601a03ba
AM
8884 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
8885 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
d0fb9a8d
JJ
8886 if (iverdef->vd_auxptr == NULL)
8887 goto error_return_verdef;
252b5132 8888
fc0e6df6
PB
8889 iverdaux = iverdef->vd_auxptr;
8890 iverdaux->vda_nodename = iverdef->vd_nodename;
252b5132
RH
8891 }
8892
b34976b6 8893 return TRUE;
252b5132
RH
8894
8895 error_return:
5ed6aba4 8896 if (contents != NULL)
252b5132 8897 free (contents);
b34976b6 8898 return FALSE;
252b5132
RH
8899}
8900\f
8901asymbol *
217aa764 8902_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
8903{
8904 elf_symbol_type *newsym;
8905
7a6e0d89 8906 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof (*newsym));
252b5132
RH
8907 if (!newsym)
8908 return NULL;
201159ec
NC
8909 newsym->symbol.the_bfd = abfd;
8910 return &newsym->symbol;
252b5132
RH
8911}
8912
8913void
217aa764
AM
8914_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
8915 asymbol *symbol,
8916 symbol_info *ret)
252b5132
RH
8917{
8918 bfd_symbol_info (symbol, ret);
8919}
8920
8921/* Return whether a symbol name implies a local symbol. Most targets
8922 use this function for the is_local_label_name entry point, but some
8923 override it. */
8924
b34976b6 8925bfd_boolean
217aa764
AM
8926_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
8927 const char *name)
252b5132
RH
8928{
8929 /* Normal local symbols start with ``.L''. */
8930 if (name[0] == '.' && name[1] == 'L')
b34976b6 8931 return TRUE;
252b5132
RH
8932
8933 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
8934 DWARF debugging symbols starting with ``..''. */
8935 if (name[0] == '.' && name[1] == '.')
b34976b6 8936 return TRUE;
252b5132
RH
8937
8938 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
8939 emitting DWARF debugging output. I suspect this is actually a
8940 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
8941 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
8942 underscore to be emitted on some ELF targets). For ease of use,
8943 we treat such symbols as local. */
8944 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 8945 return TRUE;
252b5132 8946
b1fa9dd6
NC
8947 /* Treat assembler generated fake symbols, dollar local labels and
8948 forward-backward labels (aka local labels) as locals.
8949 These labels have the form:
8950
07d6d2b8 8951 L0^A.* (fake symbols)
b1fa9dd6
NC
8952
8953 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
8954
8955 Versions which start with .L will have already been matched above,
8956 so we only need to match the rest. */
8957 if (name[0] == 'L' && ISDIGIT (name[1]))
8958 {
8959 bfd_boolean ret = FALSE;
8960 const char * p;
8961 char c;
8962
8963 for (p = name + 2; (c = *p); p++)
8964 {
8965 if (c == 1 || c == 2)
8966 {
8967 if (c == 1 && p == name + 2)
8968 /* A fake symbol. */
8969 return TRUE;
8970
8971 /* FIXME: We are being paranoid here and treating symbols like
8972 L0^Bfoo as if there were non-local, on the grounds that the
8973 assembler will never generate them. But can any symbol
8974 containing an ASCII value in the range 1-31 ever be anything
8975 other than some kind of local ? */
8976 ret = TRUE;
8977 }
8978
8979 if (! ISDIGIT (c))
8980 {
8981 ret = FALSE;
8982 break;
8983 }
8984 }
8985 return ret;
8986 }
ffa54770 8987
b34976b6 8988 return FALSE;
252b5132
RH
8989}
8990
8991alent *
217aa764
AM
8992_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
8993 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
8994{
8995 abort ();
8996 return NULL;
8997}
8998
b34976b6 8999bfd_boolean
217aa764
AM
9000_bfd_elf_set_arch_mach (bfd *abfd,
9001 enum bfd_architecture arch,
9002 unsigned long machine)
252b5132
RH
9003{
9004 /* If this isn't the right architecture for this backend, and this
9005 isn't the generic backend, fail. */
9006 if (arch != get_elf_backend_data (abfd)->arch
9007 && arch != bfd_arch_unknown
9008 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 9009 return FALSE;
252b5132
RH
9010
9011 return bfd_default_set_arch_mach (abfd, arch, machine);
9012}
9013
d1fad7c6
NC
9014/* Find the nearest line to a particular section and offset,
9015 for error reporting. */
9016
b34976b6 9017bfd_boolean
217aa764 9018_bfd_elf_find_nearest_line (bfd *abfd,
217aa764 9019 asymbol **symbols,
fb167eb2 9020 asection *section,
217aa764
AM
9021 bfd_vma offset,
9022 const char **filename_ptr,
9023 const char **functionname_ptr,
fb167eb2
AM
9024 unsigned int *line_ptr,
9025 unsigned int *discriminator_ptr)
d1fad7c6 9026{
b34976b6 9027 bfd_boolean found;
d1fad7c6 9028
fb167eb2 9029 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
4e8a9624 9030 filename_ptr, functionname_ptr,
fb167eb2 9031 line_ptr, discriminator_ptr,
9defd221 9032 dwarf_debug_sections,
e7679060
AM
9033 &elf_tdata (abfd)->dwarf2_find_line_info))
9034 return TRUE;
9035
9036 if (_bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
9037 filename_ptr, functionname_ptr, line_ptr))
d1fad7c6
NC
9038 {
9039 if (!*functionname_ptr)
e00e8198
AM
9040 _bfd_elf_find_function (abfd, symbols, section, offset,
9041 *filename_ptr ? NULL : filename_ptr,
9042 functionname_ptr);
b34976b6 9043 return TRUE;
d1fad7c6
NC
9044 }
9045
9046 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
9047 &found, filename_ptr,
9048 functionname_ptr, line_ptr,
9049 &elf_tdata (abfd)->line_info))
b34976b6 9050 return FALSE;
dc43ada5 9051 if (found && (*functionname_ptr || *line_ptr))
b34976b6 9052 return TRUE;
d1fad7c6
NC
9053
9054 if (symbols == NULL)
b34976b6 9055 return FALSE;
d1fad7c6 9056
e00e8198
AM
9057 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
9058 filename_ptr, functionname_ptr))
b34976b6 9059 return FALSE;
d1fad7c6 9060
252b5132 9061 *line_ptr = 0;
b34976b6 9062 return TRUE;
252b5132
RH
9063}
9064
5420f73d
L
9065/* Find the line for a symbol. */
9066
9067bfd_boolean
9068_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
9069 const char **filename_ptr, unsigned int *line_ptr)
9b8d1a36 9070{
fb167eb2
AM
9071 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
9072 filename_ptr, NULL, line_ptr, NULL,
9defd221 9073 dwarf_debug_sections,
fb167eb2 9074 &elf_tdata (abfd)->dwarf2_find_line_info);
5420f73d
L
9075}
9076
4ab527b0
FF
9077/* After a call to bfd_find_nearest_line, successive calls to
9078 bfd_find_inliner_info can be used to get source information about
9079 each level of function inlining that terminated at the address
9080 passed to bfd_find_nearest_line. Currently this is only supported
9081 for DWARF2 with appropriate DWARF3 extensions. */
9082
9083bfd_boolean
9084_bfd_elf_find_inliner_info (bfd *abfd,
9085 const char **filename_ptr,
9086 const char **functionname_ptr,
9087 unsigned int *line_ptr)
9088{
9089 bfd_boolean found;
9090 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
9091 functionname_ptr, line_ptr,
9092 & elf_tdata (abfd)->dwarf2_find_line_info);
9093 return found;
9094}
9095
252b5132 9096int
a6b96beb 9097_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 9098{
8ded5a0f
AM
9099 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9100 int ret = bed->s->sizeof_ehdr;
252b5132 9101
0e1862bb 9102 if (!bfd_link_relocatable (info))
8ded5a0f 9103 {
12bd6957 9104 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 9105
62d7a5f6
AM
9106 if (phdr_size == (bfd_size_type) -1)
9107 {
9108 struct elf_segment_map *m;
9109
9110 phdr_size = 0;
12bd6957 9111 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62d7a5f6 9112 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 9113
62d7a5f6
AM
9114 if (phdr_size == 0)
9115 phdr_size = get_program_header_size (abfd, info);
9116 }
8ded5a0f 9117
12bd6957 9118 elf_program_header_size (abfd) = phdr_size;
8ded5a0f
AM
9119 ret += phdr_size;
9120 }
9121
252b5132
RH
9122 return ret;
9123}
9124
b34976b6 9125bfd_boolean
217aa764
AM
9126_bfd_elf_set_section_contents (bfd *abfd,
9127 sec_ptr section,
0f867abe 9128 const void *location,
217aa764
AM
9129 file_ptr offset,
9130 bfd_size_type count)
252b5132
RH
9131{
9132 Elf_Internal_Shdr *hdr;
1b6aeedb 9133 file_ptr pos;
252b5132
RH
9134
9135 if (! abfd->output_has_begun
217aa764 9136 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 9137 return FALSE;
252b5132 9138
0ce398f1
L
9139 if (!count)
9140 return TRUE;
9141
252b5132 9142 hdr = &elf_section_data (section)->this_hdr;
0ce398f1
L
9143 if (hdr->sh_offset == (file_ptr) -1)
9144 {
1ff6de03
NA
9145 if (bfd_section_is_ctf (section))
9146 /* Nothing to do with this section: the contents are generated
9147 later. */
9148 return TRUE;
9149
0ce398f1
L
9150 /* We must compress this section. Write output to the buffer. */
9151 unsigned char *contents = hdr->contents;
9152 if ((offset + count) > hdr->sh_size
9153 || (section->flags & SEC_ELF_COMPRESS) == 0
9154 || contents == NULL)
9155 abort ();
9156 memcpy (contents + offset, location, count);
9157 return TRUE;
9158 }
dc810e39
AM
9159 pos = hdr->sh_offset + offset;
9160 if (bfd_seek (abfd, pos, SEEK_SET) != 0
9161 || bfd_bwrite (location, count, abfd) != count)
b34976b6 9162 return FALSE;
252b5132 9163
b34976b6 9164 return TRUE;
252b5132
RH
9165}
9166
f3185997 9167bfd_boolean
217aa764
AM
9168_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
9169 arelent *cache_ptr ATTRIBUTE_UNUSED,
9170 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
9171{
9172 abort ();
f3185997 9173 return FALSE;
252b5132
RH
9174}
9175
252b5132
RH
9176/* Try to convert a non-ELF reloc into an ELF one. */
9177
b34976b6 9178bfd_boolean
217aa764 9179_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 9180{
c044fabd 9181 /* Check whether we really have an ELF howto. */
252b5132
RH
9182
9183 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
9184 {
9185 bfd_reloc_code_real_type code;
9186 reloc_howto_type *howto;
9187
9188 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 9189 equivalent ELF reloc. */
252b5132
RH
9190
9191 if (areloc->howto->pc_relative)
9192 {
9193 switch (areloc->howto->bitsize)
9194 {
9195 case 8:
9196 code = BFD_RELOC_8_PCREL;
9197 break;
9198 case 12:
9199 code = BFD_RELOC_12_PCREL;
9200 break;
9201 case 16:
9202 code = BFD_RELOC_16_PCREL;
9203 break;
9204 case 24:
9205 code = BFD_RELOC_24_PCREL;
9206 break;
9207 case 32:
9208 code = BFD_RELOC_32_PCREL;
9209 break;
9210 case 64:
9211 code = BFD_RELOC_64_PCREL;
9212 break;
9213 default:
9214 goto fail;
9215 }
9216
9217 howto = bfd_reloc_type_lookup (abfd, code);
9218
94698d01 9219 if (howto && areloc->howto->pcrel_offset != howto->pcrel_offset)
252b5132
RH
9220 {
9221 if (howto->pcrel_offset)
9222 areloc->addend += areloc->address;
9223 else
9224 areloc->addend -= areloc->address; /* addend is unsigned!! */
9225 }
9226 }
9227 else
9228 {
9229 switch (areloc->howto->bitsize)
9230 {
9231 case 8:
9232 code = BFD_RELOC_8;
9233 break;
9234 case 14:
9235 code = BFD_RELOC_14;
9236 break;
9237 case 16:
9238 code = BFD_RELOC_16;
9239 break;
9240 case 26:
9241 code = BFD_RELOC_26;
9242 break;
9243 case 32:
9244 code = BFD_RELOC_32;
9245 break;
9246 case 64:
9247 code = BFD_RELOC_64;
9248 break;
9249 default:
9250 goto fail;
9251 }
9252
9253 howto = bfd_reloc_type_lookup (abfd, code);
9254 }
9255
9256 if (howto)
9257 areloc->howto = howto;
9258 else
9259 goto fail;
9260 }
9261
b34976b6 9262 return TRUE;
252b5132
RH
9263
9264 fail:
0aa13fee
AM
9265 /* xgettext:c-format */
9266 _bfd_error_handler (_("%pB: %s unsupported"),
9267 abfd, areloc->howto->name);
9aea1e31 9268 bfd_set_error (bfd_error_sorry);
b34976b6 9269 return FALSE;
252b5132
RH
9270}
9271
b34976b6 9272bfd_boolean
217aa764 9273_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132 9274{
d9071b0c
TG
9275 struct elf_obj_tdata *tdata = elf_tdata (abfd);
9276 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
252b5132 9277 {
c0355132 9278 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 9279 _bfd_elf_strtab_free (elf_shstrtab (abfd));
d9071b0c 9280 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
252b5132
RH
9281 }
9282
9283 return _bfd_generic_close_and_cleanup (abfd);
9284}
9285
9286/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
9287 in the relocation's offset. Thus we cannot allow any sort of sanity
9288 range-checking to interfere. There is nothing else to do in processing
9289 this reloc. */
9290
9291bfd_reloc_status_type
217aa764
AM
9292_bfd_elf_rel_vtable_reloc_fn
9293 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 9294 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
9295 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
9296 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
9297{
9298 return bfd_reloc_ok;
9299}
252b5132
RH
9300\f
9301/* Elf core file support. Much of this only works on native
9302 toolchains, since we rely on knowing the
9303 machine-dependent procfs structure in order to pick
c044fabd 9304 out details about the corefile. */
252b5132
RH
9305
9306#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
9307/* Needed for new procfs interface on sparc-solaris. */
9308# define _STRUCTURED_PROC 1
252b5132
RH
9309# include <sys/procfs.h>
9310#endif
9311
261b8d08
PA
9312/* Return a PID that identifies a "thread" for threaded cores, or the
9313 PID of the main process for non-threaded cores. */
252b5132
RH
9314
9315static int
217aa764 9316elfcore_make_pid (bfd *abfd)
252b5132 9317{
261b8d08
PA
9318 int pid;
9319
228e534f 9320 pid = elf_tdata (abfd)->core->lwpid;
261b8d08 9321 if (pid == 0)
228e534f 9322 pid = elf_tdata (abfd)->core->pid;
261b8d08
PA
9323
9324 return pid;
252b5132
RH
9325}
9326
252b5132
RH
9327/* If there isn't a section called NAME, make one, using
9328 data from SECT. Note, this function will generate a
9329 reference to NAME, so you shouldn't deallocate or
c044fabd 9330 overwrite it. */
252b5132 9331
b34976b6 9332static bfd_boolean
217aa764 9333elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 9334{
c044fabd 9335 asection *sect2;
252b5132
RH
9336
9337 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 9338 return TRUE;
252b5132 9339
117ed4f8 9340 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 9341 if (sect2 == NULL)
b34976b6 9342 return FALSE;
252b5132 9343
eea6121a 9344 sect2->size = sect->size;
252b5132 9345 sect2->filepos = sect->filepos;
252b5132 9346 sect2->alignment_power = sect->alignment_power;
b34976b6 9347 return TRUE;
252b5132
RH
9348}
9349
bb0082d6
AM
9350/* Create a pseudosection containing SIZE bytes at FILEPOS. This
9351 actually creates up to two pseudosections:
9352 - For the single-threaded case, a section named NAME, unless
9353 such a section already exists.
