]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
Fix reading of .debug_str_offsets{,.dwo} twice.
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91 2
b90efa5b 3 Copyright (C) 1993-2015 Free Software Foundation, Inc.
252b5132 4
5e8d7549 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
5e8d7549
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
5e8d7549 10 (at your option) any later version.
252b5132 11
5e8d7549
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
5e8d7549 17 You should have received a copy of the GNU General Public License
b34976b6 18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132 22
1b74d094
BW
23/*
24SECTION
252b5132
RH
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
661a3fd4 33 haven't bothered yet. */
252b5132 34
7ee38065
MS
35/* For sparc64-cross-sparc32. */
36#define _SYSCALL32
252b5132 37#include "sysdep.h"
3db64b00 38#include "bfd.h"
252b5132
RH
39#include "bfdlink.h"
40#include "libbfd.h"
41#define ARCH_SIZE 0
42#include "elf-bfd.h"
e0e8c97f 43#include "libiberty.h"
ff59fc36 44#include "safe-ctype.h"
70a38d42 45#include "elf-linux-psinfo.h"
252b5132 46
8bc7f138
L
47#ifdef CORE_HEADER
48#include CORE_HEADER
49#endif
50
217aa764 51static int elf_sort_sections (const void *, const void *);
c84fca4d 52static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
53static bfd_boolean prep_headers (bfd *);
54static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
718175fa
JK
55static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
56static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
57 file_ptr offset);
50b2bdb7 58
252b5132
RH
59/* Swap version information in and out. The version information is
60 currently size independent. If that ever changes, this code will
61 need to move into elfcode.h. */
62
63/* Swap in a Verdef structure. */
64
65void
217aa764
AM
66_bfd_elf_swap_verdef_in (bfd *abfd,
67 const Elf_External_Verdef *src,
68 Elf_Internal_Verdef *dst)
252b5132 69{
dc810e39
AM
70 dst->vd_version = H_GET_16 (abfd, src->vd_version);
71 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
72 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
73 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
74 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
75 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
76 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
77}
78
79/* Swap out a Verdef structure. */
80
81void
217aa764
AM
82_bfd_elf_swap_verdef_out (bfd *abfd,
83 const Elf_Internal_Verdef *src,
84 Elf_External_Verdef *dst)
252b5132 85{
dc810e39
AM
86 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
87 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
88 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
89 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
90 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
91 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
92 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
93}
94
95/* Swap in a Verdaux structure. */
96
97void
217aa764
AM
98_bfd_elf_swap_verdaux_in (bfd *abfd,
99 const Elf_External_Verdaux *src,
100 Elf_Internal_Verdaux *dst)
252b5132 101{
dc810e39
AM
102 dst->vda_name = H_GET_32 (abfd, src->vda_name);
103 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
104}
105
106/* Swap out a Verdaux structure. */
107
108void
217aa764
AM
109_bfd_elf_swap_verdaux_out (bfd *abfd,
110 const Elf_Internal_Verdaux *src,
111 Elf_External_Verdaux *dst)
252b5132 112{
dc810e39
AM
113 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
114 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
115}
116
117/* Swap in a Verneed structure. */
118
119void
217aa764
AM
120_bfd_elf_swap_verneed_in (bfd *abfd,
121 const Elf_External_Verneed *src,
122 Elf_Internal_Verneed *dst)
252b5132 123{
dc810e39
AM
124 dst->vn_version = H_GET_16 (abfd, src->vn_version);
125 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
126 dst->vn_file = H_GET_32 (abfd, src->vn_file);
127 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
128 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
129}
130
131/* Swap out a Verneed structure. */
132
133void
217aa764
AM
134_bfd_elf_swap_verneed_out (bfd *abfd,
135 const Elf_Internal_Verneed *src,
136 Elf_External_Verneed *dst)
252b5132 137{
dc810e39
AM
138 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
139 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
140 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
141 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
142 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
143}
144
145/* Swap in a Vernaux structure. */
146
147void
217aa764
AM
148_bfd_elf_swap_vernaux_in (bfd *abfd,
149 const Elf_External_Vernaux *src,
150 Elf_Internal_Vernaux *dst)
252b5132 151{
dc810e39
AM
152 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
153 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
154 dst->vna_other = H_GET_16 (abfd, src->vna_other);
155 dst->vna_name = H_GET_32 (abfd, src->vna_name);
156 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
157}
158
159/* Swap out a Vernaux structure. */
160
161void
217aa764
AM
162_bfd_elf_swap_vernaux_out (bfd *abfd,
163 const Elf_Internal_Vernaux *src,
164 Elf_External_Vernaux *dst)
252b5132 165{
dc810e39
AM
166 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
167 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
168 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
169 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
170 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
171}
172
173/* Swap in a Versym structure. */
174
175void
217aa764
AM
176_bfd_elf_swap_versym_in (bfd *abfd,
177 const Elf_External_Versym *src,
178 Elf_Internal_Versym *dst)
252b5132 179{
dc810e39 180 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
181}
182
183/* Swap out a Versym structure. */
184
185void
217aa764
AM
186_bfd_elf_swap_versym_out (bfd *abfd,
187 const Elf_Internal_Versym *src,
188 Elf_External_Versym *dst)
252b5132 189{
dc810e39 190 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
191}
192
193/* Standard ELF hash function. Do not change this function; you will
194 cause invalid hash tables to be generated. */
3a99b017 195
252b5132 196unsigned long
217aa764 197bfd_elf_hash (const char *namearg)
252b5132 198{
3a99b017 199 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
200 unsigned long h = 0;
201 unsigned long g;
202 int ch;
203
204 while ((ch = *name++) != '\0')
205 {
206 h = (h << 4) + ch;
207 if ((g = (h & 0xf0000000)) != 0)
208 {
209 h ^= g >> 24;
210 /* The ELF ABI says `h &= ~g', but this is equivalent in
211 this case and on some machines one insn instead of two. */
212 h ^= g;
213 }
214 }
32dfa85d 215 return h & 0xffffffff;
252b5132
RH
216}
217
fdc90cb4
JJ
218/* DT_GNU_HASH hash function. Do not change this function; you will
219 cause invalid hash tables to be generated. */
220
221unsigned long
222bfd_elf_gnu_hash (const char *namearg)
223{
224 const unsigned char *name = (const unsigned char *) namearg;
225 unsigned long h = 5381;
226 unsigned char ch;
227
228 while ((ch = *name++) != '\0')
229 h = (h << 5) + h + ch;
230 return h & 0xffffffff;
231}
232
0c8d6e5c
AM
233/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
234 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 235bfd_boolean
0c8d6e5c 236bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 237 size_t object_size,
4dfe6ac6 238 enum elf_target_id object_id)
252b5132 239{
0ffa91dd
NC
240 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
241 abfd->tdata.any = bfd_zalloc (abfd, object_size);
242 if (abfd->tdata.any == NULL)
243 return FALSE;
252b5132 244
0ffa91dd 245 elf_object_id (abfd) = object_id;
c0355132
AM
246 if (abfd->direction != read_direction)
247 {
248 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
249 if (o == NULL)
250 return FALSE;
251 elf_tdata (abfd)->o = o;
252 elf_program_header_size (abfd) = (bfd_size_type) -1;
253 }
b34976b6 254 return TRUE;
252b5132
RH
255}
256
0ffa91dd
NC
257
258bfd_boolean
ae95ffa6 259bfd_elf_make_object (bfd *abfd)
0ffa91dd 260{
ae95ffa6 261 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 262 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 263 bed->target_id);
0ffa91dd
NC
264}
265
b34976b6 266bfd_boolean
217aa764 267bfd_elf_mkcorefile (bfd *abfd)
252b5132 268{
c044fabd 269 /* I think this can be done just like an object file. */
228e534f
AM
270 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
271 return FALSE;
272 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
273 return elf_tdata (abfd)->core != NULL;
252b5132
RH
274}
275
72a80a16 276static char *
217aa764 277bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
278{
279 Elf_Internal_Shdr **i_shdrp;
f075ee0c 280 bfd_byte *shstrtab = NULL;
dc810e39
AM
281 file_ptr offset;
282 bfd_size_type shstrtabsize;
252b5132
RH
283
284 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
285 if (i_shdrp == 0
286 || shindex >= elf_numsections (abfd)
287 || i_shdrp[shindex] == 0)
f075ee0c 288 return NULL;
252b5132 289
f075ee0c 290 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
291 if (shstrtab == NULL)
292 {
c044fabd 293 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
294 offset = i_shdrp[shindex]->sh_offset;
295 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
296
297 /* Allocate and clear an extra byte at the end, to prevent crashes
298 in case the string table is not terminated. */
3471d59d 299 if (shstrtabsize + 1 <= 1
06614111
NC
300 || bfd_seek (abfd, offset, SEEK_SET) != 0
301 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL)
c6c60d09
JJ
302 shstrtab = NULL;
303 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
304 {
305 if (bfd_get_error () != bfd_error_system_call)
306 bfd_set_error (bfd_error_file_truncated);
06614111 307 bfd_release (abfd, shstrtab);
c6c60d09 308 shstrtab = NULL;
3471d59d
CC
309 /* Once we've failed to read it, make sure we don't keep
310 trying. Otherwise, we'll keep allocating space for
311 the string table over and over. */
312 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
313 }
314 else
315 shstrtab[shstrtabsize] = '\0';
217aa764 316 i_shdrp[shindex]->contents = shstrtab;
252b5132 317 }
f075ee0c 318 return (char *) shstrtab;
252b5132
RH
319}
320
321char *
217aa764
AM
322bfd_elf_string_from_elf_section (bfd *abfd,
323 unsigned int shindex,
324 unsigned int strindex)
252b5132
RH
325{
326 Elf_Internal_Shdr *hdr;
327
328 if (strindex == 0)
329 return "";
330
74f2e02b
AM
331 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
332 return NULL;
333
252b5132
RH
334 hdr = elf_elfsections (abfd)[shindex];
335
06614111
NC
336 if (hdr->contents == NULL)
337 {
338 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
339 {
340 /* PR 17512: file: f057ec89. */
341 _bfd_error_handler (_("%B: attempt to load strings from a non-string section (number %d)"),
342 abfd, shindex);
343 return NULL;
344 }
345
346 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
347 return NULL;
348 }
252b5132
RH
349
350 if (strindex >= hdr->sh_size)
351 {
1b3a8575 352 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 353 (*_bfd_error_handler)
d003868e
AM
354 (_("%B: invalid string offset %u >= %lu for section `%s'"),
355 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 356 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 357 ? ".shstrtab"
1b3a8575 358 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 359 return NULL;
252b5132
RH
360 }
361
362 return ((char *) hdr->contents) + strindex;
363}
364
6cdc0ccc
AM
365/* Read and convert symbols to internal format.
366 SYMCOUNT specifies the number of symbols to read, starting from
367 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
368 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
369 symbols, and symbol section index extensions, respectively.
370 Returns a pointer to the internal symbol buffer (malloced if necessary)
371 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
372
373Elf_Internal_Sym *
217aa764
AM
374bfd_elf_get_elf_syms (bfd *ibfd,
375 Elf_Internal_Shdr *symtab_hdr,
376 size_t symcount,
377 size_t symoffset,
378 Elf_Internal_Sym *intsym_buf,
379 void *extsym_buf,
380 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
381{
382 Elf_Internal_Shdr *shndx_hdr;
217aa764 383 void *alloc_ext;
df622259 384 const bfd_byte *esym;
6cdc0ccc
AM
385 Elf_External_Sym_Shndx *alloc_extshndx;
386 Elf_External_Sym_Shndx *shndx;
4dd07732 387 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
388 Elf_Internal_Sym *isym;
389 Elf_Internal_Sym *isymend;
9c5bfbb7 390 const struct elf_backend_data *bed;
6cdc0ccc
AM
391 size_t extsym_size;
392 bfd_size_type amt;
393 file_ptr pos;
394
e44a2c9c
AM
395 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
396 abort ();
397
6cdc0ccc
AM
398 if (symcount == 0)
399 return intsym_buf;
400
401 /* Normal syms might have section extension entries. */
402 shndx_hdr = NULL;
403 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
404 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
405
406 /* Read the symbols. */
407 alloc_ext = NULL;
408 alloc_extshndx = NULL;
4dd07732 409 alloc_intsym = NULL;
6cdc0ccc
AM
410 bed = get_elf_backend_data (ibfd);
411 extsym_size = bed->s->sizeof_sym;
412 amt = symcount * extsym_size;
413 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
414 if (extsym_buf == NULL)
415 {
d0fb9a8d 416 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
417 extsym_buf = alloc_ext;
418 }
419 if (extsym_buf == NULL
420 || bfd_seek (ibfd, pos, SEEK_SET) != 0
421 || bfd_bread (extsym_buf, amt, ibfd) != amt)
422 {
423 intsym_buf = NULL;
424 goto out;
425 }
426
427 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
428 extshndx_buf = NULL;
429 else
430 {
431 amt = symcount * sizeof (Elf_External_Sym_Shndx);
432 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
433 if (extshndx_buf == NULL)
434 {
a50b1753
NC
435 alloc_extshndx = (Elf_External_Sym_Shndx *)
436 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
437 extshndx_buf = alloc_extshndx;
438 }
439 if (extshndx_buf == NULL
440 || bfd_seek (ibfd, pos, SEEK_SET) != 0
441 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
442 {
443 intsym_buf = NULL;
444 goto out;
445 }
446 }
447
448 if (intsym_buf == NULL)
449 {
a50b1753
NC
450 alloc_intsym = (Elf_Internal_Sym *)
451 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 452 intsym_buf = alloc_intsym;
6cdc0ccc
AM
453 if (intsym_buf == NULL)
454 goto out;
455 }
456
457 /* Convert the symbols to internal form. */
458 isymend = intsym_buf + symcount;
a50b1753
NC
459 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
460 shndx = extshndx_buf;
6cdc0ccc
AM
461 isym < isymend;
462 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
463 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
464 {
465 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
466 (*_bfd_error_handler) (_("%B symbol number %lu references "
467 "nonexistent SHT_SYMTAB_SHNDX section"),
468 ibfd, (unsigned long) symoffset);
4dd07732
AM
469 if (alloc_intsym != NULL)
470 free (alloc_intsym);
8384fb8f
AM
471 intsym_buf = NULL;
472 goto out;
473 }
6cdc0ccc
AM
474
475 out:
476 if (alloc_ext != NULL)
477 free (alloc_ext);
478 if (alloc_extshndx != NULL)
479 free (alloc_extshndx);
480
481 return intsym_buf;
482}
483
5cab59f6
AM
484/* Look up a symbol name. */
485const char *
be8dd2ca
AM
486bfd_elf_sym_name (bfd *abfd,
487 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
488 Elf_Internal_Sym *isym,
489 asection *sym_sec)
5cab59f6 490{
26c61ae5 491 const char *name;
5cab59f6 492 unsigned int iname = isym->st_name;
be8dd2ca 493 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 494
138f35cc
JJ
495 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
496 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 497 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
498 {
499 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
500 shindex = elf_elfheader (abfd)->e_shstrndx;
501 }
502
26c61ae5
L
503 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
504 if (name == NULL)
505 name = "(null)";
506 else if (sym_sec && *name == '\0')
507 name = bfd_section_name (abfd, sym_sec);
508
509 return name;
5cab59f6
AM
510}
511
dbb410c3
AM
512/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
513 sections. The first element is the flags, the rest are section
514 pointers. */
515
516typedef union elf_internal_group {
517 Elf_Internal_Shdr *shdr;
518 unsigned int flags;
519} Elf_Internal_Group;
520
b885599b
AM
521/* Return the name of the group signature symbol. Why isn't the
522 signature just a string? */
523
524static const char *
217aa764 525group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 526{
9dce4196 527 Elf_Internal_Shdr *hdr;
9dce4196
AM
528 unsigned char esym[sizeof (Elf64_External_Sym)];
529 Elf_External_Sym_Shndx eshndx;
530 Elf_Internal_Sym isym;
b885599b 531
13792e9d
L
532 /* First we need to ensure the symbol table is available. Make sure
533 that it is a symbol table section. */
4fbb74a6
AM
534 if (ghdr->sh_link >= elf_numsections (abfd))
535 return NULL;
13792e9d
L
536 hdr = elf_elfsections (abfd) [ghdr->sh_link];
537 if (hdr->sh_type != SHT_SYMTAB
538 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
539 return NULL;
540
9dce4196
AM
541 /* Go read the symbol. */
542 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
543 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
544 &isym, esym, &eshndx) == NULL)
b885599b 545 return NULL;
9dce4196 546
26c61ae5 547 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
548}
549
dbb410c3
AM
550/* Set next_in_group list pointer, and group name for NEWSECT. */
551
b34976b6 552static bfd_boolean
217aa764 553setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
554{
555 unsigned int num_group = elf_tdata (abfd)->num_group;
556
557 /* If num_group is zero, read in all SHT_GROUP sections. The count
558 is set to -1 if there are no SHT_GROUP sections. */
559 if (num_group == 0)
560 {
561 unsigned int i, shnum;
562
563 /* First count the number of groups. If we have a SHT_GROUP
564 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 565 shnum = elf_numsections (abfd);
dbb410c3 566 num_group = 0;
08a40648 567
44534af3 568#define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
1783205a 569 ( (shdr)->sh_type == SHT_GROUP \
44534af3 570 && (shdr)->sh_size >= minsize \
1783205a
NC
571 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
572 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 573
dbb410c3
AM
574 for (i = 0; i < shnum; i++)
575 {
576 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 577
44534af3 578 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3
AM
579 num_group += 1;
580 }
581
582 if (num_group == 0)
20dbb49d
L
583 {
584 num_group = (unsigned) -1;
585 elf_tdata (abfd)->num_group = num_group;
586 }
587 else
dbb410c3
AM
588 {
589 /* We keep a list of elf section headers for group sections,
590 so we can find them quickly. */
20dbb49d 591 bfd_size_type amt;
d0fb9a8d 592
20dbb49d 593 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
594 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
595 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 596 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 597 return FALSE;
dbb410c3
AM
598
599 num_group = 0;
600 for (i = 0; i < shnum; i++)
601 {
602 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 603
44534af3 604 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3 605 {
973ffd63 606 unsigned char *src;
dbb410c3
AM
607 Elf_Internal_Group *dest;
608
609 /* Add to list of sections. */
610 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
611 num_group += 1;
612
613 /* Read the raw contents. */
614 BFD_ASSERT (sizeof (*dest) >= 4);
615 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
616 shdr->contents = (unsigned char *)
617 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
618 /* PR binutils/4110: Handle corrupt group headers. */
619 if (shdr->contents == NULL)
620 {
621 _bfd_error_handler
493a3386 622 (_("%B: corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
1783205a 623 bfd_set_error (bfd_error_bad_value);
493a3386
NC
624 -- num_group;
625 continue;
1783205a
NC
626 }
627
628 memset (shdr->contents, 0, amt);
629
630 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
631 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
632 != shdr->sh_size))
493a3386
NC
633 {
634 _bfd_error_handler
635 (_("%B: invalid size field in group section header: 0x%lx"), abfd, shdr->sh_size);
636 bfd_set_error (bfd_error_bad_value);
637 -- num_group;
638 /* PR 17510: If the group contents are even partially
639 corrupt, do not allow any of the contents to be used. */
640 memset (shdr->contents, 0, amt);
641 continue;
642 }
708d7d0d 643
dbb410c3
AM
644 /* Translate raw contents, a flag word followed by an
645 array of elf section indices all in target byte order,
646 to the flag word followed by an array of elf section
647 pointers. */
648 src = shdr->contents + shdr->sh_size;
649 dest = (Elf_Internal_Group *) (shdr->contents + amt);
06614111 650
dbb410c3
AM
651 while (1)
652 {
653 unsigned int idx;
654
655 src -= 4;
656 --dest;
657 idx = H_GET_32 (abfd, src);
658 if (src == shdr->contents)
659 {
660 dest->flags = idx;
b885599b
AM
661 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
662 shdr->bfd_section->flags
663 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
664 break;
665 }
666 if (idx >= shnum)
667 {
668 ((*_bfd_error_handler)
d003868e 669 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
670 idx = 0;
671 }
672 dest->shdr = elf_elfsections (abfd)[idx];
673 }
674 }
675 }
493a3386
NC
676
677 /* PR 17510: Corrupt binaries might contain invalid groups. */
678 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
679 {
680 elf_tdata (abfd)->num_group = num_group;
681
682 /* If all groups are invalid then fail. */
683 if (num_group == 0)
684 {
685 elf_tdata (abfd)->group_sect_ptr = NULL;
686 elf_tdata (abfd)->num_group = num_group = -1;
687 (*_bfd_error_handler) (_("%B: no valid group sections found"), abfd);
688 bfd_set_error (bfd_error_bad_value);
689 }
690 }
dbb410c3
AM
691 }
692 }
693
694 if (num_group != (unsigned) -1)
695 {
696 unsigned int i;
697
698 for (i = 0; i < num_group; i++)
699 {
700 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
701 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
702 unsigned int n_elt = shdr->sh_size / 4;
703
704 /* Look through this group's sections to see if current
705 section is a member. */
706 while (--n_elt != 0)
707 if ((++idx)->shdr == hdr)
708 {
e0e8c97f 709 asection *s = NULL;
dbb410c3
AM
710
711 /* We are a member of this group. Go looking through
712 other members to see if any others are linked via
713 next_in_group. */
714 idx = (Elf_Internal_Group *) shdr->contents;
715 n_elt = shdr->sh_size / 4;
716 while (--n_elt != 0)
717 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 718 && elf_next_in_group (s) != NULL)
dbb410c3
AM
719 break;
720 if (n_elt != 0)
721 {
dbb410c3
AM
722 /* Snarf the group name from other member, and
723 insert current section in circular list. */
945906ff
AM
724 elf_group_name (newsect) = elf_group_name (s);
725 elf_next_in_group (newsect) = elf_next_in_group (s);
726 elf_next_in_group (s) = newsect;
dbb410c3
AM
727 }
728 else
729 {
dbb410c3
AM
730 const char *gname;
731
b885599b
AM
732 gname = group_signature (abfd, shdr);
733 if (gname == NULL)
b34976b6 734 return FALSE;
945906ff 735 elf_group_name (newsect) = gname;
dbb410c3
AM
736
737 /* Start a circular list with one element. */
945906ff 738 elf_next_in_group (newsect) = newsect;
dbb410c3 739 }
b885599b 740
9dce4196
AM
741 /* If the group section has been created, point to the
742 new member. */
dbb410c3 743 if (shdr->bfd_section != NULL)
945906ff 744 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 745
dbb410c3
AM
746 i = num_group - 1;
747 break;
748 }
749 }
750 }
751
945906ff 752 if (elf_group_name (newsect) == NULL)
dbb410c3 753 {
d003868e
AM
754 (*_bfd_error_handler) (_("%B: no group info for section %A"),
755 abfd, newsect);
493a3386 756 return FALSE;
dbb410c3 757 }
b34976b6 758 return TRUE;
dbb410c3
AM
759}
760
3d7f7666 761bfd_boolean
dd863624 762_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
763{
764 unsigned int i;
765 unsigned int num_group = elf_tdata (abfd)->num_group;
766 bfd_boolean result = TRUE;
dd863624
L
767 asection *s;
768
769 /* Process SHF_LINK_ORDER. */
770 for (s = abfd->sections; s != NULL; s = s->next)
771 {
772 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
773 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
774 {
775 unsigned int elfsec = this_hdr->sh_link;
776 /* FIXME: The old Intel compiler and old strip/objcopy may
777 not set the sh_link or sh_info fields. Hence we could
778 get the situation where elfsec is 0. */
779 if (elfsec == 0)
780 {
4fbb74a6 781 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
782 if (bed->link_order_error_handler)
783 bed->link_order_error_handler
784 (_("%B: warning: sh_link not set for section `%A'"),
785 abfd, s);
786 }
787 else
788 {
91d6fa6a 789 asection *linksec = NULL;
25bbc984 790
4fbb74a6
AM
791 if (elfsec < elf_numsections (abfd))
792 {
793 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 794 linksec = this_hdr->bfd_section;
4fbb74a6 795 }
25bbc984
L
796
797 /* PR 1991, 2008:
798 Some strip/objcopy may leave an incorrect value in
799 sh_link. We don't want to proceed. */
91d6fa6a 800 if (linksec == NULL)
25bbc984
L
801 {
802 (*_bfd_error_handler)
803 (_("%B: sh_link [%d] in section `%A' is incorrect"),
804 s->owner, s, elfsec);
805 result = FALSE;
806 }
807
91d6fa6a 808 elf_linked_to_section (s) = linksec;
dd863624
L
809 }
810 }
811 }
3d7f7666 812
dd863624 813 /* Process section groups. */
3d7f7666
L
814 if (num_group == (unsigned) -1)
815 return result;
816
817 for (i = 0; i < num_group; i++)
818 {
819 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
820 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
821 unsigned int n_elt = shdr->sh_size / 4;
822
823 while (--n_elt != 0)
824 if ((++idx)->shdr->bfd_section)
825 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
826 else if (idx->shdr->sh_type == SHT_RELA
827 || idx->shdr->sh_type == SHT_REL)
828 /* We won't include relocation sections in section groups in
829 output object files. We adjust the group section size here
830 so that relocatable link will work correctly when
831 relocation sections are in section group in input object
832 files. */
833 shdr->bfd_section->size -= 4;
834 else
835 {
836 /* There are some unknown sections in the group. */
837 (*_bfd_error_handler)
d003868e
AM
838 (_("%B: unknown [%d] section `%s' in group [%s]"),
839 abfd,
3d7f7666 840 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
841 bfd_elf_string_from_elf_section (abfd,
842 (elf_elfheader (abfd)
843 ->e_shstrndx),
844 idx->shdr->sh_name),
3d7f7666
L
845 shdr->bfd_section->name);
846 result = FALSE;
847 }
848 }
849 return result;
850}
851
72adc230
AM
852bfd_boolean
853bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
854{
855 return elf_next_in_group (sec) != NULL;
856}
857
252b5132
RH
858/* Make a BFD section from an ELF section. We store a pointer to the
859 BFD section in the bfd_section field of the header. */
860
b34976b6 861bfd_boolean
217aa764
AM
862_bfd_elf_make_section_from_shdr (bfd *abfd,
863 Elf_Internal_Shdr *hdr,
6dc132d9
L
864 const char *name,
865 int shindex)
252b5132
RH
866{
867 asection *newsect;
868 flagword flags;
9c5bfbb7 869 const struct elf_backend_data *bed;
252b5132
RH
870
871 if (hdr->bfd_section != NULL)
4e011fb5 872 return TRUE;
252b5132
RH
873
874 newsect = bfd_make_section_anyway (abfd, name);
875 if (newsect == NULL)
b34976b6 876 return FALSE;
252b5132 877
1829f4b2
AM
878 hdr->bfd_section = newsect;
879 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 880 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 881
2f89ff8d
L
882 /* Always use the real type/flags. */
883 elf_section_type (newsect) = hdr->sh_type;
884 elf_section_flags (newsect) = hdr->sh_flags;
885
252b5132
RH
886 newsect->filepos = hdr->sh_offset;
887
888 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
889 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
890 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 891 bfd_log2 (hdr->sh_addralign)))
b34976b6 892 return FALSE;
252b5132
RH
893
894 flags = SEC_NO_FLAGS;
895 if (hdr->sh_type != SHT_NOBITS)
896 flags |= SEC_HAS_CONTENTS;
dbb410c3 897 if (hdr->sh_type == SHT_GROUP)
b3096250 898 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
899 if ((hdr->sh_flags & SHF_ALLOC) != 0)
900 {
901 flags |= SEC_ALLOC;
902 if (hdr->sh_type != SHT_NOBITS)
903 flags |= SEC_LOAD;
904 }
905 if ((hdr->sh_flags & SHF_WRITE) == 0)
906 flags |= SEC_READONLY;
907 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
908 flags |= SEC_CODE;
909 else if ((flags & SEC_LOAD) != 0)
910 flags |= SEC_DATA;
f5fa8ca2
JJ
911 if ((hdr->sh_flags & SHF_MERGE) != 0)
912 {
913 flags |= SEC_MERGE;
914 newsect->entsize = hdr->sh_entsize;
915 if ((hdr->sh_flags & SHF_STRINGS) != 0)
916 flags |= SEC_STRINGS;
917 }
dbb410c3
AM
918 if (hdr->sh_flags & SHF_GROUP)
919 if (!setup_group (abfd, hdr, newsect))
b34976b6 920 return FALSE;
13ae64f3
JJ
921 if ((hdr->sh_flags & SHF_TLS) != 0)
922 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
923 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
924 flags |= SEC_EXCLUDE;
252b5132 925
3d2b39cf 926 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 927 {
3d2b39cf
L
928 /* The debugging sections appear to be recognized only by name,
929 not any sort of flag. Their SEC_ALLOC bits are cleared. */
3d2b39cf
L
930 if (name [0] == '.')
931 {
f073ced3
AM
932 const char *p;
933 int n;
934 if (name[1] == 'd')
935 p = ".debug", n = 6;
936 else if (name[1] == 'g' && name[2] == 'n')
937 p = ".gnu.linkonce.wi.", n = 17;
938 else if (name[1] == 'g' && name[2] == 'd')
939 p = ".gdb_index", n = 11; /* yes we really do mean 11. */
940 else if (name[1] == 'l')
941 p = ".line", n = 5;
942 else if (name[1] == 's')
943 p = ".stab", n = 5;
944 else if (name[1] == 'z')
945 p = ".zdebug", n = 7;
946 else
947 p = NULL, n = 0;
948 if (p != NULL && strncmp (name, p, n) == 0)
3d2b39cf
L
949 flags |= SEC_DEBUGGING;
950 }
951 }
252b5132
RH
952
953 /* As a GNU extension, if the name begins with .gnu.linkonce, we
954 only link a single copy of the section. This is used to support
955 g++. g++ will emit each template expansion in its own section.
956 The symbols will be defined as weak, so that multiple definitions
957 are permitted. The GNU linker extension is to actually discard
958 all but one of the sections. */
0112cd26 959 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 960 && elf_next_in_group (newsect) == NULL)
252b5132
RH
961 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
962
fa152c49
JW
963 bed = get_elf_backend_data (abfd);
964 if (bed->elf_backend_section_flags)
965 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 966 return FALSE;
fa152c49 967
252b5132 968 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 969 return FALSE;
252b5132 970
718175fa
JK
971 /* We do not parse the PT_NOTE segments as we are interested even in the
972 separate debug info files which may have the segments offsets corrupted.
973 PT_NOTEs from the core files are currently not parsed using BFD. */
974 if (hdr->sh_type == SHT_NOTE)
975 {
baea7ef1 976 bfd_byte *contents;
718175fa 977
baea7ef1 978 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
979 return FALSE;
980
baea7ef1 981 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
982 free (contents);
983 }
984
252b5132
RH
985 if ((flags & SEC_ALLOC) != 0)
986 {
987 Elf_Internal_Phdr *phdr;
6ffd7900
AM
988 unsigned int i, nload;
989
990 /* Some ELF linkers produce binaries with all the program header
991 p_paddr fields zero. If we have such a binary with more than
992 one PT_LOAD header, then leave the section lma equal to vma
993 so that we don't create sections with overlapping lma. */
994 phdr = elf_tdata (abfd)->phdr;
995 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
996 if (phdr->p_paddr != 0)
997 break;
998 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
999 ++nload;
1000 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1001 return TRUE;
252b5132 1002
252b5132
RH
1003 phdr = elf_tdata (abfd)->phdr;
1004 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1005 {
86b2281f
AM
1006 if (((phdr->p_type == PT_LOAD
1007 && (hdr->sh_flags & SHF_TLS) == 0)
1008 || phdr->p_type == PT_TLS)
9a83a553 1009 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 1010 {
88967714
AM
1011 if ((flags & SEC_LOAD) == 0)
1012 newsect->lma = (phdr->p_paddr
1013 + hdr->sh_addr - phdr->p_vaddr);
1014 else
1015 /* We used to use the same adjustment for SEC_LOAD
1016 sections, but that doesn't work if the segment
1017 is packed with code from multiple VMAs.