9354 - For the multi-threaded case, a section named "NAME/PID", where
9355 PID is elfcore_make_pid (abfd).
24d3e51b 9356 Both pseudosections have identical contents. */
b34976b6 9357bfd_boolean
217aa764
AM
9358_bfd_elfcore_make_pseudosection (bfd *abfd,
9359 char *name,
9360 size_t size,
9361 ufile_ptr filepos)
bb0082d6
AM
9362{
9363 char buf[100];
9364 char *threaded_name;
d4c88bbb 9365 size_t len;
bb0082d6
AM
9366 asection *sect;
9367
9368 /* Build the section name. */
9369
9370 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 9371 len = strlen (buf) + 1;
a50b1753 9372 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 9373 if (threaded_name == NULL)
b34976b6 9374 return FALSE;
d4c88bbb 9375 memcpy (threaded_name, buf, len);
bb0082d6 9376
117ed4f8
AM
9377 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
9378 SEC_HAS_CONTENTS);
bb0082d6 9379 if (sect == NULL)
b34976b6 9380 return FALSE;
eea6121a 9381 sect->size = size;
bb0082d6 9382 sect->filepos = filepos;
bb0082d6
AM
9383 sect->alignment_power = 2;
9384
936e320b 9385 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
9386}
9387
58e07198
CZ
9388static bfd_boolean
9389elfcore_make_auxv_note_section (bfd *abfd, Elf_Internal_Note *note,
9390 size_t offs)
9391{
9392 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9393 SEC_HAS_CONTENTS);
9394
9395 if (sect == NULL)
9396 return FALSE;
9397
9398 sect->size = note->descsz - offs;
9399 sect->filepos = note->descpos + offs;
9400 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9401
9402 return TRUE;
9403}
9404
252b5132 9405/* prstatus_t exists on:
4a938328 9406 solaris 2.5+
252b5132
RH
9407 linux 2.[01] + glibc
9408 unixware 4.2
9409*/
9410
9411#if defined (HAVE_PRSTATUS_T)
a7b97311 9412
b34976b6 9413static bfd_boolean
217aa764 9414elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 9415{
eea6121a 9416 size_t size;
7ee38065 9417 int offset;
252b5132 9418
4a938328
MS
9419 if (note->descsz == sizeof (prstatus_t))
9420 {
9421 prstatus_t prstat;
252b5132 9422
eea6121a 9423 size = sizeof (prstat.pr_reg);
7ee38065 9424 offset = offsetof (prstatus_t, pr_reg);
4a938328 9425 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 9426
fa49d224
NC
9427 /* Do not overwrite the core signal if it
9428 has already been set by another thread. */
228e534f
AM
9429 if (elf_tdata (abfd)->core->signal == 0)
9430 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9431 if (elf_tdata (abfd)->core->pid == 0)
9432 elf_tdata (abfd)->core->pid = prstat.pr_pid;
252b5132 9433
4a938328
MS
9434 /* pr_who exists on:
9435 solaris 2.5+
9436 unixware 4.2
9437 pr_who doesn't exist on:
9438 linux 2.[01]
9439 */
252b5132 9440#if defined (HAVE_PRSTATUS_T_PR_WHO)
228e534f 9441 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 9442#else
228e534f 9443 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
252b5132 9444#endif
4a938328 9445 }
7ee38065 9446#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
9447 else if (note->descsz == sizeof (prstatus32_t))
9448 {
9449 /* 64-bit host, 32-bit corefile */
9450 prstatus32_t prstat;
9451
eea6121a 9452 size = sizeof (prstat.pr_reg);
7ee38065 9453 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
9454 memcpy (&prstat, note->descdata, sizeof (prstat));
9455
fa49d224
NC
9456 /* Do not overwrite the core signal if it
9457 has already been set by another thread. */
228e534f
AM
9458 if (elf_tdata (abfd)->core->signal == 0)
9459 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9460 if (elf_tdata (abfd)->core->pid == 0)
9461 elf_tdata (abfd)->core->pid = prstat.pr_pid;
4a938328
MS
9462
9463 /* pr_who exists on:
9464 solaris 2.5+
9465 unixware 4.2
9466 pr_who doesn't exist on:
9467 linux 2.[01]
9468 */
7ee38065 9469#if defined (HAVE_PRSTATUS32_T_PR_WHO)
228e534f 9470 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 9471#else
228e534f 9472 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
4a938328
MS
9473#endif
9474 }
7ee38065 9475#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
9476 else
9477 {
9478 /* Fail - we don't know how to handle any other
9479 note size (ie. data object type). */
b34976b6 9480 return TRUE;
4a938328 9481 }
252b5132 9482
bb0082d6 9483 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 9484 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 9485 size, note->descpos + offset);
252b5132
RH
9486}
9487#endif /* defined (HAVE_PRSTATUS_T) */
9488
bb0082d6 9489/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 9490static bfd_boolean
217aa764
AM
9491elfcore_make_note_pseudosection (bfd *abfd,
9492 char *name,
9493 Elf_Internal_Note *note)
252b5132 9494{
936e320b
AM
9495 return _bfd_elfcore_make_pseudosection (abfd, name,
9496 note->descsz, note->descpos);
252b5132
RH
9497}
9498
ff08c6bb
JB
9499/* There isn't a consistent prfpregset_t across platforms,
9500 but it doesn't matter, because we don't have to pick this
c044fabd
KH
9501 data structure apart. */
9502
b34976b6 9503static bfd_boolean
217aa764 9504elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
9505{
9506 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9507}
9508
ff08c6bb 9509/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 9510 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 9511 literally. */
c044fabd 9512
b34976b6 9513static bfd_boolean
217aa764 9514elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
9515{
9516 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9517}
9518
4339cae0
L
9519/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9520 with a note type of NT_X86_XSTATE. Just include the whole note's
9521 contents literally. */
9522
9523static bfd_boolean
9524elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
9525{
9526 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
9527}
9528
97753bd5
AM
9529static bfd_boolean
9530elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
9531{
9532 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
9533}
9534
89eeb0bc
LM
9535static bfd_boolean
9536elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
9537{
9538 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
9539}
97753bd5 9540
cb2366c1
EBM
9541static bfd_boolean
9542elfcore_grok_ppc_tar (bfd *abfd, Elf_Internal_Note *note)
9543{
9544 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tar", note);
9545}
9546
9547static bfd_boolean
9548elfcore_grok_ppc_ppr (bfd *abfd, Elf_Internal_Note *note)
9549{
9550 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ppr", note);
9551}
9552
9553static bfd_boolean
9554elfcore_grok_ppc_dscr (bfd *abfd, Elf_Internal_Note *note)
9555{
9556 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-dscr", note);
9557}
9558
9559static bfd_boolean
9560elfcore_grok_ppc_ebb (bfd *abfd, Elf_Internal_Note *note)
9561{
9562 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ebb", note);
9563}
9564
9565static bfd_boolean
9566elfcore_grok_ppc_pmu (bfd *abfd, Elf_Internal_Note *note)
9567{
9568 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-pmu", note);
9569}
9570
9571static bfd_boolean
9572elfcore_grok_ppc_tm_cgpr (bfd *abfd, Elf_Internal_Note *note)
9573{
9574 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cgpr", note);
9575}
9576
9577static bfd_boolean
9578elfcore_grok_ppc_tm_cfpr (bfd *abfd, Elf_Internal_Note *note)
9579{
9580 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cfpr", note);
9581}
9582
9583static bfd_boolean
9584elfcore_grok_ppc_tm_cvmx (bfd *abfd, Elf_Internal_Note *note)
9585{
9586 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvmx", note);
9587}
9588
9589static bfd_boolean
9590elfcore_grok_ppc_tm_cvsx (bfd *abfd, Elf_Internal_Note *note)
9591{
9592 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvsx", note);
9593}
9594
9595static bfd_boolean
9596elfcore_grok_ppc_tm_spr (bfd *abfd, Elf_Internal_Note *note)
9597{
9598 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-spr", note);
9599}
9600
9601static bfd_boolean
9602elfcore_grok_ppc_tm_ctar (bfd *abfd, Elf_Internal_Note *note)
9603{
9604 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-ctar", note);
9605}
9606
9607static bfd_boolean
9608elfcore_grok_ppc_tm_cppr (bfd *abfd, Elf_Internal_Note *note)
9609{
9610 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cppr", note);
9611}
9612
9613static bfd_boolean
9614elfcore_grok_ppc_tm_cdscr (bfd *abfd, Elf_Internal_Note *note)
9615{
9616 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cdscr", note);
9617}
9618
0675e188
UW
9619static bfd_boolean
9620elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
9621{
9622 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
9623}
9624
d7eeb400
MS
9625static bfd_boolean
9626elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
9627{
9628 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
9629}
9630
9631static bfd_boolean
9632elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
9633{
9634 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
9635}
9636
9637static bfd_boolean
9638elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
9639{
9640 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
9641}
9642
9643static bfd_boolean
9644elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
9645{
9646 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
9647}
9648
9649static bfd_boolean
9650elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9651{
9652 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9653}
9654
355b81d9
UW
9655static bfd_boolean
9656elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9657{
9658 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9659}
9660
9661static bfd_boolean
9662elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9663{
9664 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9665}
9666
abb3f6cc
NC
9667static bfd_boolean
9668elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9669{
9670 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9671}
9672
4ef9f41a
AA
9673static bfd_boolean
9674elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
9675{
9676 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
9677}
9678
9679static bfd_boolean
9680elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
9681{
9682 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
9683}
9684
88ab90e8
AA
9685static bfd_boolean
9686elfcore_grok_s390_gs_cb (bfd *abfd, Elf_Internal_Note *note)
9687{
9688 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-cb", note);
9689}
9690
9691static bfd_boolean
9692elfcore_grok_s390_gs_bc (bfd *abfd, Elf_Internal_Note *note)
9693{
9694 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-bc", note);
9695}
9696
faa9a424
UW
9697static bfd_boolean
9698elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
9699{
9700 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
9701}
9702
652451f8
YZ
9703static bfd_boolean
9704elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
9705{
9706 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
9707}
9708
9709static bfd_boolean
9710elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
9711{
9712 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
9713}
9714
9715static bfd_boolean
9716elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
9717{
9718 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
9719}
9720
ad1cc4e4
AH
9721static bfd_boolean
9722elfcore_grok_aarch_sve (bfd *abfd, Elf_Internal_Note *note)
9723{
9724 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-sve", note);
9725}
9726
e6c3b5bf
AH
9727static bfd_boolean
9728elfcore_grok_aarch_pauth (bfd *abfd, Elf_Internal_Note *note)
9729{
9730 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-pauth", note);
9731}
9732
252b5132 9733#if defined (HAVE_PRPSINFO_T)
4a938328 9734typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 9735#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9736typedef prpsinfo32_t elfcore_psinfo32_t;
9737#endif
252b5132
RH
9738#endif
9739
9740#if defined (HAVE_PSINFO_T)
4a938328 9741typedef psinfo_t elfcore_psinfo_t;
7ee38065 9742#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9743typedef psinfo32_t elfcore_psinfo32_t;
9744#endif
252b5132
RH
9745#endif
9746
252b5132
RH
9747/* return a malloc'ed copy of a string at START which is at
9748 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 9749 the copy will always have a terminating '\0'. */
252b5132 9750
936e320b 9751char *
217aa764 9752_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 9753{
dc810e39 9754 char *dups;
a50b1753 9755 char *end = (char *) memchr (start, '\0', max);
dc810e39 9756 size_t len;
252b5132
RH
9757
9758 if (end == NULL)
9759 len = max;
9760 else
9761 len = end - start;
9762
a50b1753 9763 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 9764 if (dups == NULL)
252b5132
RH
9765 return NULL;
9766
dc810e39
AM
9767 memcpy (dups, start, len);
9768 dups[len] = '\0';
252b5132 9769
dc810e39 9770 return dups;
252b5132
RH
9771}
9772
bb0082d6 9773#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 9774static bfd_boolean
217aa764 9775elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 9776{
4a938328
MS
9777 if (note->descsz == sizeof (elfcore_psinfo_t))
9778 {
9779 elfcore_psinfo_t psinfo;
252b5132 9780
7ee38065 9781 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9782
335e41d4 9783#if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
228e534f 9784 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9785#endif
228e534f 9786 elf_tdata (abfd)->core->program
936e320b
AM
9787 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9788 sizeof (psinfo.pr_fname));
252b5132 9789
228e534f 9790 elf_tdata (abfd)->core->command
936e320b
AM
9791 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9792 sizeof (psinfo.pr_psargs));
4a938328 9793 }
7ee38065 9794#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
9795 else if (note->descsz == sizeof (elfcore_psinfo32_t))
9796 {
9797 /* 64-bit host, 32-bit corefile */
9798 elfcore_psinfo32_t psinfo;
9799
7ee38065 9800 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9801
335e41d4 9802#if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
228e534f 9803 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9804#endif
228e534f 9805 elf_tdata (abfd)->core->program
936e320b
AM