1018 Instead we calculate the section LMA based on
1019 the segment LMA. It is assumed that the
1020 segment will contain sections with contiguous
1021 LMAs, even if the VMAs are not. */
1022 newsect->lma = (phdr->p_paddr
1023 + hdr->sh_offset - phdr->p_offset);
1024
1025 /* With contiguous segments, we can't tell from file
1026 offsets whether a section with zero size should
1027 be placed at the end of one segment or the
1028 beginning of the next. Decide based on vaddr. */
1029 if (hdr->sh_addr >= phdr->p_vaddr
1030 && (hdr->sh_addr + hdr->sh_size
1031 <= phdr->p_vaddr + phdr->p_memsz))
1032 break;
252b5132
RH
1033 }
1034 }
1035 }
1036
4a114e3e
L
1037 /* Compress/decompress DWARF debug sections with names: .debug_* and
1038 .zdebug_*, after the section flags is set. */
1039 if ((flags & SEC_DEBUGGING)
1040 && ((name[1] == 'd' && name[6] == '_')
1041 || (name[1] == 'z' && name[7] == '_')))
1042 {
1043 enum { nothing, compress, decompress } action = nothing;
4e011fb5 1044 char *new_name;
151411f8
L
1045 int compression_header_size;
1046 bfd_boolean compressed
1047 = bfd_is_section_compressed_with_header (abfd, newsect,
1048 &compression_header_size);
4a114e3e 1049
151411f8 1050 if (compressed)
4a114e3e
L
1051 {
1052 /* Compressed section. Check if we should decompress. */
1053 if ((abfd->flags & BFD_DECOMPRESS))
1054 action = decompress;
1055 }
151411f8
L
1056
1057 /* Compress the uncompressed section or convert from/to .zdebug*
1058 section. Check if we should compress. */
1059 if (action == nothing)
4a114e3e 1060 {
151411f8
L
1061 if (newsect->size != 0
1062 && (abfd->flags & BFD_COMPRESS)
1063 && compression_header_size >= 0
1064 && (!compressed
1065 || ((compression_header_size > 0)
1066 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
4a114e3e 1067 action = compress;
151411f8
L
1068 else
1069 return TRUE;
4a114e3e
L
1070 }
1071
151411f8 1072 if (action == compress)
4a114e3e 1073 {
4a114e3e
L
1074 if (!bfd_init_section_compress_status (abfd, newsect))
1075 {
1076 (*_bfd_error_handler)
bc823199 1077 (_("%B: unable to initialize compress status for section %s"),
4a114e3e
L
1078 abfd, name);
1079 return FALSE;
1080 }
151411f8
L
1081 }
1082 else
1083 {
4a114e3e
L
1084 if (!bfd_init_section_decompress_status (abfd, newsect))
1085 {
1086 (*_bfd_error_handler)
bc823199 1087 (_("%B: unable to initialize decompress status for section %s"),
4a114e3e
L
1088 abfd, name);
1089 return FALSE;
1090 }
151411f8
L
1091 }
1092
1093 new_name = NULL;
1094 if (action == decompress
1095 || (action == compress
1096 && (abfd->flags & BFD_COMPRESS_GABI) != 0))
1097 {
4e011fb5
AM
1098 if (name[1] == 'z')
1099 {
1100 unsigned int len = strlen (name);
1101
1102 new_name = bfd_alloc (abfd, len);
1103 if (new_name == NULL)
1104 return FALSE;
1105 new_name[0] = '.';
1106 memcpy (new_name + 1, name + 2, len - 1);
1107 }
151411f8
L
1108 }
1109 else if (action == compress
1110 && newsect->compress_status == COMPRESS_SECTION_DONE)
1111 {
1112 /* PR binutils/18087: Compression does not always make a section
1113 smaller. So only rename the section when compression has
1114 actually taken place. */
1115 if (name[1] != 'z')
1116 {
1117 unsigned int len = strlen (name);
1118
1119 new_name = bfd_alloc (abfd, len + 2);
1120 if (new_name == NULL)
1121 return FALSE;
1122 new_name[0] = '.';
1123 new_name[1] = 'z';
1124 memcpy (new_name + 2, name + 1, len);
1125 }
4a114e3e 1126 }
4e011fb5
AM
1127 if (new_name != NULL)
1128 bfd_rename_section (abfd, newsect, new_name);
4a114e3e
L
1129 }
1130
b34976b6 1131 return TRUE;
252b5132
RH
1132}
1133
252b5132
RH
1134const char *const bfd_elf_section_type_names[] = {
1135 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1136 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1137 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1138};
1139
1049f94e 1140/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1141 output, and the reloc is against an external symbol, and nothing
1142 has given us any additional addend, the resulting reloc will also
1143 be against the same symbol. In such a case, we don't want to
1144 change anything about the way the reloc is handled, since it will
1145 all be done at final link time. Rather than put special case code
1146 into bfd_perform_relocation, all the reloc types use this howto
1147 function. It just short circuits the reloc if producing
1049f94e 1148 relocatable output against an external symbol. */
252b5132 1149
252b5132 1150bfd_reloc_status_type
217aa764
AM
1151bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1152 arelent *reloc_entry,
1153 asymbol *symbol,
1154 void *data ATTRIBUTE_UNUSED,
1155 asection *input_section,
1156 bfd *output_bfd,
1157 char **error_message ATTRIBUTE_UNUSED)
1158{
1159 if (output_bfd != NULL
252b5132
RH
1160 && (symbol->flags & BSF_SECTION_SYM) == 0
1161 && (! reloc_entry->howto->partial_inplace
1162 || reloc_entry->addend == 0))
1163 {
1164 reloc_entry->address += input_section->output_offset;
1165 return bfd_reloc_ok;
1166 }
1167
1168 return bfd_reloc_continue;
1169}
1170\f
0ac4564e
L
1171/* Copy the program header and other data from one object module to
1172 another. */
252b5132 1173
b34976b6 1174bfd_boolean
217aa764 1175_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1176{
1177 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1178 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1179 return TRUE;
2d502050 1180
57b828ef
L
1181 if (!elf_flags_init (obfd))
1182 {
1183 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1184 elf_flags_init (obfd) = TRUE;
1185 }
2d502050 1186
0ac4564e 1187 elf_gp (obfd) = elf_gp (ibfd);
57b828ef
L
1188
1189 /* Also copy the EI_OSABI field. */
1190 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1191 elf_elfheader (ibfd)->e_ident[EI_OSABI];
104d59d1
JM
1192
1193 /* Copy object attributes. */
1194 _bfd_elf_copy_obj_attributes (ibfd, obfd);
b34976b6 1195 return TRUE;
2d502050
L
1196}
1197
cedc298e
L
1198static const char *
1199get_segment_type (unsigned int p_type)
1200{
1201 const char *pt;
1202 switch (p_type)
1203 {
1204 case PT_NULL: pt = "NULL"; break;
1205 case PT_LOAD: pt = "LOAD"; break;
1206 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1207 case PT_INTERP: pt = "INTERP"; break;
1208 case PT_NOTE: pt = "NOTE"; break;
1209 case PT_SHLIB: pt = "SHLIB"; break;
1210 case PT_PHDR: pt = "PHDR"; break;
1211 case PT_TLS: pt = "TLS"; break;
1212 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1213 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1214 case PT_GNU_RELRO: pt = "RELRO"; break;
1215 default: pt = NULL; break;
1216 }
1217 return pt;
1218}
1219
f0b79d91
L
1220/* Print out the program headers. */
1221
b34976b6 1222bfd_boolean
217aa764 1223_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1224{
a50b1753 1225 FILE *f = (FILE *) farg;
252b5132
RH
1226 Elf_Internal_Phdr *p;
1227 asection *s;
1228 bfd_byte *dynbuf = NULL;
1229
1230 p = elf_tdata (abfd)->phdr;
1231 if (p != NULL)
1232 {
1233 unsigned int i, c;
1234
1235 fprintf (f, _("\nProgram Header:\n"));
1236 c = elf_elfheader (abfd)->e_phnum;
1237 for (i = 0; i < c; i++, p++)
1238 {
cedc298e 1239 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1240 char buf[20];
1241
cedc298e 1242 if (pt == NULL)
252b5132 1243 {
cedc298e
L
1244 sprintf (buf, "0x%lx", p->p_type);
1245 pt = buf;
252b5132 1246 }
dc810e39 1247 fprintf (f, "%8s off 0x", pt);
60b89a18 1248 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1249 fprintf (f, " vaddr 0x");
60b89a18 1250 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1251 fprintf (f, " paddr 0x");
60b89a18 1252 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1253 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1254 fprintf (f, " filesz 0x");
60b89a18 1255 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1256 fprintf (f, " memsz 0x");
60b89a18 1257 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1258 fprintf (f, " flags %c%c%c",
1259 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1260 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1261 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1262 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1263 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1264 fprintf (f, "\n");
1265 }
1266 }
1267
1268 s = bfd_get_section_by_name (abfd, ".dynamic");
1269 if (s != NULL)
1270 {
cb33740c 1271 unsigned int elfsec;
dc810e39 1272 unsigned long shlink;
252b5132
RH
1273 bfd_byte *extdyn, *extdynend;
1274 size_t extdynsize;
217aa764 1275 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1276
1277 fprintf (f, _("\nDynamic Section:\n"));
1278
eea6121a 1279 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1280 goto error_return;
1281
1282 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1283 if (elfsec == SHN_BAD)
252b5132 1284 goto error_return;
dc810e39 1285 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1286
1287 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1288 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1289
1290 extdyn = dynbuf;
06614111
NC
1291 /* PR 17512: file: 6f427532. */
1292 if (s->size < extdynsize)
1293 goto error_return;
eea6121a 1294 extdynend = extdyn + s->size;
1036838a
NC
1295 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1296 Fix range check. */
1297 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
252b5132
RH
1298 {
1299 Elf_Internal_Dyn dyn;
ad9563d6 1300 const char *name = "";
252b5132 1301 char ab[20];
b34976b6 1302 bfd_boolean stringp;
ad9563d6 1303 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1304
217aa764 1305 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1306
1307 if (dyn.d_tag == DT_NULL)
1308 break;
1309
b34976b6 1310 stringp = FALSE;
252b5132
RH
1311 switch (dyn.d_tag)
1312 {
1313 default:
ad9563d6
CM
1314 if (bed->elf_backend_get_target_dtag)
1315 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1316
1317 if (!strcmp (name, ""))
1318 {
1319 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1320 name = ab;
1321 }
252b5132
RH
1322 break;
1323
b34976b6 1324 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1325 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1326 case DT_PLTGOT: name = "PLTGOT"; break;
1327 case DT_HASH: name = "HASH"; break;
1328 case DT_STRTAB: name = "STRTAB"; break;
1329 case DT_SYMTAB: name = "SYMTAB"; break;
1330 case DT_RELA: name = "RELA"; break;
1331 case DT_RELASZ: name = "RELASZ"; break;
1332 case DT_RELAENT: name = "RELAENT"; break;
1333 case DT_STRSZ: name = "STRSZ"; break;
1334 case DT_SYMENT: name = "SYMENT"; break;
1335 case DT_INIT: name = "INIT"; break;
1336 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1337 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1338 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1339 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1340 case DT_REL: name = "REL"; break;
1341 case DT_RELSZ: name = "RELSZ"; break;
1342 case DT_RELENT: name = "RELENT"; break;
1343 case DT_PLTREL: name = "PLTREL"; break;
1344 case DT_DEBUG: name = "DEBUG"; break;
1345 case DT_TEXTREL: name = "TEXTREL"; break;
1346 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1347 case DT_BIND_NOW: name = "BIND_NOW"; break;
1348 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1349 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1350 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1351 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1352 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1353 case DT_FLAGS: name = "FLAGS"; break;
1354 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1355 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1356 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1357 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1358 case DT_MOVEENT: name = "MOVEENT"; break;
1359 case DT_MOVESZ: name = "MOVESZ"; break;
1360 case DT_FEATURE: name = "FEATURE"; break;
1361 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1362 case DT_SYMINSZ: name = "SYMINSZ"; break;
1363 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1364 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1365 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1366 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1367 case DT_PLTPAD: name = "PLTPAD"; break;
1368 case DT_MOVETAB: name = "MOVETAB"; break;
1369 case DT_SYMINFO: name = "SYMINFO"; break;
1370 case DT_RELACOUNT: name = "RELACOUNT"; break;
1371 case DT_RELCOUNT: name = "RELCOUNT"; break;
1372 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1373 case DT_VERSYM: name = "VERSYM"; break;
1374 case DT_VERDEF: name = "VERDEF"; break;
1375 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1376 case DT_VERNEED: name = "VERNEED"; break;
1377 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1378 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1379 case DT_USED: name = "USED"; break;
b34976b6 1380 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1381 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1382 }
1383
ad9563d6 1384 fprintf (f, " %-20s ", name);
252b5132 1385 if (! stringp)
a1f3c56e
AN
1386 {
1387 fprintf (f, "0x");
1388 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1389 }
252b5132
RH
1390 else
1391 {
1392 const char *string;
dc810e39 1393 unsigned int tagv = dyn.d_un.d_val;
252b5132 1394
dc810e39 1395 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1396 if (string == NULL)
1397 goto error_return;
1398 fprintf (f, "%s", string);
1399 }
1400 fprintf (f, "\n");
1401 }
1402
1403 free (dynbuf);
1404 dynbuf = NULL;
1405 }
1406
1407 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1408 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1409 {
fc0e6df6 1410 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1411 return FALSE;
252b5132
RH
1412 }
1413
1414 if (elf_dynverdef (abfd) != 0)
1415 {
1416 Elf_Internal_Verdef *t;
1417
1418 fprintf (f, _("\nVersion definitions:\n"));
1419 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1420 {
1421 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1422 t->vd_flags, t->vd_hash,
1423 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1424 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1425 {
1426 Elf_Internal_Verdaux *a;
1427
1428 fprintf (f, "\t");
1429 for (a = t->vd_auxptr->vda_nextptr;
1430 a != NULL;
1431 a = a->vda_nextptr)
d0fb9a8d
JJ
1432 fprintf (f, "%s ",
1433 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1434 fprintf (f, "\n");
1435 }
1436 }
1437 }
1438
1439 if (elf_dynverref (abfd) != 0)
1440 {
1441 Elf_Internal_Verneed *t;
1442
1443 fprintf (f, _("\nVersion References:\n"));
1444 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1445 {
1446 Elf_Internal_Vernaux *a;
1447
d0fb9a8d
JJ
1448 fprintf (f, _(" required from %s:\n"),
1449 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1450 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1451 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1452 a->vna_flags, a->vna_other,
1453 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1454 }
1455 }
1456
b34976b6 1457 return TRUE;
252b5132
RH
1458
1459 error_return:
1460 if (dynbuf != NULL)
1461 free (dynbuf);
b34976b6 1462 return FALSE;
252b5132
RH
1463}
1464
bb4d2ac2
L
1465/* Get version string. */
1466
1467const char *
60bb06bc
L
1468_bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1469 bfd_boolean *hidden)
bb4d2ac2
L
1470{
1471 const char *version_string = NULL;
1472 if (elf_dynversym (abfd) != 0
1473 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1474 {
1475 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1476
1477 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1478 vernum &= VERSYM_VERSION;
1479
1480 if (vernum == 0)
1481 version_string = "";
1482 else if (vernum == 1)
1483 version_string = "Base";
1484 else if (vernum <= elf_tdata (abfd)->cverdefs)
1485 version_string =
1486 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1487 else
1488 {
1489 Elf_Internal_Verneed *t;
1490
1491 version_string = "";
1492 for (t = elf_tdata (abfd)->verref;
1493 t != NULL;
1494 t = t->vn_nextref)
1495 {
1496 Elf_Internal_Vernaux *a;
1497
1498 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1499 {
1500 if (a->vna_other == vernum)
1501 {
1502 version_string = a->vna_nodename;
1503 break;
1504 }
1505 }
1506 }
1507 }
1508 }
1509 return version_string;
1510}
1511
252b5132
RH
1512/* Display ELF-specific fields of a symbol. */
1513
1514void
217aa764
AM
1515bfd_elf_print_symbol (bfd *abfd,
1516 void *filep,
1517 asymbol *symbol,
1518 bfd_print_symbol_type how)
252b5132 1519{
a50b1753 1520 FILE *file = (FILE *) filep;
252b5132
RH
1521 switch (how)
1522 {
1523 case bfd_print_symbol_name:
1524 fprintf (file, "%s", symbol->name);
1525 break;
1526 case bfd_print_symbol_more:
1527 fprintf (file, "elf ");
60b89a18 1528 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1529 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1530 break;
1531 case bfd_print_symbol_all:
1532 {
4e8a9624
AM
1533 const char *section_name;
1534 const char *name = NULL;
9c5bfbb7 1535 const struct elf_backend_data *bed;
7a13edea 1536 unsigned char st_other;
dbb410c3 1537 bfd_vma val;
bb4d2ac2
L
1538 const char *version_string;
1539 bfd_boolean hidden;
c044fabd 1540
252b5132 1541 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1542
1543 bed = get_elf_backend_data (abfd);
1544 if (bed->elf_backend_print_symbol_all)
c044fabd 1545 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1546
1547 if (name == NULL)
1548 {
7ee38065 1549 name = symbol->name;
217aa764 1550 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1551 }
1552
252b5132
RH
1553 fprintf (file, " %s\t", section_name);
1554 /* Print the "other" value for a symbol. For common symbols,
1555 we've already printed the size; now print the alignment.
1556 For other symbols, we have no specified alignment, and
1557 we've printed the address; now print the size. */
dcf6c779 1558 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1559 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1560 else
1561 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1562 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1563
1564 /* If we have version information, print it. */
60bb06bc
L
1565 version_string = _bfd_elf_get_symbol_version_string (abfd,
1566 symbol,
1567 &hidden);
bb4d2ac2 1568 if (version_string)
252b5132 1569 {
bb4d2ac2 1570 if (!hidden)
252b5132
RH
1571 fprintf (file, " %-11s", version_string);
1572 else
1573 {
1574 int i;
1575
1576 fprintf (file, " (%s)", version_string);
1577 for (i = 10 - strlen (version_string); i > 0; --i)
1578 putc (' ', file);
1579 }
1580 }
1581
1582 /* If the st_other field is not zero, print it. */
7a13edea 1583 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1584
7a13edea
NC
1585 switch (st_other)
1586 {
1587 case 0: break;
1588 case STV_INTERNAL: fprintf (file, " .internal"); break;
1589 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1590 case STV_PROTECTED: fprintf (file, " .protected"); break;
1591 default:
1592 /* Some other non-defined flags are also present, so print
1593 everything hex. */
1594 fprintf (file, " 0x%02x", (unsigned int) st_other);
1595 }
252b5132 1596
587ff49e 1597 fprintf (file, " %s", name);
252b5132
RH
1598 }
1599 break;
1600 }
1601}
252b5132 1602
252b5132
RH
1603/* Allocate an ELF string table--force the first byte to be zero. */
1604
1605struct bfd_strtab_hash *
217aa764 1606_bfd_elf_stringtab_init (void)
252b5132
RH
1607{
1608 struct bfd_strtab_hash *ret;
1609
1610 ret = _bfd_stringtab_init ();
1611 if (ret != NULL)
1612 {
1613 bfd_size_type loc;
1614
b34976b6 1615 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1616 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1617 if (loc == (bfd_size_type) -1)
1618 {
1619 _bfd_stringtab_free (ret);
1620 ret = NULL;
1621 }
1622 }
1623 return ret;
1624}
1625\f
1626/* ELF .o/exec file reading */
1627
c044fabd 1628/* Create a new bfd section from an ELF section header. */
252b5132 1629
b34976b6 1630bfd_boolean
217aa764 1631bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1632{
4fbb74a6
AM
1633 Elf_Internal_Shdr *hdr;
1634 Elf_Internal_Ehdr *ehdr;
1635 const struct elf_backend_data *bed;
90937f86 1636 const char *name;
bf67003b
NC
1637 bfd_boolean ret = TRUE;
1638 static bfd_boolean * sections_being_created = NULL;
5a4b0ccc 1639 static bfd * sections_being_created_abfd = NULL;
bf67003b 1640 static unsigned int nesting = 0;
252b5132 1641
4fbb74a6
AM
1642 if (shindex >= elf_numsections (abfd))
1643 return FALSE;
1644
bf67003b
NC
1645 if (++ nesting > 3)
1646 {
1647 /* PR17512: A corrupt ELF binary might contain a recursive group of
06614111 1648 sections, with each the string indicies pointing to the next in the
bf67003b
NC
1649 loop. Detect this here, by refusing to load a section that we are
1650 already in the process of loading. We only trigger this test if
1651 we have nested at least three sections deep as normal ELF binaries
5a4b0ccc
NC
1652 can expect to recurse at least once.
1653
1654 FIXME: It would be better if this array was attached to the bfd,
1655 rather than being held in a static pointer. */
1656
1657 if (sections_being_created_abfd != abfd)
1658 sections_being_created = NULL;
bf67003b
NC
1659 if (sections_being_created == NULL)
1660 {
1661 /* FIXME: It would be more efficient to attach this array to the bfd somehow. */
1662 sections_being_created = (bfd_boolean *)
1663 bfd_zalloc (abfd, elf_numsections (abfd) * sizeof (bfd_boolean));
5a4b0ccc 1664 sections_being_created_abfd = abfd;
bf67003b
NC
1665 }
1666 if (sections_being_created [shindex])
1667 {
1668 (*_bfd_error_handler)
1669 (_("%B: warning: loop in section dependencies detected"), abfd);
1670 return FALSE;
1671 }
1672 sections_being_created [shindex] = TRUE;
1673 }
1674
4fbb74a6
AM
1675 hdr = elf_elfsections (abfd)[shindex];
1676 ehdr = elf_elfheader (abfd);
1677 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1678 hdr->sh_name);
933d961a 1679 if (name == NULL)
bf67003b 1680 goto fail;
252b5132 1681
4fbb74a6 1682 bed = get_elf_backend_data (abfd);
252b5132
RH
1683 switch (hdr->sh_type)
1684 {
1685 case SHT_NULL:
1686 /* Inactive section. Throw it away. */
bf67003b 1687 goto success;
252b5132 1688
bf67003b
NC
1689 case SHT_PROGBITS: /* Normal section with contents. */
1690 case SHT_NOBITS: /* .bss section. */
1691 case SHT_HASH: /* .hash section. */
1692 case SHT_NOTE: /* .note section. */
25e27870
L
1693 case SHT_INIT_ARRAY: /* .init_array section. */
1694 case SHT_FINI_ARRAY: /* .fini_array section. */
1695 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1696 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1697 case SHT_GNU_HASH: /* .gnu.hash section. */
bf67003b
NC
1698 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1699 goto success;
252b5132 1700
797fc050 1701 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1702 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
1703 goto fail;
1704
cfcac11d
NC
1705 if (hdr->sh_link > elf_numsections (abfd))
1706 {
caa83f8b 1707 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
1708 field set to SHN_BEFORE or SHN_AFTER. */
1709 switch (bfd_get_arch (abfd))
1710 {
caa83f8b 1711 case bfd_arch_i386:
cfcac11d
NC
1712 case bfd_arch_sparc:
1713 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
1714 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
1715 break;
1716 /* Otherwise fall through. */
1717 default:
bf67003b 1718 goto fail;
cfcac11d
NC
1719 }
1720 }
1721 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
bf67003b 1722 goto fail;
cfcac11d 1723 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
1724 {
1725 Elf_Internal_Shdr *dynsymhdr;
1726
1727 /* The shared libraries distributed with hpux11 have a bogus
1728 sh_link field for the ".dynamic" section. Find the
1729 string table for the ".dynsym" section instead. */
1730 if (elf_dynsymtab (abfd) != 0)
1731 {
1732 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1733 hdr->sh_link = dynsymhdr->sh_link;
1734 }
1735 else
1736 {
1737 unsigned int i, num_sec;
1738
1739 num_sec = elf_numsections (abfd);
1740 for (i = 1; i < num_sec; i++)
1741 {
1742 dynsymhdr = elf_elfsections (abfd)[i];
1743 if (dynsymhdr->sh_type == SHT_DYNSYM)
1744 {
1745 hdr->sh_link = dynsymhdr->sh_link;
1746 break;
1747 }
1748 }
1749 }
1750 }
bf67003b 1751 goto success;
797fc050 1752
bf67003b 1753 case SHT_SYMTAB: /* A symbol table. */
252b5132 1754 if (elf_onesymtab (abfd) == shindex)
bf67003b 1755 goto success;
252b5132 1756
a50b2160 1757 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
1758 goto fail;
1759
3337c1e5 1760 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
eee3b786
AM
1761 {
1762 if (hdr->sh_size != 0)
bf67003b 1763 goto fail;
eee3b786
AM
1764 /* Some assemblers erroneously set sh_info to one with a
1765 zero sh_size. ld sees this as a global symbol count
1766 of (unsigned) -1. Fix it here. */
1767 hdr->sh_info = 0;
bf67003b 1768 goto success;
eee3b786 1769 }
bf67003b 1770
252b5132
RH
1771 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1772 elf_onesymtab (abfd) = shindex;
1773 elf_tdata (abfd)->symtab_hdr = *hdr;
1774 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1775 abfd->flags |= HAS_SYMS;
1776
1777 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1778 SHF_ALLOC is set, and this is a shared object, then we also
1779 treat this section as a BFD section. We can not base the
1780 decision purely on SHF_ALLOC, because that flag is sometimes
1781 set in a relocatable object file, which would confuse the
1782 linker. */
252b5132
RH
1783 if ((hdr->sh_flags & SHF_ALLOC) != 0
1784 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1785 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1786 shindex))
bf67003b 1787 goto fail;
252b5132 1788
1b3a8575
AM
1789 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1790 can't read symbols without that section loaded as well. It
1791 is most likely specified by the next section header. */
1792 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1793 {
1794 unsigned int i, num_sec;
1795
1796 num_sec = elf_numsections (abfd);
1797 for (i = shindex + 1; i < num_sec; i++)
1798 {
1799 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1800 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1801 && hdr2->sh_link == shindex)
1802 break;
1803 }
1804 if (i == num_sec)
1805 for (i = 1; i < shindex; i++)
1806 {
1807 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1808 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1809 && hdr2->sh_link == shindex)
1810 break;
1811 }
1812 if (i != shindex)
bf67003b 1813 ret = bfd_section_from_shdr (abfd, i);
1b3a8575 1814 }
bf67003b 1815 goto success;
252b5132 1816
bf67003b 1817 case SHT_DYNSYM: /* A dynamic symbol table. */
252b5132 1818 if (elf_dynsymtab (abfd) == shindex)
bf67003b 1819 goto success;
252b5132 1820
a50b2160 1821 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
1822 goto fail;
1823
eee3b786
AM
1824 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
1825 {
1826 if (hdr->sh_size != 0)
bf67003b
NC
1827 goto fail;
1828
eee3b786
AM
1829 /* Some linkers erroneously set sh_info to one with a
1830 zero sh_size. ld sees this as a global symbol count
1831 of (unsigned) -1. Fix it here. */
1832 hdr->sh_info = 0;
bf67003b 1833 goto success;
eee3b786 1834 }
bf67003b 1835
252b5132
RH
1836 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1837 elf_dynsymtab (abfd) = shindex;
1838 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1839 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1840 abfd->flags |= HAS_SYMS;
1841
1842 /* Besides being a symbol table, we also treat this as a regular
1843 section, so that objcopy can handle it. */
bf67003b
NC
1844 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1845 goto success;
252b5132 1846
bf67003b 1847 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
9ad5cbcf 1848 if (elf_symtab_shndx (abfd) == shindex)
bf67003b 1849 goto success;
9ad5cbcf 1850
1b3a8575 1851 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1852 elf_symtab_shndx (abfd) = shindex;
1853 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1854 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
bf67003b 1855 goto success;
9ad5cbcf 1856
bf67003b 1857 case SHT_STRTAB: /* A string table. */
252b5132 1858 if (hdr->bfd_section != NULL)
bf67003b
NC
1859 goto success;
1860
252b5132
RH
1861 if (ehdr->e_shstrndx == shindex)
1862 {
1863 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1864 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
bf67003b 1865 goto success;
252b5132 1866 }
bf67003b 1867
1b3a8575
AM
1868 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1869 {
1870 symtab_strtab:
1871 elf_tdata (abfd)->strtab_hdr = *hdr;
1872 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
bf67003b 1873 goto success;
1b3a8575 1874 }
bf67003b 1875
1b3a8575
AM
1876 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1877 {
1878 dynsymtab_strtab:
1879 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1880 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1881 elf_elfsections (abfd)[shindex] = hdr;
1882 /* We also treat this as a regular section, so that objcopy
1883 can handle it. */
bf67003b
NC
1884 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1885 shindex);
1886 goto success;
1b3a8575 1887 }
252b5132 1888
1b3a8575
AM
1889 /* If the string table isn't one of the above, then treat it as a
1890 regular section. We need to scan all the headers to be sure,
1891 just in case this strtab section appeared before the above. */
1892 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1893 {
1894 unsigned int i, num_sec;
252b5132 1895
1b3a8575
AM
1896 num_sec = elf_numsections (abfd);
1897 for (i = 1; i < num_sec; i++)
1898 {
1899 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1900 if (hdr2->sh_link == shindex)
1901 {
933d961a
JJ
1902 /* Prevent endless recursion on broken objects. */
1903 if (i == shindex)
bf67003b 1904 goto fail;
1b3a8575 1905 if (! bfd_section_from_shdr (abfd, i))
bf67003b 1906 goto fail;
1b3a8575
AM
1907 if (elf_onesymtab (abfd) == i)
1908 goto symtab_strtab;
1909 if (elf_dynsymtab (abfd) == i)
1910 goto dynsymtab_strtab;
1911 }
1912 }
1913 }
bf67003b
NC
1914 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1915 goto success;
252b5132
RH
1916
1917 case SHT_REL:
1918 case SHT_RELA:
1919 /* *These* do a lot of work -- but build no sections! */
1920 {
1921 asection *target_sect;
d4730f92 1922 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 1923 unsigned int num_sec = elf_numsections (abfd);
d4730f92
BS
1924 struct bfd_elf_section_data *esdt;
1925 bfd_size_type amt;
252b5132 1926
aa2ca951
JJ
1927 if (hdr->sh_entsize
1928 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160 1929 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
bf67003b 1930 goto fail;
a50b2160 1931
03ae5f59 1932 /* Check for a bogus link to avoid crashing. */
4fbb74a6 1933 if (hdr->sh_link >= num_sec)
03ae5f59
ILT
1934 {
1935 ((*_bfd_error_handler)
d003868e
AM
1936 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1937 abfd, hdr->sh_link, name, shindex));
bf67003b
NC
1938 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1939 shindex);
1940 goto success;
03ae5f59
ILT
1941 }
1942
252b5132
RH
1943 /* For some incomprehensible reason Oracle distributes
1944 libraries for Solaris in which some of the objects have
1945 bogus sh_link fields. It would be nice if we could just
1946 reject them, but, unfortunately, some people need to use
1947 them. We scan through the section headers; if we find only
1948 one suitable symbol table, we clobber the sh_link to point
83b89087
L
1949 to it. I hope this doesn't break anything.