9806 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9807 sizeof (psinfo.pr_fname));
4a938328 9808
228e534f 9809 elf_tdata (abfd)->core->command
936e320b
AM
9810 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9811 sizeof (psinfo.pr_psargs));
4a938328
MS
9812 }
9813#endif
9814
9815 else
9816 {
9817 /* Fail - we don't know how to handle any other
9818 note size (ie. data object type). */
b34976b6 9819 return TRUE;
4a938328 9820 }
252b5132
RH
9821
9822 /* Note that for some reason, a spurious space is tacked
9823 onto the end of the args in some (at least one anyway)
c044fabd 9824 implementations, so strip it off if it exists. */
252b5132
RH
9825
9826 {
228e534f 9827 char *command = elf_tdata (abfd)->core->command;
252b5132
RH
9828 int n = strlen (command);
9829
9830 if (0 < n && command[n - 1] == ' ')
9831 command[n - 1] = '\0';
9832 }
9833
b34976b6 9834 return TRUE;
252b5132
RH
9835}
9836#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
9837
252b5132 9838#if defined (HAVE_PSTATUS_T)
b34976b6 9839static bfd_boolean
217aa764 9840elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 9841{
f572a39d
AM
9842 if (note->descsz == sizeof (pstatus_t)
9843#if defined (HAVE_PXSTATUS_T)
9844 || note->descsz == sizeof (pxstatus_t)
9845#endif
9846 )
4a938328
MS
9847 {
9848 pstatus_t pstat;
252b5132 9849
4a938328 9850 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9851
228e534f 9852 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328 9853 }
7ee38065 9854#if defined (HAVE_PSTATUS32_T)
4a938328
MS
9855 else if (note->descsz == sizeof (pstatus32_t))
9856 {
9857 /* 64-bit host, 32-bit corefile */
9858 pstatus32_t pstat;
252b5132 9859
4a938328 9860 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9861
228e534f 9862 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328
MS
9863 }
9864#endif
252b5132
RH
9865 /* Could grab some more details from the "representative"
9866 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 9867 NT_LWPSTATUS note, presumably. */
252b5132 9868
b34976b6 9869 return TRUE;
252b5132
RH
9870}
9871#endif /* defined (HAVE_PSTATUS_T) */
9872
252b5132 9873#if defined (HAVE_LWPSTATUS_T)
b34976b6 9874static bfd_boolean
217aa764 9875elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
9876{
9877 lwpstatus_t lwpstat;
9878 char buf[100];
c044fabd 9879 char *name;
d4c88bbb 9880 size_t len;
c044fabd 9881 asection *sect;
252b5132 9882
f572a39d
AM
9883 if (note->descsz != sizeof (lwpstat)
9884#if defined (HAVE_LWPXSTATUS_T)
9885 && note->descsz != sizeof (lwpxstatus_t)
9886#endif
9887 )
b34976b6 9888 return TRUE;
252b5132
RH
9889
9890 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
9891
228e534f 9892 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
a1504221
JB
9893 /* Do not overwrite the core signal if it has already been set by
9894 another thread. */
228e534f
AM
9895 if (elf_tdata (abfd)->core->signal == 0)
9896 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
252b5132 9897
c044fabd 9898 /* Make a ".reg/999" section. */
252b5132
RH
9899
9900 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 9901 len = strlen (buf) + 1;
217aa764 9902 name = bfd_alloc (abfd, len);
252b5132 9903 if (name == NULL)
b34976b6 9904 return FALSE;
d4c88bbb 9905 memcpy (name, buf, len);
252b5132 9906
117ed4f8 9907 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9908 if (sect == NULL)
b34976b6 9909 return FALSE;
252b5132
RH
9910
9911#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9912 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
9913 sect->filepos = note->descpos
9914 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
9915#endif
9916
9917#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 9918 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
9919 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
9920#endif
9921
252b5132
RH
9922 sect->alignment_power = 2;
9923
9924 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9925 return FALSE;
252b5132
RH
9926
9927 /* Make a ".reg2/999" section */
9928
9929 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 9930 len = strlen (buf) + 1;
217aa764 9931 name = bfd_alloc (abfd, len);
252b5132 9932 if (name == NULL)
b34976b6 9933 return FALSE;
d4c88bbb 9934 memcpy (name, buf, len);
252b5132 9935
117ed4f8 9936 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9937 if (sect == NULL)
b34976b6 9938 return FALSE;
252b5132
RH
9939
9940#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9941 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
9942 sect->filepos = note->descpos
9943 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
9944#endif
9945
9946#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 9947 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
9948 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
9949#endif
9950
252b5132
RH
9951 sect->alignment_power = 2;
9952
936e320b 9953 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
9954}
9955#endif /* defined (HAVE_LWPSTATUS_T) */
9956
b34976b6 9957static bfd_boolean
217aa764 9958elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
9959{
9960 char buf[30];
c044fabd 9961 char *name;
d4c88bbb 9962 size_t len;
c044fabd 9963 asection *sect;
4a6636fb
PA
9964 int type;
9965 int is_active_thread;
9966 bfd_vma base_addr;
16e9c715 9967
4a6636fb 9968 if (note->descsz < 728)
b34976b6 9969 return TRUE;
16e9c715 9970
4a6636fb
PA
9971 if (! CONST_STRNEQ (note->namedata, "win32"))
9972 return TRUE;
9973
9974 type = bfd_get_32 (abfd, note->descdata);
c044fabd 9975
4a6636fb 9976 switch (type)
16e9c715 9977 {
4a6636fb 9978 case 1 /* NOTE_INFO_PROCESS */:
228e534f 9979 /* FIXME: need to add ->core->command. */
4a6636fb 9980 /* process_info.pid */
228e534f 9981 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
4a6636fb 9982 /* process_info.signal */
228e534f 9983 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 9984 break;
16e9c715 9985
4a6636fb 9986 case 2 /* NOTE_INFO_THREAD */:
16e9c715 9987 /* Make a ".reg/999" section. */
4a6636fb
PA
9988 /* thread_info.tid */
9989 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 9990
d4c88bbb 9991 len = strlen (buf) + 1;
a50b1753 9992 name = (char *) bfd_alloc (abfd, len);
16e9c715 9993 if (name == NULL)
b34976b6 9994 return FALSE;
c044fabd 9995
d4c88bbb 9996 memcpy (name, buf, len);
16e9c715 9997
117ed4f8 9998 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 9999 if (sect == NULL)
b34976b6 10000 return FALSE;
c044fabd 10001
4a6636fb
PA
10002 /* sizeof (thread_info.thread_context) */
10003 sect->size = 716;
10004 /* offsetof (thread_info.thread_context) */
10005 sect->filepos = note->descpos + 12;
16e9c715
NC
10006 sect->alignment_power = 2;
10007
4a6636fb
PA
10008 /* thread_info.is_active_thread */
10009 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
10010
10011 if (is_active_thread)
16e9c715 10012 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 10013 return FALSE;
16e9c715
NC
10014 break;
10015
4a6636fb 10016 case 3 /* NOTE_INFO_MODULE */:
16e9c715 10017 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
10018 /* module_info.base_address */
10019 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 10020 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 10021
d4c88bbb 10022 len = strlen (buf) + 1;
a50b1753 10023 name = (char *) bfd_alloc (abfd, len);
16e9c715 10024 if (name == NULL)
b34976b6 10025 return FALSE;
c044fabd 10026
d4c88bbb 10027 memcpy (name, buf, len);
252b5132 10028
117ed4f8 10029 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 10030
16e9c715 10031 if (sect == NULL)
b34976b6 10032 return FALSE;
c044fabd 10033
eea6121a 10034 sect->size = note->descsz;
16e9c715 10035 sect->filepos = note->descpos;
16e9c715
NC
10036 sect->alignment_power = 2;
10037 break;
10038
10039 default:
b34976b6 10040 return TRUE;
16e9c715
NC
10041 }
10042
b34976b6 10043 return TRUE;
16e9c715 10044}
252b5132 10045
b34976b6 10046static bfd_boolean
217aa764 10047elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 10048{
9c5bfbb7 10049 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 10050
252b5132
RH
10051 switch (note->type)
10052 {
10053 default:
b34976b6 10054 return TRUE;
252b5132 10055
252b5132 10056 case NT_PRSTATUS:
bb0082d6
AM
10057 if (bed->elf_backend_grok_prstatus)
10058 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 10059 return TRUE;
bb0082d6 10060#if defined (HAVE_PRSTATUS_T)
252b5132 10061 return elfcore_grok_prstatus (abfd, note);
bb0082d6 10062#else
b34976b6 10063 return TRUE;
252b5132
RH
10064#endif
10065
10066#if defined (HAVE_PSTATUS_T)
10067 case NT_PSTATUS:
10068 return elfcore_grok_pstatus (abfd, note);
10069#endif
10070
10071#if defined (HAVE_LWPSTATUS_T)
10072 case NT_LWPSTATUS:
10073 return elfcore_grok_lwpstatus (abfd, note);
10074#endif
10075
10076 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
10077 return elfcore_grok_prfpreg (abfd, note);
10078
c044fabd 10079 case NT_WIN32PSTATUS:
16e9c715 10080 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 10081
c044fabd 10082 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
10083 if (note->namesz == 6
10084 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
10085 return elfcore_grok_prxfpreg (abfd, note);
10086 else
b34976b6 10087 return TRUE;
ff08c6bb 10088
4339cae0
L
10089 case NT_X86_XSTATE: /* Linux XSAVE extension */
10090 if (note->namesz == 6
10091 && strcmp (note->namedata, "LINUX") == 0)
10092 return elfcore_grok_xstatereg (abfd, note);
10093 else
10094 return TRUE;
10095
97753bd5
AM
10096 case NT_PPC_VMX:
10097 if (note->namesz == 6
10098 && strcmp (note->namedata, "LINUX") == 0)
10099 return elfcore_grok_ppc_vmx (abfd, note);
10100 else
10101 return TRUE;
10102
89eeb0bc
LM
10103 case NT_PPC_VSX:
10104 if (note->namesz == 6
07d6d2b8
AM
10105 && strcmp (note->namedata, "LINUX") == 0)
10106 return elfcore_grok_ppc_vsx (abfd, note);
89eeb0bc 10107 else
07d6d2b8 10108 return TRUE;
89eeb0bc 10109
cb2366c1
EBM
10110 case NT_PPC_TAR:
10111 if (note->namesz == 6
4b24dd1a
AM
10112 && strcmp (note->namedata, "LINUX") == 0)
10113 return elfcore_grok_ppc_tar (abfd, note);
cb2366c1 10114 else
4b24dd1a 10115 return TRUE;
cb2366c1
EBM
10116
10117 case NT_PPC_PPR:
10118 if (note->namesz == 6
4b24dd1a
AM
10119 && strcmp (note->namedata, "LINUX") == 0)
10120 return elfcore_grok_ppc_ppr (abfd, note);
cb2366c1 10121 else
4b24dd1a 10122 return TRUE;
cb2366c1
EBM
10123
10124 case NT_PPC_DSCR:
10125 if (note->namesz == 6
4b24dd1a
AM
10126 && strcmp (note->namedata, "LINUX") == 0)
10127 return elfcore_grok_ppc_dscr (abfd, note);
cb2366c1 10128 else
4b24dd1a 10129 return TRUE;
cb2366c1
EBM
10130
10131 case NT_PPC_EBB:
10132 if (note->namesz == 6
4b24dd1a
AM
10133 && strcmp (note->namedata, "LINUX") == 0)
10134 return elfcore_grok_ppc_ebb (abfd, note);
cb2366c1 10135 else
4b24dd1a 10136 return TRUE;
cb2366c1
EBM
10137
10138 case NT_PPC_PMU:
10139 if (note->namesz == 6
4b24dd1a
AM
10140 && strcmp (note->namedata, "LINUX") == 0)
10141 return elfcore_grok_ppc_pmu (abfd, note);
cb2366c1 10142 else
4b24dd1a 10143 return TRUE;
cb2366c1
EBM
10144
10145 case NT_PPC_TM_CGPR:
10146 if (note->namesz == 6
4b24dd1a
AM
10147 && strcmp (note->namedata, "LINUX") == 0)
10148 return elfcore_grok_ppc_tm_cgpr (abfd, note);
cb2366c1 10149 else
4b24dd1a 10150 return TRUE;
cb2366c1
EBM
10151
10152 case NT_PPC_TM_CFPR:
10153 if (note->namesz == 6
4b24dd1a
AM
10154 && strcmp (note->namedata, "LINUX") == 0)
10155 return elfcore_grok_ppc_tm_cfpr (abfd, note);
cb2366c1 10156 else
4b24dd1a 10157 return TRUE;
cb2366c1
EBM
10158
10159 case NT_PPC_TM_CVMX:
10160 if (note->namesz == 6
4b24dd1a
AM
10161 && strcmp (note->namedata, "LINUX") == 0)
10162 return elfcore_grok_ppc_tm_cvmx (abfd, note);
cb2366c1 10163 else
4b24dd1a 10164 return TRUE;
cb2366c1
EBM
10165
10166 case NT_PPC_TM_CVSX:
10167 if (note->namesz == 6
4b24dd1a
AM
10168 && strcmp (note->namedata, "LINUX") == 0)
10169 return elfcore_grok_ppc_tm_cvsx (abfd, note);
cb2366c1 10170 else
4b24dd1a 10171 return TRUE;
cb2366c1
EBM
10172
10173 case NT_PPC_TM_SPR:
10174 if (note->namesz == 6
4b24dd1a
AM
10175 && strcmp (note->namedata, "LINUX") == 0)
10176 return elfcore_grok_ppc_tm_spr (abfd, note);
cb2366c1 10177 else
4b24dd1a 10178 return TRUE;
cb2366c1
EBM
10179
10180 case NT_PPC_TM_CTAR:
10181 if (note->namesz == 6
4b24dd1a
AM
10182 && strcmp (note->namedata, "LINUX") == 0)
10183 return elfcore_grok_ppc_tm_ctar (abfd, note);
cb2366c1 10184 else
4b24dd1a 10185 return TRUE;
cb2366c1
EBM
10186
10187 case NT_PPC_TM_CPPR:
10188 if (note->namesz == 6
4b24dd1a
AM
10189 && strcmp (note->namedata, "LINUX") == 0)
10190 return elfcore_grok_ppc_tm_cppr (abfd, note);
cb2366c1 10191 else
4b24dd1a 10192 return TRUE;
cb2366c1
EBM
10193
10194 case NT_PPC_TM_CDSCR:
10195 if (note->namesz == 6
4b24dd1a
AM
10196 && strcmp (note->namedata, "LINUX") == 0)
10197 return elfcore_grok_ppc_tm_cdscr (abfd, note);
cb2366c1 10198 else
4b24dd1a 10199 return TRUE;
cb2366c1 10200
0675e188
UW
10201 case NT_S390_HIGH_GPRS:
10202 if (note->namesz == 6
07d6d2b8
AM
10203 && strcmp (note->namedata, "LINUX") == 0)
10204 return elfcore_grok_s390_high_gprs (abfd, note);
0675e188 10205 else
07d6d2b8 10206 return TRUE;
0675e188 10207
d7eeb400
MS
10208 case NT_S390_TIMER:
10209 if (note->namesz == 6
07d6d2b8
AM
10210 && strcmp (note->namedata, "LINUX") == 0)
10211 return elfcore_grok_s390_timer (abfd, note);
d7eeb400 10212 else
07d6d2b8 10213 return TRUE;
d7eeb400
MS
10214
10215 case NT_S390_TODCMP:
10216 if (note->namesz == 6
07d6d2b8
AM
10217 && strcmp (note->namedata, "LINUX") == 0)
10218 return elfcore_grok_s390_todcmp (abfd, note);
d7eeb400 10219 else
07d6d2b8 10220 return TRUE;
d7eeb400
MS
10221
10222 case NT_S390_TODPREG:
10223 if (note->namesz == 6
07d6d2b8
AM
10224 && strcmp (note->namedata, "LINUX") == 0)
10225 return elfcore_grok_s390_todpreg (abfd, note);
d7eeb400 10226 else
07d6d2b8 10227 return TRUE;
d7eeb400
MS
10228
10229 case NT_S390_CTRS:
10230 if (note->namesz == 6
07d6d2b8
AM
10231 && strcmp (note->namedata, "LINUX") == 0)
10232 return elfcore_grok_s390_ctrs (abfd, note);
d7eeb400 10233 else
07d6d2b8 10234 return TRUE;
d7eeb400
MS
10235
10236 case NT_S390_PREFIX:
10237 if (note->namesz == 6
07d6d2b8
AM
10238 && strcmp (note->namedata, "LINUX") == 0)
10239 return elfcore_grok_s390_prefix (abfd, note);
d7eeb400 10240 else
07d6d2b8 10241 return TRUE;
d7eeb400 10242
355b81d9
UW
10243 case NT_S390_LAST_BREAK:
10244 if (note->namesz == 6
07d6d2b8
AM
10245 && strcmp (note->namedata, "LINUX") == 0)
10246 return elfcore_grok_s390_last_break (abfd, note);
355b81d9 10247 else
07d6d2b8 10248 return TRUE;
355b81d9
UW
10249
10250 case NT_S390_SYSTEM_CALL:
10251 if (note->namesz == 6
07d6d2b8
AM
10252 && strcmp (note->namedata, "LINUX") == 0)
10253 return elfcore_grok_s390_system_call (abfd, note);
355b81d9 10254 else
07d6d2b8 10255 return TRUE;
355b81d9 10256
abb3f6cc
NC
10257 case NT_S390_TDB:
10258 if (note->namesz == 6
07d6d2b8
AM
10259 && strcmp (note->namedata, "LINUX") == 0)
10260 return elfcore_grok_s390_tdb (abfd, note);
abb3f6cc 10261 else
07d6d2b8 10262 return TRUE;
abb3f6cc 10263
4ef9f41a
AA
10264 case NT_S390_VXRS_LOW:
10265 if (note->namesz == 6
10266 && strcmp (note->namedata, "LINUX") == 0)
10267 return elfcore_grok_s390_vxrs_low (abfd, note);
10268 else
10269 return TRUE;
10270
10271 case NT_S390_VXRS_HIGH:
10272 if (note->namesz == 6
10273 && strcmp (note->namedata, "LINUX") == 0)
10274 return elfcore_grok_s390_vxrs_high (abfd, note);
10275 else
10276 return TRUE;
10277
88ab90e8
AA
10278 case NT_S390_GS_CB:
10279 if (note->namesz == 6
10280 && strcmp (note->namedata, "LINUX") == 0)
8fe09d74 10281 return elfcore_grok_s390_gs_cb (abfd, note);
88ab90e8
AA
10282 else
10283 return TRUE;
10284
10285 case NT_S390_GS_BC:
10286 if (note->namesz == 6
10287 && strcmp (note->namedata, "LINUX") == 0)
8fe09d74 10288 return elfcore_grok_s390_gs_bc (abfd, note);
88ab90e8
AA
10289 else
10290 return TRUE;
10291
faa9a424
UW
10292 case NT_ARM_VFP:
10293 if (note->namesz == 6
10294 && strcmp (note->namedata, "LINUX") == 0)
10295 return elfcore_grok_arm_vfp (abfd, note);
10296 else
10297 return TRUE;
10298
652451f8
YZ
10299 case NT_ARM_TLS:
10300 if (note->namesz == 6
10301 && strcmp (note->namedata, "LINUX") == 0)
10302 return elfcore_grok_aarch_tls (abfd, note);
10303 else
10304 return TRUE;
10305
10306 case NT_ARM_HW_BREAK:
10307 if (note->namesz == 6
10308 && strcmp (note->namedata, "LINUX") == 0)
10309 return elfcore_grok_aarch_hw_break (abfd, note);
10310 else
10311 return TRUE;
10312
10313 case NT_ARM_HW_WATCH:
10314 if (note->namesz == 6
10315 && strcmp (note->namedata, "LINUX") == 0)
10316 return elfcore_grok_aarch_hw_watch (abfd, note);
10317 else
10318 return TRUE;
10319
ad1cc4e4
AH
10320 case NT_ARM_SVE:
10321 if (note->namesz == 6
10322 && strcmp (note->namedata, "LINUX") == 0)
10323 return elfcore_grok_aarch_sve (abfd, note);
10324 else
10325 return TRUE;
10326
e6c3b5bf
AH
10327 case NT_ARM_PAC_MASK:
10328 if (note->namesz == 6
10329 && strcmp (note->namedata, "LINUX") == 0)
10330 return elfcore_grok_aarch_pauth (abfd, note);
10331 else
10332 return TRUE;
10333
252b5132
RH
10334 case NT_PRPSINFO:
10335 case NT_PSINFO:
bb0082d6
AM
10336 if (bed->elf_backend_grok_psinfo)
10337 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 10338 return TRUE;
bb0082d6 10339#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 10340 return elfcore_grok_psinfo (abfd, note);
bb0082d6 10341#else
b34976b6 10342 return TRUE;
252b5132 10343#endif
3333a7c3
RM
10344
10345 case NT_AUXV:
58e07198 10346 return elfcore_make_auxv_note_section (abfd, note, 0);
9015683b 10347
451b7c33
TT
10348 case NT_FILE:
10349 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
10350 note);
10351
9015683b
TT
10352 case NT_SIGINFO:
10353 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
10354 note);
5b2c414d 10355
252b5132
RH
10356 }
10357}
10358
718175fa
JK
10359static bfd_boolean
10360elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
10361{
c74f7d1c 10362 struct bfd_build_id* build_id;
30e8ee25
AM
10363
10364 if (note->descsz == 0)
10365 return FALSE;
10366
c74f7d1c
JT
10367 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
10368 if (build_id == NULL)
718175fa
JK
10369 return FALSE;
10370
c74f7d1c
JT
10371 build_id->size = note->descsz;
10372 memcpy (build_id->data, note->descdata, note->descsz);
10373 abfd->build_id = build_id;
718175fa
JK
10374
10375 return TRUE;
10376}
10377
10378static bfd_boolean
10379elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
10380{
10381 switch (note->type)
10382 {
10383 default:
10384 return TRUE;
10385
46bed679
L
10386 case NT_GNU_PROPERTY_TYPE_0:
10387 return _bfd_elf_parse_gnu_properties (abfd, note);
10388
718175fa
JK
10389 case NT_GNU_BUILD_ID:
10390 return elfobj_grok_gnu_build_id (abfd, note);
10391 }
10392}
10393
e21e5835
NC
10394static bfd_boolean
10395elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
10396{
10397 struct sdt_note *cur =
7a6e0d89
AM
10398 (struct sdt_note *) bfd_alloc (abfd,
10399 sizeof (struct sdt_note) + note->descsz);
e21e5835
NC
10400
10401 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
10402 cur->size = (bfd_size_type) note->descsz;
10403 memcpy (cur->data, note->descdata, note->descsz);
10404
10405 elf_tdata (abfd)->sdt_note_head = cur;
10406
10407 return TRUE;
10408}
10409
10410static bfd_boolean
10411elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
10412{
10413 switch (note->type)
10414 {
10415 case NT_STAPSDT:
10416 return elfobj_grok_stapsdt_note_1 (abfd, note);
10417
10418 default:
10419 return TRUE;
10420 }
10421}
10422
aa1ed4a9
JB
10423static bfd_boolean
10424elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
10425{
10426 size_t offset;
10427
b5430a3c 10428 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
aa1ed4a9 10429 {
b5430a3c 10430 case ELFCLASS32:
0064d223
JB
10431 if (note->descsz < 108)
10432 return FALSE;
aa1ed4a9
JB
10433 break;
10434
b5430a3c 10435 case ELFCLASS64:
0064d223
JB
10436 if (note->descsz < 120)
10437 return FALSE;
aa1ed4a9
JB
10438 break;
10439
10440 default:
10441 return FALSE;
10442 }
10443
0064d223
JB
10444 /* Check for version 1 in pr_version. */
10445 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10446 return FALSE;
80a04378 10447
0064d223
JB
10448 offset = 4;
10449
10450 /* Skip over pr_psinfosz. */
b5430a3c 10451 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
0064d223
JB
10452 offset += 4;
10453 else
10454 {
10455 offset += 4; /* Padding before pr_psinfosz. */
10456 offset += 8;
10457 }
10458
aa1ed4a9
JB
10459 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
10460 elf_tdata (abfd)->core->program
10461 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
10462 offset += 17;
10463
10464 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
10465 elf_tdata (abfd)->core->command
10466 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
0064d223
JB
10467 offset += 81;
10468
10469 /* Padding before pr_pid. */
10470 offset += 2;
10471
10472 /* The pr_pid field was added in version "1a". */
10473 if (note->descsz < offset + 4)
10474 return TRUE;
10475
10476 elf_tdata (abfd)->core->pid
10477 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
aa1ed4a9
JB
10478
10479 return TRUE;
10480}
10481
10482static bfd_boolean
10483elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
10484{
10485 size_t offset;
10486 size_t size;
24d3e51b 10487 size_t min_size;
aa1ed4a9 10488
24d3e51b
NC
10489 /* Compute offset of pr_getregsz, skipping over pr_statussz.
10490 Also compute minimum size of this note. */
b5430a3c 10491 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
aa1ed4a9 10492 {
b5430a3c 10493 case ELFCLASS32:
24d3e51b
NC
10494 offset = 4 + 4;
10495 min_size = offset + (4 * 2) + 4 + 4 + 4;
aa1ed4a9
JB
10496 break;
10497
b5430a3c 10498 case ELFCLASS64:
24d3e51b
NC
10499 offset = 4 + 4 + 8; /* Includes padding before pr_statussz. */
10500 min_size = offset + (8 * 2) + 4 + 4 + 4 + 4;
aa1ed4a9
JB
10501 break;
10502
10503 default:
10504 return FALSE;
10505 }
10506
24d3e51b
NC
10507 if (note->descsz < min_size)
10508 return FALSE;
10509
10510 /* Check for version 1 in pr_version. */
10511 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10512 return FALSE;
aa1ed4a9 10513
24d3e51b
NC
10514 /* Extract size of pr_reg from pr_gregsetsz. */
10515 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
b5430a3c 10516 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
24d3e51b
NC
10517 {
10518 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10519 offset += 4 * 2;
10520 }
b5430a3c 10521 else
24d3e51b
NC
10522 {
10523 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
10524 offset += 8 * 2;
10525 }
aa1ed4a9 10526
24d3e51b 10527 /* Skip over pr_osreldate. */
aa1ed4a9
JB
10528 offset += 4;
10529
24d3e51b 10530 /* Read signal from pr_cursig. */
aa1ed4a9
JB
10531 if (elf_tdata (abfd)->core->signal == 0)
10532 elf_tdata (abfd)->core->signal
10533 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10534 offset += 4;
10535
24d3e51b 10536 /* Read TID from pr_pid. */
aa1ed4a9
JB
10537 elf_tdata (abfd)->core->lwpid
10538 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10539 offset += 4;
10540
24d3e51b 10541 /* Padding before pr_reg. */
b5430a3c 10542 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS64)
aa1ed4a9
JB
10543 offset += 4;
10544
24d3e51b
NC
10545 /* Make sure that there is enough data remaining in the note. */
10546 if ((note->descsz - offset) < size)
10547 return FALSE;
10548
aa1ed4a9
JB
10549 /* Make a ".reg/999" section and a ".reg" section. */
10550 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
10551 size, note->descpos + offset);
10552}
10553
10554static bfd_boolean
10555elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
10556{
544c67cd
JB
10557 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10558
aa1ed4a9
JB
10559 switch (note->type)
10560 {
10561 case NT_PRSTATUS:
544c67cd
JB
10562 if (bed->elf_backend_grok_freebsd_prstatus)
10563 if ((*bed->elf_backend_grok_freebsd_prstatus) (abfd, note))
10564 return TRUE;
aa1ed4a9
JB
10565 return elfcore_grok_freebsd_prstatus (abfd, note);
10566
10567 case NT_FPREGSET:
10568 return elfcore_grok_prfpreg (abfd, note);
10569
10570 case NT_PRPSINFO:
10571 return elfcore_grok_freebsd_psinfo (abfd, note);
10572
10573 case NT_FREEBSD_THRMISC:
10574 if (note->namesz == 8)
10575 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
10576 else
10577 return TRUE;
10578
ddb2bbcf
JB
10579 case NT_FREEBSD_PROCSTAT_PROC:
10580 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.proc",
10581 note);
10582
10583 case NT_FREEBSD_PROCSTAT_FILES:
10584 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.files",
10585 note);
10586
10587 case NT_FREEBSD_PROCSTAT_VMMAP:
10588 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.vmmap",
10589 note);
10590
3350c5f5 10591 case NT_FREEBSD_PROCSTAT_AUXV:
58e07198 10592 return elfcore_make_auxv_note_section (abfd, note, 4);
3350c5f5 10593
aa1ed4a9
JB
10594 case NT_X86_XSTATE:
10595 if (note->namesz == 8)
10596 return elfcore_grok_xstatereg (abfd, note);
10597 else
10598 return TRUE;
10599
e6f3b9c3
JB
10600 case NT_FREEBSD_PTLWPINFO:
10601 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.lwpinfo",
10602 note);
10603
6d5be5d6
JB
10604 case NT_ARM_VFP:
10605 return elfcore_grok_arm_vfp (abfd, note);
10606
aa1ed4a9
JB
10607 default:
10608 return TRUE;
10609 }
10610}
10611
b34976b6 10612static bfd_boolean
217aa764 10613elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
10614{
10615 char *cp;
10616
10617 cp = strchr (note->namedata, '@');
10618 if (cp != NULL)
10619 {
d2b64500 10620 *lwpidp = atoi(cp + 1);
b34976b6 10621 return TRUE;
50b2bdb7 10622 }
b34976b6 10623 return FALSE;
50b2bdb7
AM
10624}
10625
b34976b6 10626static bfd_boolean
217aa764 10627elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 10628{
80a04378
NC
10629 if (note->descsz <= 0x7c + 31)
10630 return FALSE;
10631
50b2bdb7 10632 /* Signal number at offset 0x08. */
228e534f 10633 elf_tdata (abfd)->core->signal
50b2bdb7
AM
10634 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10635
10636 /* Process ID at offset 0x50. */
228e534f 10637 elf_tdata (abfd)->core->pid
50b2bdb7
AM
10638 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
10639
10640 /* Command name at 0x7c (max 32 bytes, including nul). */
228e534f 10641 elf_tdata (abfd)->core->command
50b2bdb7
AM
10642 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
10643
7720ba9f
MK
10644 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
10645 note);
50b2bdb7
AM
10646}
10647
b34976b6 10648static bfd_boolean
217aa764 10649elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
10650{
10651 int lwp;
10652
10653 if (elfcore_netbsd_get_lwpid (note, &lwp))
228e534f 10654 elf_tdata (abfd)->core->lwpid = lwp;
50b2bdb7 10655
58e07198 10656 switch (note->type)
50b2bdb7 10657 {
58e07198 10658 case NT_NETBSDCORE_PROCINFO:
50b2bdb7 10659 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
10660 find this note before any of the others, which is fine,
10661 since the kernel writes this note out first when it
10662 creates a core file. */
50b2bdb7 10663 return elfcore_grok_netbsd_procinfo (abfd, note);
58e07198
CZ
10664#ifdef NT_NETBSDCORE_AUXV
10665 case NT_NETBSDCORE_AUXV:
10666 /* NetBSD-specific Elf Auxiliary Vector data. */
10667 return elfcore_make_auxv_note_section (abfd, note, 4);
10668#endif
10669 default:
10670 break;
50b2bdb7
AM
10671 }
10672
58e07198 10673 /* As of March 2017 there are no other machine-independent notes
b4db1224
JT
10674 defined for NetBSD core files. If the note type is less
10675 than the start of the machine-dependent note types, we don't
10676 understand it. */
47d9a591 10677
b4db1224 10678 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 10679 return TRUE;
50b2bdb7
AM
10680
10681
10682 switch (bfd_get_arch (abfd))
10683 {
08a40648
AM
10684 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
10685 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
10686
10687 case bfd_arch_alpha:
10688 case bfd_arch_sparc:
10689 switch (note->type)
08a40648
AM
10690 {
10691 case NT_NETBSDCORE_FIRSTMACH+0:
10692 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 10693
08a40648
AM
10694 case NT_NETBSDCORE_FIRSTMACH+2:
10695 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 10696
08a40648
AM
10697 default:
10698 return TRUE;
10699 }
50b2bdb7 10700
58e07198
CZ
10701 /* On SuperH, PT_GETREGS == mach+3 and PT_GETFPREGS == mach+5.