1950
1951 Don't do it on executable nor shared library. */
1952 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
1953 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
1954 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1955 {
9ad5cbcf 1956 unsigned int scan;
252b5132
RH
1957 int found;
1958
1959 found = 0;
9ad5cbcf 1960 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1961 {
1962 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1963 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1964 {
1965 if (found != 0)
1966 {
1967 found = 0;
1968 break;
1969 }
1970 found = scan;
1971 }
1972 }
1973 if (found != 0)
1974 hdr->sh_link = found;
1975 }
1976
1977 /* Get the symbol table. */
1b3a8575
AM
1978 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1979 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1980 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
bf67003b 1981 goto fail;
252b5132
RH
1982
1983 /* If this reloc section does not use the main symbol table we
1984 don't treat it as a reloc section. BFD can't adequately
1985 represent such a section, so at least for now, we don't
c044fabd 1986 try. We just present it as a normal section. We also
60bcf0fa 1987 can't use it as a reloc section if it points to the null
83b89087
L
1988 section, an invalid section, another reloc section, or its
1989 sh_link points to the null section. */
185ef66d 1990 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 1991 || hdr->sh_link == SHN_UNDEF
185ef66d 1992 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
1993 || hdr->sh_info >= num_sec
1994 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
1995 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
bf67003b
NC
1996 {
1997 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1998 shindex);
1999 goto success;
2000 }
252b5132
RH
2001
2002 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
bf67003b
NC
2003 goto fail;
2004
252b5132
RH
2005 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2006 if (target_sect == NULL)
bf67003b 2007 goto fail;
252b5132 2008
d4730f92
BS
2009 esdt = elf_section_data (target_sect);
2010 if (hdr->sh_type == SHT_RELA)
2011 p_hdr = &esdt->rela.hdr;
252b5132 2012 else
d4730f92
BS
2013 p_hdr = &esdt->rel.hdr;
2014
06614111
NC
2015 /* PR 17512: file: 0b4f81b7. */
2016 if (*p_hdr != NULL)
2017 goto fail;
d4730f92
BS
2018 amt = sizeof (*hdr2);
2019 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, amt);
2020 if (hdr2 == NULL)
bf67003b 2021 goto fail;
252b5132 2022 *hdr2 = *hdr;
d4730f92 2023 *p_hdr = hdr2;
252b5132 2024 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2025 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2026 target_sect->flags |= SEC_RELOC;
2027 target_sect->relocation = NULL;
2028 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2029 /* In the section to which the relocations apply, mark whether
2030 its relocations are of the REL or RELA variety. */
72730e0c 2031 if (hdr->sh_size != 0)
d4730f92
BS
2032 {
2033 if (hdr->sh_type == SHT_RELA)
2034 target_sect->use_rela_p = 1;
2035 }
252b5132 2036 abfd->flags |= HAS_RELOC;
bf67003b 2037 goto success;
252b5132 2038 }
252b5132
RH
2039
2040 case SHT_GNU_verdef:
2041 elf_dynverdef (abfd) = shindex;
2042 elf_tdata (abfd)->dynverdef_hdr = *hdr;
bf67003b
NC
2043 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2044 goto success;
252b5132
RH
2045
2046 case SHT_GNU_versym:
a50b2160 2047 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
bf67003b
NC
2048 goto fail;
2049
252b5132
RH
2050 elf_dynversym (abfd) = shindex;
2051 elf_tdata (abfd)->dynversym_hdr = *hdr;
bf67003b
NC
2052 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2053 goto success;
252b5132
RH
2054
2055 case SHT_GNU_verneed:
2056 elf_dynverref (abfd) = shindex;
2057 elf_tdata (abfd)->dynverref_hdr = *hdr;
bf67003b
NC
2058 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2059 goto success;
252b5132
RH
2060
2061 case SHT_SHLIB:
bf67003b 2062 goto success;
252b5132 2063
dbb410c3 2064 case SHT_GROUP:
44534af3 2065 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
bf67003b
NC
2066 goto fail;
2067
6dc132d9 2068 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2069 goto fail;
2070
dbb410c3
AM
2071 if (hdr->contents != NULL)
2072 {
2073 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
06614111 2074 unsigned int n_elt = hdr->sh_size / sizeof (* idx);
dbb410c3
AM
2075 asection *s;
2076
06614111
NC
2077 if (n_elt == 0)
2078 goto fail;
b885599b
AM
2079 if (idx->flags & GRP_COMDAT)
2080 hdr->bfd_section->flags
2081 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2082
45c5e9ed
L
2083 /* We try to keep the same section order as it comes in. */
2084 idx += n_elt;
06614111 2085
dbb410c3 2086 while (--n_elt != 0)
1783205a
NC
2087 {
2088 --idx;
2089
2090 if (idx->shdr != NULL
2091 && (s = idx->shdr->bfd_section) != NULL
2092 && elf_next_in_group (s) != NULL)
2093 {
2094 elf_next_in_group (hdr->bfd_section) = s;
2095 break;
2096 }
2097 }
dbb410c3 2098 }
bf67003b 2099 goto success;
dbb410c3 2100
252b5132 2101 default:
104d59d1
JM
2102 /* Possibly an attributes section. */
2103 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2104 || hdr->sh_type == bed->obj_attrs_section_type)
2105 {
2106 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2107 goto fail;
104d59d1 2108 _bfd_elf_parse_attributes (abfd, hdr);
bf67003b 2109 goto success;
104d59d1
JM
2110 }
2111
252b5132 2112 /* Check for any processor-specific section types. */
3eb70a79 2113 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2114 goto success;
3eb70a79
L
2115
2116 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2117 {
2118 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2119 /* FIXME: How to properly handle allocated section reserved
2120 for applications? */
2121 (*_bfd_error_handler)
2122 (_("%B: don't know how to handle allocated, application "
2123 "specific section `%s' [0x%8x]"),
2124 abfd, name, hdr->sh_type);
2125 else
bf67003b
NC
2126 {
2127 /* Allow sections reserved for applications. */
2128 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2129 shindex);
2130 goto success;
2131 }
3eb70a79
L
2132 }
2133 else if (hdr->sh_type >= SHT_LOPROC
2134 && hdr->sh_type <= SHT_HIPROC)
2135 /* FIXME: We should handle this section. */
2136 (*_bfd_error_handler)
2137 (_("%B: don't know how to handle processor specific section "
2138 "`%s' [0x%8x]"),
2139 abfd, name, hdr->sh_type);
2140 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
2141 {
2142 /* Unrecognised OS-specific sections. */
2143 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2144 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 2145 required to correctly process the section and the file should
ff15b240
NC
2146 be rejected with an error message. */
2147 (*_bfd_error_handler)
2148 (_("%B: don't know how to handle OS specific section "
2149 "`%s' [0x%8x]"),
2150 abfd, name, hdr->sh_type);
2151 else
bf67003b
NC
2152 {
2153 /* Otherwise it should be processed. */
2154 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2155 goto success;
2156 }
ff15b240 2157 }
3eb70a79
L
2158 else
2159 /* FIXME: We should handle this section. */
2160 (*_bfd_error_handler)
2161 (_("%B: don't know how to handle section `%s' [0x%8x]"),
2162 abfd, name, hdr->sh_type);
2163
bf67003b 2164 goto fail;
252b5132
RH
2165 }
2166
bf67003b
NC
2167 fail:
2168 ret = FALSE;
2169 success:
e5b470e2 2170 if (sections_being_created && sections_being_created_abfd == abfd)
bf67003b
NC
2171 sections_being_created [shindex] = FALSE;
2172 if (-- nesting == 0)
5a4b0ccc
NC
2173 {
2174 sections_being_created = NULL;
2175 sections_being_created_abfd = abfd;
2176 }
bf67003b 2177 return ret;
252b5132
RH
2178}
2179
87d72d41 2180/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2181
87d72d41
AM
2182Elf_Internal_Sym *
2183bfd_sym_from_r_symndx (struct sym_cache *cache,
2184 bfd *abfd,
2185 unsigned long r_symndx)
ec338859 2186{
ec338859
AM
2187 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2188
a5d1b3b5
AM
2189 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2190 {
2191 Elf_Internal_Shdr *symtab_hdr;
2192 unsigned char esym[sizeof (Elf64_External_Sym)];
2193 Elf_External_Sym_Shndx eshndx;
ec338859 2194
a5d1b3b5
AM
2195 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2196 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2197 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2198 return NULL;
9ad5cbcf 2199
a5d1b3b5
AM
2200 if (cache->abfd != abfd)
2201 {
2202 memset (cache->indx, -1, sizeof (cache->indx));
2203 cache->abfd = abfd;
2204 }
2205 cache->indx[ent] = r_symndx;
ec338859 2206 }
a5d1b3b5 2207
87d72d41 2208 return &cache->sym[ent];
ec338859
AM
2209}
2210
252b5132
RH
2211/* Given an ELF section number, retrieve the corresponding BFD
2212 section. */
2213
2214asection *
91d6fa6a 2215bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2216{
91d6fa6a 2217 if (sec_index >= elf_numsections (abfd))
252b5132 2218 return NULL;
91d6fa6a 2219 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2220}
2221
b35d266b 2222static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2223{
0112cd26
NC
2224 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2225 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2226};
2227
b35d266b 2228static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2229{
0112cd26
NC
2230 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2231 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2232};
2233
b35d266b 2234static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2235{
0112cd26
NC
2236 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2237 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
a9a72a65
DE
2238 /* There are more DWARF sections than these, but they needn't be added here
2239 unless you have to cope with broken compilers that don't emit section
2240 attributes or you want to help the user writing assembler. */
0112cd26
NC
2241 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2242 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2243 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2244 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2245 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2246 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2247 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2248 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2249 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2250};
2251
b35d266b 2252static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2253{
0112cd26
NC
2254 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2255 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2256 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2257};
2258
b35d266b 2259static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2260{
0112cd26 2261 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
68efed41 2262 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
0112cd26
NC
2263 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2264 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2265 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2266 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2267 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2268 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2269 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2270 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2271};
2272
b35d266b 2273static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2274{
0112cd26
NC
2275 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2276 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2277};
2278
b35d266b 2279static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2280{
0112cd26
NC
2281 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2282 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2283 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2284 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2285};
2286
b35d266b 2287static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2288{
0112cd26
NC
2289 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2290 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2291};
2292
b35d266b 2293static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2294{
0112cd26
NC
2295 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2296 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2297 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2298};
2299
b35d266b 2300static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2301{
0112cd26
NC
2302 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2303 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2304 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2305};
2306
b35d266b 2307static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2308{
0112cd26
NC
2309 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2310 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2311 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2312 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2313 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2314};
2315
b35d266b 2316static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2317{
0112cd26
NC
2318 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2319 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2320 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2321 /* See struct bfd_elf_special_section declaration for the semantics of
2322 this special case where .prefix_length != strlen (.prefix). */
2323 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2324 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2325};
2326
b35d266b 2327static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2328{
0112cd26
NC
2329 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2330 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2331 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2332 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2333};
2334
1b315056
CS
2335static const struct bfd_elf_special_section special_sections_z[] =
2336{
2337 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2338 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2339 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2340 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2341 { NULL, 0, 0, 0, 0 }
2342};
2343
e4c93b56 2344static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2345{
7f4d3958 2346 special_sections_b, /* 'b' */
98ece1b3 2347 special_sections_c, /* 'c' */
7f4d3958
L
2348 special_sections_d, /* 'd' */
2349 NULL, /* 'e' */
2350 special_sections_f, /* 'f' */
2351 special_sections_g, /* 'g' */
2352 special_sections_h, /* 'h' */
2353 special_sections_i, /* 'i' */
2354 NULL, /* 'j' */
2355 NULL, /* 'k' */
2356 special_sections_l, /* 'l' */
2357 NULL, /* 'm' */
2358 special_sections_n, /* 'n' */
2359 NULL, /* 'o' */
2360 special_sections_p, /* 'p' */
2361 NULL, /* 'q' */
2362 special_sections_r, /* 'r' */
2363 special_sections_s, /* 's' */
2364 special_sections_t, /* 't' */
1b315056
CS
2365 NULL, /* 'u' */
2366 NULL, /* 'v' */
2367 NULL, /* 'w' */
2368 NULL, /* 'x' */
2369 NULL, /* 'y' */
2370 special_sections_z /* 'z' */
7f4d3958
L
2371};
2372
551b43fd
AM
2373const struct bfd_elf_special_section *
2374_bfd_elf_get_special_section (const char *name,
2375 const struct bfd_elf_special_section *spec,
2376 unsigned int rela)
2f89ff8d
L
2377{
2378 int i;
7f4d3958 2379 int len;
7f4d3958 2380
551b43fd 2381 len = strlen (name);
7f4d3958 2382
551b43fd 2383 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2384 {
2385 int suffix_len;
551b43fd 2386 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2387
2388 if (len < prefix_len)
2389 continue;
551b43fd 2390 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2391 continue;
2392
551b43fd 2393 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2394 if (suffix_len <= 0)
2395 {
2396 if (name[prefix_len] != 0)
2397 {
2398 if (suffix_len == 0)
2399 continue;
2400 if (name[prefix_len] != '.'
2401 && (suffix_len == -2
551b43fd 2402 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2403 continue;
2404 }
2405 }
2406 else
2407 {
2408 if (len < prefix_len + suffix_len)
2409 continue;
2410 if (memcmp (name + len - suffix_len,
551b43fd 2411 spec[i].prefix + prefix_len,
7dcb9820
AM
2412 suffix_len) != 0)
2413 continue;
2414 }
551b43fd 2415 return &spec[i];
7dcb9820 2416 }
2f89ff8d
L
2417
2418 return NULL;
2419}
2420
7dcb9820 2421const struct bfd_elf_special_section *
29ef7005 2422_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2423{
551b43fd
AM
2424 int i;
2425 const struct bfd_elf_special_section *spec;
29ef7005 2426 const struct elf_backend_data *bed;
2f89ff8d
L
2427
2428 /* See if this is one of the special sections. */
551b43fd
AM
2429 if (sec->name == NULL)
2430 return NULL;
2f89ff8d 2431
29ef7005
L
2432 bed = get_elf_backend_data (abfd);
2433 spec = bed->special_sections;
2434 if (spec)
2435 {
2436 spec = _bfd_elf_get_special_section (sec->name,
2437 bed->special_sections,
2438 sec->use_rela_p);
2439 if (spec != NULL)
2440 return spec;
2441 }
2442
551b43fd
AM
2443 if (sec->name[0] != '.')
2444 return NULL;
2f89ff8d 2445
551b43fd 2446 i = sec->name[1] - 'b';
1b315056 2447 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2448 return NULL;
2449
2450 spec = special_sections[i];
2f89ff8d 2451
551b43fd
AM
2452 if (spec == NULL)
2453 return NULL;
2454
2455 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2456}
2457
b34976b6 2458bfd_boolean
217aa764 2459_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2460{
2461 struct bfd_elf_section_data *sdata;
551b43fd 2462 const struct elf_backend_data *bed;
7dcb9820 2463 const struct bfd_elf_special_section *ssect;
252b5132 2464
f0abc2a1
AM
2465 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2466 if (sdata == NULL)
2467 {
a50b1753
NC
2468 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2469 sizeof (*sdata));
f0abc2a1
AM
2470 if (sdata == NULL)
2471 return FALSE;
217aa764 2472 sec->used_by_bfd = sdata;
f0abc2a1 2473 }
bf572ba0 2474
551b43fd
AM
2475 /* Indicate whether or not this section should use RELA relocations. */
2476 bed = get_elf_backend_data (abfd);
2477 sec->use_rela_p = bed->default_use_rela_p;
2478
e843e0f8
L
2479 /* When we read a file, we don't need to set ELF section type and
2480 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2481 anyway. We will set ELF section type and flags for all linker
2482 created sections. If user specifies BFD section flags, we will
2483 set ELF section type and flags based on BFD section flags in
02ecc8e9
L
2484 elf_fake_sections. Special handling for .init_array/.fini_array
2485 output sections since they may contain .ctors/.dtors input
2486 sections. We don't want _bfd_elf_init_private_section_data to
2487 copy ELF section type from .ctors/.dtors input sections. */
2488 if (abfd->direction != read_direction
3496cb2a 2489 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2490 {
551b43fd 2491 ssect = (*bed->get_sec_type_attr) (abfd, sec);
02ecc8e9
L
2492 if (ssect != NULL
2493 && (!sec->flags
2494 || (sec->flags & SEC_LINKER_CREATED) != 0
2495 || ssect->type == SHT_INIT_ARRAY
2496 || ssect->type == SHT_FINI_ARRAY))
a31501e9
L
2497 {
2498 elf_section_type (sec) = ssect->type;
2499 elf_section_flags (sec) = ssect->attr;
2500 }
2f89ff8d
L
2501 }
2502
f592407e 2503 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2504}
2505
2506/* Create a new bfd section from an ELF program header.
2507
2508 Since program segments have no names, we generate a synthetic name
2509 of the form segment<NUM>, where NUM is generally the index in the
2510 program header table. For segments that are split (see below) we
2511 generate the names segment<NUM>a and segment<NUM>b.
2512
2513 Note that some program segments may have a file size that is different than
2514 (less than) the memory size. All this means is that at execution the
2515 system must allocate the amount of memory specified by the memory size,
2516 but only initialize it with the first "file size" bytes read from the
2517 file. This would occur for example, with program segments consisting
2518 of combined data+bss.
2519
2520 To handle the above situation, this routine generates TWO bfd sections
2521 for the single program segment. The first has the length specified by
2522 the file size of the segment, and the second has the length specified
2523 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2524 into its initialized and uninitialized parts.
252b5132
RH
2525
2526 */
2527
b34976b6 2528bfd_boolean
217aa764
AM
2529_bfd_elf_make_section_from_phdr (bfd *abfd,
2530 Elf_Internal_Phdr *hdr,
91d6fa6a 2531 int hdr_index,
a50b1753 2532 const char *type_name)
252b5132
RH
2533{
2534 asection *newsect;
2535 char *name;
2536 char namebuf[64];
d4c88bbb 2537 size_t len;
252b5132
RH
2538 int split;
2539
2540 split = ((hdr->p_memsz > 0)
2541 && (hdr->p_filesz > 0)
2542 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2543
2544 if (hdr->p_filesz > 0)
252b5132 2545 {
91d6fa6a 2546 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2547 len = strlen (namebuf) + 1;
a50b1753 2548 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2549 if (!name)
2550 return FALSE;
2551 memcpy (name, namebuf, len);
2552 newsect = bfd_make_section (abfd, name);
2553 if (newsect == NULL)
2554 return FALSE;
2555 newsect->vma = hdr->p_vaddr;
2556 newsect->lma = hdr->p_paddr;
2557 newsect->size = hdr->p_filesz;
2558 newsect->filepos = hdr->p_offset;
2559 newsect->flags |= SEC_HAS_CONTENTS;
2560 newsect->alignment_power = bfd_log2 (hdr->p_align);
2561 if (hdr->p_type == PT_LOAD)
252b5132 2562 {
d5191d0c
AM
2563 newsect->flags |= SEC_ALLOC;
2564 newsect->flags |= SEC_LOAD;
2565 if (hdr->p_flags & PF_X)
2566 {
2567 /* FIXME: all we known is that it has execute PERMISSION,
2568 may be data. */
2569 newsect->flags |= SEC_CODE;
2570 }
2571 }
2572 if (!(hdr->p_flags & PF_W))
2573 {
2574 newsect->flags |= SEC_READONLY;
252b5132 2575 }
252b5132
RH
2576 }
2577
d5191d0c 2578 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2579 {
d5191d0c
AM
2580 bfd_vma align;
2581
91d6fa6a 2582 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2583 len = strlen (namebuf) + 1;
a50b1753 2584 name = (char *) bfd_alloc (abfd, len);
252b5132 2585 if (!name)
b34976b6 2586 return FALSE;
d4c88bbb 2587 memcpy (name, namebuf, len);
252b5132
RH
2588 newsect = bfd_make_section (abfd, name);
2589 if (newsect == NULL)
b34976b6 2590 return FALSE;
252b5132
RH
2591 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2592 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2593 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2594 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2595 align = newsect->vma & -newsect->vma;
2596 if (align == 0 || align > hdr->p_align)
2597 align = hdr->p_align;
2598 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2599 if (hdr->p_type == PT_LOAD)
2600 {
d5191d0c
AM
2601 /* Hack for gdb. Segments that have not been modified do
2602 not have their contents written to a core file, on the
2603 assumption that a debugger can find the contents in the
2604 executable. We flag this case by setting the fake
2605 section size to zero. Note that "real" bss sections will
2606 always have their contents dumped to the core file. */
2607 if (bfd_get_format (abfd) == bfd_core)
2608 newsect->size = 0;
252b5132
RH
2609 newsect->flags |= SEC_ALLOC;
2610 if (hdr->p_flags & PF_X)
2611 newsect->flags |= SEC_CODE;
2612 }
2613 if (!(hdr->p_flags & PF_W))
2614 newsect->flags |= SEC_READONLY;
2615 }
2616
b34976b6 2617 return TRUE;
252b5132
RH
2618}
2619
b34976b6 2620bfd_boolean
91d6fa6a 2621bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2622{
9c5bfbb7 2623 const struct elf_backend_data *bed;
20cfcaae
NC
2624
2625 switch (hdr->p_type)
2626 {
2627 case PT_NULL:
91d6fa6a 2628 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2629
2630 case PT_LOAD:
91d6fa6a 2631 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2632
2633 case PT_DYNAMIC:
91d6fa6a 2634 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2635
2636 case PT_INTERP:
91d6fa6a 2637 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2638
2639 case PT_NOTE:
91d6fa6a 2640 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2641 return FALSE;
718175fa 2642 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2643 return FALSE;
2644 return TRUE;
20cfcaae
NC
2645
2646 case PT_SHLIB:
91d6fa6a 2647 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
2648
2649 case PT_PHDR:
91d6fa6a 2650 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 2651
811072d8 2652 case PT_GNU_EH_FRAME:
91d6fa6a 2653 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
2654 "eh_frame_hdr");
2655
2b05f1b7 2656 case PT_GNU_STACK:
91d6fa6a 2657 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 2658
8c37241b 2659 case PT_GNU_RELRO:
91d6fa6a 2660 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 2661
20cfcaae 2662 default:
8c1acd09 2663 /* Check for any processor-specific program segment types. */
20cfcaae 2664 bed = get_elf_backend_data (abfd);
91d6fa6a 2665 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
2666 }
2667}
2668
d4730f92
BS
2669/* Return the REL_HDR for SEC, assuming there is only a single one, either
2670 REL or RELA. */
2671
2672Elf_Internal_Shdr *
2673_bfd_elf_single_rel_hdr (asection *sec)
2674{
2675 if (elf_section_data (sec)->rel.hdr)
2676 {
2677 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
2678 return elf_section_data (sec)->rel.hdr;
2679 }
2680 else
2681 return elf_section_data (sec)->rela.hdr;
2682}
2683
2684/* Allocate and initialize a section-header for a new reloc section,
2685 containing relocations against ASECT. It is stored in RELDATA. If
2686 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
2687 relocations. */
23bc299b 2688
5d13b3b3 2689static bfd_boolean
217aa764 2690_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 2691 struct bfd_elf_section_reloc_data *reldata,
217aa764
AM
2692 asection *asect,
2693 bfd_boolean use_rela_p)
23bc299b 2694{
d4730f92 2695 Elf_Internal_Shdr *rel_hdr;
23bc299b 2696 char *name;
9c5bfbb7 2697 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92
BS
2698 bfd_size_type amt;
2699
2700 amt = sizeof (Elf_Internal_Shdr);
2701 BFD_ASSERT (reldata->hdr == NULL);
2702 rel_hdr = bfd_zalloc (abfd, amt);
2703 reldata->hdr = rel_hdr;
23bc299b 2704
d324f6d6 2705 amt = sizeof ".rela" + strlen (asect->name);
a50b1753 2706 name = (char *) bfd_alloc (abfd, amt);
23bc299b 2707 if (name == NULL)
b34976b6 2708 return FALSE;
23bc299b
MM
2709 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2710 rel_hdr->sh_name =
2b0f7ef9 2711 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2712 FALSE);
23bc299b 2713 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2714 return FALSE;
23bc299b
MM
2715 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2716 rel_hdr->sh_entsize = (use_rela_p
2717 ? bed->s->sizeof_rela
2718 : bed->s->sizeof_rel);
72de5009 2719 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
2720 rel_hdr->sh_flags = 0;
2721 rel_hdr->sh_addr = 0;
2722 rel_hdr->sh_size = 0;
2723 rel_hdr->sh_offset = 0;
2724
b34976b6 2725 return TRUE;
23bc299b
MM
2726}
2727
94be91de
JB
2728/* Return the default section type based on the passed in section flags. */
2729
2730int
2731bfd_elf_get_default_section_type (flagword flags)
2732{
2733 if ((flags & SEC_ALLOC) != 0
2e76e85a 2734 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
2735 return SHT_NOBITS;
2736 return SHT_PROGBITS;
2737}
2738
d4730f92
BS
2739struct fake_section_arg
2740{
2741 struct bfd_link_info *link_info;
2742 bfd_boolean failed;
2743};
2744
252b5132
RH
2745/* Set up an ELF internal section header for a section. */
2746
252b5132 2747static void
d4730f92 2748elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 2749{
d4730f92 2750 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 2751 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 2752 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 2753 Elf_Internal_Shdr *this_hdr;
0414f35b 2754 unsigned int sh_type;
252b5132 2755
d4730f92 2756 if (arg->failed)
252b5132
RH
2757 {
2758 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2759 loop. */
252b5132
RH
2760 return;
2761 }
2762
d4730f92 2763 this_hdr = &esd->this_hdr;
252b5132 2764
e57b5356
AM
2765 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2766 asect->name, FALSE);
2767 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2768 {
d4730f92 2769 arg->failed = TRUE;
252b5132
RH
2770 return;
2771 }
2772
a4d8e49b 2773 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2774
2775 if ((asect->flags & SEC_ALLOC) != 0
2776 || asect->user_set_vma)
2777 this_hdr->sh_addr = asect->vma;
2778 else
2779 this_hdr->sh_addr = 0;
2780
2781 this_hdr->sh_offset = 0;
eea6121a 2782 this_hdr->sh_size = asect->size;
252b5132 2783 this_hdr->sh_link = 0;
c86934ce
NC
2784 /* PR 17512: file: 0eb809fe, 8b0535ee. */
2785 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
2786 {
2787 (*_bfd_error_handler)
2788 (_("%B: error: Alignment power %d of section `%A' is too big"),
2789 abfd, asect, asect->alignment_power);
2790 arg->failed = TRUE;
2791 return;
2792 }
72de5009 2793 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
2794 /* The sh_entsize and sh_info fields may have been set already by
2795 copy_private_section_data. */
2796
2797 this_hdr->bfd_section = asect;
2798 this_hdr->contents = NULL;
2799
3cddba1e
L
2800 /* If the section type is unspecified, we set it based on
2801 asect->flags. */
98ece1b3
AM
2802 if ((asect->flags & SEC_GROUP) != 0)
2803 sh_type = SHT_GROUP;
98ece1b3 2804 else
94be91de 2805 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 2806
3cddba1e 2807 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
2808 this_hdr->sh_type = sh_type;
2809 else if (this_hdr->sh_type == SHT_NOBITS
2810 && sh_type == SHT_PROGBITS
2811 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 2812 {
98ece1b3
AM
2813 /* Warn if we are changing a NOBITS section to PROGBITS, but
2814 allow the link to proceed. This can happen when users link
2815 non-bss input sections to bss output sections, or emit data
2816 to a bss output section via a linker script. */
2817 (*_bfd_error_handler)
58f0869b 2818 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 2819 this_hdr->sh_type = sh_type;
3cddba1e
L
2820 }
2821
2f89ff8d 2822 switch (this_hdr->sh_type)
252b5132 2823 {
2f89ff8d 2824 default:
2f89ff8d
L
2825 break;
2826
2827 case SHT_STRTAB:
2828 case SHT_INIT_ARRAY:
2829 case SHT_FINI_ARRAY:
2830 case SHT_PREINIT_ARRAY:
2831 case SHT_NOTE:
2832 case SHT_NOBITS:
2833 case SHT_PROGBITS:
2834 break;
2835
2836 case SHT_HASH:
c7ac6ff8 2837 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2838 break;
5de3bf90 2839
2f89ff8d 2840 case SHT_DYNSYM:
252b5132 2841 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2842 break;
2843
2844 case SHT_DYNAMIC:
252b5132 2845 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2846 break;
2847
2848 case SHT_RELA:
2849 if (get_elf_backend_data (abfd)->may_use_rela_p)
2850 this_hdr->sh_entsize = bed->s->sizeof_rela;
2851 break;
2852
2853 case SHT_REL:
2854 if (get_elf_backend_data (abfd)->may_use_rel_p)
2855 this_hdr->sh_entsize = bed->s->sizeof_rel;
2856 break;
2857
2858 case SHT_GNU_versym:
252b5132 2859 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2860 break;
2861
2862 case SHT_GNU_verdef:
252b5132
RH
2863 this_hdr->sh_entsize = 0;
2864 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2865 cverdefs. The linker will set cverdefs, but sh_info will be
2866 zero. */
252b5132
RH
2867 if (this_hdr->sh_info == 0)
2868 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2869 else
2870 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2871 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2872 break;
2873
2874 case SHT_GNU_verneed:
252b5132
RH
2875 this_hdr->sh_entsize = 0;
2876 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2877 cverrefs. The linker will set cverrefs, but sh_info will be
2878 zero. */
252b5132
RH
2879 if (this_hdr->sh_info == 0)
2880 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2881 else
2882 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2883 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2884 break;
2885
2886 case SHT_GROUP:
1783205a 2887 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 2888 break;
fdc90cb4
JJ
2889
2890 case SHT_GNU_HASH:
2891 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2892 break;
dbb410c3 2893 }
252b5132
RH
2894
2895 if ((asect->flags & SEC_ALLOC) != 0)
2896 this_hdr->sh_flags |= SHF_ALLOC;
2897 if ((asect->flags & SEC_READONLY) == 0)
2898 this_hdr->sh_flags |= SHF_WRITE;
2899 if ((asect->flags & SEC_CODE) != 0)
2900 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2901 if ((asect->flags & SEC_MERGE) != 0)
2902 {
2903 this_hdr->sh_flags |= SHF_MERGE;
2904 this_hdr->sh_entsize = asect->entsize;
2905 if ((asect->flags & SEC_STRINGS) != 0)
2906 this_hdr->sh_flags |= SHF_STRINGS;
2907 }
1126897b 2908 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2909 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2910 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2911 {
2912 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2913 if (asect->size == 0
2914 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2915 {
3a800eb9 2916 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2917
704afa60 2918 this_hdr->sh_size = 0;
3a800eb9
AM
2919 if (o != NULL)
2920 {
704afa60 2921 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2922 if (this_hdr->sh_size != 0)
2923 this_hdr->sh_type = SHT_NOBITS;
2924 }
704afa60
JJ
2925 }
2926 }
18ae9cc1
L
2927 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
2928 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 2929
d4730f92
BS
2930 /* If the section has relocs, set up a section header for the
2931 SHT_REL[A] section. If two relocation sections are required for
2932 this section, it is up to the processor-specific back-end to
2933 create the other. */
2934 if ((asect->flags & SEC_RELOC) != 0)
2935 {
2936 /* When doing a relocatable link, create both REL and RELA sections if
2937 needed. */
2938 if (arg->link_info
2939 /* Do the normal setup if we wouldn't create any sections here. */
2940 && esd->rel.count + esd->rela.count > 0
2941 && (arg->link_info->relocatable || arg->link_info->emitrelocations))
2942 {
2943 if (esd->rel.count && esd->rel.hdr == NULL
2944 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, asect, FALSE))
2945 {
2946 arg->failed = TRUE;
2947 return;
2948 }
2949 if (esd->rela.count && esd->rela.hdr == NULL
2950 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, asect, TRUE))
2951 {
2952 arg->failed = TRUE;
2953 return;
2954 }
2955 }
2956 else if (!_bfd_elf_init_reloc_shdr (abfd,
2957 (asect->use_rela_p
2958 ? &esd->rela : &esd->rel),
2959 asect,
2960 asect->use_rela_p))
2961 arg->failed = TRUE;
2962 }
2963
252b5132 2964 /* Check for processor-specific section types. */
0414f35b 2965 sh_type = this_hdr->sh_type;
e1fddb6b
AO
2966 if (bed->elf_backend_fake_sections
2967 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
d4730f92 2968 arg->failed = TRUE;
252b5132 2969
42bb2e33 2970 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
2971 {
2972 /* Don't change the header type from NOBITS if we are being
42bb2e33 2973 called for objcopy --only-keep-debug. */
0414f35b
AM
2974 this_hdr->sh_type = sh_type;
2975 }
252b5132
RH
2976}
2977
bcacc0f5
AM
2978/* Fill in the contents of a SHT_GROUP section. Called from
2979 _bfd_elf_compute_section_file_positions for gas, objcopy, and
2980 when ELF targets use the generic linker, ld. Called for ld -r
2981 from bfd_elf_final_link. */
dbb410c3 2982
1126897b 2983void
217aa764 2984bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2985{
a50b1753 2986 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 2987 asection *elt, *first;