10702 There's also old PT___GETREGS40 == mach + 1 for old reg
10703 structure which lacks GBR. */
10704
10705 case bfd_arch_sh:
10706 switch (note->type)
10707 {
10708 case NT_NETBSDCORE_FIRSTMACH+3:
10709 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10710
10711 case NT_NETBSDCORE_FIRSTMACH+5:
10712 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10713
10714 default:
10715 return TRUE;
10716 }
10717
08a40648
AM
10718 /* On all other arch's, PT_GETREGS == mach+1 and
10719 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
10720
10721 default:
10722 switch (note->type)
08a40648
AM
10723 {
10724 case NT_NETBSDCORE_FIRSTMACH+1:
10725 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 10726
08a40648
AM
10727 case NT_NETBSDCORE_FIRSTMACH+3:
10728 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 10729
08a40648
AM
10730 default:
10731 return TRUE;
10732 }
50b2bdb7
AM
10733 }
10734 /* NOTREACHED */
10735}
10736
67cc5033
MK
10737static bfd_boolean
10738elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10739{
80a04378
NC
10740 if (note->descsz <= 0x48 + 31)
10741 return FALSE;
10742
67cc5033 10743 /* Signal number at offset 0x08. */
228e534f 10744 elf_tdata (abfd)->core->signal
67cc5033
MK
10745 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10746
10747 /* Process ID at offset 0x20. */
228e534f 10748 elf_tdata (abfd)->core->pid
67cc5033
MK
10749 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
10750
10751 /* Command name at 0x48 (max 32 bytes, including nul). */
228e534f 10752 elf_tdata (abfd)->core->command
67cc5033
MK
10753 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
10754
10755 return TRUE;
10756}
10757
10758static bfd_boolean
10759elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
10760{
10761 if (note->type == NT_OPENBSD_PROCINFO)
10762 return elfcore_grok_openbsd_procinfo (abfd, note);
10763
10764 if (note->type == NT_OPENBSD_REGS)
10765 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10766
10767 if (note->type == NT_OPENBSD_FPREGS)
10768 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10769
10770 if (note->type == NT_OPENBSD_XFPREGS)
10771 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
10772
10773 if (note->type == NT_OPENBSD_AUXV)
58e07198 10774 return elfcore_make_auxv_note_section (abfd, note, 0);
67cc5033
MK
10775
10776 if (note->type == NT_OPENBSD_WCOOKIE)
10777 {
10778 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
10779 SEC_HAS_CONTENTS);
10780
10781 if (sect == NULL)
10782 return FALSE;
10783 sect->size = note->descsz;
10784 sect->filepos = note->descpos;
10785 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10786
10787 return TRUE;
10788 }
10789
10790 return TRUE;
10791}
10792
07c6e936 10793static bfd_boolean
d3fd4074 10794elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
10795{
10796 void *ddata = note->descdata;
10797 char buf[100];
10798 char *name;
10799 asection *sect;
f8843e87
AM
10800 short sig;
10801 unsigned flags;
07c6e936 10802
80a04378
NC
10803 if (note->descsz < 16)
10804 return FALSE;
10805
07c6e936 10806 /* nto_procfs_status 'pid' field is at offset 0. */
228e534f 10807 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
07c6e936 10808
f8843e87
AM
10809 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
10810 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
10811
10812 /* nto_procfs_status 'flags' field is at offset 8. */
10813 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
10814
10815 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
10816 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
10817 {
228e534f
AM
10818 elf_tdata (abfd)->core->signal = sig;
10819 elf_tdata (abfd)->core->lwpid = *tid;
f8843e87 10820 }
07c6e936 10821
f8843e87
AM
10822 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
10823 do not come from signals so we make sure we set the current
10824 thread just in case. */
10825 if (flags & 0x00000080)
228e534f 10826 elf_tdata (abfd)->core->lwpid = *tid;
07c6e936
NC
10827
10828 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 10829 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 10830
a50b1753 10831 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10832 if (name == NULL)
10833 return FALSE;
10834 strcpy (name, buf);
10835
117ed4f8 10836 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10837 if (sect == NULL)
10838 return FALSE;
10839
07d6d2b8
AM
10840 sect->size = note->descsz;
10841 sect->filepos = note->descpos;
07c6e936
NC
10842 sect->alignment_power = 2;
10843
10844 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
10845}
10846
10847static bfd_boolean
d69f560c
KW
10848elfcore_grok_nto_regs (bfd *abfd,
10849 Elf_Internal_Note *note,
d3fd4074 10850 long tid,
d69f560c 10851 char *base)
07c6e936
NC
10852{
10853 char buf[100];
10854 char *name;
10855 asection *sect;
10856
d69f560c 10857 /* Make a "(base)/%d" section. */
d3fd4074 10858 sprintf (buf, "%s/%ld", base, tid);
07c6e936 10859
a50b1753 10860 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10861 if (name == NULL)
10862 return FALSE;
10863 strcpy (name, buf);
10864
117ed4f8 10865 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10866 if (sect == NULL)
10867 return FALSE;
10868
07d6d2b8
AM
10869 sect->size = note->descsz;
10870 sect->filepos = note->descpos;
07c6e936
NC
10871 sect->alignment_power = 2;
10872
f8843e87 10873 /* This is the current thread. */
228e534f 10874 if (elf_tdata (abfd)->core->lwpid == tid)
d69f560c 10875 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
10876
10877 return TRUE;
07c6e936
NC
10878}
10879
10880#define BFD_QNT_CORE_INFO 7
10881#define BFD_QNT_CORE_STATUS 8
10882#define BFD_QNT_CORE_GREG 9
10883#define BFD_QNT_CORE_FPREG 10
10884
10885static bfd_boolean
217aa764 10886elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
10887{
10888 /* Every GREG section has a STATUS section before it. Store the
811072d8 10889 tid from the previous call to pass down to the next gregs
07c6e936 10890 function. */
d3fd4074 10891 static long tid = 1;
07c6e936
NC
10892
10893 switch (note->type)
10894 {
d69f560c
KW
10895 case BFD_QNT_CORE_INFO:
10896 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
10897 case BFD_QNT_CORE_STATUS:
10898 return elfcore_grok_nto_status (abfd, note, &tid);
10899 case BFD_QNT_CORE_GREG:
10900 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
10901 case BFD_QNT_CORE_FPREG:
10902 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
10903 default:
10904 return TRUE;
07c6e936
NC
10905 }
10906}
10907
b15fa79e
AM
10908static bfd_boolean
10909elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
10910{
10911 char *name;
10912 asection *sect;
10913 size_t len;
10914
10915 /* Use note name as section name. */
10916 len = note->namesz;
a50b1753 10917 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
10918 if (name == NULL)
10919 return FALSE;
10920 memcpy (name, note->namedata, len);
10921 name[len - 1] = '\0';
10922
10923 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10924 if (sect == NULL)
10925 return FALSE;
10926
07d6d2b8
AM
10927 sect->size = note->descsz;
10928 sect->filepos = note->descpos;
b15fa79e
AM
10929 sect->alignment_power = 1;
10930
10931 return TRUE;
10932}
10933
7c76fa91
MS
10934/* Function: elfcore_write_note
10935
47d9a591 10936 Inputs:
a39f3346 10937 buffer to hold note, and current size of buffer
7c76fa91
MS
10938 name of note
10939 type of note
10940 data for note
10941 size of data for note
10942
a39f3346
AM
10943 Writes note to end of buffer. ELF64 notes are written exactly as
10944 for ELF32, despite the current (as of 2006) ELF gabi specifying
10945 that they ought to have 8-byte namesz and descsz field, and have
10946 8-byte alignment. Other writers, eg. Linux kernel, do the same.
10947
7c76fa91 10948 Return:
a39f3346 10949 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
10950
10951char *
a39f3346 10952elfcore_write_note (bfd *abfd,
217aa764 10953 char *buf,
a39f3346 10954 int *bufsiz,
217aa764 10955 const char *name,
a39f3346 10956 int type,
217aa764 10957 const void *input,
a39f3346 10958 int size)
7c76fa91
MS
10959{
10960 Elf_External_Note *xnp;
d4c88bbb 10961 size_t namesz;
d4c88bbb 10962 size_t newspace;
a39f3346 10963 char *dest;
7c76fa91 10964
d4c88bbb 10965 namesz = 0;
d4c88bbb 10966 if (name != NULL)
a39f3346 10967 namesz = strlen (name) + 1;
d4c88bbb 10968
a39f3346 10969 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 10970
a50b1753 10971 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
10972 if (buf == NULL)
10973 return buf;
a39f3346 10974 dest = buf + *bufsiz;
7c76fa91
MS
10975 *bufsiz += newspace;
10976 xnp = (Elf_External_Note *) dest;
10977 H_PUT_32 (abfd, namesz, xnp->namesz);
10978 H_PUT_32 (abfd, size, xnp->descsz);
10979 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
10980 dest = xnp->name;
10981 if (name != NULL)
10982 {
10983 memcpy (dest, name, namesz);
10984 dest += namesz;
a39f3346 10985 while (namesz & 3)
d4c88bbb
AM
10986 {
10987 *dest++ = '\0';
a39f3346 10988 ++namesz;
d4c88bbb
AM
10989 }
10990 }
10991 memcpy (dest, input, size);
a39f3346
AM
10992 dest += size;
10993 while (size & 3)
10994 {
10995 *dest++ = '\0';
10996 ++size;
10997 }
10998 return buf;
7c76fa91
MS
10999}
11000
602f1657
AM
11001/* gcc-8 warns (*) on all the strncpy calls in this function about
11002 possible string truncation. The "truncation" is not a bug. We
11003 have an external representation of structs with fields that are not
11004 necessarily NULL terminated and corresponding internal
11005 representation fields that are one larger so that they can always
11006 be NULL terminated.
11007 gcc versions between 4.2 and 4.6 do not allow pragma control of
11008 diagnostics inside functions, giving a hard error if you try to use
11009 the finer control available with later versions.
11010 gcc prior to 4.2 warns about diagnostic push and pop.
11011 gcc-5, gcc-6 and gcc-7 warn that -Wstringop-truncation is unknown,
11012 unless you also add #pragma GCC diagnostic ignored "-Wpragma".