dbb410c3 2988 unsigned char *loc;
b34976b6 2989 bfd_boolean gas;
dbb410c3 2990
7e4111ad
L
2991 /* Ignore linker created group section. See elfNN_ia64_object_p in
2992 elfxx-ia64.c. */
2993 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2994 || *failedptr)
2995 return;
2996
bcacc0f5
AM
2997 if (elf_section_data (sec)->this_hdr.sh_info == 0)
2998 {
2999 unsigned long symindx = 0;
3000
3001 /* elf_group_id will have been set up by objcopy and the
3002 generic linker. */
3003 if (elf_group_id (sec) != NULL)
3004 symindx = elf_group_id (sec)->udata.i;
1126897b 3005
bcacc0f5
AM
3006 if (symindx == 0)
3007 {
3008 /* If called from the assembler, swap_out_syms will have set up
3009 elf_section_syms. */
3010 BFD_ASSERT (elf_section_syms (abfd) != NULL);
3011 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3012 }
3013 elf_section_data (sec)->this_hdr.sh_info = symindx;
3014 }
3015 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 3016 {
bcacc0f5
AM
3017 /* The ELF backend linker sets sh_info to -2 when the group
3018 signature symbol is global, and thus the index can't be
3019 set until all local symbols are output. */
3020 asection *igroup = elf_sec_group (elf_next_in_group (sec));
3021 struct bfd_elf_section_data *sec_data = elf_section_data (igroup);
3022 unsigned long symndx = sec_data->this_hdr.sh_info;
3023 unsigned long extsymoff = 0;
3024 struct elf_link_hash_entry *h;
3025
3026 if (!elf_bad_symtab (igroup->owner))
3027 {
3028 Elf_Internal_Shdr *symtab_hdr;
3029
3030 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3031 extsymoff = symtab_hdr->sh_info;
3032 }
3033 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3034 while (h->root.type == bfd_link_hash_indirect
3035 || h->root.type == bfd_link_hash_warning)
3036 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3037
3038 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 3039 }
dbb410c3 3040
1126897b 3041 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 3042 gas = TRUE;
dbb410c3
AM
3043 if (sec->contents == NULL)
3044 {
b34976b6 3045 gas = FALSE;
a50b1753 3046 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
3047
3048 /* Arrange for the section to be written out. */
3049 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
3050 if (sec->contents == NULL)
3051 {
b34976b6 3052 *failedptr = TRUE;
dbb410c3
AM
3053 return;
3054 }
3055 }
3056
eea6121a 3057 loc = sec->contents + sec->size;
dbb410c3 3058
9dce4196
AM
3059 /* Get the pointer to the first section in the group that gas
3060 squirreled away here. objcopy arranges for this to be set to the
3061 start of the input section group. */
3062 first = elt = elf_next_in_group (sec);
dbb410c3
AM
3063
3064 /* First element is a flag word. Rest of section is elf section
3065 indices for all the sections of the group. Write them backwards
3066 just to keep the group in the same order as given in .section
3067 directives, not that it matters. */
3068 while (elt != NULL)
3069 {
9dce4196 3070 asection *s;
9dce4196 3071
9dce4196 3072 s = elt;
415f38a6
AM
3073 if (!gas)
3074 s = s->output_section;
3075 if (s != NULL
3076 && !bfd_is_abs_section (s))
01e1a5bc 3077 {
415f38a6
AM
3078 unsigned int idx = elf_section_data (s)->this_idx;
3079
01e1a5bc 3080 loc -= 4;
01e1a5bc
NC
3081 H_PUT_32 (abfd, idx, loc);
3082 }
945906ff 3083 elt = elf_next_in_group (elt);
9dce4196
AM
3084 if (elt == first)
3085 break;
dbb410c3
AM
3086 }
3087
3d7f7666 3088 if ((loc -= 4) != sec->contents)
9dce4196 3089 abort ();
dbb410c3 3090
9dce4196 3091 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
3092}
3093
bd53a53a
L
3094/* Return the section which RELOC_SEC applies to. */
3095
3096asection *
3097_bfd_elf_get_reloc_section (asection *reloc_sec)
3098{
3099 const char *name;
3100 unsigned int type;
3101 bfd *abfd;
3102
3103 if (reloc_sec == NULL)
3104 return NULL;
3105
3106 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3107 if (type != SHT_REL && type != SHT_RELA)
3108 return NULL;
3109
3110 /* We look up the section the relocs apply to by name. */
3111 name = reloc_sec->name;
3112 if (type == SHT_REL)
3113 name += 4;
3114 else
3115 name += 5;
3116
3117 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3118 section apply to .got.plt section. */
3119 abfd = reloc_sec->owner;
3120 if (get_elf_backend_data (abfd)->want_got_plt
3121 && strcmp (name, ".plt") == 0)
87070c08
AM
3122 {
3123 /* .got.plt is a linker created input section. It may be mapped
3124 to some other output section. Try two likely sections. */
3125 name = ".got.plt";
3126 reloc_sec = bfd_get_section_by_name (abfd, name);
3127 if (reloc_sec != NULL)
3128 return reloc_sec;
3129 name = ".got";
3130 }
bd53a53a
L
3131
3132 reloc_sec = bfd_get_section_by_name (abfd, name);
3133 return reloc_sec;
3134}
3135
252b5132
RH
3136/* Assign all ELF section numbers. The dummy first section is handled here
3137 too. The link/info pointers for the standard section types are filled
3138 in here too, while we're at it. */
3139
b34976b6 3140static bfd_boolean
da9f89d4 3141assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
3142{
3143 struct elf_obj_tdata *t = elf_tdata (abfd);
3144 asection *sec;
2b0f7ef9 3145 unsigned int section_number, secn;
252b5132 3146 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 3147 struct bfd_elf_section_data *d;
3516e984 3148 bfd_boolean need_symtab;
252b5132
RH
3149
3150 section_number = 1;
3151
2b0f7ef9
JJ
3152 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3153
da9f89d4
L
3154 /* SHT_GROUP sections are in relocatable files only. */
3155 if (link_info == NULL || link_info->relocatable)
252b5132 3156 {
da9f89d4 3157 /* Put SHT_GROUP sections first. */
04dd1667 3158 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 3159 {
5daa8fe7 3160 d = elf_section_data (sec);
da9f89d4
L
3161
3162 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 3163 {
5daa8fe7 3164 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
3165 {
3166 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 3167 bfd_section_list_remove (abfd, sec);
da9f89d4 3168 abfd->section_count--;
da9f89d4 3169 }
08a40648 3170 else
4fbb74a6 3171 d->this_idx = section_number++;
da9f89d4 3172 }
47cc2cf5
PB
3173 }
3174 }
3175
3176 for (sec = abfd->sections; sec; sec = sec->next)
3177 {
3178 d = elf_section_data (sec);
3179
3180 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 3181 d->this_idx = section_number++;
2b0f7ef9 3182 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 3183 if (d->rel.hdr)
2b0f7ef9 3184 {
d4730f92
BS
3185 d->rel.idx = section_number++;
3186 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 3187 }
d4730f92
BS
3188 else
3189 d->rel.idx = 0;
23bc299b 3190
d4730f92 3191 if (d->rela.hdr)
2b0f7ef9 3192 {
d4730f92
BS
3193 d->rela.idx = section_number++;
3194 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 3195 }
23bc299b 3196 else
d4730f92 3197 d->rela.idx = 0;
252b5132
RH
3198 }
3199
12bd6957 3200 elf_shstrtab_sec (abfd) = section_number++;
2b0f7ef9 3201 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
12bd6957 3202 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
252b5132 3203
3516e984
L
3204 need_symtab = (bfd_get_symcount (abfd) > 0
3205 || (link_info == NULL
3206 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3207 == HAS_RELOC)));
3208 if (need_symtab)
252b5132 3209 {
12bd6957 3210 elf_onesymtab (abfd) = section_number++;
2b0f7ef9 3211 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 3212 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 3213 {
12bd6957 3214 elf_symtab_shndx (abfd) = section_number++;
9ad5cbcf
AM
3215 t->symtab_shndx_hdr.sh_name
3216 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3217 ".symtab_shndx", FALSE);
9ad5cbcf 3218 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 3219 return FALSE;
9ad5cbcf 3220 }
12bd6957 3221 elf_strtab_sec (abfd) = section_number++;
2b0f7ef9 3222 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3223 }
3224
1c52a645
L
3225 if (section_number >= SHN_LORESERVE)
3226 {
3227 _bfd_error_handler (_("%B: too many sections: %u"),
3228 abfd, section_number);
3229 return FALSE;
3230 }
3231
2b0f7ef9
JJ
3232 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
3233 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
3234
3235 elf_numsections (abfd) = section_number;
252b5132
RH
3236 elf_elfheader (abfd)->e_shnum = section_number;
3237
3238 /* Set up the list of section header pointers, in agreement with the
3239 indices. */
a50b1753
NC
3240 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
3241 sizeof (Elf_Internal_Shdr *));
252b5132 3242 if (i_shdrp == NULL)
b34976b6 3243 return FALSE;
252b5132 3244
a50b1753
NC
3245 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3246 sizeof (Elf_Internal_Shdr));
252b5132
RH
3247 if (i_shdrp[0] == NULL)
3248 {
3249 bfd_release (abfd, i_shdrp);
b34976b6 3250 return FALSE;
252b5132 3251 }
252b5132
RH
3252
3253 elf_elfsections (abfd) = i_shdrp;
3254
12bd6957 3255 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3516e984 3256 if (need_symtab)
252b5132 3257 {
12bd6957 3258 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
4fbb74a6 3259 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf 3260 {
12bd6957
AM
3261 i_shdrp[elf_symtab_shndx (abfd)] = &t->symtab_shndx_hdr;
3262 t->symtab_shndx_hdr.sh_link = elf_onesymtab (abfd);
9ad5cbcf 3263 }
12bd6957
AM
3264 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3265 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
252b5132 3266 }
38ce5b11 3267
252b5132
RH
3268 for (sec = abfd->sections; sec; sec = sec->next)
3269 {
252b5132 3270 asection *s;
252b5132 3271
91d6fa6a
NC
3272 d = elf_section_data (sec);
3273
252b5132 3274 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3275 if (d->rel.idx != 0)
3276 i_shdrp[d->rel.idx] = d->rel.hdr;
3277 if (d->rela.idx != 0)
3278 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3279
3280 /* Fill in the sh_link and sh_info fields while we're at it. */
3281
3282 /* sh_link of a reloc section is the section index of the symbol
3283 table. sh_info is the section index of the section to which
3284 the relocation entries apply. */
d4730f92 3285 if (d->rel.idx != 0)
252b5132 3286 {
12bd6957 3287 d->rel.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3288 d->rel.hdr->sh_info = d->this_idx;
9ef5d938 3289 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
252b5132 3290 }
d4730f92 3291 if (d->rela.idx != 0)
23bc299b 3292 {
12bd6957 3293 d->rela.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3294 d->rela.hdr->sh_info = d->this_idx;
9ef5d938 3295 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
23bc299b 3296 }
252b5132 3297
38ce5b11
L
3298 /* We need to set up sh_link for SHF_LINK_ORDER. */
3299 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3300 {
3301 s = elf_linked_to_section (sec);
3302 if (s)
38ce5b11 3303 {
f2876037 3304 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3305 if (link_info != NULL)
38ce5b11 3306 {
f2876037 3307 /* Check discarded linkonce section. */
dbaa2011 3308 if (discarded_section (s))
38ce5b11 3309 {
ccd2ec6a
L
3310 asection *kept;
3311 (*_bfd_error_handler)
3312 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3313 abfd, d->this_hdr.bfd_section,
3314 s, s->owner);
3315 /* Point to the kept section if it has the same
3316 size as the discarded one. */
c0f00686 3317 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3318 if (kept == NULL)
185d09ad 3319 {
ccd2ec6a
L
3320 bfd_set_error (bfd_error_bad_value);
3321 return FALSE;
185d09ad 3322 }
ccd2ec6a 3323 s = kept;
38ce5b11 3324 }
e424ecc8 3325
ccd2ec6a
L
3326 s = s->output_section;
3327 BFD_ASSERT (s != NULL);
38ce5b11 3328 }
f2876037
L
3329 else
3330 {
3331 /* Handle objcopy. */
3332 if (s->output_section == NULL)
3333 {
3334 (*_bfd_error_handler)
3335 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
3336 abfd, d->this_hdr.bfd_section, s, s->owner);
3337 bfd_set_error (bfd_error_bad_value);
3338 return FALSE;
3339 }
3340 s = s->output_section;
3341 }
ccd2ec6a
L
3342 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3343 }
3344 else
3345 {
3346 /* PR 290:
3347 The Intel C compiler generates SHT_IA_64_UNWIND with
3348 SHF_LINK_ORDER. But it doesn't set the sh_link or
3349 sh_info fields. Hence we could get the situation
08a40648 3350 where s is NULL. */
ccd2ec6a
L
3351 const struct elf_backend_data *bed
3352 = get_elf_backend_data (abfd);
3353 if (bed->link_order_error_handler)
3354 bed->link_order_error_handler
3355 (_("%B: warning: sh_link not set for section `%A'"),
3356 abfd, sec);
38ce5b11
L
3357 }
3358 }
3359
252b5132
RH
3360 switch (d->this_hdr.sh_type)
3361 {
3362 case SHT_REL:
3363 case SHT_RELA:
3364 /* A reloc section which we are treating as a normal BFD
3365 section. sh_link is the section index of the symbol
3366 table. sh_info is the section index of the section to
3367 which the relocation entries apply. We assume that an
3368 allocated reloc section uses the dynamic symbol table.
3369 FIXME: How can we be sure? */
3370 s = bfd_get_section_by_name (abfd, ".dynsym");
3371 if (s != NULL)
3372 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3373
bd53a53a 3374 s = get_elf_backend_data (abfd)->get_reloc_section (sec);
252b5132 3375 if (s != NULL)
9ef5d938
L
3376 {
3377 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3378 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3379 }
252b5132
RH
3380 break;
3381
3382 case SHT_STRTAB:
3383 /* We assume that a section named .stab*str is a stabs
3384 string section. We look for a section with the same name
3385 but without the trailing ``str'', and set its sh_link
3386 field to point to this section. */
0112cd26 3387 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3388 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3389 {
3390 size_t len;
3391 char *alc;
3392
3393 len = strlen (sec->name);
a50b1753 3394 alc = (char *) bfd_malloc (len - 2);
252b5132 3395 if (alc == NULL)
b34976b6 3396 return FALSE;
d4c88bbb 3397 memcpy (alc, sec->name, len - 3);
252b5132
RH
3398 alc[len - 3] = '\0';
3399 s = bfd_get_section_by_name (abfd, alc);
3400 free (alc);
3401 if (s != NULL)
3402 {
3403 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3404
3405 /* This is a .stab section. */
0594c12d
AM
3406 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3407 elf_section_data (s)->this_hdr.sh_entsize
3408 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3409 }
3410 }
3411 break;
3412
3413 case SHT_DYNAMIC:
3414 case SHT_DYNSYM:
3415 case SHT_GNU_verneed:
3416 case SHT_GNU_verdef:
3417 /* sh_link is the section header index of the string table
3418 used for the dynamic entries, or the symbol table, or the
3419 version strings. */
3420 s = bfd_get_section_by_name (abfd, ".dynstr");
3421 if (s != NULL)
3422 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3423 break;
3424
7f1204bb
JJ
3425 case SHT_GNU_LIBLIST:
3426 /* sh_link is the section header index of the prelink library
08a40648
AM
3427 list used for the dynamic entries, or the symbol table, or
3428 the version strings. */
7f1204bb
JJ
3429 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3430 ? ".dynstr" : ".gnu.libstr");
3431 if (s != NULL)
3432 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3433 break;
3434
252b5132 3435 case SHT_HASH:
fdc90cb4 3436 case SHT_GNU_HASH:
252b5132
RH
3437 case SHT_GNU_versym:
3438 /* sh_link is the section header index of the symbol table
3439 this hash table or version table is for. */
3440 s = bfd_get_section_by_name (abfd, ".dynsym");
3441 if (s != NULL)
3442 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3443 break;
dbb410c3
AM
3444
3445 case SHT_GROUP:
12bd6957 3446 d->this_hdr.sh_link = elf_onesymtab (abfd);
252b5132
RH
3447 }
3448 }
3449
2b0f7ef9 3450 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3451 if (i_shdrp[secn] == NULL)
3452 i_shdrp[secn] = i_shdrp[0];
3453 else
3454 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3455 i_shdrp[secn]->sh_name);
b34976b6 3456 return TRUE;
252b5132
RH
3457}
3458
5372391b 3459static bfd_boolean
217aa764 3460sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3461{
3462 /* If the backend has a special mapping, use it. */
9c5bfbb7 3463 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3464 if (bed->elf_backend_sym_is_global)
3465 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3466
e47bf690 3467 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3468 || bfd_is_und_section (bfd_get_section (sym))
3469 || bfd_is_com_section (bfd_get_section (sym)));
3470}
3471
5372391b 3472/* Don't output section symbols for sections that are not going to be
c6d8cab4 3473 output, that are duplicates or there is no BFD section. */
5372391b
AM
3474
3475static bfd_boolean
3476ignore_section_sym (bfd *abfd, asymbol *sym)
3477{
c6d8cab4
L
3478 elf_symbol_type *type_ptr;
3479
3480 if ((sym->flags & BSF_SECTION_SYM) == 0)
3481 return FALSE;
3482
3483 type_ptr = elf_symbol_from (abfd, sym);
3484 return ((type_ptr != NULL
3485 && type_ptr->internal_elf_sym.st_shndx != 0
3486 && bfd_is_abs_section (sym->section))
3487 || !(sym->section->owner == abfd
0f0a5e58 3488 || (sym->section->output_section->owner == abfd
2633a79c
AM
3489 && sym->section->output_offset == 0)
3490 || bfd_is_abs_section (sym->section)));
5372391b
AM
3491}
3492
2633a79c
AM
3493/* Map symbol from it's internal number to the external number, moving
3494 all local symbols to be at the head of the list. */
3495
b34976b6 3496static bfd_boolean
12bd6957 3497elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
252b5132 3498{
dc810e39 3499 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3500 asymbol **syms = bfd_get_outsymbols (abfd);
3501 asymbol **sect_syms;
dc810e39
AM
3502 unsigned int num_locals = 0;
3503 unsigned int num_globals = 0;
3504 unsigned int num_locals2 = 0;
3505 unsigned int num_globals2 = 0;
252b5132 3506 int max_index = 0;
dc810e39 3507 unsigned int idx;
252b5132
RH
3508 asection *asect;
3509 asymbol **new_syms;
252b5132
RH
3510
3511#ifdef DEBUG
3512 fprintf (stderr, "elf_map_symbols\n");
3513 fflush (stderr);
3514#endif
3515
252b5132
RH
3516 for (asect = abfd->sections; asect; asect = asect->next)
3517 {
3518 if (max_index < asect->index)
3519 max_index = asect->index;
3520 }
3521
3522 max_index++;
a50b1753 3523 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3524 if (sect_syms == NULL)
b34976b6 3525 return FALSE;
252b5132 3526 elf_section_syms (abfd) = sect_syms;
4e89ac30 3527 elf_num_section_syms (abfd) = max_index;
252b5132 3528
079e9a2f
AM
3529 /* Init sect_syms entries for any section symbols we have already
3530 decided to output. */
252b5132
RH
3531 for (idx = 0; idx < symcount; idx++)
3532 {
dc810e39 3533 asymbol *sym = syms[idx];
c044fabd 3534
252b5132 3535 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 3536 && sym->value == 0
2633a79c
AM
3537 && !ignore_section_sym (abfd, sym)
3538 && !bfd_is_abs_section (sym->section))
252b5132 3539 {
5372391b 3540 asection *sec = sym->section;
252b5132 3541
5372391b
AM
3542 if (sec->owner != abfd)
3543 sec = sec->output_section;
252b5132 3544
5372391b 3545 sect_syms[sec->index] = syms[idx];
252b5132
RH
3546 }
3547 }
3548
252b5132
RH
3549 /* Classify all of the symbols. */
3550 for (idx = 0; idx < symcount; idx++)
3551 {
2633a79c 3552 if (sym_is_global (abfd, syms[idx]))
252b5132 3553 num_globals++;
2633a79c
AM
3554 else if (!ignore_section_sym (abfd, syms[idx]))
3555 num_locals++;
252b5132 3556 }
079e9a2f 3557
5372391b 3558 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3559 sections will already have a section symbol in outsymbols, but
3560 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3561 at least in that case. */
252b5132
RH
3562 for (asect = abfd->sections; asect; asect = asect->next)
3563 {
079e9a2f 3564 if (sect_syms[asect->index] == NULL)
252b5132 3565 {
079e9a2f 3566 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3567 num_locals++;
3568 else
3569 num_globals++;
252b5132
RH
3570 }
3571 }
3572
3573 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
3574 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
3575 sizeof (asymbol *));
dc810e39 3576
252b5132 3577 if (new_syms == NULL)
b34976b6 3578 return FALSE;
252b5132
RH
3579
3580 for (idx = 0; idx < symcount; idx++)
3581 {
3582 asymbol *sym = syms[idx];
dc810e39 3583 unsigned int i;
252b5132 3584
2633a79c
AM
3585 if (sym_is_global (abfd, sym))
3586 i = num_locals + num_globals2++;
3587 else if (!ignore_section_sym (abfd, sym))
252b5132
RH
3588 i = num_locals2++;
3589 else
2633a79c 3590 continue;
252b5132
RH
3591 new_syms[i] = sym;
3592 sym->udata.i = i + 1;
3593 }
3594 for (asect = abfd->sections; asect; asect = asect->next)
3595 {
079e9a2f 3596 if (sect_syms[asect->index] == NULL)
252b5132 3597 {
079e9a2f 3598 asymbol *sym = asect->symbol;
dc810e39 3599 unsigned int i;
252b5132 3600
079e9a2f 3601 sect_syms[asect->index] = sym;
252b5132
RH
3602 if (!sym_is_global (abfd, sym))
3603 i = num_locals2++;
3604 else
3605 i = num_locals + num_globals2++;
3606 new_syms[i] = sym;
3607 sym->udata.i = i + 1;
3608 }
3609 }
3610
3611 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3612
12bd6957 3613 *pnum_locals = num_locals;
b34976b6 3614 return TRUE;
252b5132
RH
3615}
3616
3617/* Align to the maximum file alignment that could be required for any
3618 ELF data structure. */
3619
268b6b39 3620static inline file_ptr
217aa764 3621align_file_position (file_ptr off, int align)
252b5132
RH
3622{
3623 return (off + align - 1) & ~(align - 1);
3624}
3625
3626/* Assign a file position to a section, optionally aligning to the
3627 required section alignment. */
3628
217aa764
AM
3629file_ptr
3630_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3631 file_ptr offset,
3632 bfd_boolean align)
252b5132 3633{
72de5009
AM
3634 if (align && i_shdrp->sh_addralign > 1)
3635 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
3636 i_shdrp->sh_offset = offset;
3637 if (i_shdrp->bfd_section != NULL)
3638 i_shdrp->bfd_section->filepos = offset;
3639 if (i_shdrp->sh_type != SHT_NOBITS)
3640 offset += i_shdrp->sh_size;
3641 return offset;
3642}
3643
3644/* Compute the file positions we are going to put the sections at, and
3645 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3646 is not NULL, this is being called by the ELF backend linker. */
3647
b34976b6 3648bfd_boolean
217aa764
AM
3649_bfd_elf_compute_section_file_positions (bfd *abfd,
3650 struct bfd_link_info *link_info)
252b5132 3651{
9c5bfbb7 3652 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3653 struct fake_section_arg fsargs;
b34976b6 3654 bfd_boolean failed;
4b6c0f2f 3655 struct bfd_strtab_hash *strtab = NULL;
252b5132 3656 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 3657 bfd_boolean need_symtab;
252b5132
RH
3658
3659 if (abfd->output_has_begun)
b34976b6 3660 return TRUE;
252b5132
RH
3661
3662 /* Do any elf backend specific processing first. */
3663 if (bed->elf_backend_begin_write_processing)
3664 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3665
3666 if (! prep_headers (abfd))
b34976b6 3667 return FALSE;
252b5132 3668
e6c51ed4 3669 /* Post process the headers if necessary. */
78245035 3670 (*bed->elf_backend_post_process_headers) (abfd, link_info);
e6c51ed4 3671
d4730f92
BS
3672 fsargs.failed = FALSE;
3673 fsargs.link_info = link_info;
3674 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
3675 if (fsargs.failed)
b34976b6 3676 return FALSE;
252b5132 3677
da9f89d4 3678 if (!assign_section_numbers (abfd, link_info))
b34976b6 3679 return FALSE;
252b5132
RH
3680
3681 /* The backend linker builds symbol table information itself. */
3516e984
L
3682 need_symtab = (link_info == NULL
3683 && (bfd_get_symcount (abfd) > 0
3684 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3685 == HAS_RELOC)));
3686 if (need_symtab)
252b5132
RH
3687 {
3688 /* Non-zero if doing a relocatable link. */
3689 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3690
3691 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3692 return FALSE;
252b5132
RH
3693 }
3694
d4730f92 3695 failed = FALSE;
1126897b 3696 if (link_info == NULL)
dbb410c3 3697 {
1126897b 3698 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3699 if (failed)
b34976b6 3700 return FALSE;
dbb410c3
AM
3701 }
3702
252b5132
RH
3703 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3704 /* sh_name was set in prep_headers. */
3705 shstrtab_hdr->sh_type = SHT_STRTAB;
3706 shstrtab_hdr->sh_flags = 0;
3707 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3708 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3709 shstrtab_hdr->sh_entsize = 0;
3710 shstrtab_hdr->sh_link = 0;
3711 shstrtab_hdr->sh_info = 0;
3712 /* sh_offset is set in assign_file_positions_except_relocs. */
3713 shstrtab_hdr->sh_addralign = 1;
3714
c84fca4d 3715 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3716 return FALSE;
252b5132 3717
3516e984 3718 if (need_symtab)
252b5132
RH
3719 {
3720 file_ptr off;
3721 Elf_Internal_Shdr *hdr;
3722
12bd6957 3723 off = elf_next_file_pos (abfd);
252b5132
RH
3724
3725 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3726 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3727
9ad5cbcf
AM
3728 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3729 if (hdr->sh_size != 0)
b34976b6 3730 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3731
252b5132 3732 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3733 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3734
12bd6957 3735 elf_next_file_pos (abfd) = off;
252b5132
RH
3736
3737 /* Now that we know where the .strtab section goes, write it
08a40648 3738 out. */
252b5132
RH
3739 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3740 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3741 return FALSE;
252b5132
RH
3742 _bfd_stringtab_free (strtab);
3743 }
3744
b34976b6 3745 abfd->output_has_begun = TRUE;
252b5132 3746
b34976b6 3747 return TRUE;
252b5132
RH
3748}
3749
8ded5a0f
AM
3750/* Make an initial estimate of the size of the program header. If we
3751 get the number wrong here, we'll redo section placement. */
3752
3753static bfd_size_type
3754get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3755{
3756 size_t segs;
3757 asection *s;
2b05f1b7 3758 const struct elf_backend_data *bed;
8ded5a0f
AM
3759
3760 /* Assume we will need exactly two PT_LOAD segments: one for text
3761 and one for data. */
3762 segs = 2;
3763
3764 s = bfd_get_section_by_name (abfd, ".interp");
3765 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3766 {
3767 /* If we have a loadable interpreter section, we need a
3768 PT_INTERP segment. In this case, assume we also need a
3769 PT_PHDR segment, although that may not be true for all
3770 targets. */
3771 segs += 2;
3772 }
3773
3774 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3775 {
3776 /* We need a PT_DYNAMIC segment. */
3777 ++segs;
f210dcff 3778 }
08a40648 3779
ceae84aa 3780 if (info != NULL && info->relro)
f210dcff
L
3781 {
3782 /* We need a PT_GNU_RELRO segment. */
3783 ++segs;
8ded5a0f
AM
3784 }
3785
12bd6957 3786 if (elf_eh_frame_hdr (abfd))
8ded5a0f
AM
3787 {
3788 /* We need a PT_GNU_EH_FRAME segment. */
3789 ++segs;
3790 }
3791
12bd6957 3792 if (elf_stack_flags (abfd))
8ded5a0f 3793 {
2b05f1b7
L
3794 /* We need a PT_GNU_STACK segment. */
3795 ++segs;
3796 }
94b11780 3797
2b05f1b7
L
3798 for (s = abfd->sections; s != NULL; s = s->next)
3799 {
8ded5a0f 3800 if ((s->flags & SEC_LOAD) != 0
0112cd26 3801 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3802 {
3803 /* We need a PT_NOTE segment. */
3804 ++segs;
1c5265b5
JJ
3805 /* Try to create just one PT_NOTE segment
3806 for all adjacent loadable .note* sections.
3807 gABI requires that within a PT_NOTE segment
3808 (and also inside of each SHT_NOTE section)
3809 each note is padded to a multiple of 4 size,
3810 so we check whether the sections are correctly
3811 aligned. */
3812 if (s->alignment_power == 2)
3813 while (s->next != NULL
3814 && s->next->alignment_power == 2
3815 && (s->next->flags & SEC_LOAD) != 0
3816 && CONST_STRNEQ (s->next->name, ".note"))
3817 s = s->next;
8ded5a0f
AM
3818 }
3819 }
3820
3821 for (s = abfd->sections; s != NULL; s = s->next)
3822 {
3823 if (s->flags & SEC_THREAD_LOCAL)
3824 {
3825 /* We need a PT_TLS segment. */
3826 ++segs;
3827 break;
3828 }
3829 }
3830
3831 /* Let the backend count up any program headers it might need. */
2b05f1b7 3832 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
3833 if (bed->elf_backend_additional_program_headers)
3834 {
3835 int a;
3836
3837 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3838 if (a == -1)
3839 abort ();
3840 segs += a;
3841 }
3842
3843 return segs * bed->s->sizeof_phdr;
3844}
3845
2ea37f1c
NC
3846/* Find the segment that contains the output_section of section. */
3847
3848Elf_Internal_Phdr *
3849_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
3850{
3851 struct elf_segment_map *m;
3852 Elf_Internal_Phdr *p;
3853
12bd6957 3854 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
2ea37f1c
NC
3855 m != NULL;
3856 m = m->next, p++)
3857 {
3858 int i;
3859
3860 for (i = m->count - 1; i >= 0; i--)
3861 if (m->sections[i] == section)
3862 return p;
3863 }
3864
3865 return NULL;
3866}
3867
252b5132
RH
3868/* Create a mapping from a set of sections to a program segment. */
3869
217aa764
AM
3870static struct elf_segment_map *
3871make_mapping (bfd *abfd,
3872 asection **sections,
3873 unsigned int from,
3874 unsigned int to,
3875 bfd_boolean phdr)
252b5132
RH
3876{
3877 struct elf_segment_map *m;
3878 unsigned int i;
3879 asection **hdrpp;
dc810e39 3880 bfd_size_type amt;
252b5132 3881
dc810e39
AM
3882 amt = sizeof (struct elf_segment_map);
3883 amt += (to - from - 1) * sizeof (asection *);
a50b1753 3884 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
3885 if (m == NULL)
3886 return NULL;
3887 m->next = NULL;
3888 m->p_type = PT_LOAD;
3889 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3890 m->sections[i - from] = *hdrpp;
3891 m->count = to - from;
3892
3893 if (from == 0 && phdr)
3894 {
3895 /* Include the headers in the first PT_LOAD segment. */
3896 m->includes_filehdr = 1;
3897 m->includes_phdrs = 1;
3898 }
3899
3900 return m;
3901}
3902
229fcec5
MM
3903/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3904 on failure. */
3905
3906struct elf_segment_map *
3907_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3908{
3909 struct elf_segment_map *m;
3910
a50b1753
NC
3911 m = (struct elf_segment_map *) bfd_zalloc (abfd,
3912 sizeof (struct elf_segment_map));
229fcec5
MM
3913 if (m == NULL)
3914 return NULL;
3915 m->next = NULL;
3916 m->p_type = PT_DYNAMIC;
3917 m->count = 1;
3918 m->sections[0] = dynsec;
08a40648 3919
229fcec5
MM
3920 return m;
3921}
3922
8ded5a0f 3923/* Possibly add or remove segments from the segment map. */
252b5132 3924
b34976b6 3925static bfd_boolean
3dea8fca
AM
3926elf_modify_segment_map (bfd *abfd,
3927 struct bfd_link_info *info,
3928 bfd_boolean remove_empty_load)
252b5132 3929{
252e386e 3930 struct elf_segment_map **m;
8ded5a0f 3931 const struct elf_backend_data *bed;
252b5132 3932
8ded5a0f
AM
3933 /* The placement algorithm assumes that non allocated sections are
3934 not in PT_LOAD segments. We ensure this here by removing such
3935 sections from the segment map. We also remove excluded
252e386e
AM
3936 sections. Finally, any PT_LOAD segment without sections is
3937 removed. */
12bd6957 3938 m = &elf_seg_map (abfd);
252e386e 3939 while (*m)
8ded5a0f
AM
3940 {
3941 unsigned int i, new_count;
252b5132 3942
252e386e 3943 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3944 {
252e386e
AM
3945 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3946 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3947 || (*m)->p_type != PT_LOAD))
8ded5a0f 3948 {
252e386e
AM
3949 (*m)->sections[new_count] = (*m)->sections[i];
3950 new_count++;
8ded5a0f
AM
3951 }
3952 }
252e386e 3953 (*m)->count = new_count;
252b5132 3954
3dea8fca 3955 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
3956 *m = (*m)->next;
3957 else
3958 m = &(*m)->next;
8ded5a0f 3959 }
252b5132 3960
8ded5a0f
AM
3961 bed = get_elf_backend_data (abfd);
3962 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3963 {
252e386e 3964 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3965 return FALSE;
252b5132 3966 }
252b5132 3967
8ded5a0f
AM
3968 return TRUE;
3969}
252b5132 3970
8ded5a0f 3971/* Set up a mapping from BFD sections to program segments. */
252b5132 3972
8ded5a0f
AM
3973bfd_boolean
3974_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3975{
3976 unsigned int count;
3977 struct elf_segment_map *m;
3978 asection **sections = NULL;
3979 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 3980 bfd_boolean no_user_phdrs;
252b5132 3981
12bd6957 3982 no_user_phdrs = elf_seg_map (abfd) == NULL;
d324f6d6
RM
3983
3984 if (info != NULL)
3985 info->user_phdrs = !no_user_phdrs;
3986
3dea8fca 3987 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 3988 {
8ded5a0f
AM
3989 asection *s;
3990 unsigned int i;
3991 struct elf_segment_map *mfirst;
3992 struct elf_segment_map **pm;
3993 asection *last_hdr;
3994 bfd_vma last_size;
3995 unsigned int phdr_index;
3996 bfd_vma maxpagesize;
3997 asection **hdrpp;
3998 bfd_boolean phdr_in_segment = TRUE;
3999 bfd_boolean writable;
4000 int tls_count = 0;
4001 asection *first_tls = NULL;
4002 asection *dynsec, *eh_frame_hdr;
4003 bfd_size_type amt;
8d06853e 4004 bfd_vma addr_mask, wrap_to = 0;
252b5132 4005
8ded5a0f 4006 /* Select the allocated sections, and sort them. */
252b5132 4007
a50b1753
NC
4008 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
4009 sizeof (asection *));
8ded5a0f 4010 if (sections == NULL)
252b5132 4011 goto error_return;
252b5132 4012
8d06853e
AM
4013 /* Calculate top address, avoiding undefined behaviour of shift
4014 left operator when shift count is equal to size of type
4015 being shifted. */
4016 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4017 addr_mask = (addr_mask << 1) + 1;
4018
8ded5a0f
AM
4019 i = 0;
4020 for (s = abfd->sections; s != NULL; s = s->next)
4021 {
4022 if ((s->flags & SEC_ALLOC) != 0)
4023 {
4024 sections[i] = s;
4025 ++i;
8d06853e
AM
4026 /* A wrapping section potentially clashes with header. */
4027 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
4028 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
4029 }
4030 }
4031 BFD_ASSERT (i <= bfd_count_sections (abfd));
4032 count = i;
252b5132 4033
8ded5a0f 4034 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 4035
8ded5a0f 4036 /* Build the mapping. */
252b5132 4037
8ded5a0f
AM
4038 mfirst = NULL;
4039 pm = &mfirst;
252b5132 4040
8ded5a0f
AM
4041 /* If we have a .interp section, then create a PT_PHDR segment for
4042 the program headers and a PT_INTERP segment for the .interp
4043 section. */
4044 s = bfd_get_section_by_name (abfd, ".interp");
4045 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4046 {
4047 amt = sizeof (struct elf_segment_map);
a50b1753 4048 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4049 if (m == NULL)
4050 goto error_return;
4051 m->next = NULL;
4052 m->p_type = PT_PHDR;
4053 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
4054 m->p_flags = PF_R | PF_X;
4055 m->p_flags_valid = 1;
4056 m->includes_phdrs = 1;
252b5132 4057
8ded5a0f
AM
4058 *pm = m;
4059 pm = &m->next;
252b5132 4060
8ded5a0f 4061 amt = sizeof (struct elf_segment_map);
a50b1753 4062 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4063 if (m == NULL)
4064 goto error_return;
4065 m->next = NULL;
4066 m->p_type = PT_INTERP;
4067 m->count = 1;
4068 m->sections[0] = s;
4069
4070 *pm = m;
4071 pm = &m->next;
252b5132 4072 }
8ded5a0f
AM
4073
4074 /* Look through the sections. We put sections in the same program
4075 segment when the start of the second section can be placed within
4076 a few bytes of the end of the first section. */
4077 last_hdr = NULL;
4078 last_size = 0;
4079 phdr_index = 0;
4080 maxpagesize = bed->maxpagesize;
063bb025
NC
4081 /* PR 17512: file: c8455299.