11013 (*) Depending on your system header files! */
d99b4b92 11014#if GCC_VERSION >= 8000
602f1657
AM
11015# pragma GCC diagnostic push
11016# pragma GCC diagnostic ignored "-Wstringop-truncation"
d99b4b92 11017#endif
7c76fa91 11018char *
217aa764
AM
11019elfcore_write_prpsinfo (bfd *abfd,
11020 char *buf,
11021 int *bufsiz,
11022 const char *fname,
11023 const char *psargs)
7c76fa91 11024{
183e98be
AM
11025 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11026
11027 if (bed->elf_backend_write_core_note != NULL)
11028 {
11029 char *ret;
11030 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11031 NT_PRPSINFO, fname, psargs);
11032 if (ret != NULL)
11033 return ret;
11034 }
7c76fa91 11035
1f20dca5 11036#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
602f1657 11037# if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
183e98be
AM
11038 if (bed->s->elfclass == ELFCLASS32)
11039 {
602f1657 11040# if defined (HAVE_PSINFO32_T)
183e98be
AM
11041 psinfo32_t data;
11042 int note_type = NT_PSINFO;
602f1657 11043# else
183e98be
AM
11044 prpsinfo32_t data;
11045 int note_type = NT_PRPSINFO;
602f1657 11046# endif
183e98be
AM
11047
11048 memset (&data, 0, sizeof (data));
11049 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11050 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11051 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 11052 "CORE", note_type, &data, sizeof (data));
183e98be
AM
11053 }
11054 else
602f1657 11055# endif
183e98be 11056 {
602f1657 11057# if defined (HAVE_PSINFO_T)
183e98be
AM
11058 psinfo_t data;
11059 int note_type = NT_PSINFO;
602f1657 11060# else
183e98be
AM
11061 prpsinfo_t data;
11062 int note_type = NT_PRPSINFO;
602f1657 11063# endif
7c76fa91 11064
183e98be
AM
11065 memset (&data, 0, sizeof (data));
11066 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11067 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11068 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 11069 "CORE", note_type, &data, sizeof (data));
183e98be 11070 }
7c76fa91
MS
11071#endif /* PSINFO_T or PRPSINFO_T */
11072
1f20dca5
UW
11073 free (buf);
11074 return NULL;
11075}
d99b4b92 11076#if GCC_VERSION >= 8000
602f1657 11077# pragma GCC diagnostic pop
d99b4b92 11078#endif
1f20dca5 11079
70a38d42
SDJ
11080char *
11081elfcore_write_linux_prpsinfo32
11082 (bfd *abfd, char *buf, int *bufsiz,
11083 const struct elf_internal_linux_prpsinfo *prpsinfo)
11084{
a2f63b2e
MR
11085 if (get_elf_backend_data (abfd)->linux_prpsinfo32_ugid16)
11086 {
11087 struct elf_external_linux_prpsinfo32_ugid16 data;
11088
11089 swap_linux_prpsinfo32_ugid16_out (abfd, prpsinfo, &data);
11090 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11091 &data, sizeof (data));
11092 }
11093 else
11094 {
11095 struct elf_external_linux_prpsinfo32_ugid32 data;
70a38d42 11096
a2f63b2e
MR
11097 swap_linux_prpsinfo32_ugid32_out (abfd, prpsinfo, &data);
11098 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11099 &data, sizeof (data));
11100 }
70a38d42
SDJ
11101}
11102
11103char *
11104elfcore_write_linux_prpsinfo64
11105 (bfd *abfd, char *buf, int *bufsiz,
11106 const struct elf_internal_linux_prpsinfo *prpsinfo)
11107{
3c9a7b0d
MR
11108 if (get_elf_backend_data (abfd)->linux_prpsinfo64_ugid16)
11109 {
11110 struct elf_external_linux_prpsinfo64_ugid16 data;
11111
11112 swap_linux_prpsinfo64_ugid16_out (abfd, prpsinfo, &data);
11113 return elfcore_write_note (abfd, buf, bufsiz,
11114 "CORE", NT_PRPSINFO, &data, sizeof (data));
11115 }
11116 else
11117 {
11118 struct elf_external_linux_prpsinfo64_ugid32 data;
70a38d42 11119
3c9a7b0d
MR
11120 swap_linux_prpsinfo64_ugid32_out (abfd, prpsinfo, &data);
11121 return elfcore_write_note (abfd, buf, bufsiz,
11122 "CORE", NT_PRPSINFO, &data, sizeof (data));
11123 }
70a38d42
SDJ
11124}
11125
7c76fa91 11126char *
217aa764
AM
11127elfcore_write_prstatus (bfd *abfd,
11128 char *buf,
11129 int *bufsiz,
11130 long pid,
11131 int cursig,
11132 const void *gregs)
7c76fa91 11133{
183e98be 11134 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 11135
183e98be
AM
11136 if (bed->elf_backend_write_core_note != NULL)
11137 {
11138 char *ret;
11139 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11140 NT_PRSTATUS,
11141 pid, cursig, gregs);
11142 if (ret != NULL)
11143 return ret;
11144 }
11145
1f20dca5 11146#if defined (HAVE_PRSTATUS_T)
183e98be
AM
11147#if defined (HAVE_PRSTATUS32_T)
11148 if (bed->s->elfclass == ELFCLASS32)
11149 {
11150 prstatus32_t prstat;
11151
11152 memset (&prstat, 0, sizeof (prstat));
11153 prstat.pr_pid = pid;
11154 prstat.pr_cursig = cursig;
11155 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 11156 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
11157 NT_PRSTATUS, &prstat, sizeof (prstat));
11158 }
11159 else
11160#endif
11161 {
11162 prstatus_t prstat;
11163
11164 memset (&prstat, 0, sizeof (prstat));
11165 prstat.pr_pid = pid;
11166 prstat.pr_cursig = cursig;
11167 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 11168 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
11169 NT_PRSTATUS, &prstat, sizeof (prstat));
11170 }
7c76fa91
MS
11171#endif /* HAVE_PRSTATUS_T */
11172
1f20dca5
UW
11173 free (buf);
11174 return NULL;
11175}
11176
51316059
MS
11177#if defined (HAVE_LWPSTATUS_T)
11178char *
217aa764
AM
11179elfcore_write_lwpstatus (bfd *abfd,
11180 char *buf,
11181 int *bufsiz,
11182 long pid,
11183 int cursig,
11184 const void *gregs)
51316059
MS
11185{
11186 lwpstatus_t lwpstat;
183e98be 11187 const char *note_name = "CORE";
51316059
MS
11188
11189 memset (&lwpstat, 0, sizeof (lwpstat));
11190 lwpstat.pr_lwpid = pid >> 16;
11191 lwpstat.pr_cursig = cursig;
11192#if defined (HAVE_LWPSTATUS_T_PR_REG)
d1e8523e 11193 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
51316059
MS
11194#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
11195#if !defined(gregs)
11196 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
11197 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
11198#else
11199 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
11200 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
11201#endif
11202#endif
47d9a591 11203 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
11204 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
11205}
11206#endif /* HAVE_LWPSTATUS_T */
11207
7c76fa91
MS
11208#if defined (HAVE_PSTATUS_T)
11209char *
217aa764
AM
11210elfcore_write_pstatus (bfd *abfd,
11211 char *buf,
11212 int *bufsiz,
11213 long pid,
6c10990d
NC
11214 int cursig ATTRIBUTE_UNUSED,
11215 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 11216{
183e98be
AM
11217 const char *note_name = "CORE";
11218#if defined (HAVE_PSTATUS32_T)
11219 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 11220
183e98be
AM
11221 if (bed->s->elfclass == ELFCLASS32)
11222 {
11223 pstatus32_t pstat;
11224
11225 memset (&pstat, 0, sizeof (pstat));
11226 pstat.pr_pid = pid & 0xffff;
11227 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11228 NT_PSTATUS, &pstat, sizeof (pstat));
11229 return buf;
11230 }
11231 else
11232#endif
11233 {
11234 pstatus_t pstat;
11235
11236 memset (&pstat, 0, sizeof (pstat));
11237 pstat.pr_pid = pid & 0xffff;
11238 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11239 NT_PSTATUS, &pstat, sizeof (pstat));
11240 return buf;
11241 }
7c76fa91
MS
11242}
11243#endif /* HAVE_PSTATUS_T */
11244
11245char *
217aa764
AM
11246elfcore_write_prfpreg (bfd *abfd,
11247 char *buf,
11248 int *bufsiz,
11249 const void *fpregs,
11250 int size)
7c76fa91 11251{
183e98be 11252 const char *note_name = "CORE";
47d9a591 11253 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
11254 note_name, NT_FPREGSET, fpregs, size);
11255}
11256
11257char *
217aa764
AM
11258elfcore_write_prxfpreg (bfd *abfd,
11259 char *buf,
11260 int *bufsiz,
11261 const void *xfpregs,
11262 int size)
7c76fa91
MS
11263{
11264 char *note_name = "LINUX";
47d9a591 11265 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
11266 note_name, NT_PRXFPREG, xfpregs, size);
11267}
11268
4339cae0
L
11269char *
11270elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
11271 const void *xfpregs, int size)
11272{
97de3545
JB
11273 char *note_name;
11274 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
11275 note_name = "FreeBSD";
11276 else
11277 note_name = "LINUX";
4339cae0
L
11278 return elfcore_write_note (abfd, buf, bufsiz,
11279 note_name, NT_X86_XSTATE, xfpregs, size);
11280}
11281
97753bd5
AM
11282char *
11283elfcore_write_ppc_vmx (bfd *abfd,
11284 char *buf,
11285 int *bufsiz,
11286 const void *ppc_vmx,
11287 int size)
11288{
11289 char *note_name = "LINUX";
11290 return elfcore_write_note (abfd, buf, bufsiz,
11291 note_name, NT_PPC_VMX, ppc_vmx, size);
11292}
11293
89eeb0bc
LM
11294char *
11295elfcore_write_ppc_vsx (bfd *abfd,
07d6d2b8
AM
11296 char *buf,
11297 int *bufsiz,
11298 const void *ppc_vsx,
11299 int size)
89eeb0bc
LM
11300{
11301 char *note_name = "LINUX";
11302 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11303 note_name, NT_PPC_VSX, ppc_vsx, size);
89eeb0bc
LM
11304}
11305
cb2366c1
EBM
11306char *
11307elfcore_write_ppc_tar (bfd *abfd,
4b24dd1a
AM
11308 char *buf,
11309 int *bufsiz,
11310 const void *ppc_tar,
11311 int size)
cb2366c1
EBM
11312{
11313 char *note_name = "LINUX";
11314 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11315 note_name, NT_PPC_TAR, ppc_tar, size);
cb2366c1
EBM
11316}
11317
11318char *
11319elfcore_write_ppc_ppr (bfd *abfd,
4b24dd1a
AM
11320 char *buf,
11321 int *bufsiz,
11322 const void *ppc_ppr,
11323 int size)
cb2366c1
EBM
11324{
11325 char *note_name = "LINUX";
11326 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11327 note_name, NT_PPC_PPR, ppc_ppr, size);
cb2366c1
EBM
11328}
11329
11330char *
11331elfcore_write_ppc_dscr (bfd *abfd,
4b24dd1a
AM
11332 char *buf,
11333 int *bufsiz,
11334 const void *ppc_dscr,
11335 int size)
cb2366c1
EBM
11336{
11337 char *note_name = "LINUX";
11338 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11339 note_name, NT_PPC_DSCR, ppc_dscr, size);
cb2366c1
EBM
11340}
11341
11342char *
11343elfcore_write_ppc_ebb (bfd *abfd,
4b24dd1a
AM
11344 char *buf,
11345 int *bufsiz,
11346 const void *ppc_ebb,
11347 int size)
cb2366c1
EBM
11348{
11349 char *note_name = "LINUX";
11350 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11351 note_name, NT_PPC_EBB, ppc_ebb, size);
cb2366c1
EBM
11352}
11353
11354char *
11355elfcore_write_ppc_pmu (bfd *abfd,
4b24dd1a
AM
11356 char *buf,
11357 int *bufsiz,
11358 const void *ppc_pmu,
11359 int size)
cb2366c1
EBM
11360{
11361 char *note_name = "LINUX";
11362 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11363 note_name, NT_PPC_PMU, ppc_pmu, size);
cb2366c1
EBM
11364}
11365
11366char *
11367elfcore_write_ppc_tm_cgpr (bfd *abfd,
4b24dd1a
AM
11368 char *buf,
11369 int *bufsiz,
11370 const void *ppc_tm_cgpr,
11371 int size)
cb2366c1
EBM
11372{
11373 char *note_name = "LINUX";
11374 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11375 note_name, NT_PPC_TM_CGPR, ppc_tm_cgpr, size);
cb2366c1
EBM
11376}
11377
11378char *
11379elfcore_write_ppc_tm_cfpr (bfd *abfd,
4b24dd1a
AM
11380 char *buf,
11381 int *bufsiz,
11382 const void *ppc_tm_cfpr,
11383 int size)
cb2366c1
EBM
11384{
11385 char *note_name = "LINUX";
11386 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11387 note_name, NT_PPC_TM_CFPR, ppc_tm_cfpr, size);
cb2366c1
EBM
11388}
11389
11390char *
11391elfcore_write_ppc_tm_cvmx (bfd *abfd,
4b24dd1a
AM
11392 char *buf,
11393 int *bufsiz,
11394 const void *ppc_tm_cvmx,
11395 int size)
cb2366c1
EBM
11396{
11397 char *note_name = "LINUX";
11398 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11399 note_name, NT_PPC_TM_CVMX, ppc_tm_cvmx, size);
cb2366c1
EBM
11400}
11401
11402char *
11403elfcore_write_ppc_tm_cvsx (bfd *abfd,
4b24dd1a
AM
11404 char *buf,
11405 int *bufsiz,
11406 const void *ppc_tm_cvsx,
11407 int size)
cb2366c1
EBM
11408{
11409 char *note_name = "LINUX";
11410 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11411 note_name, NT_PPC_TM_CVSX, ppc_tm_cvsx, size);
cb2366c1
EBM
11412}
11413
11414char *
11415elfcore_write_ppc_tm_spr (bfd *abfd,
4b24dd1a
AM
11416 char *buf,
11417 int *bufsiz,
11418 const void *ppc_tm_spr,
11419 int size)
cb2366c1
EBM
11420{