4082 Avoid divide-by-zero errors later on.
4083 FIXME: Should we abort if the maxpagesize is zero ? */
4084 if (maxpagesize == 0)
4085 maxpagesize = 1;
8ded5a0f
AM
4086 writable = FALSE;
4087 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4088 if (dynsec != NULL
4089 && (dynsec->flags & SEC_LOAD) == 0)
4090 dynsec = NULL;
4091
4092 /* Deal with -Ttext or something similar such that the first section
4093 is not adjacent to the program headers. This is an
4094 approximation, since at this point we don't know exactly how many
4095 program headers we will need. */
4096 if (count > 0)
252b5132 4097 {
12bd6957 4098 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 4099
62d7a5f6 4100 if (phdr_size == (bfd_size_type) -1)
8ded5a0f 4101 phdr_size = get_program_header_size (abfd, info);
d2bcb0d1 4102 phdr_size += bed->s->sizeof_ehdr;
8ded5a0f 4103 if ((abfd->flags & D_PAGED) == 0
8d06853e
AM
4104 || (sections[0]->lma & addr_mask) < phdr_size
4105 || ((sections[0]->lma & addr_mask) % maxpagesize
4106 < phdr_size % maxpagesize)
4107 || (sections[0]->lma & addr_mask & -maxpagesize) < wrap_to)
8ded5a0f 4108 phdr_in_segment = FALSE;
252b5132
RH
4109 }
4110
8ded5a0f 4111 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 4112 {
8ded5a0f
AM
4113 asection *hdr;
4114 bfd_boolean new_segment;
4115
4116 hdr = *hdrpp;
4117
4118 /* See if this section and the last one will fit in the same
4119 segment. */
4120
4121 if (last_hdr == NULL)
4122 {
4123 /* If we don't have a segment yet, then we don't need a new
4124 one (we build the last one after this loop). */
4125 new_segment = FALSE;
4126 }
4127 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4128 {
4129 /* If this section has a different relation between the
4130 virtual address and the load address, then we need a new
4131 segment. */
4132 new_segment = TRUE;
4133 }
b5599592
AM
4134 else if (hdr->lma < last_hdr->lma + last_size
4135 || last_hdr->lma + last_size < last_hdr->lma)
4136 {
4137 /* If this section has a load address that makes it overlap
4138 the previous section, then we need a new segment. */
4139 new_segment = TRUE;
4140 }
39948a60
NC
4141 /* In the next test we have to be careful when last_hdr->lma is close
4142 to the end of the address space. If the aligned address wraps
4143 around to the start of the address space, then there are no more
4144 pages left in memory and it is OK to assume that the current
4145 section can be included in the current segment. */
4146 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4147 > last_hdr->lma)
4148 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 4149 <= hdr->lma))
8ded5a0f
AM
4150 {
4151 /* If putting this section in this segment would force us to
4152 skip a page in the segment, then we need a new segment. */
4153 new_segment = TRUE;
4154 }
4155 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
4156 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
4157 {
4158 /* We don't want to put a loadable section after a
4159 nonloadable section in the same segment.
4160 Consider .tbss sections as loadable for this purpose. */
4161 new_segment = TRUE;
4162 }
4163 else if ((abfd->flags & D_PAGED) == 0)
4164 {
4165 /* If the file is not demand paged, which means that we
4166 don't require the sections to be correctly aligned in the
4167 file, then there is no other reason for a new segment. */
4168 new_segment = FALSE;
4169 }
4170 else if (! writable
4171 && (hdr->flags & SEC_READONLY) == 0
8d06853e
AM
4172 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4173 != (hdr->lma & -maxpagesize)))
8ded5a0f
AM
4174 {
4175 /* We don't want to put a writable section in a read only
4176 segment, unless they are on the same page in memory
4177 anyhow. We already know that the last section does not
4178 bring us past the current section on the page, so the
4179 only case in which the new section is not on the same
4180 page as the previous section is when the previous section
4181 ends precisely on a page boundary. */
4182 new_segment = TRUE;
4183 }
4184 else
4185 {
4186 /* Otherwise, we can use the same segment. */
4187 new_segment = FALSE;
4188 }
4189
2889e75b 4190 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
4191 if (last_hdr != NULL
4192 && info != NULL
4193 && info->callbacks->override_segment_assignment != NULL)
4194 new_segment
4195 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4196 last_hdr,
4197 new_segment);
2889e75b 4198
8ded5a0f
AM
4199 if (! new_segment)
4200 {
4201 if ((hdr->flags & SEC_READONLY) == 0)
4202 writable = TRUE;
4203 last_hdr = hdr;
4204 /* .tbss sections effectively have zero size. */
4205 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4206 != SEC_THREAD_LOCAL)
4207 last_size = hdr->size;
4208 else
4209 last_size = 0;
4210 continue;
4211 }
4212
4213 /* We need a new program segment. We must create a new program
4214 header holding all the sections from phdr_index until hdr. */
4215
4216 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4217 if (m == NULL)
4218 goto error_return;
4219
4220 *pm = m;
4221 pm = &m->next;
4222
252b5132 4223 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 4224 writable = TRUE;
8ded5a0f
AM
4225 else
4226 writable = FALSE;
4227
baaff79e
JJ
4228 last_hdr = hdr;
4229 /* .tbss sections effectively have zero size. */
e5caec89 4230 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 4231 last_size = hdr->size;
baaff79e
JJ
4232 else
4233 last_size = 0;
8ded5a0f
AM
4234 phdr_index = i;
4235 phdr_in_segment = FALSE;
252b5132
RH
4236 }
4237
86b2281f
AM
4238 /* Create a final PT_LOAD program segment, but not if it's just
4239 for .tbss. */
4240 if (last_hdr != NULL
4241 && (i - phdr_index != 1
4242 || ((last_hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4243 != SEC_THREAD_LOCAL)))
8ded5a0f
AM
4244 {
4245 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4246 if (m == NULL)
4247 goto error_return;
252b5132 4248
8ded5a0f
AM
4249 *pm = m;
4250 pm = &m->next;
4251 }
252b5132 4252
8ded5a0f
AM
4253 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4254 if (dynsec != NULL)
4255 {
4256 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4257 if (m == NULL)
4258 goto error_return;
4259 *pm = m;
4260 pm = &m->next;
4261 }
252b5132 4262
1c5265b5
JJ
4263 /* For each batch of consecutive loadable .note sections,
4264 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4265 because if we link together nonloadable .note sections and
4266 loadable .note sections, we will generate two .note sections
4267 in the output file. FIXME: Using names for section types is
4268 bogus anyhow. */
8ded5a0f
AM
4269 for (s = abfd->sections; s != NULL; s = s->next)
4270 {
4271 if ((s->flags & SEC_LOAD) != 0
0112cd26 4272 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 4273 {
1c5265b5 4274 asection *s2;
91d6fa6a
NC
4275
4276 count = 1;
8ded5a0f 4277 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
4278 if (s->alignment_power == 2)
4279 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
4280 {
4281 if (s2->next->alignment_power == 2
4282 && (s2->next->flags & SEC_LOAD) != 0
4283 && CONST_STRNEQ (s2->next->name, ".note")
8d06853e
AM
4284 && align_power (s2->lma + s2->size, 2)
4285 == s2->next->lma)
55b581a6
JJ
4286 count++;
4287 else
4288 break;
4289 }
1c5265b5 4290 amt += (count - 1) * sizeof (asection *);
a50b1753 4291 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4292 if (m == NULL)
4293 goto error_return;
4294 m->next = NULL;
4295 m->p_type = PT_NOTE;
1c5265b5
JJ
4296 m->count = count;
4297 while (count > 1)
4298 {
4299 m->sections[m->count - count--] = s;
4300 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
4301 s = s->next;
4302 }
4303 m->sections[m->count - 1] = s;
4304 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
4305 *pm = m;
4306 pm = &m->next;
4307 }
4308 if (s->flags & SEC_THREAD_LOCAL)
4309 {
4310 if (! tls_count)
4311 first_tls = s;
4312 tls_count++;
4313 }
4314 }
252b5132 4315
8ded5a0f
AM
4316 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
4317 if (tls_count > 0)
4318 {
8ded5a0f
AM
4319 amt = sizeof (struct elf_segment_map);
4320 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 4321 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4322 if (m == NULL)
4323 goto error_return;
4324 m->next = NULL;
4325 m->p_type = PT_TLS;
4326 m->count = tls_count;
4327 /* Mandated PF_R. */
4328 m->p_flags = PF_R;
4329 m->p_flags_valid = 1;
d923cae0 4330 s = first_tls;
91d6fa6a 4331 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f 4332 {
d923cae0
L
4333 if ((s->flags & SEC_THREAD_LOCAL) == 0)
4334 {
4335 _bfd_error_handler
4336 (_("%B: TLS sections are not adjacent:"), abfd);
4337 s = first_tls;
4338 i = 0;
4339 while (i < (unsigned int) tls_count)
4340 {
4341 if ((s->flags & SEC_THREAD_LOCAL) != 0)
4342 {
4343 _bfd_error_handler (_(" TLS: %A"), s);
4344 i++;
4345 }
4346 else
4347 _bfd_error_handler (_(" non-TLS: %A"), s);
4348 s = s->next;
4349 }
4350 bfd_set_error (bfd_error_bad_value);
4351 goto error_return;
4352 }
4353 m->sections[i] = s;
4354 s = s->next;
8ded5a0f 4355 }
252b5132 4356
8ded5a0f
AM
4357 *pm = m;
4358 pm = &m->next;
4359 }
252b5132 4360
8ded5a0f
AM
4361 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4362 segment. */
12bd6957 4363 eh_frame_hdr = elf_eh_frame_hdr (abfd);
8ded5a0f
AM
4364 if (eh_frame_hdr != NULL
4365 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 4366 {
dc810e39 4367 amt = sizeof (struct elf_segment_map);
a50b1753 4368 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4369 if (m == NULL)
4370 goto error_return;
4371 m->next = NULL;
8ded5a0f 4372 m->p_type = PT_GNU_EH_FRAME;
252b5132 4373 m->count = 1;
8ded5a0f 4374 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
4375
4376 *pm = m;
4377 pm = &m->next;
4378 }
13ae64f3 4379
12bd6957 4380 if (elf_stack_flags (abfd))
13ae64f3 4381 {
8ded5a0f 4382 amt = sizeof (struct elf_segment_map);
a50b1753 4383 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4384 if (m == NULL)
4385 goto error_return;
4386 m->next = NULL;
2b05f1b7 4387 m->p_type = PT_GNU_STACK;
12bd6957 4388 m->p_flags = elf_stack_flags (abfd);
04c3a755 4389 m->p_align = bed->stack_align;
8ded5a0f 4390 m->p_flags_valid = 1;
04c3a755
NS
4391 m->p_align_valid = m->p_align != 0;
4392 if (info->stacksize > 0)
4393 {
4394 m->p_size = info->stacksize;
4395 m->p_size_valid = 1;
4396 }
252b5132 4397
8ded5a0f
AM
4398 *pm = m;
4399 pm = &m->next;
4400 }
65765700 4401
ceae84aa 4402 if (info != NULL && info->relro)
8ded5a0f 4403 {
f210dcff
L
4404 for (m = mfirst; m != NULL; m = m->next)
4405 {
3832a4d8
AM
4406 if (m->p_type == PT_LOAD
4407 && m->count != 0
4408 && m->sections[0]->vma >= info->relro_start
4409 && m->sections[0]->vma < info->relro_end)
f210dcff 4410 {
3832a4d8
AM
4411 i = m->count;
4412 while (--i != (unsigned) -1)
4413 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
4414 == (SEC_LOAD | SEC_HAS_CONTENTS))
4415 break;
4416
43a8475c 4417 if (i != (unsigned) -1)
f210dcff
L
4418 break;
4419 }
be01b344 4420 }
f210dcff
L
4421
4422 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
4423 if (m != NULL)
4424 {
4425 amt = sizeof (struct elf_segment_map);
a50b1753 4426 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
4427 if (m == NULL)
4428 goto error_return;
4429 m->next = NULL;
4430 m->p_type = PT_GNU_RELRO;
4431 m->p_flags = PF_R;
4432 m->p_flags_valid = 1;
4433
4434 *pm = m;
4435 pm = &m->next;
4436 }
8ded5a0f 4437 }
9ee5e499 4438
8ded5a0f 4439 free (sections);
12bd6957 4440 elf_seg_map (abfd) = mfirst;
9ee5e499
JJ
4441 }
4442
3dea8fca 4443 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 4444 return FALSE;
8c37241b 4445
12bd6957 4446 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
8ded5a0f 4447 ++count;
12bd6957 4448 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
252b5132 4449
b34976b6 4450 return TRUE;
252b5132
RH
4451
4452 error_return:
4453 if (sections != NULL)
4454 free (sections);
b34976b6 4455 return FALSE;
252b5132
RH
4456}
4457
4458/* Sort sections by address. */
4459
4460static int
217aa764 4461elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4462{
4463 const asection *sec1 = *(const asection **) arg1;
4464 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4465 bfd_size_type size1, size2;
252b5132
RH
4466
4467 /* Sort by LMA first, since this is the address used to
4468 place the section into a segment. */
4469 if (sec1->lma < sec2->lma)
4470 return -1;
4471 else if (sec1->lma > sec2->lma)
4472 return 1;
4473
4474 /* Then sort by VMA. Normally the LMA and the VMA will be
4475 the same, and this will do nothing. */
4476 if (sec1->vma < sec2->vma)
4477 return -1;
4478 else if (sec1->vma > sec2->vma)
4479 return 1;
4480
4481 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4482
07c6e936 4483#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4484
4485 if (TOEND (sec1))
4486 {
4487 if (TOEND (sec2))
00a7cdc5
NC
4488 {
4489 /* If the indicies are the same, do not return 0
4490 here, but continue to try the next comparison. */
4491 if (sec1->target_index - sec2->target_index != 0)
4492 return sec1->target_index - sec2->target_index;
4493 }
252b5132
RH
4494 else
4495 return 1;
4496 }
00a7cdc5 4497 else if (TOEND (sec2))
252b5132
RH
4498 return -1;
4499
4500#undef TOEND
4501
00a7cdc5
NC
4502 /* Sort by size, to put zero sized sections
4503 before others at the same address. */
252b5132 4504
eea6121a
AM
4505 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4506 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4507
4508 if (size1 < size2)
252b5132 4509 return -1;
eecdbe52 4510 if (size1 > size2)
252b5132
RH
4511 return 1;
4512
4513 return sec1->target_index - sec2->target_index;
4514}
4515
340b6d91
AC
4516/* Ian Lance Taylor writes:
4517
4518 We shouldn't be using % with a negative signed number. That's just
4519 not good. We have to make sure either that the number is not
4520 negative, or that the number has an unsigned type. When the types
4521 are all the same size they wind up as unsigned. When file_ptr is a
4522 larger signed type, the arithmetic winds up as signed long long,
4523 which is wrong.
4524
4525 What we're trying to say here is something like ``increase OFF by
4526 the least amount that will cause it to be equal to the VMA modulo
4527 the page size.'' */
4528/* In other words, something like:
4529
4530 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4531 off_offset = off % bed->maxpagesize;
4532 if (vma_offset < off_offset)
4533 adjustment = vma_offset + bed->maxpagesize - off_offset;
4534 else
4535 adjustment = vma_offset - off_offset;
08a40648 4536
340b6d91
AC
4537 which can can be collapsed into the expression below. */
4538
4539static file_ptr
4540vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4541{
dc9155b2
NC
4542 /* PR binutils/16199: Handle an alignment of zero. */
4543 if (maxpagesize == 0)
4544 maxpagesize = 1;
340b6d91
AC
4545 return ((vma - off) % maxpagesize);
4546}
4547
6d33f217
L
4548static void
4549print_segment_map (const struct elf_segment_map *m)
4550{
4551 unsigned int j;
4552 const char *pt = get_segment_type (m->p_type);
4553 char buf[32];
4554
4555 if (pt == NULL)
4556 {
4557 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4558 sprintf (buf, "LOPROC+%7.7x",
4559 (unsigned int) (m->p_type - PT_LOPROC));
4560 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4561 sprintf (buf, "LOOS+%7.7x",
4562 (unsigned int) (m->p_type - PT_LOOS));
4563 else
4564 snprintf (buf, sizeof (buf), "%8.8x",
4565 (unsigned int) m->p_type);
4566 pt = buf;
4567 }
4a97a0e5 4568 fflush (stdout);
6d33f217
L
4569 fprintf (stderr, "%s:", pt);
4570 for (j = 0; j < m->count; j++)
4571 fprintf (stderr, " %s", m->sections [j]->name);
4572 putc ('\n',stderr);
4a97a0e5 4573 fflush (stderr);
6d33f217
L
4574}
4575
32812159
AM
4576static bfd_boolean
4577write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
4578{
4579 void *buf;
4580 bfd_boolean ret;
4581
4582 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
4583 return FALSE;
4584 buf = bfd_zmalloc (len);
4585 if (buf == NULL)
4586 return FALSE;
4587 ret = bfd_bwrite (buf, len, abfd) == len;
4588 free (buf);
4589 return ret;
4590}
4591
252b5132
RH
4592/* Assign file positions to the sections based on the mapping from
4593 sections to segments. This function also sets up some fields in
f3520d2f 4594 the file header. */
252b5132 4595
b34976b6 4596static bfd_boolean
f3520d2f
AM
4597assign_file_positions_for_load_sections (bfd *abfd,
4598 struct bfd_link_info *link_info)
252b5132
RH
4599{
4600 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4601 struct elf_segment_map *m;
252b5132 4602 Elf_Internal_Phdr *phdrs;
252b5132 4603 Elf_Internal_Phdr *p;
02bf8d82 4604 file_ptr off;
3f570048 4605 bfd_size_type maxpagesize;
f3520d2f 4606 unsigned int alloc;
0920dee7 4607 unsigned int i, j;
2b0bc088 4608 bfd_vma header_pad = 0;
252b5132 4609
e36284ab 4610 if (link_info == NULL
ceae84aa 4611 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 4612 return FALSE;
252b5132 4613
8ded5a0f 4614 alloc = 0;
12bd6957 4615 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
2b0bc088
NC
4616 {
4617 ++alloc;
4618 if (m->header_size)
4619 header_pad = m->header_size;
4620 }
252b5132 4621
82f2dbf7
NC
4622 if (alloc)
4623 {
4624 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4625 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4626 }
4627 else
4628 {
4629 /* PR binutils/12467. */
4630 elf_elfheader (abfd)->e_phoff = 0;
4631 elf_elfheader (abfd)->e_phentsize = 0;
4632 }
d324f6d6 4633
8ded5a0f 4634 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4635
12bd6957
AM
4636 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
4637 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
8ded5a0f 4638 else
12bd6957 4639 BFD_ASSERT (elf_program_header_size (abfd)
59e0647f 4640 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4641
4642 if (alloc == 0)
f3520d2f 4643 {
12bd6957 4644 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
8ded5a0f 4645 return TRUE;
f3520d2f 4646 }
252b5132 4647
12bd6957 4648 /* We're writing the size in elf_program_header_size (abfd),
57268894
HPN
4649 see assign_file_positions_except_relocs, so make sure we have
4650 that amount allocated, with trailing space cleared.
12bd6957
AM
4651 The variable alloc contains the computed need, while
4652 elf_program_header_size (abfd) contains the size used for the
57268894
HPN
4653 layout.
4654 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
4655 where the layout is forced to according to a larger size in the
4656 last iterations for the testcase ld-elf/header. */
12bd6957 4657 BFD_ASSERT (elf_program_header_size (abfd) % bed->s->sizeof_phdr
57268894 4658 == 0);
a50b1753
NC
4659 phdrs = (Elf_Internal_Phdr *)
4660 bfd_zalloc2 (abfd,
12bd6957 4661 (elf_program_header_size (abfd) / bed->s->sizeof_phdr),
a50b1753 4662 sizeof (Elf_Internal_Phdr));
f3520d2f 4663 elf_tdata (abfd)->phdr = phdrs;
252b5132 4664 if (phdrs == NULL)
b34976b6 4665 return FALSE;
252b5132 4666
3f570048
AM
4667 maxpagesize = 1;
4668 if ((abfd->flags & D_PAGED) != 0)
4669 maxpagesize = bed->maxpagesize;
4670
252b5132
RH
4671 off = bed->s->sizeof_ehdr;
4672 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4673 if (header_pad < (bfd_vma) off)
4674 header_pad = 0;
4675 else
4676 header_pad -= off;
4677 off += header_pad;
252b5132 4678
12bd6957 4679 for (m = elf_seg_map (abfd), p = phdrs, j = 0;
252b5132 4680 m != NULL;
0920dee7 4681 m = m->next, p++, j++)
252b5132 4682 {
252b5132 4683 asection **secpp;
bf988460
AM
4684 bfd_vma off_adjust;
4685 bfd_boolean no_contents;
252b5132
RH
4686
4687 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4688 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4689 not be done to the PT_NOTE section of a corefile, which may
4690 contain several pseudo-sections artificially created by bfd.
4691 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4692 if (m->count > 1
4693 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4694 && m->p_type == PT_NOTE))
252b5132
RH
4695 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4696 elf_sort_sections);
4697
b301b248
AM
4698 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4699 number of sections with contents contributing to both p_filesz
4700 and p_memsz, followed by a number of sections with no contents
4701 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4702 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4703 p->p_type = m->p_type;
28a7f3e7 4704 p->p_flags = m->p_flags;
252b5132 4705
3f570048
AM
4706 if (m->count == 0)
4707 p->p_vaddr = 0;
4708 else
3271a814 4709 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4710
4711 if (m->p_paddr_valid)
4712 p->p_paddr = m->p_paddr;
4713 else if (m->count == 0)
4714 p->p_paddr = 0;
4715 else
08a40648 4716 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4717
4718 if (p->p_type == PT_LOAD
4719 && (abfd->flags & D_PAGED) != 0)
4720 {
4721 /* p_align in demand paged PT_LOAD segments effectively stores
4722 the maximum page size. When copying an executable with
4723 objcopy, we set m->p_align from the input file. Use this
4724 value for maxpagesize rather than bed->maxpagesize, which
4725 may be different. Note that we use maxpagesize for PT_TLS
4726 segment alignment later in this function, so we are relying
4727 on at least one PT_LOAD segment appearing before a PT_TLS
4728 segment. */
4729 if (m->p_align_valid)
4730 maxpagesize = m->p_align;
4731
4732 p->p_align = maxpagesize;
4733 }
3271a814
NS
4734 else if (m->p_align_valid)
4735 p->p_align = m->p_align;
e970b90a
DJ
4736 else if (m->count == 0)
4737 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4738 else
4739 p->p_align = 0;
4740
bf988460
AM
4741 no_contents = FALSE;
4742 off_adjust = 0;
252b5132 4743 if (p->p_type == PT_LOAD
b301b248 4744 && m->count > 0)
252b5132 4745 {
b301b248 4746 bfd_size_type align;
a49e53ed 4747 unsigned int align_power = 0;
b301b248 4748
3271a814
NS
4749 if (m->p_align_valid)
4750 align = p->p_align;
4751 else
252b5132 4752 {
3271a814
NS
4753 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4754 {
4755 unsigned int secalign;
08a40648 4756
3271a814
NS
4757 secalign = bfd_get_section_alignment (abfd, *secpp);
4758 if (secalign > align_power)
4759 align_power = secalign;
4760 }
4761 align = (bfd_size_type) 1 << align_power;
4762 if (align < maxpagesize)
4763 align = maxpagesize;
b301b248 4764 }
252b5132 4765
02bf8d82
AM
4766 for (i = 0; i < m->count; i++)
4767 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4768 /* If we aren't making room for this section, then
4769 it must be SHT_NOBITS regardless of what we've
4770 set via struct bfd_elf_special_section. */
4771 elf_section_type (m->sections[i]) = SHT_NOBITS;
4772
bf988460 4773 /* Find out whether this segment contains any loadable
aea274d3
AM
4774 sections. */
4775 no_contents = TRUE;
4776 for (i = 0; i < m->count; i++)
4777 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
4778 {
4779 no_contents = FALSE;
4780 break;
4781 }
bf988460 4782
85cfcbfb 4783 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
bf988460
AM
4784 off += off_adjust;
4785 if (no_contents)
4786 {
4787 /* We shouldn't need to align the segment on disk since
4788 the segment doesn't need file space, but the gABI
4789 arguably requires the alignment and glibc ld.so
4790 checks it. So to comply with the alignment
4791 requirement but not waste file space, we adjust
4792 p_offset for just this segment. (OFF_ADJUST is
4793 subtracted from OFF later.) This may put p_offset
4794 past the end of file, but that shouldn't matter. */
4795 }
4796 else
4797 off_adjust = 0;
252b5132 4798 }
b1a6d0b1
NC
4799 /* Make sure the .dynamic section is the first section in the
4800 PT_DYNAMIC segment. */
4801 else if (p->p_type == PT_DYNAMIC
4802 && m->count > 1
4803 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4804 {
4805 _bfd_error_handler
b301b248
AM
4806 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4807 abfd);
b1a6d0b1
NC
4808 bfd_set_error (bfd_error_bad_value);
4809 return FALSE;
4810 }
3f001e84
JK
4811 /* Set the note section type to SHT_NOTE. */
4812 else if (p->p_type == PT_NOTE)
4813 for (i = 0; i < m->count; i++)
4814 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 4815
252b5132
RH
4816 p->p_offset = 0;
4817 p->p_filesz = 0;
4818 p->p_memsz = 0;
4819
4820 if (m->includes_filehdr)
4821 {
bf988460 4822 if (!m->p_flags_valid)
252b5132 4823 p->p_flags |= PF_R;
252b5132
RH
4824 p->p_filesz = bed->s->sizeof_ehdr;
4825 p->p_memsz = bed->s->sizeof_ehdr;
4826 if (m->count > 0)
4827 {
252b5132
RH
4828 if (p->p_vaddr < (bfd_vma) off)
4829 {
caf47ea6 4830 (*_bfd_error_handler)
b301b248
AM
4831 (_("%B: Not enough room for program headers, try linking with -N"),
4832 abfd);
252b5132 4833 bfd_set_error (bfd_error_bad_value);
b34976b6 4834 return FALSE;
252b5132
RH
4835 }
4836
4837 p->p_vaddr -= off;
bf988460 4838 if (!m->p_paddr_valid)
252b5132
RH
4839 p->p_paddr -= off;
4840 }
252b5132
RH
4841 }
4842
4843 if (m->includes_phdrs)
4844 {
bf988460 4845 if (!m->p_flags_valid)
252b5132
RH
4846 p->p_flags |= PF_R;
4847
f3520d2f 4848 if (!m->includes_filehdr)
252b5132
RH
4849 {
4850 p->p_offset = bed->s->sizeof_ehdr;
4851
4852 if (m->count > 0)
4853 {
252b5132 4854 p->p_vaddr -= off - p->p_offset;
bf988460 4855 if (!m->p_paddr_valid)
252b5132
RH
4856 p->p_paddr -= off - p->p_offset;
4857 }
252b5132
RH
4858 }
4859
4860 p->p_filesz += alloc * bed->s->sizeof_phdr;
4861 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4862 if (m->count)
4863 {
4864 p->p_filesz += header_pad;
4865 p->p_memsz += header_pad;
4866 }
252b5132
RH
4867 }
4868
4869 if (p->p_type == PT_LOAD
4870 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4871 {
bf988460 4872 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 4873 p->p_offset = off;
252b5132
RH
4874 else
4875 {
4876 file_ptr adjust;
4877
4878 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
4879 if (!no_contents)
4880 p->p_filesz += adjust;
252b5132
RH
4881 p->p_memsz += adjust;
4882 }
4883 }
4884
1ea63fd2
AM
4885 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4886 maps. Set filepos for sections in PT_LOAD segments, and in
4887 core files, for sections in PT_NOTE segments.
4888 assign_file_positions_for_non_load_sections will set filepos
4889 for other sections and update p_filesz for other segments. */
252b5132
RH
4890 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4891 {
4892 asection *sec;
252b5132 4893 bfd_size_type align;
627b32bc 4894 Elf_Internal_Shdr *this_hdr;
252b5132
RH
4895
4896 sec = *secpp;
02bf8d82 4897 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 4898 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4899
88967714
AM
4900 if ((p->p_type == PT_LOAD
4901 || p->p_type == PT_TLS)
4902 && (this_hdr->sh_type != SHT_NOBITS
4903 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
4904 && ((this_hdr->sh_flags & SHF_TLS) == 0
4905 || p->p_type == PT_TLS))))
252b5132 4906 {
b5599592
AM
4907 bfd_vma p_start = p->p_paddr;
4908 bfd_vma p_end = p_start + p->p_memsz;
4909 bfd_vma s_start = sec->lma;
4910 bfd_vma adjust = s_start - p_end;
252b5132 4911
a2d1e028
L
4912 if (adjust != 0
4913 && (s_start < p_end
4914 || p_end < p_start))
252b5132 4915 {
88967714 4916 (*_bfd_error_handler)
b5599592
AM
4917 (_("%B: section %A lma %#lx adjusted to %#lx"), abfd, sec,
4918 (unsigned long) s_start, (unsigned long) p_end);
88967714 4919 adjust = 0;
b5599592 4920 sec->lma = p_end;
1cfb7d1e 4921 }
3ac9b6c9 4922 p->p_memsz += adjust;
1cfb7d1e 4923
88967714
AM
4924 if (this_hdr->sh_type != SHT_NOBITS)
4925 {
32812159
AM
4926 if (p->p_filesz + adjust < p->p_memsz)
4927 {
4928 /* We have a PROGBITS section following NOBITS ones.
4929 Allocate file space for the NOBITS section(s) and
4930 zero it. */
4931 adjust = p->p_memsz - p->p_filesz;
4932 if (!write_zeros (abfd, off, adjust))
4933 return FALSE;
4934 }
88967714
AM
4935 off += adjust;
4936 p->p_filesz += adjust;
252b5132 4937 }
252b5132
RH
4938 }
4939
4940 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4941 {
b301b248
AM
4942 /* The section at i == 0 is the one that actually contains
4943 everything. */
4a938328
MS
4944 if (i == 0)
4945 {
627b32bc 4946 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
4947 off += this_hdr->sh_size;
4948 p->p_filesz = this_hdr->sh_size;
b301b248
AM
4949 p->p_memsz = 0;
4950 p->p_align = 1;
252b5132 4951 }
4a938328 4952 else
252b5132 4953 {
b301b248 4954 /* The rest are fake sections that shouldn't be written. */
252b5132 4955 sec->filepos = 0;
eea6121a 4956 sec->size = 0;
b301b248
AM
4957 sec->flags = 0;
4958 continue;
252b5132 4959 }
252b5132
RH
4960 }
4961 else
4962 {
1e951488 4963 if (p->p_type == PT_LOAD)
b301b248 4964 {
1e951488
AM
4965 this_hdr->sh_offset = sec->filepos = off;
4966 if (this_hdr->sh_type != SHT_NOBITS)
4967 off += this_hdr->sh_size;
4968 }
4969 else if (this_hdr->sh_type == SHT_NOBITS
4970 && (this_hdr->sh_flags & SHF_TLS) != 0
4971 && this_hdr->sh_offset == 0)
4972 {
4973 /* This is a .tbss section that didn't get a PT_LOAD.