11421 char *note_name = "LINUX";
11422 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11423 note_name, NT_PPC_TM_SPR, ppc_tm_spr, size);
cb2366c1
EBM
11424}
11425
11426char *
11427elfcore_write_ppc_tm_ctar (bfd *abfd,
4b24dd1a
AM
11428 char *buf,
11429 int *bufsiz,
11430 const void *ppc_tm_ctar,
11431 int size)
cb2366c1
EBM
11432{
11433 char *note_name = "LINUX";
11434 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11435 note_name, NT_PPC_TM_CTAR, ppc_tm_ctar, size);
cb2366c1
EBM
11436}
11437
11438char *
11439elfcore_write_ppc_tm_cppr (bfd *abfd,
4b24dd1a
AM
11440 char *buf,
11441 int *bufsiz,
11442 const void *ppc_tm_cppr,
11443 int size)
cb2366c1
EBM
11444{
11445 char *note_name = "LINUX";
11446 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11447 note_name, NT_PPC_TM_CPPR, ppc_tm_cppr, size);
cb2366c1
EBM
11448}
11449
11450char *
11451elfcore_write_ppc_tm_cdscr (bfd *abfd,
4b24dd1a
AM
11452 char *buf,
11453 int *bufsiz,
11454 const void *ppc_tm_cdscr,
11455 int size)
cb2366c1
EBM
11456{
11457 char *note_name = "LINUX";
11458 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11459 note_name, NT_PPC_TM_CDSCR, ppc_tm_cdscr, size);
cb2366c1
EBM
11460}
11461
0675e188
UW
11462static char *
11463elfcore_write_s390_high_gprs (bfd *abfd,
11464 char *buf,
11465 int *bufsiz,
11466 const void *s390_high_gprs,
11467 int size)
11468{
11469 char *note_name = "LINUX";
11470 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11471 note_name, NT_S390_HIGH_GPRS,
0675e188
UW
11472 s390_high_gprs, size);
11473}
11474
d7eeb400
MS
11475char *
11476elfcore_write_s390_timer (bfd *abfd,
07d6d2b8
AM
11477 char *buf,
11478 int *bufsiz,
11479 const void *s390_timer,
11480 int size)
d7eeb400
MS
11481{
11482 char *note_name = "LINUX";
11483 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11484 note_name, NT_S390_TIMER, s390_timer, size);
d7eeb400
MS
11485}
11486
11487char *
11488elfcore_write_s390_todcmp (bfd *abfd,
07d6d2b8
AM
11489 char *buf,
11490 int *bufsiz,
11491 const void *s390_todcmp,
11492 int size)
d7eeb400
MS
11493{
11494 char *note_name = "LINUX";
11495 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11496 note_name, NT_S390_TODCMP, s390_todcmp, size);
d7eeb400
MS
11497}
11498
11499char *
11500elfcore_write_s390_todpreg (bfd *abfd,
07d6d2b8
AM
11501 char *buf,
11502 int *bufsiz,
11503 const void *s390_todpreg,
11504 int size)
d7eeb400
MS
11505{
11506 char *note_name = "LINUX";
11507 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11508 note_name, NT_S390_TODPREG, s390_todpreg, size);
d7eeb400
MS
11509}
11510
11511char *
11512elfcore_write_s390_ctrs (bfd *abfd,
07d6d2b8
AM
11513 char *buf,
11514 int *bufsiz,
11515 const void *s390_ctrs,
11516 int size)
d7eeb400
MS
11517{
11518 char *note_name = "LINUX";
11519 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11520 note_name, NT_S390_CTRS, s390_ctrs, size);
d7eeb400
MS
11521}
11522
11523char *
11524elfcore_write_s390_prefix (bfd *abfd,
07d6d2b8
AM
11525 char *buf,
11526 int *bufsiz,
11527 const void *s390_prefix,
11528 int size)
d7eeb400
MS
11529{
11530 char *note_name = "LINUX";
11531 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11532 note_name, NT_S390_PREFIX, s390_prefix, size);
d7eeb400
MS
11533}
11534
355b81d9
UW
11535char *
11536elfcore_write_s390_last_break (bfd *abfd,
11537 char *buf,
11538 int *bufsiz,
11539 const void *s390_last_break,
11540 int size)
11541{
11542 char *note_name = "LINUX";
11543 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11544 note_name, NT_S390_LAST_BREAK,
355b81d9
UW
11545 s390_last_break, size);
11546}
11547
11548char *
11549elfcore_write_s390_system_call (bfd *abfd,
11550 char *buf,
11551 int *bufsiz,
11552 const void *s390_system_call,
11553 int size)
11554{
11555 char *note_name = "LINUX";
11556 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11557 note_name, NT_S390_SYSTEM_CALL,
355b81d9
UW
11558 s390_system_call, size);
11559}
11560
abb3f6cc
NC
11561char *
11562elfcore_write_s390_tdb (bfd *abfd,
11563 char *buf,
11564 int *bufsiz,
11565 const void *s390_tdb,
11566 int size)
11567{
11568 char *note_name = "LINUX";
11569 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11570 note_name, NT_S390_TDB, s390_tdb, size);
abb3f6cc
NC
11571}
11572
4ef9f41a
AA
11573char *
11574elfcore_write_s390_vxrs_low (bfd *abfd,
11575 char *buf,
11576 int *bufsiz,
11577 const void *s390_vxrs_low,
11578 int size)
11579{
11580 char *note_name = "LINUX";
11581 return elfcore_write_note (abfd, buf, bufsiz,
11582 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
11583}
11584
11585char *
11586elfcore_write_s390_vxrs_high (bfd *abfd,
11587 char *buf,
11588 int *bufsiz,
11589 const void *s390_vxrs_high,
11590 int size)
11591{
11592 char *note_name = "LINUX";
11593 return elfcore_write_note (abfd, buf, bufsiz,
11594 note_name, NT_S390_VXRS_HIGH,
11595 s390_vxrs_high, size);
11596}
11597
88ab90e8
AA
11598char *
11599elfcore_write_s390_gs_cb (bfd *abfd,
11600 char *buf,
11601 int *bufsiz,
11602 const void *s390_gs_cb,
11603 int size)
11604{
11605 char *note_name = "LINUX";
11606 return elfcore_write_note (abfd, buf, bufsiz,
11607 note_name, NT_S390_GS_CB,
11608 s390_gs_cb, size);
11609}
11610
11611char *
11612elfcore_write_s390_gs_bc (bfd *abfd,
11613 char *buf,
11614 int *bufsiz,
11615 const void *s390_gs_bc,
11616 int size)
11617{
11618 char *note_name = "LINUX";
11619 return elfcore_write_note (abfd, buf, bufsiz,
11620 note_name, NT_S390_GS_BC,
11621 s390_gs_bc, size);
11622}
11623
faa9a424
UW
11624char *
11625elfcore_write_arm_vfp (bfd *abfd,
11626 char *buf,
11627 int *bufsiz,
11628 const void *arm_vfp,
11629 int size)
11630{
11631 char *note_name = "LINUX";
11632 return elfcore_write_note (abfd, buf, bufsiz,
11633 note_name, NT_ARM_VFP, arm_vfp, size);
11634}
11635
652451f8
YZ
11636char *
11637elfcore_write_aarch_tls (bfd *abfd,
11638 char *buf,
11639 int *bufsiz,
11640 const void *aarch_tls,
11641 int size)
11642{
11643 char *note_name = "LINUX";
11644 return elfcore_write_note (abfd, buf, bufsiz,
11645 note_name, NT_ARM_TLS, aarch_tls, size);
11646}
11647
11648char *
11649elfcore_write_aarch_hw_break (bfd *abfd,
11650 char *buf,
11651 int *bufsiz,
11652 const void *aarch_hw_break,
11653 int size)
11654{
11655 char *note_name = "LINUX";
11656 return elfcore_write_note (abfd, buf, bufsiz,
11657 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
11658}
11659
11660char *
11661elfcore_write_aarch_hw_watch (bfd *abfd,
11662 char *buf,
11663 int *bufsiz,
11664 const void *aarch_hw_watch,
11665 int size)
11666{
11667 char *note_name = "LINUX";
11668 return elfcore_write_note (abfd, buf, bufsiz,
11669 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
11670}
11671
ad1cc4e4
AH
11672char *
11673elfcore_write_aarch_sve (bfd *abfd,
11674 char *buf,
11675 int *bufsiz,
11676 const void *aarch_sve,
11677 int size)
11678{
11679 char *note_name = "LINUX";
11680 return elfcore_write_note (abfd, buf, bufsiz,
11681 note_name, NT_ARM_SVE, aarch_sve, size);
11682}
11683
e6c3b5bf
AH
11684char *
11685elfcore_write_aarch_pauth (bfd *abfd,
11686 char *buf,
11687 int *bufsiz,
11688 const void *aarch_pauth,
11689 int size)
11690{
11691 char *note_name = "LINUX";
11692 return elfcore_write_note (abfd, buf, bufsiz,
11693 note_name, NT_ARM_PAC_MASK, aarch_pauth, size);
11694}
11695
bb864ac1
CES
11696char *
11697elfcore_write_register_note (bfd *abfd,
11698 char *buf,
11699 int *bufsiz,
11700 const char *section,
11701 const void *data,
11702 int size)
11703{
11704 if (strcmp (section, ".reg2") == 0)
11705 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
11706 if (strcmp (section, ".reg-xfp") == 0)
11707 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
11708 if (strcmp (section, ".reg-xstate") == 0)
11709 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
11710 if (strcmp (section, ".reg-ppc-vmx") == 0)
11711 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
11712 if (strcmp (section, ".reg-ppc-vsx") == 0)
11713 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
cb2366c1
EBM
11714 if (strcmp (section, ".reg-ppc-tar") == 0)
11715 return elfcore_write_ppc_tar (abfd, buf, bufsiz, data, size);
11716 if (strcmp (section, ".reg-ppc-ppr") == 0)
11717 return elfcore_write_ppc_ppr (abfd, buf, bufsiz, data, size);
11718 if (strcmp (section, ".reg-ppc-dscr") == 0)
11719 return elfcore_write_ppc_dscr (abfd, buf, bufsiz, data, size);
11720 if (strcmp (section, ".reg-ppc-ebb") == 0)
11721 return elfcore_write_ppc_ebb (abfd, buf, bufsiz, data, size);
11722 if (strcmp (section, ".reg-ppc-pmu") == 0)
11723 return elfcore_write_ppc_pmu (abfd, buf, bufsiz, data, size);
11724 if (strcmp (section, ".reg-ppc-tm-cgpr") == 0)
11725 return elfcore_write_ppc_tm_cgpr (abfd, buf, bufsiz, data, size);
11726 if (strcmp (section, ".reg-ppc-tm-cfpr") == 0)
11727 return elfcore_write_ppc_tm_cfpr (abfd, buf, bufsiz, data, size);
11728 if (strcmp (section, ".reg-ppc-tm-cvmx") == 0)
11729 return elfcore_write_ppc_tm_cvmx (abfd, buf, bufsiz, data, size);
11730 if (strcmp (section, ".reg-ppc-tm-cvsx") == 0)
11731 return elfcore_write_ppc_tm_cvsx (abfd, buf, bufsiz, data, size);
11732 if (strcmp (section, ".reg-ppc-tm-spr") == 0)
11733 return elfcore_write_ppc_tm_spr (abfd, buf, bufsiz, data, size);
11734 if (strcmp (section, ".reg-ppc-tm-ctar") == 0)
11735 return elfcore_write_ppc_tm_ctar (abfd, buf, bufsiz, data, size);
11736 if (strcmp (section, ".reg-ppc-tm-cppr") == 0)
11737 return elfcore_write_ppc_tm_cppr (abfd, buf, bufsiz, data, size);
11738 if (strcmp (section, ".reg-ppc-tm-cdscr") == 0)
11739 return elfcore_write_ppc_tm_cdscr (abfd, buf, bufsiz, data, size);
0675e188
UW
11740 if (strcmp (section, ".reg-s390-high-gprs") == 0)
11741 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
11742 if (strcmp (section, ".reg-s390-timer") == 0)
11743 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
11744 if (strcmp (section, ".reg-s390-todcmp") == 0)
11745 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
11746 if (strcmp (section, ".reg-s390-todpreg") == 0)
11747 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
11748 if (strcmp (section, ".reg-s390-ctrs") == 0)
11749 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
11750 if (strcmp (section, ".reg-s390-prefix") == 0)
11751 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
355b81d9
UW
11752 if (strcmp (section, ".reg-s390-last-break") == 0)
11753 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
11754 if (strcmp (section, ".reg-s390-system-call") == 0)
11755 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
abb3f6cc
NC
11756 if (strcmp (section, ".reg-s390-tdb") == 0)
11757 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
4ef9f41a
AA
11758 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
11759 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
11760 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
11761 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
88ab90e8
AA
11762 if (strcmp (section, ".reg-s390-gs-cb") == 0)
11763 return elfcore_write_s390_gs_cb (abfd, buf, bufsiz, data, size);
11764 if (strcmp (section, ".reg-s390-gs-bc") == 0)
11765 return elfcore_write_s390_gs_bc (abfd, buf, bufsiz, data, size);
faa9a424
UW
11766 if (strcmp (section, ".reg-arm-vfp") == 0)
11767 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
652451f8
YZ
11768 if (strcmp (section, ".reg-aarch-tls") == 0)
11769 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
11770 if (strcmp (section, ".reg-aarch-hw-break") == 0)
11771 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
11772 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
11773 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
ad1cc4e4
AH
11774 if (strcmp (section, ".reg-aarch-sve") == 0)
11775 return elfcore_write_aarch_sve (abfd, buf, bufsiz, data, size);
e6c3b5bf
AH
11776 if (strcmp (section, ".reg-aarch-pauth") == 0)
11777 return elfcore_write_aarch_pauth (abfd, buf, bufsiz, data, size);
bb864ac1
CES
11778 return NULL;
11779}
11780
b34976b6 11781static bfd_boolean
276da9b3
L
11782elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset,
11783 size_t align)
252b5132 11784{
c044fabd 11785 char *p;
252b5132 11786
276da9b3
L
11787 /* NB: CORE PT_NOTE segments may have p_align values of 0 or 1.