4974 (See _bfd_elf_map_sections_to_segments "Create a
4975 final PT_LOAD".) Set sh_offset to the value it
4976 would have if we had created a zero p_filesz and
4977 p_memsz PT_LOAD header for the section. This
4978 also makes the PT_TLS header have the same
4979 p_offset value. */
4980 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
4981 off, align);
4982 this_hdr->sh_offset = sec->filepos = off + adjust;
b301b248 4983 }
252b5132 4984
02bf8d82 4985 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 4986 {
6a3cd2b4 4987 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
4988 /* A load section without SHF_ALLOC is something like
4989 a note section in a PT_NOTE segment. These take
4990 file space but are not loaded into memory. */
4991 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 4992 p->p_memsz += this_hdr->sh_size;
b301b248 4993 }
6a3cd2b4 4994 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 4995 {
6a3cd2b4
AM
4996 if (p->p_type == PT_TLS)
4997 p->p_memsz += this_hdr->sh_size;
4998
4999 /* .tbss is special. It doesn't contribute to p_memsz of
5000 normal segments. */
5001 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5002 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
5003 }
5004
b10a8ae0
L
5005 if (align > p->p_align
5006 && !m->p_align_valid
5007 && (p->p_type != PT_LOAD
5008 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
5009 p->p_align = align;
5010 }
5011
bf988460 5012 if (!m->p_flags_valid)
252b5132
RH
5013 {
5014 p->p_flags |= PF_R;
02bf8d82 5015 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 5016 p->p_flags |= PF_X;
02bf8d82 5017 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
5018 p->p_flags |= PF_W;
5019 }
5020 }
43a8475c 5021
bf988460 5022 off -= off_adjust;
0920dee7 5023
7c928300
AM
5024 /* Check that all sections are in a PT_LOAD segment.
5025 Don't check funky gdb generated core files. */
5026 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
5027 {
5028 bfd_boolean check_vma = TRUE;
5029
5030 for (i = 1; i < m->count; i++)
5031 if (m->sections[i]->vma == m->sections[i - 1]->vma
5032 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5033 ->this_hdr), p) != 0
5034 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5035 ->this_hdr), p) != 0)
0920dee7 5036 {
9a83a553
AM
5037 /* Looks like we have overlays packed into the segment. */
5038 check_vma = FALSE;
5039 break;
0920dee7 5040 }
9a83a553
AM
5041
5042 for (i = 0; i < m->count; i++)
5043 {
5044 Elf_Internal_Shdr *this_hdr;
5045 asection *sec;
5046
5047 sec = m->sections[i];
5048 this_hdr = &(elf_section_data(sec)->this_hdr);
86b2281f
AM
5049 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5050 && !ELF_TBSS_SPECIAL (this_hdr, p))
9a83a553
AM
5051 {
5052 (*_bfd_error_handler)
5053 (_("%B: section `%A' can't be allocated in segment %d"),
5054 abfd, sec, j);
5055 print_segment_map (m);
5056 }
5057 }
5058 }
252b5132
RH
5059 }
5060
12bd6957 5061 elf_next_file_pos (abfd) = off;
f3520d2f
AM
5062 return TRUE;
5063}
5064
5065/* Assign file positions for the other sections. */
5066
5067static bfd_boolean
5068assign_file_positions_for_non_load_sections (bfd *abfd,
5069 struct bfd_link_info *link_info)
5070{
5071 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5072 Elf_Internal_Shdr **i_shdrpp;
5073 Elf_Internal_Shdr **hdrpp;
5074 Elf_Internal_Phdr *phdrs;
5075 Elf_Internal_Phdr *p;
5076 struct elf_segment_map *m;
62655c7b 5077 struct elf_segment_map *hdrs_segment;
f3520d2f
AM
5078 bfd_vma filehdr_vaddr, filehdr_paddr;
5079 bfd_vma phdrs_vaddr, phdrs_paddr;
5080 file_ptr off;
5081 unsigned int num_sec;
5082 unsigned int i;
5083 unsigned int count;
5084
5c182d5f
AM
5085 i_shdrpp = elf_elfsections (abfd);
5086 num_sec = elf_numsections (abfd);
12bd6957 5087 off = elf_next_file_pos (abfd);
5c182d5f
AM
5088 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
5089 {
5c182d5f
AM
5090 Elf_Internal_Shdr *hdr;
5091
5092 hdr = *hdrpp;
5093 if (hdr->bfd_section != NULL
252e386e
AM
5094 && (hdr->bfd_section->filepos != 0
5095 || (hdr->sh_type == SHT_NOBITS
5096 && hdr->contents == NULL)))
627b32bc 5097 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
5098 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
5099 {
e8d2ba53
AM
5100 if (hdr->sh_size != 0)
5101 (*_bfd_error_handler)
5102 (_("%B: warning: allocated section `%s' not in segment"),
5103 abfd,
5104 (hdr->bfd_section == NULL
5105 ? "*unknown*"
5106 : hdr->bfd_section->name));
3ba71138
L
5107 /* We don't need to page align empty sections. */
5108 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
5109 off += vma_page_aligned_bias (hdr->sh_addr, off,
5110 bed->maxpagesize);
5111 else
5112 off += vma_page_aligned_bias (hdr->sh_addr, off,
5113 hdr->sh_addralign);
5114 off = _bfd_elf_assign_file_position_for_section (hdr, off,
5115 FALSE);
5116 }
5117 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5118 && hdr->bfd_section == NULL)
12bd6957
AM
5119 || hdr == i_shdrpp[elf_onesymtab (abfd)]
5120 || hdr == i_shdrpp[elf_symtab_shndx (abfd)]
5121 || hdr == i_shdrpp[elf_strtab_sec (abfd)])
5c182d5f
AM
5122 hdr->sh_offset = -1;
5123 else
5124 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
5125 }
5126
252b5132
RH
5127 /* Now that we have set the section file positions, we can set up
5128 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
5129 count = 0;
5130 filehdr_vaddr = 0;
5131 filehdr_paddr = 0;
5132 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
5133 phdrs_paddr = 0;
62655c7b 5134 hdrs_segment = NULL;
f3520d2f 5135 phdrs = elf_tdata (abfd)->phdr;
12bd6957 5136 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
f3520d2f
AM
5137 {
5138 ++count;
5139 if (p->p_type != PT_LOAD)
5140 continue;
5141
5142 if (m->includes_filehdr)
5143 {
5144 filehdr_vaddr = p->p_vaddr;
5145 filehdr_paddr = p->p_paddr;
5146 }
5147 if (m->includes_phdrs)
5148 {
5149 phdrs_vaddr = p->p_vaddr;
5150 phdrs_paddr = p->p_paddr;
5151 if (m->includes_filehdr)
5152 {
62655c7b 5153 hdrs_segment = m;
f3520d2f
AM
5154 phdrs_vaddr += bed->s->sizeof_ehdr;
5155 phdrs_paddr += bed->s->sizeof_ehdr;
5156 }
5157 }
5158 }
5159
62655c7b
RM
5160 if (hdrs_segment != NULL && link_info != NULL)
5161 {
5162 /* There is a segment that contains both the file headers and the
5163 program headers, so provide a symbol __ehdr_start pointing there.
5164 A program can use this to examine itself robustly. */
5165
5166 struct elf_link_hash_entry *hash
5167 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5168 FALSE, FALSE, TRUE);
5169 /* If the symbol was referenced and not defined, define it. */
5170 if (hash != NULL
5171 && (hash->root.type == bfd_link_hash_new
5172 || hash->root.type == bfd_link_hash_undefined
5173 || hash->root.type == bfd_link_hash_undefweak
5174 || hash->root.type == bfd_link_hash_common))
5175 {
5176 asection *s = NULL;
5177 if (hdrs_segment->count != 0)
5178 /* The segment contains sections, so use the first one. */
5179 s = hdrs_segment->sections[0];
5180 else
5181 /* Use the first (i.e. lowest-addressed) section in any segment. */
12bd6957 5182 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62655c7b
RM
5183 if (m->count != 0)
5184 {
5185 s = m->sections[0];
5186 break;
5187 }
5188
5189 if (s != NULL)
5190 {
5191 hash->root.u.def.value = filehdr_vaddr - s->vma;
5192 hash->root.u.def.section = s;
5193 }
5194 else
5195 {
5196 hash->root.u.def.value = filehdr_vaddr;
5197 hash->root.u.def.section = bfd_abs_section_ptr;
5198 }
5199
5200 hash->root.type = bfd_link_hash_defined;
5201 hash->def_regular = 1;
5202 hash->non_elf = 0;
5203 }
5204 }
5205
12bd6957 5206 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
252b5132 5207 {
129af99f 5208 if (p->p_type == PT_GNU_RELRO)
252b5132 5209 {
b84a33b5 5210 const Elf_Internal_Phdr *lp;
3146fac4 5211 struct elf_segment_map *lm;
1ea63fd2 5212
129af99f 5213 if (link_info != NULL)
8c37241b 5214 {
129af99f
AS
5215 /* During linking the range of the RELRO segment is passed
5216 in link_info. */
12bd6957 5217 for (lm = elf_seg_map (abfd), lp = phdrs;
3146fac4
AM
5218 lm != NULL;
5219 lm = lm->next, lp++)
8c37241b
JJ
5220 {
5221 if (lp->p_type == PT_LOAD
b84a33b5 5222 && lp->p_vaddr < link_info->relro_end
3146fac4
AM
5223 && lm->count != 0
5224 && lm->sections[0]->vma >= link_info->relro_start)
8c37241b
JJ
5225 break;
5226 }
8981c88a 5227
3146fac4 5228 BFD_ASSERT (lm != NULL);
8c37241b 5229 }
129af99f
AS
5230 else
5231 {
5232 /* Otherwise we are copying an executable or shared
b84a33b5 5233 library, but we need to use the same linker logic. */
129af99f
AS
5234 for (lp = phdrs; lp < phdrs + count; ++lp)
5235 {
5236 if (lp->p_type == PT_LOAD
5237 && lp->p_paddr == p->p_paddr)
5238 break;
5239 }
b84a33b5
AM
5240 }
5241
5242 if (lp < phdrs + count)
5243 {
5244 p->p_vaddr = lp->p_vaddr;
5245 p->p_paddr = lp->p_paddr;
5246 p->p_offset = lp->p_offset;
5247 if (link_info != NULL)
5248 p->p_filesz = link_info->relro_end - lp->p_vaddr;
5249 else if (m->p_size_valid)
5250 p->p_filesz = m->p_size;
129af99f
AS
5251 else
5252 abort ();
b84a33b5 5253 p->p_memsz = p->p_filesz;
f3944f72
L
5254 /* Preserve the alignment and flags if they are valid. The
5255 gold linker generates RW/4 for the PT_GNU_RELRO section.
5256 It is better for objcopy/strip to honor these attributes
5257 otherwise gdb will choke when using separate debug files.
5258 */
5259 if (!m->p_align_valid)
5260 p->p_align = 1;
5261 if (!m->p_flags_valid)
5262 p->p_flags = (lp->p_flags & ~PF_W);
129af99f 5263 }
9433b9b1 5264 else
b84a33b5
AM
5265 {
5266 memset (p, 0, sizeof *p);
5267 p->p_type = PT_NULL;
5268 }
129af99f 5269 }
04c3a755
NS
5270 else if (p->p_type == PT_GNU_STACK)
5271 {
5272 if (m->p_size_valid)
5273 p->p_memsz = m->p_size;
5274 }
129af99f
AS
5275 else if (m->count != 0)
5276 {
5277 if (p->p_type != PT_LOAD
5278 && (p->p_type != PT_NOTE
5279 || bfd_get_format (abfd) != bfd_core))
5280 {
c86934ce
NC
5281 if (m->includes_filehdr || m->includes_phdrs)
5282 {
5283 /* PR 17512: file: 2195325e. */
5284 (*_bfd_error_handler)
5285 (_("%B: warning: non-load segment includes file header and/or program header"),
5286 abfd);
5287 return FALSE;
5288 }
129af99f 5289
86b2281f 5290 p->p_filesz = 0;
129af99f 5291 p->p_offset = m->sections[0]->filepos;
86b2281f
AM
5292 for (i = m->count; i-- != 0;)
5293 {
5294 asection *sect = m->sections[i];
5295 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
5296 if (hdr->sh_type != SHT_NOBITS)
5297 {
5298 p->p_filesz = (sect->filepos - m->sections[0]->filepos
5299 + hdr->sh_size);
5300 break;
5301 }
5302 }
129af99f
AS
5303 }
5304 }
5305 else if (m->includes_filehdr)
5306 {
5307 p->p_vaddr = filehdr_vaddr;
5308 if (! m->p_paddr_valid)
5309 p->p_paddr = filehdr_paddr;
5310 }
5311 else if (m->includes_phdrs)
5312 {
5313 p->p_vaddr = phdrs_vaddr;
5314 if (! m->p_paddr_valid)
5315 p->p_paddr = phdrs_paddr;
252b5132
RH
5316 }
5317 }
5318
12bd6957 5319 elf_next_file_pos (abfd) = off;
252b5132 5320
b34976b6 5321 return TRUE;
252b5132
RH
5322}
5323
252b5132
RH
5324/* Work out the file positions of all the sections. This is called by
5325 _bfd_elf_compute_section_file_positions. All the section sizes and
5326 VMAs must be known before this is called.
5327
e0638f70
AM
5328 Reloc sections come in two flavours: Those processed specially as
5329 "side-channel" data attached to a section to which they apply, and
5330 those that bfd doesn't process as relocations. The latter sort are
5331 stored in a normal bfd section by bfd_section_from_shdr. We don't
5332 consider the former sort here, unless they form part of the loadable
5333 image. Reloc sections not assigned here will be handled later by
5334 assign_file_positions_for_relocs.
252b5132
RH
5335
5336 We also don't set the positions of the .symtab and .strtab here. */
5337
b34976b6 5338static bfd_boolean
c84fca4d
AO
5339assign_file_positions_except_relocs (bfd *abfd,
5340 struct bfd_link_info *link_info)
252b5132 5341{
5c182d5f
AM
5342 struct elf_obj_tdata *tdata = elf_tdata (abfd);
5343 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
9c5bfbb7 5344 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5345
5346 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
5347 && bfd_get_format (abfd) != bfd_core)
5348 {
5c182d5f
AM
5349 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
5350 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
5351 Elf_Internal_Shdr **hdrpp;
5352 unsigned int i;
a485e98e 5353 file_ptr off;
252b5132
RH
5354
5355 /* Start after the ELF header. */
5356 off = i_ehdrp->e_ehsize;
5357
5358 /* We are not creating an executable, which means that we are
5359 not creating a program header, and that the actual order of
5360 the sections in the file is unimportant. */
9ad5cbcf 5361 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
5362 {
5363 Elf_Internal_Shdr *hdr;
5364
5365 hdr = *hdrpp;
e0638f70
AM
5366 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5367 && hdr->bfd_section == NULL)
12bd6957
AM
5368 || i == elf_onesymtab (abfd)
5369 || i == elf_symtab_shndx (abfd)
5370 || i == elf_strtab_sec (abfd))
252b5132
RH
5371 {
5372 hdr->sh_offset = -1;
252b5132 5373 }
9ad5cbcf 5374 else
b34976b6 5375 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 5376 }
a485e98e
AM
5377
5378 elf_next_file_pos (abfd) = off;
252b5132
RH
5379 }
5380 else
5381 {
f3520d2f
AM
5382 unsigned int alloc;
5383
252b5132 5384 /* Assign file positions for the loaded sections based on the
08a40648 5385 assignment of sections to segments. */
f3520d2f
AM
5386 if (!assign_file_positions_for_load_sections (abfd, link_info))
5387 return FALSE;
5388
5389 /* And for non-load sections. */
5390 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
5391 return FALSE;
5392
e36284ab
AM
5393 if (bed->elf_backend_modify_program_headers != NULL)
5394 {
5395 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
5396 return FALSE;
5397 }
5398
58e7ebac
L
5399 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=. */
5400 if (link_info != NULL
5401 && link_info->executable
5402 && link_info->shared)
5403 {
5404 unsigned int num_segments = elf_elfheader (abfd)->e_phnum;
5405 Elf_Internal_Phdr *segment = elf_tdata (abfd)->phdr;
5406 Elf_Internal_Phdr *end_segment = &segment[num_segments];
5407
5408 /* Find the lowest p_vaddr in PT_LOAD segments. */
5409 bfd_vma p_vaddr = (bfd_vma) -1;
5410 for (; segment < end_segment; segment++)
5411 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
5412 p_vaddr = segment->p_vaddr;
5413
5414 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
5415 segments is non-zero. */
5416 if (p_vaddr)
5417 i_ehdrp->e_type = ET_EXEC;
5418 }
5419
f3520d2f 5420 /* Write out the program headers. */
12bd6957 5421 alloc = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
f3520d2f
AM
5422 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
5423 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 5424 return FALSE;
252b5132
RH
5425 }
5426
b34976b6 5427 return TRUE;
252b5132
RH
5428}
5429
b34976b6 5430static bfd_boolean
217aa764 5431prep_headers (bfd *abfd)
252b5132 5432{
3d540e93 5433 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 5434 struct elf_strtab_hash *shstrtab;
9c5bfbb7 5435 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5436
5437 i_ehdrp = elf_elfheader (abfd);
252b5132 5438
2b0f7ef9 5439 shstrtab = _bfd_elf_strtab_init ();
252b5132 5440 if (shstrtab == NULL)
b34976b6 5441 return FALSE;
252b5132
RH
5442
5443 elf_shstrtab (abfd) = shstrtab;
5444
5445 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
5446 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
5447 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
5448 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
5449
5450 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
5451 i_ehdrp->e_ident[EI_DATA] =
5452 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
5453 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
5454
252b5132
RH
5455 if ((abfd->flags & DYNAMIC) != 0)
5456 i_ehdrp->e_type = ET_DYN;
5457 else if ((abfd->flags & EXEC_P) != 0)
5458 i_ehdrp->e_type = ET_EXEC;
5459 else if (bfd_get_format (abfd) == bfd_core)
5460 i_ehdrp->e_type = ET_CORE;
5461 else
5462 i_ehdrp->e_type = ET_REL;
5463
5464 switch (bfd_get_arch (abfd))
5465 {
5466 case bfd_arch_unknown:
5467 i_ehdrp->e_machine = EM_NONE;
5468 break;
aa4f99bb
AO
5469
5470 /* There used to be a long list of cases here, each one setting
5471 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
5472 in the corresponding bfd definition. To avoid duplication,
5473 the switch was removed. Machines that need special handling
5474 can generally do it in elf_backend_final_write_processing(),
5475 unless they need the information earlier than the final write.
5476 Such need can generally be supplied by replacing the tests for
5477 e_machine with the conditions used to determine it. */
252b5132 5478 default:
9c5bfbb7
AM
5479 i_ehdrp->e_machine = bed->elf_machine_code;
5480 }
aa4f99bb 5481
252b5132
RH
5482 i_ehdrp->e_version = bed->s->ev_current;
5483 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
5484
c044fabd 5485 /* No program header, for now. */
252b5132
RH
5486 i_ehdrp->e_phoff = 0;
5487 i_ehdrp->e_phentsize = 0;
5488 i_ehdrp->e_phnum = 0;
5489
c044fabd 5490 /* Each bfd section is section header entry. */
252b5132
RH
5491 i_ehdrp->e_entry = bfd_get_start_address (abfd);
5492 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
5493
c044fabd 5494 /* If we're building an executable, we'll need a program header table. */
252b5132 5495 if (abfd->flags & EXEC_P)
0e71e495
BE
5496 /* It all happens later. */
5497 ;
252b5132
RH
5498 else
5499 {
5500 i_ehdrp->e_phentsize = 0;
252b5132
RH
5501 i_ehdrp->e_phoff = 0;
5502 }
5503
5504 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 5505 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 5506 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 5507 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 5508 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 5509 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132 5510 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
17ca87fc 5511 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
252b5132 5512 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 5513 return FALSE;
252b5132 5514
b34976b6 5515 return TRUE;
252b5132
RH
5516}
5517
5518/* Assign file positions for all the reloc sections which are not part
a485e98e 5519 of the loadable file image, and the file position of section headers. */
252b5132 5520
a485e98e 5521static void
217aa764 5522_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
5523{
5524 file_ptr off;
9ad5cbcf 5525 unsigned int i, num_sec;
252b5132 5526 Elf_Internal_Shdr **shdrpp;
a485e98e
AM
5527 Elf_Internal_Ehdr *i_ehdrp;
5528 const struct elf_backend_data *bed;
252b5132 5529
12bd6957 5530 off = elf_next_file_pos (abfd);
252b5132 5531
9ad5cbcf
AM
5532 num_sec = elf_numsections (abfd);
5533 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
5534 {
5535 Elf_Internal_Shdr *shdrp;
5536
5537 shdrp = *shdrpp;
5538 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
5539 && shdrp->sh_offset == -1)
b34976b6 5540 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
5541 }
5542
a485e98e
AM
5543/* Place the section headers. */
5544 i_ehdrp = elf_elfheader (abfd);
5545 bed = get_elf_backend_data (abfd);
5546 off = align_file_position (off, 1 << bed->s->log_file_align);
5547 i_ehdrp->e_shoff = off;
5548 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
12bd6957 5549 elf_next_file_pos (abfd) = off;
252b5132
RH
5550}
5551
b34976b6 5552bfd_boolean
217aa764 5553_bfd_elf_write_object_contents (bfd *abfd)
252b5132 5554{
9c5bfbb7 5555 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5556 Elf_Internal_Shdr **i_shdrp;
b34976b6 5557 bfd_boolean failed;
9ad5cbcf 5558 unsigned int count, num_sec;
30e8ee25 5559 struct elf_obj_tdata *t;
252b5132
RH
5560
5561 if (! abfd->output_has_begun
217aa764 5562 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 5563 return FALSE;
252b5132
RH
5564
5565 i_shdrp = elf_elfsections (abfd);
252b5132 5566
b34976b6 5567 failed = FALSE;
252b5132
RH
5568 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
5569 if (failed)
b34976b6 5570 return FALSE;
252b5132
RH
5571
5572 _bfd_elf_assign_file_positions_for_relocs (abfd);
5573
c044fabd 5574 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
5575 num_sec = elf_numsections (abfd);
5576 for (count = 1; count < num_sec; count++)
252b5132
RH
5577 {
5578 if (bed->elf_backend_section_processing)
5579 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5580 if (i_shdrp[count]->contents)
5581 {
dc810e39
AM
5582 bfd_size_type amt = i_shdrp[count]->sh_size;
5583
252b5132 5584 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5585 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5586 return FALSE;
252b5132
RH
5587 }
5588 }
5589
5590 /* Write out the section header names. */
30e8ee25 5591 t = elf_tdata (abfd);
26ae6d5e 5592 if (elf_shstrtab (abfd) != NULL
30e8ee25 5593 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 5594 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5595 return FALSE;
252b5132
RH
5596
5597 if (bed->elf_backend_final_write_processing)
12bd6957 5598 (*bed->elf_backend_final_write_processing) (abfd, elf_linker (abfd));
252b5132 5599
ff59fc36
RM
5600 if (!bed->s->write_shdrs_and_ehdr (abfd))
5601 return FALSE;
5602
5603 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
c0355132
AM
5604 if (t->o->build_id.after_write_object_contents != NULL)
5605 return (*t->o->build_id.after_write_object_contents) (abfd);
ff59fc36
RM
5606
5607 return TRUE;
252b5132
RH
5608}
5609
b34976b6 5610bfd_boolean
217aa764 5611_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5612{
c044fabd 5613 /* Hopefully this can be done just like an object file. */
252b5132
RH
5614 return _bfd_elf_write_object_contents (abfd);
5615}
c044fabd
KH
5616
5617/* Given a section, search the header to find them. */
5618
cb33740c 5619unsigned int
198beae2 5620_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5621{
9c5bfbb7 5622 const struct elf_backend_data *bed;
91d6fa6a 5623 unsigned int sec_index;
252b5132 5624
9ad5cbcf
AM
5625 if (elf_section_data (asect) != NULL
5626 && elf_section_data (asect)->this_idx != 0)
5627 return elf_section_data (asect)->this_idx;
5628
5629 if (bfd_is_abs_section (asect))
91d6fa6a 5630 sec_index = SHN_ABS;
af746e92 5631 else if (bfd_is_com_section (asect))
91d6fa6a 5632 sec_index = SHN_COMMON;
af746e92 5633 else if (bfd_is_und_section (asect))
91d6fa6a 5634 sec_index = SHN_UNDEF;
af746e92 5635 else
91d6fa6a 5636 sec_index = SHN_BAD;
252b5132 5637
af746e92 5638 bed = get_elf_backend_data (abfd);
252b5132
RH
5639 if (bed->elf_backend_section_from_bfd_section)
5640 {
91d6fa6a 5641 int retval = sec_index;
9ad5cbcf 5642
af746e92
AM
5643 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5644 return retval;
252b5132
RH
5645 }
5646
91d6fa6a 5647 if (sec_index == SHN_BAD)
af746e92 5648 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5649
91d6fa6a 5650 return sec_index;
252b5132
RH
5651}
5652
5653/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5654 on error. */
5655
5656int
217aa764 5657_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5658{
5659 asymbol *asym_ptr = *asym_ptr_ptr;
5660 int idx;
5661 flagword flags = asym_ptr->flags;
5662
5663 /* When gas creates relocations against local labels, it creates its
5664 own symbol for the section, but does put the symbol into the
5665 symbol chain, so udata is 0. When the linker is generating
5666 relocatable output, this section symbol may be for one of the
5667 input sections rather than the output section. */
5668 if (asym_ptr->udata.i == 0
5669 && (flags & BSF_SECTION_SYM)
5670 && asym_ptr->section)
5671 {
5372391b 5672 asection *sec;
252b5132
RH
5673 int indx;
5674
5372391b
AM
5675 sec = asym_ptr->section;
5676 if (sec->owner != abfd && sec->output_section != NULL)
5677 sec = sec->output_section;
5678 if (sec->owner == abfd
5679 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5680 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5681 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5682 }
5683
5684 idx = asym_ptr->udata.i;
5685
5686 if (idx == 0)
5687 {
5688 /* This case can occur when using --strip-symbol on a symbol
08a40648 5689 which is used in a relocation entry. */
252b5132 5690 (*_bfd_error_handler)
d003868e
AM
5691 (_("%B: symbol `%s' required but not present"),
5692 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5693 bfd_set_error (bfd_error_no_symbols);
5694 return -1;
5695 }
5696
5697#if DEBUG & 4
5698 {
5699 fprintf (stderr,
9ccb8af9
AM
5700 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx\n",
5701 (long) asym_ptr, asym_ptr->name, idx, (long) flags);
252b5132
RH
5702 fflush (stderr);
5703 }
5704#endif
5705
5706 return idx;
5707}
5708
84d1d650 5709/* Rewrite program header information. */
252b5132 5710
b34976b6 5711static bfd_boolean
84d1d650 5712rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5713{
b34976b6
AM
5714 Elf_Internal_Ehdr *iehdr;
5715 struct elf_segment_map *map;
5716 struct elf_segment_map *map_first;
5717 struct elf_segment_map **pointer_to_map;
5718 Elf_Internal_Phdr *segment;
5719 asection *section;
5720 unsigned int i;
5721 unsigned int num_segments;
5722 bfd_boolean phdr_included = FALSE;
5c44b38e 5723 bfd_boolean p_paddr_valid;
b34976b6
AM
5724 bfd_vma maxpagesize;
5725 struct elf_segment_map *phdr_adjust_seg = NULL;
5726 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5727 const struct elf_backend_data *bed;
bc67d8a6 5728
caf47ea6 5729 bed = get_elf_backend_data (ibfd);
252b5132
RH
5730 iehdr = elf_elfheader (ibfd);
5731
bc67d8a6 5732 map_first = NULL;
c044fabd 5733 pointer_to_map = &map_first;
252b5132
RH
5734
5735 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5736 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5737
5738 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5739#define SEGMENT_END(segment, start) \
5740 (start + (segment->p_memsz > segment->p_filesz \
5741 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5742
eecdbe52
JJ
5743#define SECTION_SIZE(section, segment) \
5744 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5745 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5746 ? section->size : 0)
eecdbe52 5747
b34976b6 5748 /* Returns TRUE if the given section is contained within
bc67d8a6 5749 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5750#define IS_CONTAINED_BY_VMA(section, segment) \
5751 (section->vma >= segment->p_vaddr \
eecdbe52 5752 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5753 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5754
b34976b6 5755 /* Returns TRUE if the given section is contained within
bc67d8a6 5756 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5757#define IS_CONTAINED_BY_LMA(section, segment, base) \
5758 (section->lma >= base \
eecdbe52 5759 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5760 <= SEGMENT_END (segment, base)))
252b5132 5761
0efc80c8
L
5762 /* Handle PT_NOTE segment. */
5763#define IS_NOTE(p, s) \
aecc8f8a 5764 (p->p_type == PT_NOTE \
0efc80c8 5765 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 5766 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5767 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5768 <= p->p_offset + p->p_filesz))
252b5132 5769
0efc80c8
L
5770 /* Special case: corefile "NOTE" section containing regs, prpsinfo
5771 etc. */
5772#define IS_COREFILE_NOTE(p, s) \
5773 (IS_NOTE (p, s) \
5774 && bfd_get_format (ibfd) == bfd_core \
5775 && s->vma == 0 \
5776 && s->lma == 0)
5777
252b5132
RH
5778 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5779 linker, which generates a PT_INTERP section with p_vaddr and
5780 p_memsz set to 0. */
aecc8f8a
AM
5781#define IS_SOLARIS_PT_INTERP(p, s) \
5782 (p->p_vaddr == 0 \
5783 && p->p_paddr == 0 \
5784 && p->p_memsz == 0 \
5785 && p->p_filesz > 0 \
5786 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5787 && s->size > 0 \
aecc8f8a 5788 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5789 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5790 <= p->p_offset + p->p_filesz))
5c440b1e 5791
bc67d8a6
NC
5792 /* Decide if the given section should be included in the given segment.
5793 A section will be included if:
f5ffc919 5794 1. It is within the address space of the segment -- we use the LMA
08a40648 5795 if that is set for the segment and the VMA otherwise,
0efc80c8 5796 2. It is an allocated section or a NOTE section in a PT_NOTE
d324f6d6 5797 segment.
bc67d8a6 5798 3. There is an output section associated with it,
eecdbe52 5799 4. The section has not already been allocated to a previous segment.
2b05f1b7 5800 5. PT_GNU_STACK segments do not include any sections.
03394ac9 5801 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5802 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5803 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 5804 (with the possible exception of .dynamic). */
9f17e2a6 5805#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
5806 ((((segment->p_paddr \
5807 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5808 : IS_CONTAINED_BY_VMA (section, segment)) \
5809 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 5810 || IS_NOTE (segment, section)) \
2b05f1b7
L
5811 && segment->p_type != PT_GNU_STACK \
5812 && (segment->p_type != PT_TLS \
5813 || (section->flags & SEC_THREAD_LOCAL)) \
5814 && (segment->p_type == PT_LOAD \
5815 || segment->p_type == PT_TLS \
5816 || (section->flags & SEC_THREAD_LOCAL) == 0) \
5817 && (segment->p_type != PT_DYNAMIC \
5818 || SECTION_SIZE (section, segment) > 0 \
5819 || (segment->p_paddr \
5820 ? segment->p_paddr != section->lma \
5821 : segment->p_vaddr != section->vma) \
5822 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5823 == 0)) \
0067a569 5824 && !section->segment_mark)
bc67d8a6 5825
9f17e2a6
L
5826/* If the output section of a section in the input segment is NULL,
5827 it is removed from the corresponding output segment. */
5828#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
5829 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
5830 && section->output_section != NULL)
5831
b34976b6 5832 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5833#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5834 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5835
5836 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5837 their VMA address ranges and their LMA address ranges overlap.
5838 It is possible to have overlapping VMA ranges without overlapping LMA
5839 ranges. RedBoot images for example can have both .data and .bss mapped
5840 to the same VMA range, but with the .data section mapped to a different
5841 LMA. */
aecc8f8a 5842#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 5843 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 5844 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 5845 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 5846 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5847
5848 /* Initialise the segment mark field. */
5849 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5850 section->segment_mark = FALSE;
bc67d8a6 5851
5c44b38e
AM
5852 /* The Solaris linker creates program headers in which all the
5853 p_paddr fields are zero. When we try to objcopy or strip such a
5854 file, we get confused. Check for this case, and if we find it
5855 don't set the p_paddr_valid fields. */
5856 p_paddr_valid = FALSE;
5857 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5858 i < num_segments;
5859 i++, segment++)
5860 if (segment->p_paddr != 0)
5861 {
5862 p_paddr_valid = TRUE;
5863 break;
5864 }
5865
252b5132 5866 /* Scan through the segments specified in the program header
bc67d8a6 5867 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5868 in the loadable segments. These can be created by weird
aecc8f8a 5869 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5870 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5871 i < num_segments;
c044fabd 5872 i++, segment++)
252b5132 5873 {
252b5132 5874 unsigned int j;
c044fabd 5875 Elf_Internal_Phdr *segment2;
252b5132 5876
aecc8f8a
AM
5877 if (segment->p_type == PT_INTERP)
5878 for (section = ibfd->sections; section; section = section->next)
5879 if (IS_SOLARIS_PT_INTERP (segment, section))
5880 {
5881 /* Mininal change so that the normal section to segment
4cc11e76 5882 assignment code will work. */
aecc8f8a
AM
5883 segment->p_vaddr = section->vma;
5884 break;
5885 }
5886
bc67d8a6 5887 if (segment->p_type != PT_LOAD)
b10a8ae0
L
5888 {
5889 /* Remove PT_GNU_RELRO segment. */
5890 if (segment->p_type == PT_GNU_RELRO)
5891 segment->p_type = PT_NULL;
5892 continue;
5893 }
c044fabd 5894
bc67d8a6 5895 /* Determine if this segment overlaps any previous segments. */
0067a569 5896 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
5897 {
5898 bfd_signed_vma extra_length;
c044fabd 5899
bc67d8a6 5900 if (segment2->p_type != PT_LOAD
0067a569 5901 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 5902 continue;
c044fabd 5903
bc67d8a6
NC
5904 /* Merge the two segments together. */
5905 if (segment2->p_vaddr < segment->p_vaddr)
5906 {
c044fabd 5907 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 5908 SEGMENT. */
0067a569
AM
5909 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
5910 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 5911
bc67d8a6
NC
5912 if (extra_length > 0)
5913 {
0067a569 5914 segment2->p_memsz += extra_length;
bc67d8a6
NC
5915 segment2->p_filesz += extra_length;
5916 }
c044fabd 5917
bc67d8a6 5918 segment->p_type = PT_NULL;
c044fabd 5919
bc67d8a6
NC
5920 /* Since we have deleted P we must restart the outer loop. */
5921 i = 0;
5922 segment = elf_tdata (ibfd)->phdr;
5923 break;
5924 }
5925 else
5926 {
c044fabd 5927 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 5928 SEGMENT2. */
0067a569
AM
5929 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
5930 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 5931
bc67d8a6
NC
5932 if (extra_length > 0)
5933 {
0067a569 5934 segment->p_memsz += extra_length;
bc67d8a6
NC
5935 segment->p_filesz += extra_length;
5936 }
c044fabd 5937
bc67d8a6
NC
5938 segment2->p_type = PT_NULL;
5939 }
5940 }
5941 }
c044fabd 5942
bc67d8a6
NC
5943 /* The second scan attempts to assign sections to segments. */
5944 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5945 i < num_segments;
0067a569 5946 i++, segment++)
bc67d8a6 5947 {
0067a569
AM
5948 unsigned int section_count;
5949 asection **sections;
5950 asection *output_section;
5951 unsigned int isec;
5952 bfd_vma matching_lma;
5953 bfd_vma suggested_lma;
5954 unsigned int j;
dc810e39 5955 bfd_size_type amt;
0067a569
AM
5956 asection *first_section;
5957 bfd_boolean first_matching_lma;
5958 bfd_boolean first_suggested_lma;
bc67d8a6
NC
5959
5960 if (segment->p_type == PT_NULL)
5961 continue;
c044fabd 5962
9f17e2a6 5963 first_section = NULL;
bc67d8a6 5964 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5965 for (section = ibfd->sections, section_count = 0;
5966 section != NULL;
5967 section = section->next)
9f17e2a6
L
5968 {
5969 /* Find the first section in the input segment, which may be
5970 removed from the corresponding output segment. */
5971 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
5972 {
5973 if (first_section == NULL)
5974 first_section = section;
5975 if (section->output_section != NULL)
5976 ++section_count;
5977 }
5978 }
811072d8 5979
b5f852ea
NC
5980 /* Allocate a segment map big enough to contain
5981 all of the sections we have selected. */
dc810e39
AM
5982 amt = sizeof (struct elf_segment_map);
5983 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5984 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 5985 if (map == NULL)
b34976b6 5986 return FALSE;
252b5132
RH
5987
5988 /* Initialise the fields of the segment map. Default to
5989 using the physical address of the segment in the input BFD. */
0067a569
AM
5990 map->next = NULL;
5991 map->p_type = segment->p_type;
5992 map->p_flags = segment->p_flags;
bc67d8a6 5993 map->p_flags_valid = 1;
55d55ac7 5994
9f17e2a6
L
5995 /* If the first section in the input segment is removed, there is
5996 no need to preserve segment physical address in the corresponding
5997 output segment. */
945c025a 5998 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
5999 {
6000 map->p_paddr = segment->p_paddr;
5c44b38e 6001 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 6002 }
252b5132
RH
6003
6004 /* Determine if this segment contains the ELF file header
6005 and if it contains the program headers themselves. */
bc67d8a6
NC
6006 map->includes_filehdr = (segment->p_offset == 0
6007 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 6008 map->includes_phdrs = 0;
252b5132 6009
0067a569 6010 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 6011 {
bc67d8a6
NC
6012 map->includes_phdrs =
6013 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6014 && (segment->p_offset + segment->p_filesz
252b5132
RH
6015 >= ((bfd_vma) iehdr->e_phoff
6016 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 6017
bc67d8a6 6018 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 6019 phdr_included = TRUE;
252b5132
RH
6020 }
6021
bc67d8a6 6022 if (section_count == 0)
252b5132
RH
6023 {
6024 /* Special segments, such as the PT_PHDR segment, may contain
6025 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
6026 something. They are allowed by the ELF spec however, so only
6027 a warning is produced. */
bc67d8a6 6028 if (segment->p_type == PT_LOAD)
c86934ce
NC
6029 (*_bfd_error_handler) (_("\
6030%B: warning: Empty loadable segment detected, is this intentional ?"),
0067a569 6031 ibfd);
252b5132 6032
bc67d8a6 6033 map->count = 0;
c044fabd
KH
6034 *pointer_to_map = map;
6035 pointer_to_map = &map->next;
252b5132
RH
6036
6037 continue;
6038 }
6039
6040 /* Now scan the sections in the input BFD again and attempt
6041 to add their corresponding output sections to the segment map.
6042 The problem here is how to handle an output section which has
6043 been moved (ie had its LMA changed). There are four possibilities:
6044
6045 1. None of the sections have been moved.
6046 In this case we can continue to use the segment LMA from the
6047 input BFD.
6048
6049 2. All of the sections have been moved by the same amount.
6050 In this case we can change the segment's LMA to match the LMA
6051 of the first section.
6052
6053 3. Some of the sections have been moved, others have not.
6054 In this case those sections which have not been moved can be
6055 placed in the current segment which will have to have its size,
6056 and possibly its LMA changed, and a new segment or segments will
6057 have to be created to contain the other sections.
6058
b5f852ea 6059 4. The sections have been moved, but not by the same amount.
252b5132
RH
6060 In this case we can change the segment's LMA to match the LMA
6061 of the first section and we will have to create a new segment
6062 or segments to contain the other sections.
6063
6064 In order to save time, we allocate an array to hold the section
6065 pointers that we are interested in. As these sections get assigned
6066 to a segment, they are removed from this array. */
6067
a50b1753 6068 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 6069 if (sections == NULL)
b34976b6 6070 return FALSE;
252b5132
RH
6071
6072 /* Step One: Scan for segment vs section LMA conflicts.
6073 Also add the sections to the section array allocated above.
6074 Also add the sections to the current segment. In the common
6075 case, where the sections have not been moved, this means that
6076 we have completely filled the segment, and there is nothing
6077 more to do. */
252b5132 6078 isec = 0;
72730e0c 6079 matching_lma = 0;
252b5132 6080 suggested_lma = 0;
0067a569
AM
6081 first_matching_lma = TRUE;
6082 first_suggested_lma = TRUE;
252b5132 6083
147d51c2 6084 for (section = ibfd->sections;
bc67d8a6
NC
6085 section != NULL;
6086 section = section->next)
147d51c2
L
6087 if (section == first_section)
6088 break;
6089
6090 for (j = 0; section != NULL; section = section->next)
252b5132 6091 {
caf47ea6 6092 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 6093 {
bc67d8a6
NC
6094 output_section = section->output_section;
6095
0067a569 6096 sections[j++] = section;
252b5132
RH
6097
6098 /* The Solaris native linker always sets p_paddr to 0.
6099 We try to catch that case here, and set it to the
5e8d7549
NC
6100 correct value. Note - some backends require that
6101 p_paddr be left as zero. */
5c44b38e 6102 if (!p_paddr_valid
4455705d 6103 && segment->p_vaddr != 0
0067a569 6104 && !bed->want_p_paddr_set_to_zero
252b5132 6105 && isec == 0
bc67d8a6 6106 && output_section->lma != 0
0067a569
AM
6107 && output_section->vma == (segment->p_vaddr
6108 + (map->includes_filehdr
6109 ? iehdr->e_ehsize
6110 : 0)
6111 + (map->includes_phdrs
6112 ? (iehdr->e_phnum
6113 * iehdr->e_phentsize)
6114 : 0)))
bc67d8a6 6115 map->p_paddr = segment->p_vaddr;
252b5132
RH
6116
6117 /* Match up the physical address of the segment with the
6118 LMA address of the output section. */
bc67d8a6 6119 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 6120 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
6121 || (bed->want_p_paddr_set_to_zero
6122 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 6123 {
0067a569
AM
6124 if (first_matching_lma || output_section->lma < matching_lma)
6125 {
6126 matching_lma = output_section->lma;
6127 first_matching_lma = FALSE;
6128 }
252b5132
RH
6129
6130 /* We assume that if the section fits within the segment
bc67d8a6 6131 then it does not overlap any other section within that
252b5132 6132 segment. */
0067a569
AM
6133 map->sections[isec++] = output_section;
6134 }
6135 else if (first_suggested_lma)
6136 {
6137 suggested_lma = output_section->lma;
6138 first_suggested_lma = FALSE;
252b5132 6139 }
147d51c2
L
6140
6141 if (j == section_count)
6142 break;
252b5132
RH
6143 }
6144 }
6145
bc67d8a6 6146 BFD_ASSERT (j == section_count);
252b5132
RH
6147
6148 /* Step Two: Adjust the physical address of the current segment,
6149 if necessary. */
bc67d8a6 6150 if (isec == section_count)
252b5132
RH
6151 {
6152 /* All of the sections fitted within the segment as currently
6153 specified. This is the default case. Add the segment to
6154 the list of built segments and carry on to process the next
6155 program header in the input BFD. */
bc67d8a6 6156 map->count = section_count;
c044fabd
KH
6157 *pointer_to_map = map;
6158 pointer_to_map = &map->next;
08a40648 6159
5c44b38e
AM
6160 if (p_paddr_valid
6161 && !bed->want_p_paddr_set_to_zero
147d51c2 6162 && matching_lma != map->p_paddr
5c44b38e
AM
6163 && !map->includes_filehdr
6164 && !map->includes_phdrs)
3271a814
NS
6165 /* There is some padding before the first section in the
6166 segment. So, we must account for that in the output
6167 segment's vma. */
6168 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 6169
252b5132
RH
6170 free (sections);
6171 continue;
6172 }
252b5132
RH
6173 else
6174 {
0067a569 6175 if (!first_matching_lma)
72730e0c
AM
6176 {
6177 /* At least one section fits inside the current segment.
6178 Keep it, but modify its physical address to match the
6179 LMA of the first section that fitted. */
bc67d8a6 6180 map->p_paddr = matching_lma;
72730e0c
AM
6181 }
6182 else
6183 {
6184 /* None of the sections fitted inside the current segment.
6185 Change the current segment's physical address to match
6186 the LMA of the first section. */
bc67d8a6 6187 map->p_paddr = suggested_lma;
72730e0c
AM
6188 }
6189
bc67d8a6
NC
6190 /* Offset the segment physical address from the lma
6191 to allow for space taken up by elf headers. */
6192 if (map->includes_filehdr)
010c8431
AM
6193 {
6194 if (map->p_paddr >= iehdr->e_ehsize)
6195 map->p_paddr -= iehdr->e_ehsize;
6196 else
6197 {
6198 map->includes_filehdr = FALSE;
6199 map->includes_phdrs = FALSE;
6200 }
6201 }
252b5132 6202
bc67d8a6
NC
6203 if (map->includes_phdrs)
6204 {
010c8431
AM
6205 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
6206 {
6207 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
6208
6209 /* iehdr->e_phnum is just an estimate of the number
6210 of program headers that we will need. Make a note
6211 here of the number we used and the segment we chose
6212 to hold these headers, so that we can adjust the
6213 offset when we know the correct value. */
6214 phdr_adjust_num = iehdr->e_phnum;
6215 phdr_adjust_seg = map;
6216 }
6217 else
6218 map->includes_phdrs = FALSE;
bc67d8a6 6219 }
252b5132
RH
6220 }
6221
6222 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 6223 those that fit to the current segment and removing them from the
252b5132
RH
6224 sections array; but making sure not to leave large gaps. Once all
6225 possible sections have been assigned to the current segment it is
6226 added to the list of built segments and if sections still remain
6227 to be assigned, a new segment is constructed before repeating
6228 the loop. */
6229 isec = 0;
6230 do
6231 {
bc67d8a6 6232 map->count = 0;
252b5132 6233 suggested_lma = 0;
0067a569 6234 first_suggested_lma = TRUE;
252b5132
RH
6235
6236 /* Fill the current segment with sections that fit. */
bc67d8a6 6237 for (j = 0; j < section_count; j++)
252b5132 6238 {
bc67d8a6 6239 section = sections[j];
252b5132 6240
bc67d8a6 6241 if (section == NULL)
252b5132
RH
6242 continue;
6243
bc67d8a6 6244 output_section = section->output_section;
252b5132 6245
bc67d8a6 6246 BFD_ASSERT (output_section != NULL);
c044fabd 6247
bc67d8a6
NC
6248 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
6249 || IS_COREFILE_NOTE (segment, section))
252b5132 6250 {
bc67d8a6 6251 if (map->count == 0)
252b5132
RH
6252 {
6253 /* If the first section in a segment does not start at
bc67d8a6
NC
6254 the beginning of the segment, then something is
6255 wrong. */
0067a569
AM
6256 if (output_section->lma
6257 != (map->p_paddr
6258 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
6259 + (map->includes_phdrs
6260 ? iehdr->e_phnum * iehdr->e_phentsize
6261 : 0)))
252b5132
RH
6262 abort ();
6263 }
6264 else
6265 {
0067a569 6266 asection *prev_sec;
252b5132 6267
bc67d8a6 6268 prev_sec = map->sections[map->count - 1];
252b5132
RH
6269
6270 /* If the gap between the end of the previous section
bc67d8a6
NC
6271 and the start of this section is more than
6272 maxpagesize then we need to start a new segment. */
eea6121a 6273 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 6274 maxpagesize)
caf47ea6 6275 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 6276 || (prev_sec->lma + prev_sec->size
079e9a2f 6277 > output_section->lma))
252b5132 6278 {
0067a569
AM
6279 if (first_suggested_lma)
6280 {
6281 suggested_lma = output_section->lma;
6282 first_suggested_lma = FALSE;
6283 }
252b5132
RH
6284
6285 continue;
6286 }
6287 }
6288
bc67d8a6 6289 map->sections[map->count++] = output_section;
252b5132
RH
6290 ++isec;
6291 sections[j] = NULL;
b34976b6 6292 section->segment_mark = TRUE;
252b5132 6293 }
0067a569
AM
6294 else if (first_suggested_lma)
6295 {
6296 suggested_lma = output_section->lma;
6297 first_suggested_lma = FALSE;
6298 }
252b5132
RH
6299 }
6300
bc67d8a6 6301 BFD_ASSERT (map->count > 0);
252b5132
RH
6302
6303 /* Add the current segment to the list of built segments. */
c044fabd
KH
6304 *pointer_to_map = map;
6305 pointer_to_map = &map->next;
252b5132 6306
bc67d8a6 6307 if (isec < section_count)
252b5132
RH
6308 {
6309 /* We still have not allocated all of the sections to
6310 segments. Create a new segment here, initialise it
6311 and carry on looping. */
dc810e39
AM
6312 amt = sizeof (struct elf_segment_map);
6313 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
5964fc3a 6314 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 6315 if (map == NULL)
5ed6aba4
NC
6316 {
6317 free (sections);
6318 return FALSE;
6319 }
252b5132
RH
6320
6321 /* Initialise the fields of the segment map. Set the physical
6322 physical address to the LMA of the first section that has
6323 not yet been assigned. */
0067a569
AM
6324 map->next = NULL;
6325 map->p_type = segment->p_type;
6326 map->p_flags = segment->p_flags;
6327 map->p_flags_valid = 1;
6328 map->p_paddr = suggested_lma;
5c44b38e 6329 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 6330 map->includes_filehdr = 0;
0067a569 6331 map->includes_phdrs = 0;
252b5132
RH
6332 }
6333 }
bc67d8a6 6334 while (isec < section_count);
252b5132
RH
6335
6336 free (sections);
6337 }
6338
12bd6957 6339 elf_seg_map (obfd) = map_first;
bc67d8a6
NC
6340
6341 /* If we had to estimate the number of program headers that were
9ad5cbcf 6342 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
6343 the offset if necessary. */
6344 if (phdr_adjust_seg != NULL)
6345 {
6346 unsigned int count;
c044fabd 6347
bc67d8a6 6348 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 6349 count++;
252b5132 6350
bc67d8a6
NC
6351 if (count > phdr_adjust_num)
6352 phdr_adjust_seg->p_paddr
6353 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
6354 }
c044fabd 6355
bc67d8a6 6356#undef SEGMENT_END
eecdbe52 6357#undef SECTION_SIZE
bc67d8a6
NC
6358#undef IS_CONTAINED_BY_VMA
6359#undef IS_CONTAINED_BY_LMA
0efc80c8 6360#undef IS_NOTE
252b5132 6361#undef IS_COREFILE_NOTE
bc67d8a6 6362#undef IS_SOLARIS_PT_INTERP
9f17e2a6 6363#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
6364#undef INCLUDE_SECTION_IN_SEGMENT
6365#undef SEGMENT_AFTER_SEGMENT
6366#undef SEGMENT_OVERLAPS
b34976b6 6367 return TRUE;
252b5132
RH
6368}
6369
84d1d650
L
6370/* Copy ELF program header information. */
6371
6372static bfd_boolean
6373copy_elf_program_header (bfd *ibfd, bfd *obfd)
6374{
6375 Elf_Internal_Ehdr *iehdr;
6376 struct elf_segment_map *map;
6377 struct elf_segment_map *map_first;
6378 struct elf_segment_map **pointer_to_map;
6379 Elf_Internal_Phdr *segment;
6380 unsigned int i;
6381 unsigned int num_segments;
6382 bfd_boolean phdr_included = FALSE;
88967714 6383 bfd_boolean p_paddr_valid;
84d1d650
L
6384
6385 iehdr = elf_elfheader (ibfd);
6386
6387 map_first = NULL;
6388 pointer_to_map = &map_first;
6389
88967714
AM
6390 /* If all the segment p_paddr fields are zero, don't set
6391 map->p_paddr_valid. */
6392 p_paddr_valid = FALSE;
84d1d650 6393 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
6394 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6395 i < num_segments;
6396 i++, segment++)
6397 if (segment->p_paddr != 0)
6398 {
6399 p_paddr_valid = TRUE;
6400 break;
6401 }
6402
84d1d650
L
6403 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6404 i < num_segments;
6405 i++, segment++)
6406 {
6407 asection *section;
6408 unsigned int section_count;
6409 bfd_size_type amt;
6410 Elf_Internal_Shdr *this_hdr;
53020534 6411 asection *first_section = NULL;
a76e6f2f 6412 asection *lowest_section;
84d1d650 6413
84d1d650
L
6414 /* Compute how many sections are in this segment. */
6415 for (section = ibfd->sections, section_count = 0;
6416 section != NULL;
6417 section = section->next)
6418 {
6419 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6420 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 6421 {
a76e6f2f
AM
6422 if (first_section == NULL)
6423 first_section = section;
3271a814
NS
6424 section_count++;
6425 }
84d1d650
L
6426 }
6427
6428 /* Allocate a segment map big enough to contain
6429 all of the sections we have selected. */
6430 amt = sizeof (struct elf_segment_map);
6431 if (section_count != 0)
6432 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6433 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
6434 if (map == NULL)
6435 return FALSE;
6436
6437 /* Initialize the fields of the output segment map with the
6438 input segment. */
6439 map->next = NULL;
6440 map->p_type = segment->p_type;
6441 map->p_flags = segment->p_flags;
6442 map->p_flags_valid = 1;
6443 map->p_paddr = segment->p_paddr;
88967714 6444 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
6445 map->p_align = segment->p_align;
6446 map->p_align_valid = 1;
3271a814 6447 map->p_vaddr_offset = 0;
84d1d650 6448
04c3a755
NS
6449 if (map->p_type == PT_GNU_RELRO
6450 || map->p_type == PT_GNU_STACK)
b10a8ae0
L
6451 {
6452 /* The PT_GNU_RELRO segment may contain the first a few
6453 bytes in the .got.plt section even if the whole .got.plt
6454 section isn't in the PT_GNU_RELRO segment. We won't
04c3a755
NS
6455 change the size of the PT_GNU_RELRO segment.
6456 Similarly, PT_GNU_STACK size is significant on uclinux
6457 systems. */
9433b9b1 6458 map->p_size = segment->p_memsz;
b10a8ae0
L
6459 map->p_size_valid = 1;
6460 }
6461
84d1d650
L
6462 /* Determine if this segment contains the ELF file header
6463 and if it contains the program headers themselves. */
6464 map->includes_filehdr = (segment->p_offset == 0
6465 && segment->p_filesz >= iehdr->e_ehsize);
6466
6467 map->includes_phdrs = 0;
6468 if (! phdr_included || segment->p_type != PT_LOAD)
6469 {
6470 map->includes_phdrs =
6471 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6472 && (segment->p_offset + segment->p_filesz
6473 >= ((bfd_vma) iehdr->e_phoff
6474 + iehdr->e_phnum * iehdr->e_phentsize)));
6475
6476 if (segment->p_type == PT_LOAD && map->includes_phdrs)
6477 phdr_included = TRUE;
6478 }
6479
bbefd0a9 6480 lowest_section = NULL;
84d1d650
L
6481 if (section_count != 0)
6482 {
6483 unsigned int isec = 0;
6484
53020534 6485 for (section = first_section;
84d1d650
L
6486 section != NULL;
6487 section = section->next)
6488 {
6489 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6490 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
6491 {
6492 map->sections[isec++] = section->output_section;
a76e6f2f
AM
6493 if ((section->flags & SEC_ALLOC) != 0)
6494 {
6495 bfd_vma seg_off;
6496
bbefd0a9
AM
6497 if (lowest_section == NULL
6498 || section->lma < lowest_section->lma)
fb8a5684
AM
6499 lowest_section = section;
6500
a76e6f2f
AM
6501 /* Section lmas are set up from PT_LOAD header
6502 p_paddr in _bfd_elf_make_section_from_shdr.
6503 If this header has a p_paddr that disagrees
6504 with the section lma, flag the p_paddr as
6505 invalid. */
6506 if ((section->flags & SEC_LOAD) != 0)
6507 seg_off = this_hdr->sh_offset - segment->p_offset;
6508 else
6509 seg_off = this_hdr->sh_addr - segment->p_vaddr;
6510 if (section->lma - segment->p_paddr != seg_off)
6511 map->p_paddr_valid = FALSE;
6512 }
53020534
L
6513 if (isec == section_count)
6514 break;
6515 }
84d1d650
L
6516 }
6517 }
6518
a76e6f2f
AM
6519 if (map->includes_filehdr && lowest_section != NULL)
6520 /* We need to keep the space used by the headers fixed. */
6521 map->header_size = lowest_section->vma - segment->p_vaddr;
d324f6d6 6522
a76e6f2f
AM
6523 if (!map->includes_phdrs
6524 && !map->includes_filehdr
6525 && map->p_paddr_valid)
6526 /* There is some other padding before the first section. */
6527 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
6528 - segment->p_paddr);
6529
84d1d650
L
6530 map->count = section_count;
6531 *pointer_to_map = map;
6532 pointer_to_map = &map->next;
6533 }
6534
12bd6957 6535 elf_seg_map (obfd) = map_first;
84d1d650
L
6536 return TRUE;
6537}
6538
6539/* Copy private BFD data. This copies or rewrites ELF program header
6540 information. */
6541
6542static bfd_boolean
6543copy_private_bfd_data (bfd *ibfd, bfd *obfd)
6544{
84d1d650
L
6545 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6546 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6547 return TRUE;
6548
6549 if (elf_tdata (ibfd)->phdr == NULL)
6550 return TRUE;
6551
6552 if (ibfd->xvec == obfd->xvec)
6553 {
cb3ff1e5
NC
6554 /* Check to see if any sections in the input BFD
6555 covered by ELF program header have changed. */
d55ce4e2 6556 Elf_Internal_Phdr *segment;
84d1d650
L
6557 asection *section, *osec;
6558 unsigned int i, num_segments;
6559 Elf_Internal_Shdr *this_hdr;
147d51c2
L
6560 const struct elf_backend_data *bed;
6561
6562 bed = get_elf_backend_data (ibfd);
6563
6564 /* Regenerate the segment map if p_paddr is set to 0. */
6565 if (bed->want_p_paddr_set_to_zero)
6566 goto rewrite;
84d1d650
L
6567
6568 /* Initialize the segment mark field. */
6569 for (section = obfd->sections; section != NULL;
6570 section = section->next)
6571 section->segment_mark = FALSE;
6572
6573 num_segments = elf_elfheader (ibfd)->e_phnum;
6574 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6575 i < num_segments;
6576 i++, segment++)
6577 {
5f6999aa
NC
6578 /* PR binutils/3535. The Solaris linker always sets the p_paddr
6579 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
6580 which severly confuses things, so always regenerate the segment
6581 map in this case. */
6582 if (segment->p_paddr == 0
6583 && segment->p_memsz == 0
6584 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 6585 goto rewrite;
5f6999aa 6586
84d1d650
L
6587 for (section = ibfd->sections;
6588 section != NULL; section = section->next)
6589 {
6590 /* We mark the output section so that we know it comes
6591 from the input BFD. */
6592 osec = section->output_section;
6593 if (osec)
6594 osec->segment_mark = TRUE;
6595
6596 /* Check if this section is covered by the segment. */
6597 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6598 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
6599 {
6600 /* FIXME: Check if its output section is changed or
6601 removed. What else do we need to check? */
6602 if (osec == NULL
6603 || section->flags != osec->flags
6604 || section->lma != osec->lma
6605 || section->vma != osec->vma
6606 || section->size != osec->size
6607 || section->rawsize != osec->rawsize
6608 || section->alignment_power != osec->alignment_power)
6609 goto rewrite;
6610 }
6611 }
6612 }
6613
cb3ff1e5 6614 /* Check to see if any output section do not come from the
84d1d650
L
6615 input BFD. */
6616 for (section = obfd->sections; section != NULL;
6617 section = section->next)
6618 {
6619 if (section->segment_mark == FALSE)
6620 goto rewrite;
6621 else
6622 section->segment_mark = FALSE;
6623 }
6624
6625 return copy_elf_program_header (ibfd, obfd);
6626 }
6627
6628rewrite:
f1d85785
L
6629 if (ibfd->xvec == obfd->xvec)
6630 {
6631 /* When rewriting program header, set the output maxpagesize to
6632 the maximum alignment of input PT_LOAD segments. */
6633 Elf_Internal_Phdr *segment;
6634 unsigned int i;
6635 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
6636 bfd_vma maxpagesize = 0;
6637
6638 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6639 i < num_segments;
6640 i++, segment++)
6641 if (segment->p_type == PT_LOAD
6642 && maxpagesize < segment->p_align)
c86934ce
NC
6643 {
6644 /* PR 17512: file: f17299af. */
6645 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
6646 (*_bfd_error_handler) (_("\
6647%B: warning: segment alignment of 0x%llx is too large"),
6648 ibfd, (long long) segment->p_align);
6649 else
6650 maxpagesize = segment->p_align;
6651 }
f1d85785
L
6652
6653 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
6654 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
6655 }
6656
84d1d650
L
6657 return rewrite_elf_program_header (ibfd, obfd);
6658}
6659
ccd2ec6a
L
6660/* Initialize private output section information from input section. */
6661
6662bfd_boolean
6663_bfd_elf_init_private_section_data (bfd *ibfd,
6664 asection *isec,
6665 bfd *obfd,
6666 asection *osec,
6667 struct bfd_link_info *link_info)
6668
6669{
6670 Elf_Internal_Shdr *ihdr, *ohdr;
dfa7b0b8 6671 bfd_boolean final_link = link_info != NULL && !link_info->relocatable;
ccd2ec6a
L
6672
6673 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6674 || obfd->xvec->flavour != bfd_target_elf_flavour)
6675 return TRUE;
6676
ba85c43e
NC
6677 BFD_ASSERT (elf_section_data (osec) != NULL);
6678
dfa7b0b8
AM
6679 /* For objcopy and relocatable link, don't copy the output ELF
6680 section type from input if the output BFD section flags have been
6681 set to something different. For a final link allow some flags
6682 that the linker clears to differ. */
42bb2e33 6683 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
6684 && (osec->flags == isec->flags
6685 || (final_link
6686 && ((osec->flags ^ isec->flags)
0814be7d 6687 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 6688 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
6689
6690 /* FIXME: Is this correct for all OS/PROC specific flags? */
6691 elf_section_flags (osec) |= (elf_section_flags (isec)
6692 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
6693
6694 /* Set things up for objcopy and relocatable link. The output
6695 SHT_GROUP section will have its elf_next_in_group pointing back
6696 to the input group members. Ignore linker created group section.
6697 See elfNN_ia64_object_p in elfxx-ia64.c. */
dfa7b0b8 6698 if (!final_link)
ccd2ec6a
L
6699 {
6700 if (elf_sec_group (isec) == NULL
6701 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
6702 {
6703 if (elf_section_flags (isec) & SHF_GROUP)
6704 elf_section_flags (osec) |= SHF_GROUP;
6705 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 6706 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a 6707 }
68f5ff89
L
6708
6709 /* If not decompress, preserve SHF_COMPRESSED. */
6710 if ((ibfd->flags & BFD_DECOMPRESS) == 0)
6711 elf_section_flags (osec) |= (elf_section_flags (isec)
6712 & SHF_COMPRESSED);
ccd2ec6a
L
6713 }
6714
6715 ihdr = &elf_section_data (isec)->this_hdr;
6716
6717 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
6718 don't use the output section of the linked-to section since it
6719 may be NULL at this point. */
6720 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
6721 {
6722 ohdr = &elf_section_data (osec)->this_hdr;
6723 ohdr->sh_flags |= SHF_LINK_ORDER;
6724 elf_linked_to_section (osec) = elf_linked_to_section (isec);
6725 }
6726
6727 osec->use_rela_p = isec->use_rela_p;
6728
6729 return TRUE;
6730}
6731
252b5132
RH
6732/* Copy private section information. This copies over the entsize
6733 field, and sometimes the info field. */
6734
b34976b6 6735bfd_boolean
217aa764
AM
6736_bfd_elf_copy_private_section_data (bfd *ibfd,
6737 asection *isec,
6738 bfd *obfd,
6739 asection *osec)
252b5132
RH
6740{
6741 Elf_Internal_Shdr *ihdr, *ohdr;
6742
6743 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6744 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6745 return TRUE;
252b5132 6746
252b5132
RH
6747 ihdr = &elf_section_data (isec)->this_hdr;
6748 ohdr = &elf_section_data (osec)->this_hdr;
6749
6750 ohdr->sh_entsize = ihdr->sh_entsize;
6751
6752 if (ihdr->sh_type == SHT_SYMTAB
6753 || ihdr->sh_type == SHT_DYNSYM
6754 || ihdr->sh_type == SHT_GNU_verneed
6755 || ihdr->sh_type == SHT_GNU_verdef)
6756 ohdr->sh_info = ihdr->sh_info;
6757
ccd2ec6a
L
6758 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6759 NULL);
252b5132
RH
6760}
6761
d0bf826b
AM
6762/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
6763 necessary if we are removing either the SHT_GROUP section or any of
6764 the group member sections. DISCARDED is the value that a section's
6765 output_section has if the section will be discarded, NULL when this
6766 function is called from objcopy, bfd_abs_section_ptr when called
6767 from the linker. */
80fccad2
BW
6768
6769bfd_boolean
d0bf826b 6770_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 6771{
30288845
AM
6772 asection *isec;
6773
30288845 6774 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 6775 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
6776 {
6777 asection *first = elf_next_in_group (isec);
6778 asection *s = first;
d0bf826b
AM
6779 bfd_size_type removed = 0;
6780
30288845
AM
6781 while (s != NULL)
6782 {
415f38a6
AM
6783 /* If this member section is being output but the
6784 SHT_GROUP section is not, then clear the group info
6785 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
6786 if (s->output_section != discarded
6787 && isec->output_section == discarded)
30288845
AM
6788 {
6789 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6790 elf_group_name (s->output_section) = NULL;
6791 }
415f38a6
AM
6792 /* Conversely, if the member section is not being output
6793 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
6794 else if (s->output_section == discarded
6795 && isec->output_section != discarded)
6796 removed += 4;
30288845
AM
6797 s = elf_next_in_group (s);
6798 if (s == first)
6799 break;
6800 }
d0bf826b
AM
6801 if (removed != 0)
6802 {
6803 if (discarded != NULL)
6804 {
6805 /* If we've been called for ld -r, then we need to
6806 adjust the input section size. This function may
6807 be called multiple times, so save the original
6808 size. */
6809 if (isec->rawsize == 0)
6810 isec->rawsize = isec->size;
6811 isec->size = isec->rawsize - removed;
6812 }
6813 else
6814 {
6815 /* Adjust the output section size when called from
6816 objcopy. */
6817 isec->output_section->size -= removed;
6818 }
6819 }
30288845
AM
6820 }
6821
80fccad2
BW
6822 return TRUE;
6823}
6824
d0bf826b
AM
6825/* Copy private header information. */
6826
6827bfd_boolean
6828_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6829{
6830 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6831 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6832 return TRUE;
6833
6834 /* Copy over private BFD data if it has not already been copied.