11788 gABI specifies that PT_NOTE alignment should be aligned to 4
11789 bytes for 32-bit objects and to 8 bytes for 64-bit objects. If
11790 align is less than 4, we use 4 byte alignment. */
11791 if (align < 4)
11792 align = 4;
ef135d43
NC
11793 if (align != 4 && align != 8)
11794 return FALSE;
276da9b3 11795
252b5132
RH
11796 p = buf;
11797 while (p < buf + size)
11798 {
c044fabd 11799 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
11800 Elf_Internal_Note in;
11801
baea7ef1
AM
11802 if (offsetof (Elf_External_Note, name) > buf - p + size)
11803 return FALSE;
11804
dc810e39 11805 in.type = H_GET_32 (abfd, xnp->type);
252b5132 11806
dc810e39 11807 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 11808 in.namedata = xnp->name;
baea7ef1
AM
11809 if (in.namesz > buf - in.namedata + size)
11810 return FALSE;
252b5132 11811
dc810e39 11812 in.descsz = H_GET_32 (abfd, xnp->descsz);
276da9b3 11813 in.descdata = p + ELF_NOTE_DESC_OFFSET (in.namesz, align);
252b5132 11814 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
11815 if (in.descsz != 0
11816 && (in.descdata >= buf + size
11817 || in.descsz > buf - in.descdata + size))
11818 return FALSE;
252b5132 11819
718175fa 11820 switch (bfd_get_format (abfd))
07d6d2b8 11821 {
718175fa
JK
11822 default:
11823 return TRUE;
11824
11825 case bfd_core:
f64e188b 11826 {
8acbedd6 11827#define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
f64e188b 11828 struct
718175fa 11829 {
f64e188b 11830 const char * string;
8acbedd6 11831 size_t len;
f64e188b 11832 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
718175fa 11833 }
f64e188b 11834 grokers[] =
b15fa79e 11835 {
8acbedd6 11836 GROKER_ELEMENT ("", elfcore_grok_note),
aa1ed4a9 11837 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
8acbedd6
KS
11838 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
11839 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
11840 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
864619bb
KS
11841 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note),
11842 GROKER_ELEMENT ("GNU", elfobj_grok_gnu_note)
f64e188b 11843 };
8acbedd6 11844#undef GROKER_ELEMENT
f64e188b
NC
11845 int i;
11846
11847 for (i = ARRAY_SIZE (grokers); i--;)
8acbedd6
KS
11848 {
11849 if (in.namesz >= grokers[i].len
11850 && strncmp (in.namedata, grokers[i].string,
11851 grokers[i].len) == 0)
11852 {
11853 if (! grokers[i].func (abfd, & in))
11854 return FALSE;
11855 break;
11856 }
11857 }
f64e188b
NC
11858 break;
11859 }
718175fa
JK
11860
11861 case bfd_object:
11862 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
11863 {
11864 if (! elfobj_grok_gnu_note (abfd, &in))
11865 return FALSE;
11866 }
e21e5835
NC
11867 else if (in.namesz == sizeof "stapsdt"
11868 && strcmp (in.namedata, "stapsdt") == 0)
11869 {
11870 if (! elfobj_grok_stapsdt_note (abfd, &in))
11871 return FALSE;
11872 }
718175fa 11873 break;
08a40648 11874 }
252b5132 11875
276da9b3 11876 p += ELF_NOTE_NEXT_OFFSET (in.namesz, in.descsz, align);
252b5132
RH
11877 }
11878
718175fa
JK
11879 return TRUE;
11880}
11881
864619bb 11882bfd_boolean
276da9b3
L
11883elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size,
11884 size_t align)
718175fa
JK
11885{
11886 char *buf;
11887
957e1fc1 11888 if (size == 0 || (size + 1) == 0)
718175fa
JK
11889 return TRUE;
11890
11891 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
11892 return FALSE;
11893
f64e188b 11894 buf = (char *) bfd_malloc (size + 1);
718175fa
JK
11895 if (buf == NULL)
11896 return FALSE;
11897
f64e188b
NC
11898 /* PR 17512: file: ec08f814
11899 0-termintate the buffer so that string searches will not overflow. */
11900 buf[size] = 0;
11901
718175fa 11902 if (bfd_bread (buf, size, abfd) != size
276da9b3 11903 || !elf_parse_notes (abfd, buf, size, offset, align))
718175fa
JK
11904 {
11905 free (buf);
11906 return FALSE;
11907 }
11908
252b5132 11909 free (buf);
b34976b6 11910 return TRUE;
252b5132 11911}
98d8431c
JB
11912\f
11913/* Providing external access to the ELF program header table. */
11914
11915/* Return an upper bound on the number of bytes required to store a
11916 copy of ABFD's program header table entries. Return -1 if an error
11917 occurs; bfd_get_error will return an appropriate code. */
c044fabd 11918
98d8431c 11919long
217aa764 11920bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
11921{
11922 if (abfd->xvec->flavour != bfd_target_elf_flavour)
11923 {
11924 bfd_set_error (bfd_error_wrong_format);
11925 return -1;
11926 }
11927
936e320b 11928 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
11929}
11930
98d8431c
JB
11931/* Copy ABFD's program header table entries to *PHDRS. The entries
11932 will be stored as an array of Elf_Internal_Phdr structures, as
11933 defined in include/elf/internal.h. To find out how large the
11934 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
11935
11936 Return the number of program header table entries read, or -1 if an
11937 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 11938
98d8431c 11939int
217aa764 11940bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
11941{
11942 int num_phdrs;
11943
11944 if (abfd->xvec->flavour != bfd_target_elf_flavour)
11945 {
11946 bfd_set_error (bfd_error_wrong_format);
11947 return -1;
11948 }
11949
11950 num_phdrs = elf_elfheader (abfd)->e_phnum;
01bcaf63
TT
11951 if (num_phdrs != 0)
11952 memcpy (phdrs, elf_tdata (abfd)->phdr,
11953 num_phdrs * sizeof (Elf_Internal_Phdr));
98d8431c
JB
11954
11955 return num_phdrs;
11956}
ae4221d7 11957
db6751f2 11958enum elf_reloc_type_class
7e612e98
AM
11959_bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
11960 const asection *rel_sec ATTRIBUTE_UNUSED,
11961 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
11962{
11963 return reloc_class_normal;
11964}
f8df10f4 11965
47d9a591 11966/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
11967 relocation against a local symbol. */
11968
11969bfd_vma
217aa764
AM
11970_bfd_elf_rela_local_sym (bfd *abfd,
11971 Elf_Internal_Sym *sym,
8517fae7 11972 asection **psec,
217aa764 11973 Elf_Internal_Rela *rel)
f8df10f4 11974{
8517fae7 11975 asection *sec = *psec;
f8df10f4
JJ
11976 bfd_vma relocation;
11977
6835821b
AM
11978 relocation = (sec->output_section->vma
11979 + sec->output_offset
11980 + sym->st_value);
f8df10f4 11981 if ((sec->flags & SEC_MERGE)
c629eae0 11982 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 11983 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
f8df10f4 11984 {
f8df10f4 11985 rel->r_addend =
8517fae7 11986 _bfd_merged_section_offset (abfd, psec,
65765700 11987 elf_section_data (sec)->sec_info,
753731ee
AM
11988 sym->st_value + rel->r_addend);
11989 if (sec != *psec)
11990 {
11991 /* If we have changed the section, and our original section is
11992 marked with SEC_EXCLUDE, it means that the original
11993 SEC_MERGE section has been completely subsumed in some
11994 other SEC_MERGE section. In this case, we need to leave
11995 some info around for --emit-relocs. */
11996 if ((sec->flags & SEC_EXCLUDE) != 0)
11997 sec->kept_section = *psec;
11998 sec = *psec;
11999 }
8517fae7
AM
12000 rel->r_addend -= relocation;
12001 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
12002 }
12003 return relocation;
12004}
c629eae0
JJ
12005
12006bfd_vma
217aa764
AM
12007_bfd_elf_rel_local_sym (bfd *abfd,
12008 Elf_Internal_Sym *sym,
12009 asection **psec,
12010 bfd_vma addend)
47d9a591 12011{
c629eae0
JJ
12012 asection *sec = *psec;
12013
6835821b 12014 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
c629eae0
JJ
12015 return sym->st_value + addend;
12016
12017 return _bfd_merged_section_offset (abfd, psec,
65765700 12018 elf_section_data (sec)->sec_info,
753731ee 12019 sym->st_value + addend);
c629eae0
JJ
12020}
12021
37b01f6a
DG
12022/* Adjust an address within a section. Given OFFSET within SEC, return
12023 the new offset within the section, based upon changes made to the
12024 section. Returns -1 if the offset is now invalid.
12025 The offset (in abnd out) is in target sized bytes, however big a
12026 byte may be. */
12027
c629eae0 12028bfd_vma
217aa764 12029_bfd_elf_section_offset (bfd *abfd,
92e4ec35 12030 struct bfd_link_info *info,
217aa764
AM
12031 asection *sec,
12032 bfd_vma offset)
c629eae0 12033{
68bfbfcc 12034 switch (sec->sec_info_type)
65765700 12035 {
dbaa2011 12036 case SEC_INFO_TYPE_STABS:
eea6121a
AM
12037 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
12038 offset);
dbaa2011 12039 case SEC_INFO_TYPE_EH_FRAME:
92e4ec35 12040 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
37b01f6a 12041
65765700 12042 default:
310fd250
L
12043 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
12044 {
37b01f6a 12045 /* Reverse the offset. */
310fd250
L
12046 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12047 bfd_size_type address_size = bed->s->arch_size / 8;
37b01f6a
DG
12048
12049 /* address_size and sec->size are in octets. Convert
12050 to bytes before subtracting the original offset. */
61826503 12051 offset = ((sec->size - address_size)
bb294208 12052 / bfd_octets_per_byte (abfd, sec) - offset);
310fd250 12053 }
65765700
JJ
12054 return offset;
12055 }
c629eae0 12056}
3333a7c3
RM
12057\f
12058/* Create a new BFD as if by bfd_openr. Rather than opening a file,
12059 reconstruct an ELF file by reading the segments out of remote memory
12060 based on the ELF file header at EHDR_VMA and the ELF program headers it
12061 points to. If not null, *LOADBASEP is filled in with the difference
12062 between the VMAs from which the segments were read, and the VMAs the
12063 file headers (and hence BFD's idea of each section's VMA) put them at.
12064
12065 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
12066 remote memory at target address VMA into the local buffer at MYADDR; it
12067 should return zero on success or an `errno' code on failure. TEMPL must
12068 be a BFD for an ELF target with the word size and byte order found in
12069 the remote memory. */
12070
12071bfd *
217aa764
AM
12072bfd_elf_bfd_from_remote_memory
12073 (bfd *templ,
12074 bfd_vma ehdr_vma,
f0a5d95a 12075 bfd_size_type size,
217aa764 12076 bfd_vma *loadbasep,
fe78531d 12077 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
3333a7c3
RM
12078{
12079 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
5979d6b6 12080 (templ, ehdr_vma, size, loadbasep, target_read_memory);
3333a7c3 12081}
4c45e5c9
JJ
12082\f
12083long
c9727e01
AM
12084_bfd_elf_get_synthetic_symtab (bfd *abfd,
12085 long symcount ATTRIBUTE_UNUSED,
12086 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 12087 long dynsymcount,
c9727e01
AM
12088 asymbol **dynsyms,
12089 asymbol **ret)
4c45e5c9
JJ
12090{
12091 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12092 asection *relplt;
12093 asymbol *s;
12094 const char *relplt_name;
12095 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
12096 arelent *p;
12097 long count, i, n;
12098 size_t size;
12099 Elf_Internal_Shdr *hdr;
12100 char *names;
12101 asection *plt;
12102
8615f3f2
AM
12103 *ret = NULL;
12104
90e3cdf2
JJ
12105 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
12106 return 0;
12107
8615f3f2
AM
12108 if (dynsymcount <= 0)
12109 return 0;
12110
4c45e5c9
JJ
12111 if (!bed->plt_sym_val)
12112 return 0;
12113
12114 relplt_name = bed->relplt_name;
12115 if (relplt_name == NULL)
d35fd659 12116 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
12117 relplt = bfd_get_section_by_name (abfd, relplt_name);
12118 if (relplt == NULL)
12119 return 0;
12120
12121 hdr = &elf_section_data (relplt)->this_hdr;
12122 if (hdr->sh_link != elf_dynsymtab (abfd)
12123 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
12124 return 0;
12125
12126 plt = bfd_get_section_by_name (abfd, ".plt");
12127 if (plt == NULL)
12128 return 0;
12129
12130 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 12131 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
12132 return -1;
12133
eea6121a 12134 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
12135 size = count * sizeof (asymbol);
12136 p = relplt->relocation;
cb53bf42 12137 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
12138 {
12139 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
12140 if (p->addend != 0)
12141 {
12142#ifdef BFD64
12143 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
12144#else
12145 size += sizeof ("+0x") - 1 + 8;
12146#endif
12147 }
12148 }
4c45e5c9 12149
a50b1753 12150 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
12151 if (s == NULL)
12152 return -1;
12153
12154 names = (char *) (s + count);
12155 p = relplt->relocation;
12156 n = 0;
cb53bf42 12157 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
12158 {
12159 size_t len;
12160 bfd_vma addr;
12161
12162 addr = bed->plt_sym_val (i, plt, p);
12163 if (addr == (bfd_vma) -1)
12164 continue;
12165
12166 *s = **p->sym_ptr_ptr;
65a7a66f
AM
12167 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
12168 we are defining a symbol, ensure one of them is set. */
12169 if ((s->flags & BSF_LOCAL) == 0)
12170 s->flags |= BSF_GLOBAL;
6ba2a415 12171 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
12172 s->section = plt;
12173 s->value = addr - plt->vma;
12174 s->name = names;
8f39ba8e 12175 s->udata.p = NULL;
4c45e5c9
JJ
12176 len = strlen ((*p->sym_ptr_ptr)->name);
12177 memcpy (names, (*p->sym_ptr_ptr)->name, len);
12178 names += len;
041de40d
AM
12179 if (p->addend != 0)
12180 {
1d770845 12181 char buf[30], *a;
d324f6d6 12182
041de40d
AM
12183 memcpy (names, "+0x", sizeof ("+0x") - 1);
12184 names += sizeof ("+0x") - 1;
1d770845
L
12185 bfd_sprintf_vma (abfd, buf, p->addend);
12186 for (a = buf; *a == '0'; ++a)
12187 ;
12188 len = strlen (a);
12189 memcpy (names, a, len);
12190 names += len;
041de40d 12191 }
4c45e5c9
JJ
12192 memcpy (names, "@plt", sizeof ("@plt"));
12193 names += sizeof ("@plt");
8f39ba8e 12194 ++s, ++n;
4c45e5c9
JJ
12195 }
12196
12197 return n;
12198}
3d7f7666 12199
821e6ff6
AM
12200/* It is only used by x86-64 so far.
12201 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
7eacd66b
AM
12202 but current usage would allow all of _bfd_std_section to be zero. */
12203static const asymbol lcomm_sym
12204 = GLOBAL_SYM_INIT ("LARGE_COMMON", &_bfd_elf_large_com_section);
3b22753a 12205asection _bfd_elf_large_com_section
7eacd66b 12206 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, &lcomm_sym,
821e6ff6 12207 "LARGE_COMMON", 0, SEC_IS_COMMON);
ecca9871 12208
cc364be6
AM
12209bfd_boolean
12210_bfd_elf_final_write_processing (bfd *abfd)
06f44071
AM
12211{
12212 Elf_Internal_Ehdr *i_ehdrp; /* ELF file header, internal form. */
d1036acb
L
12213
12214 i_ehdrp = elf_elfheader (abfd);
12215
06f44071
AM
12216 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12217 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23 12218
df3a023b
AM
12219 /* Set the osabi field to ELFOSABI_GNU if the binary contains
12220 SHF_GNU_MBIND sections or symbols of STT_GNU_IFUNC type or
12221 STB_GNU_UNIQUE binding. */
cc364be6
AM
12222 if (elf_tdata (abfd)->has_gnu_osabi != 0)
12223 {
12224 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12225 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
12226 else if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU
12227 && i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_FREEBSD)
12228 {
12229 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind)
12230 _bfd_error_handler (_("GNU_MBIND section is unsupported"));
12231 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_ifunc)
12232 _bfd_error_handler (_("symbol type STT_GNU_IFUNC is unsupported"));
12233 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_unique)
12234 _bfd_error_handler (_("symbol binding STB_GNU_UNIQUE is unsupported"));
9aea1e31 12235 bfd_set_error (bfd_error_sorry);
cc364be6
AM
12236 return FALSE;
12237 }
12238 }
12239 return TRUE;
d1036acb 12240}
fcb93ecf
PB
12241
12242
12243/* Return TRUE for ELF symbol types that represent functions.
12244 This is the default version of this function, which is sufficient for
d8045f23 12245 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
12246
12247bfd_boolean
12248_bfd_elf_is_function_type (unsigned int type)
12249{
d8045f23
NC
12250 return (type == STT_FUNC
12251 || type == STT_GNU_IFUNC);
fcb93ecf 12252}
9f296da3 12253
aef36ac1
AM
12254/* If the ELF symbol SYM might be a function in SEC, return the
12255 function size and set *CODE_OFF to the function's entry point,
12256 otherwise return zero. */
9f296da3 12257
aef36ac1
AM
12258bfd_size_type
12259_bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
12260 bfd_vma *code_off)
9f296da3 12261{
aef36ac1
AM
12262 bfd_size_type size;
12263
ff9e0f5b 12264 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
aef36ac1
AM
12265 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
12266 || sym->section != sec)
12267 return 0;
ff9e0f5b 12268
ff9e0f5b 12269 *code_off = sym->value;
aef36ac1
AM
12270 size = 0;
12271 if (!(sym->flags & BSF_SYNTHETIC))
12272 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
12273 if (size == 0)
12274 size = 1;
12275 return size;
9f296da3 12276}