6835 This must be done here, rather than in the copy_private_bfd_data
6836 entry point, because the latter is called after the section
6837 contents have been set, which means that the program headers have
6838 already been worked out. */
12bd6957 6839 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
d0bf826b
AM
6840 {
6841 if (! copy_private_bfd_data (ibfd, obfd))
6842 return FALSE;
6843 }
6844
6845 return _bfd_elf_fixup_group_sections (ibfd, NULL);
6846}
6847
252b5132
RH
6848/* Copy private symbol information. If this symbol is in a section
6849 which we did not map into a BFD section, try to map the section
6850 index correctly. We use special macro definitions for the mapped
6851 section indices; these definitions are interpreted by the
6852 swap_out_syms function. */
6853
9ad5cbcf
AM
6854#define MAP_ONESYMTAB (SHN_HIOS + 1)
6855#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6856#define MAP_STRTAB (SHN_HIOS + 3)
6857#define MAP_SHSTRTAB (SHN_HIOS + 4)
6858#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6859
b34976b6 6860bfd_boolean
217aa764
AM
6861_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6862 asymbol *isymarg,
6863 bfd *obfd,
6864 asymbol *osymarg)
252b5132
RH
6865{
6866 elf_symbol_type *isym, *osym;
6867
6868 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6869 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6870 return TRUE;
252b5132
RH
6871
6872 isym = elf_symbol_from (ibfd, isymarg);
6873 osym = elf_symbol_from (obfd, osymarg);
6874
6875 if (isym != NULL
8424d8f5 6876 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
6877 && osym != NULL
6878 && bfd_is_abs_section (isym->symbol.section))
6879 {
6880 unsigned int shndx;
6881
6882 shndx = isym->internal_elf_sym.st_shndx;
6883 if (shndx == elf_onesymtab (ibfd))
6884 shndx = MAP_ONESYMTAB;
6885 else if (shndx == elf_dynsymtab (ibfd))
6886 shndx = MAP_DYNSYMTAB;
12bd6957 6887 else if (shndx == elf_strtab_sec (ibfd))
252b5132 6888 shndx = MAP_STRTAB;
12bd6957 6889 else if (shndx == elf_shstrtab_sec (ibfd))
252b5132 6890 shndx = MAP_SHSTRTAB;
12bd6957 6891 else if (shndx == elf_symtab_shndx (ibfd))
9ad5cbcf 6892 shndx = MAP_SYM_SHNDX;
252b5132
RH
6893 osym->internal_elf_sym.st_shndx = shndx;
6894 }
6895
b34976b6 6896 return TRUE;
252b5132
RH
6897}
6898
6899/* Swap out the symbols. */
6900
b34976b6 6901static bfd_boolean
217aa764
AM
6902swap_out_syms (bfd *abfd,
6903 struct bfd_strtab_hash **sttp,
6904 int relocatable_p)
252b5132 6905{
9c5bfbb7 6906 const struct elf_backend_data *bed;
079e9a2f
AM
6907 int symcount;
6908 asymbol **syms;
6909 struct bfd_strtab_hash *stt;
6910 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6911 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6912 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6913 bfd_byte *outbound_syms;
6914 bfd_byte *outbound_shndx;
079e9a2f 6915 int idx;
12bd6957 6916 unsigned int num_locals;
079e9a2f 6917 bfd_size_type amt;
174fd7f9 6918 bfd_boolean name_local_sections;
252b5132 6919
12bd6957 6920 if (!elf_map_symbols (abfd, &num_locals))
b34976b6 6921 return FALSE;
252b5132 6922
c044fabd 6923 /* Dump out the symtabs. */
079e9a2f
AM
6924 stt = _bfd_elf_stringtab_init ();
6925 if (stt == NULL)
b34976b6 6926 return FALSE;
252b5132 6927
079e9a2f
AM
6928 bed = get_elf_backend_data (abfd);
6929 symcount = bfd_get_symcount (abfd);
6930 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6931 symtab_hdr->sh_type = SHT_SYMTAB;
6932 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6933 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
12bd6957 6934 symtab_hdr->sh_info = num_locals + 1;
72de5009 6935 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
6936
6937 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6938 symstrtab_hdr->sh_type = SHT_STRTAB;
6939
a50b1753
NC
6940 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
6941 bed->s->sizeof_sym);
079e9a2f 6942 if (outbound_syms == NULL)
5ed6aba4
NC
6943 {
6944 _bfd_stringtab_free (stt);
6945 return FALSE;
6946 }
217aa764 6947 symtab_hdr->contents = outbound_syms;
252b5132 6948
9ad5cbcf
AM
6949 outbound_shndx = NULL;
6950 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6951 if (symtab_shndx_hdr->sh_name != 0)
6952 {
6953 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
a50b1753
NC
6954 outbound_shndx = (bfd_byte *)
6955 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6956 if (outbound_shndx == NULL)
5ed6aba4
NC
6957 {
6958 _bfd_stringtab_free (stt);
6959 return FALSE;
6960 }
6961
9ad5cbcf
AM
6962 symtab_shndx_hdr->contents = outbound_shndx;
6963 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6964 symtab_shndx_hdr->sh_size = amt;
6965 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6966 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6967 }
6968
589e6347 6969 /* Now generate the data (for "contents"). */
079e9a2f
AM
6970 {
6971 /* Fill in zeroth symbol and swap it out. */
6972 Elf_Internal_Sym sym;
6973 sym.st_name = 0;
6974 sym.st_value = 0;
6975 sym.st_size = 0;
6976 sym.st_info = 0;
6977 sym.st_other = 0;
6978 sym.st_shndx = SHN_UNDEF;
35fc36a8 6979 sym.st_target_internal = 0;
9ad5cbcf 6980 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6981 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6982 if (outbound_shndx != NULL)
6983 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6984 }
252b5132 6985
174fd7f9
RS
6986 name_local_sections
6987 = (bed->elf_backend_name_local_section_symbols
6988 && bed->elf_backend_name_local_section_symbols (abfd));
6989
079e9a2f
AM
6990 syms = bfd_get_outsymbols (abfd);
6991 for (idx = 0; idx < symcount; idx++)
252b5132 6992 {
252b5132 6993 Elf_Internal_Sym sym;
079e9a2f
AM
6994 bfd_vma value = syms[idx]->value;
6995 elf_symbol_type *type_ptr;
6996 flagword flags = syms[idx]->flags;
6997 int type;
252b5132 6998
174fd7f9
RS
6999 if (!name_local_sections
7000 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
7001 {
7002 /* Local section symbols have no name. */
7003 sym.st_name = 0;
7004 }
7005 else
7006 {
7007 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
7008 syms[idx]->name,
b34976b6 7009 TRUE, FALSE);
079e9a2f 7010 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
7011 {
7012 _bfd_stringtab_free (stt);
7013 return FALSE;
7014 }
079e9a2f 7015 }
252b5132 7016
079e9a2f 7017 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 7018
079e9a2f
AM
7019 if ((flags & BSF_SECTION_SYM) == 0
7020 && bfd_is_com_section (syms[idx]->section))
7021 {
7022 /* ELF common symbols put the alignment into the `value' field,
7023 and the size into the `size' field. This is backwards from
7024 how BFD handles it, so reverse it here. */
7025 sym.st_size = value;
7026 if (type_ptr == NULL
7027 || type_ptr->internal_elf_sym.st_value == 0)
7028 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
7029 else
7030 sym.st_value = type_ptr->internal_elf_sym.st_value;
7031 sym.st_shndx = _bfd_elf_section_from_bfd_section
7032 (abfd, syms[idx]->section);
7033 }
7034 else
7035 {
7036 asection *sec = syms[idx]->section;
cb33740c 7037 unsigned int shndx;
252b5132 7038
079e9a2f
AM
7039 if (sec->output_section)
7040 {
7041 value += sec->output_offset;
7042 sec = sec->output_section;
7043 }
589e6347 7044
079e9a2f
AM
7045 /* Don't add in the section vma for relocatable output. */
7046 if (! relocatable_p)
7047 value += sec->vma;
7048 sym.st_value = value;
7049 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
7050
7051 if (bfd_is_abs_section (sec)
7052 && type_ptr != NULL
7053 && type_ptr->internal_elf_sym.st_shndx != 0)
7054 {
7055 /* This symbol is in a real ELF section which we did
7056 not create as a BFD section. Undo the mapping done
7057 by copy_private_symbol_data. */
7058 shndx = type_ptr->internal_elf_sym.st_shndx;
7059 switch (shndx)
7060 {
7061 case MAP_ONESYMTAB:
7062 shndx = elf_onesymtab (abfd);
7063 break;
7064 case MAP_DYNSYMTAB:
7065 shndx = elf_dynsymtab (abfd);
7066 break;
7067 case MAP_STRTAB:
12bd6957 7068 shndx = elf_strtab_sec (abfd);
079e9a2f
AM
7069 break;
7070 case MAP_SHSTRTAB:
12bd6957 7071 shndx = elf_shstrtab_sec (abfd);
079e9a2f 7072 break;
9ad5cbcf 7073 case MAP_SYM_SHNDX:
12bd6957 7074 shndx = elf_symtab_shndx (abfd);
9ad5cbcf 7075 break;
079e9a2f 7076 default:
15bc576a 7077 shndx = SHN_ABS;
079e9a2f
AM
7078 break;
7079 }
7080 }
7081 else
7082 {
7083 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 7084
cb33740c 7085 if (shndx == SHN_BAD)
079e9a2f
AM
7086 {
7087 asection *sec2;
7088
7089 /* Writing this would be a hell of a lot easier if
7090 we had some decent documentation on bfd, and
7091 knew what to expect of the library, and what to
7092 demand of applications. For example, it
7093 appears that `objcopy' might not set the
7094 section of a symbol to be a section that is
7095 actually in the output file. */
7096 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
7097 if (sec2 == NULL)
7098 {
7099 _bfd_error_handler (_("\
7100Unable to find equivalent output section for symbol '%s' from section '%s'"),
7101 syms[idx]->name ? syms[idx]->name : "<Local sym>",
7102 sec->name);
811072d8 7103 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 7104 _bfd_stringtab_free (stt);
589e6347
NC
7105 return FALSE;
7106 }
811072d8 7107
079e9a2f 7108 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
cb33740c 7109 BFD_ASSERT (shndx != SHN_BAD);
079e9a2f
AM
7110 }
7111 }
252b5132 7112
079e9a2f
AM
7113 sym.st_shndx = shndx;
7114 }
252b5132 7115
13ae64f3
JJ
7116 if ((flags & BSF_THREAD_LOCAL) != 0)
7117 type = STT_TLS;
d8045f23
NC
7118 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
7119 type = STT_GNU_IFUNC;
13ae64f3 7120 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
7121 type = STT_FUNC;
7122 else if ((flags & BSF_OBJECT) != 0)
7123 type = STT_OBJECT;
d9352518
DB
7124 else if ((flags & BSF_RELC) != 0)
7125 type = STT_RELC;
7126 else if ((flags & BSF_SRELC) != 0)
7127 type = STT_SRELC;
079e9a2f
AM
7128 else
7129 type = STT_NOTYPE;
252b5132 7130
13ae64f3
JJ
7131 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
7132 type = STT_TLS;
7133
589e6347 7134 /* Processor-specific types. */
079e9a2f
AM
7135 if (type_ptr != NULL
7136 && bed->elf_backend_get_symbol_type)
7137 type = ((*bed->elf_backend_get_symbol_type)
7138 (&type_ptr->internal_elf_sym, type));
252b5132 7139
079e9a2f
AM
7140 if (flags & BSF_SECTION_SYM)
7141 {
7142 if (flags & BSF_GLOBAL)
7143 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
7144 else
7145 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
7146 }
7147 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 7148 {
504b7d20 7149#ifdef USE_STT_COMMON
0a40daed
MK
7150 if (type == STT_OBJECT)
7151 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_COMMON);
7152 else
504b7d20 7153#endif
c91e322a 7154 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 7155 }
079e9a2f
AM
7156 else if (bfd_is_und_section (syms[idx]->section))
7157 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
7158 ? STB_WEAK
7159 : STB_GLOBAL),
7160 type);
7161 else if (flags & BSF_FILE)
7162 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
7163 else
7164 {
7165 int bind = STB_LOCAL;
252b5132 7166
079e9a2f
AM
7167 if (flags & BSF_LOCAL)
7168 bind = STB_LOCAL;
3e7a7d11
NC
7169 else if (flags & BSF_GNU_UNIQUE)
7170 bind = STB_GNU_UNIQUE;
079e9a2f
AM
7171 else if (flags & BSF_WEAK)
7172 bind = STB_WEAK;
7173 else if (flags & BSF_GLOBAL)
7174 bind = STB_GLOBAL;
252b5132 7175
079e9a2f
AM
7176 sym.st_info = ELF_ST_INFO (bind, type);
7177 }
252b5132 7178
079e9a2f 7179 if (type_ptr != NULL)
35fc36a8
RS
7180 {
7181 sym.st_other = type_ptr->internal_elf_sym.st_other;
7182 sym.st_target_internal
7183 = type_ptr->internal_elf_sym.st_target_internal;
7184 }
079e9a2f 7185 else
35fc36a8
RS
7186 {
7187 sym.st_other = 0;
7188 sym.st_target_internal = 0;
7189 }
252b5132 7190
9ad5cbcf 7191 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 7192 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
7193 if (outbound_shndx != NULL)
7194 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 7195 }
252b5132 7196
079e9a2f
AM
7197 *sttp = stt;
7198 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
7199 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 7200
079e9a2f
AM
7201 symstrtab_hdr->sh_flags = 0;
7202 symstrtab_hdr->sh_addr = 0;
7203 symstrtab_hdr->sh_entsize = 0;
7204 symstrtab_hdr->sh_link = 0;
7205 symstrtab_hdr->sh_info = 0;
7206 symstrtab_hdr->sh_addralign = 1;
252b5132 7207
b34976b6 7208 return TRUE;
252b5132
RH
7209}
7210
7211/* Return the number of bytes required to hold the symtab vector.
7212
7213 Note that we base it on the count plus 1, since we will null terminate
7214 the vector allocated based on this size. However, the ELF symbol table
7215 always has a dummy entry as symbol #0, so it ends up even. */
7216
7217long
217aa764 7218_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
7219{
7220 long symcount;
7221 long symtab_size;
7222 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
7223
7224 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
7225 symtab_size = (symcount + 1) * (sizeof (asymbol *));
7226 if (symcount > 0)
7227 symtab_size -= sizeof (asymbol *);
252b5132
RH
7228
7229 return symtab_size;
7230}
7231
7232long
217aa764 7233_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
7234{
7235 long symcount;
7236 long symtab_size;
7237 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
7238
7239 if (elf_dynsymtab (abfd) == 0)
7240 {
7241 bfd_set_error (bfd_error_invalid_operation);
7242 return -1;
7243 }
7244
7245 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
7246 symtab_size = (symcount + 1) * (sizeof (asymbol *));
7247 if (symcount > 0)
7248 symtab_size -= sizeof (asymbol *);
252b5132
RH
7249
7250 return symtab_size;
7251}
7252
7253long
217aa764
AM
7254_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
7255 sec_ptr asect)
252b5132
RH
7256{
7257 return (asect->reloc_count + 1) * sizeof (arelent *);
7258}
7259
7260/* Canonicalize the relocs. */
7261
7262long
217aa764
AM
7263_bfd_elf_canonicalize_reloc (bfd *abfd,
7264 sec_ptr section,
7265 arelent **relptr,
7266 asymbol **symbols)
252b5132
RH
7267{
7268 arelent *tblptr;
7269 unsigned int i;
9c5bfbb7 7270 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 7271
b34976b6 7272 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
7273 return -1;
7274
7275 tblptr = section->relocation;
7276 for (i = 0; i < section->reloc_count; i++)
7277 *relptr++ = tblptr++;
7278
7279 *relptr = NULL;
7280
7281 return section->reloc_count;
7282}
7283
7284long
6cee3f79 7285_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 7286{
9c5bfbb7 7287 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 7288 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
7289
7290 if (symcount >= 0)
7291 bfd_get_symcount (abfd) = symcount;
7292 return symcount;
7293}
7294
7295long
217aa764
AM
7296_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
7297 asymbol **allocation)
252b5132 7298{
9c5bfbb7 7299 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 7300 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
7301
7302 if (symcount >= 0)
7303 bfd_get_dynamic_symcount (abfd) = symcount;
7304 return symcount;
252b5132
RH
7305}
7306
8615f3f2
AM
7307/* Return the size required for the dynamic reloc entries. Any loadable
7308 section that was actually installed in the BFD, and has type SHT_REL
7309 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
7310 dynamic reloc section. */
252b5132
RH
7311
7312long
217aa764 7313_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
7314{
7315 long ret;
7316 asection *s;
7317
7318 if (elf_dynsymtab (abfd) == 0)
7319 {
7320 bfd_set_error (bfd_error_invalid_operation);
7321 return -1;
7322 }
7323
7324 ret = sizeof (arelent *);
7325 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 7326 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
7327 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
7328 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 7329 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
7330 * sizeof (arelent *));
7331
7332 return ret;
7333}
7334
8615f3f2
AM
7335/* Canonicalize the dynamic relocation entries. Note that we return the
7336 dynamic relocations as a single block, although they are actually
7337 associated with particular sections; the interface, which was
7338 designed for SunOS style shared libraries, expects that there is only
7339 one set of dynamic relocs. Any loadable section that was actually
7340 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
7341 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
7342
7343long
217aa764
AM
7344_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
7345 arelent **storage,
7346 asymbol **syms)
252b5132 7347{
217aa764 7348 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
7349 asection *s;
7350 long ret;
7351
7352 if (elf_dynsymtab (abfd) == 0)
7353 {
7354 bfd_set_error (bfd_error_invalid_operation);
7355 return -1;
7356 }
7357
7358 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
7359 ret = 0;
7360 for (s = abfd->sections; s != NULL; s = s->next)
7361 {
266b05cf 7362 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
7363 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
7364 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
7365 {
7366 arelent *p;
7367 long count, i;
7368
b34976b6 7369 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 7370 return -1;
eea6121a 7371 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
7372 p = s->relocation;
7373 for (i = 0; i < count; i++)
7374 *storage++ = p++;
7375 ret += count;
7376 }
7377 }
7378
7379 *storage = NULL;
7380
7381 return ret;
7382}
7383\f
7384/* Read in the version information. */
7385
b34976b6 7386bfd_boolean
fc0e6df6 7387_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
7388{
7389 bfd_byte *contents = NULL;
fc0e6df6
PB
7390 unsigned int freeidx = 0;
7391
7392 if (elf_dynverref (abfd) != 0)
7393 {
7394 Elf_Internal_Shdr *hdr;
7395 Elf_External_Verneed *everneed;
7396 Elf_Internal_Verneed *iverneed;
7397 unsigned int i;
d0fb9a8d 7398 bfd_byte *contents_end;
fc0e6df6
PB
7399
7400 hdr = &elf_tdata (abfd)->dynverref_hdr;
7401
601a03ba 7402 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verneed))
d0fb9a8d 7403 {
601a03ba
AM
7404error_return_bad_verref:
7405 (*_bfd_error_handler)
7406 (_("%B: .gnu.version_r invalid entry"), abfd);
7407 bfd_set_error (bfd_error_bad_value);
d0fb9a8d
JJ
7408error_return_verref:
7409 elf_tdata (abfd)->verref = NULL;
7410 elf_tdata (abfd)->cverrefs = 0;
7411 goto error_return;
7412 }
601a03ba
AM
7413
7414 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
7415 if (contents == NULL)
7416 goto error_return_verref;
7417
fc0e6df6
PB
7418 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
7419 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 7420 goto error_return_verref;
fc0e6df6 7421
601a03ba
AM
7422 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
7423 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
7424
7425 if (elf_tdata (abfd)->verref == NULL)
d0fb9a8d
JJ
7426 goto error_return_verref;
7427
7428 BFD_ASSERT (sizeof (Elf_External_Verneed)
7429 == sizeof (Elf_External_Vernaux));
7430 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
7431 everneed = (Elf_External_Verneed *) contents;
7432 iverneed = elf_tdata (abfd)->verref;
7433 for (i = 0; i < hdr->sh_info; i++, iverneed++)
7434 {
7435 Elf_External_Vernaux *evernaux;
7436 Elf_Internal_Vernaux *ivernaux;
7437 unsigned int j;
7438
7439 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
7440
7441 iverneed->vn_bfd = abfd;
7442
7443 iverneed->vn_filename =
7444 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7445 iverneed->vn_file);
7446 if (iverneed->vn_filename == NULL)
601a03ba 7447 goto error_return_bad_verref;
fc0e6df6 7448
d0fb9a8d
JJ
7449 if (iverneed->vn_cnt == 0)
7450 iverneed->vn_auxptr = NULL;
7451 else
7452 {
a50b1753
NC
7453 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
7454 bfd_alloc2 (abfd, iverneed->vn_cnt,
7455 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
7456 if (iverneed->vn_auxptr == NULL)
7457 goto error_return_verref;
7458 }
7459
7460 if (iverneed->vn_aux
7461 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 7462 goto error_return_bad_verref;
fc0e6df6
PB
7463
7464 evernaux = ((Elf_External_Vernaux *)
7465 ((bfd_byte *) everneed + iverneed->vn_aux));
7466 ivernaux = iverneed->vn_auxptr;
7467 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
7468 {
7469 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
7470
7471 ivernaux->vna_nodename =
7472 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7473 ivernaux->vna_name);
7474 if (ivernaux->vna_nodename == NULL)
601a03ba 7475 goto error_return_bad_verref;
fc0e6df6 7476
25ff461f
AM
7477 if (ivernaux->vna_other > freeidx)
7478 freeidx = ivernaux->vna_other;
7479
7480 ivernaux->vna_nextptr = NULL;
7481 if (ivernaux->vna_next == 0)
7482 {
7483 iverneed->vn_cnt = j + 1;
7484 break;
7485 }
fc0e6df6
PB
7486 if (j + 1 < iverneed->vn_cnt)
7487 ivernaux->vna_nextptr = ivernaux + 1;
fc0e6df6 7488
d0fb9a8d
JJ
7489 if (ivernaux->vna_next
7490 > (size_t) (contents_end - (bfd_byte *) evernaux))
601a03ba 7491 goto error_return_bad_verref;
d0fb9a8d 7492
fc0e6df6
PB
7493 evernaux = ((Elf_External_Vernaux *)
7494 ((bfd_byte *) evernaux + ivernaux->vna_next));
fc0e6df6
PB
7495 }
7496
25ff461f
AM
7497 iverneed->vn_nextref = NULL;
7498 if (iverneed->vn_next == 0)
7499 break;
fc0e6df6
PB
7500 if (i + 1 < hdr->sh_info)
7501 iverneed->vn_nextref = iverneed + 1;
fc0e6df6 7502
d0fb9a8d
JJ
7503 if (iverneed->vn_next
7504 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 7505 goto error_return_bad_verref;
d0fb9a8d 7506
fc0e6df6
PB
7507 everneed = ((Elf_External_Verneed *)
7508 ((bfd_byte *) everneed + iverneed->vn_next));
7509 }
25ff461f 7510 elf_tdata (abfd)->cverrefs = i;
fc0e6df6
PB
7511
7512 free (contents);
7513 contents = NULL;
7514 }
252b5132
RH
7515
7516 if (elf_dynverdef (abfd) != 0)
7517 {
7518 Elf_Internal_Shdr *hdr;
7519 Elf_External_Verdef *everdef;
7520 Elf_Internal_Verdef *iverdef;
f631889e
UD
7521 Elf_Internal_Verdef *iverdefarr;
7522 Elf_Internal_Verdef iverdefmem;
252b5132 7523 unsigned int i;
062e2358 7524 unsigned int maxidx;
d0fb9a8d 7525 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
7526
7527 hdr = &elf_tdata (abfd)->dynverdef_hdr;
7528
601a03ba
AM
7529 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
7530 {
7531 error_return_bad_verdef:
7532 (*_bfd_error_handler)
7533 (_("%B: .gnu.version_d invalid entry"), abfd);
7534 bfd_set_error (bfd_error_bad_value);
7535 error_return_verdef:
7536 elf_tdata (abfd)->verdef = NULL;
7537 elf_tdata (abfd)->cverdefs = 0;
7538 goto error_return;
7539 }
7540
a50b1753 7541 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132 7542 if (contents == NULL)
601a03ba 7543 goto error_return_verdef;
252b5132 7544 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 7545 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
601a03ba 7546 goto error_return_verdef;
d0fb9a8d
JJ
7547
7548 BFD_ASSERT (sizeof (Elf_External_Verdef)
7549 >= sizeof (Elf_External_Verdaux));
7550 contents_end_def = contents + hdr->sh_size
7551 - sizeof (Elf_External_Verdef);
7552 contents_end_aux = contents + hdr->sh_size
7553 - sizeof (Elf_External_Verdaux);
7554
f631889e
UD
7555 /* We know the number of entries in the section but not the maximum
7556 index. Therefore we have to run through all entries and find
7557 the maximum. */
252b5132 7558 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
7559 maxidx = 0;
7560 for (i = 0; i < hdr->sh_info; ++i)
7561 {
7562 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7563
601a03ba
AM
7564 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
7565 goto error_return_bad_verdef;
062e2358
AM
7566 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
7567 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 7568
25ff461f
AM
7569 if (iverdefmem.vd_next == 0)
7570 break;
7571
d0fb9a8d
JJ
7572 if (iverdefmem.vd_next
7573 > (size_t) (contents_end_def - (bfd_byte *) everdef))
601a03ba 7574 goto error_return_bad_verdef;
d0fb9a8d 7575
f631889e
UD
7576 everdef = ((Elf_External_Verdef *)
7577 ((bfd_byte *) everdef + iverdefmem.vd_next));
7578 }
7579
fc0e6df6
PB
7580 if (default_imported_symver)
7581 {
7582 if (freeidx > maxidx)
7583 maxidx = ++freeidx;
7584 else
7585 freeidx = ++maxidx;
7586 }
201159ec 7587
601a03ba
AM
7588 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7589 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e 7590 if (elf_tdata (abfd)->verdef == NULL)
601a03ba 7591 goto error_return_verdef;
f631889e
UD
7592
7593 elf_tdata (abfd)->cverdefs = maxidx;
7594
7595 everdef = (Elf_External_Verdef *) contents;
7596 iverdefarr = elf_tdata (abfd)->verdef;
7597 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
7598 {
7599 Elf_External_Verdaux *everdaux;
7600 Elf_Internal_Verdaux *iverdaux;
7601 unsigned int j;
7602
f631889e
UD
7603 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7604
d0fb9a8d 7605 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
601a03ba 7606 goto error_return_bad_verdef;
d0fb9a8d 7607
f631889e
UD
7608 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
7609 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
7610
7611 iverdef->vd_bfd = abfd;
7612
d0fb9a8d
JJ
7613 if (iverdef->vd_cnt == 0)
7614 iverdef->vd_auxptr = NULL;
7615 else
7616 {
a50b1753
NC
7617 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7618 bfd_alloc2 (abfd, iverdef->vd_cnt,
7619 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7620 if (iverdef->vd_auxptr == NULL)
7621 goto error_return_verdef;
7622 }
7623
7624 if (iverdef->vd_aux
7625 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
601a03ba 7626 goto error_return_bad_verdef;
252b5132
RH
7627
7628 everdaux = ((Elf_External_Verdaux *)
7629 ((bfd_byte *) everdef + iverdef->vd_aux));
7630 iverdaux = iverdef->vd_auxptr;
7631 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
7632 {
7633 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
7634
7635 iverdaux->vda_nodename =
7636 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7637 iverdaux->vda_name);
7638 if (iverdaux->vda_nodename == NULL)
601a03ba 7639 goto error_return_bad_verdef;
252b5132 7640
25ff461f
AM
7641 iverdaux->vda_nextptr = NULL;
7642 if (iverdaux->vda_next == 0)
7643 {
7644 iverdef->vd_cnt = j + 1;
7645 break;
7646 }
252b5132
RH
7647 if (j + 1 < iverdef->vd_cnt)
7648 iverdaux->vda_nextptr = iverdaux + 1;
252b5132 7649
d0fb9a8d
JJ
7650 if (iverdaux->vda_next
7651 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
601a03ba 7652 goto error_return_bad_verdef;
d0fb9a8d 7653
252b5132
RH
7654 everdaux = ((Elf_External_Verdaux *)
7655 ((bfd_byte *) everdaux + iverdaux->vda_next));
7656 }
7657
d0fb9a8d
JJ
7658 if (iverdef->vd_cnt)
7659 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 7660
25ff461f
AM
7661 iverdef->vd_nextdef = NULL;
7662 if (iverdef->vd_next == 0)
7663 break;
d0fb9a8d 7664 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132 7665 iverdef->vd_nextdef = iverdef + 1;
252b5132
RH
7666
7667 everdef = ((Elf_External_Verdef *)
7668 ((bfd_byte *) everdef + iverdef->vd_next));
7669 }
7670
7671 free (contents);
7672 contents = NULL;
7673 }
fc0e6df6 7674 else if (default_imported_symver)
252b5132 7675 {
fc0e6df6
PB
7676 if (freeidx < 3)
7677 freeidx = 3;
7678 else
7679 freeidx++;
252b5132 7680
a50b1753
NC
7681 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7682 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 7683 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
7684 goto error_return;
7685
fc0e6df6
PB
7686 elf_tdata (abfd)->cverdefs = freeidx;
7687 }
252b5132 7688
fc0e6df6
PB
7689 /* Create a default version based on the soname. */
7690 if (default_imported_symver)
7691 {
7692 Elf_Internal_Verdef *iverdef;
7693 Elf_Internal_Verdaux *iverdaux;
252b5132 7694
5bb3703f 7695 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
252b5132 7696
fc0e6df6
PB
7697 iverdef->vd_version = VER_DEF_CURRENT;
7698 iverdef->vd_flags = 0;
7699 iverdef->vd_ndx = freeidx;
7700 iverdef->vd_cnt = 1;
252b5132 7701
fc0e6df6 7702 iverdef->vd_bfd = abfd;
252b5132 7703
fc0e6df6
PB
7704 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
7705 if (iverdef->vd_nodename == NULL)
d0fb9a8d 7706 goto error_return_verdef;
fc0e6df6 7707 iverdef->vd_nextdef = NULL;
601a03ba
AM
7708 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
7709 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
d0fb9a8d
JJ
7710 if (iverdef->vd_auxptr == NULL)
7711 goto error_return_verdef;
252b5132 7712
fc0e6df6
PB
7713 iverdaux = iverdef->vd_auxptr;
7714 iverdaux->vda_nodename = iverdef->vd_nodename;
252b5132
RH
7715 }
7716
b34976b6 7717 return TRUE;
252b5132
RH
7718
7719 error_return:
5ed6aba4 7720 if (contents != NULL)
252b5132 7721 free (contents);
b34976b6 7722 return FALSE;
252b5132
RH
7723}
7724\f
7725asymbol *
217aa764 7726_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
7727{
7728 elf_symbol_type *newsym;
7729
201159ec 7730 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof * newsym);
252b5132
RH
7731 if (!newsym)
7732 return NULL;
201159ec
NC
7733 newsym->symbol.the_bfd = abfd;
7734 return &newsym->symbol;
252b5132
RH
7735}
7736
7737void
217aa764
AM
7738_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
7739 asymbol *symbol,
7740 symbol_info *ret)
252b5132
RH
7741{
7742 bfd_symbol_info (symbol, ret);
7743}
7744
7745/* Return whether a symbol name implies a local symbol. Most targets
7746 use this function for the is_local_label_name entry point, but some
7747 override it. */
7748
b34976b6 7749bfd_boolean
217aa764
AM
7750_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
7751 const char *name)
252b5132
RH
7752{
7753 /* Normal local symbols start with ``.L''. */
7754 if (name[0] == '.' && name[1] == 'L')
b34976b6 7755 return TRUE;
252b5132
RH
7756
7757 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
7758 DWARF debugging symbols starting with ``..''. */
7759 if (name[0] == '.' && name[1] == '.')
b34976b6 7760 return TRUE;
252b5132
RH
7761
7762 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
7763 emitting DWARF debugging output. I suspect this is actually a
7764 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
7765 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
7766 underscore to be emitted on some ELF targets). For ease of use,
7767 we treat such symbols as local. */
7768 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 7769 return TRUE;
252b5132 7770
ffa54770
NC
7771 /* Treat assembler generated local labels as local. */
7772 if (name[0] == 'L' && name[strlen (name) - 1] < 32)
7773 return TRUE;
7774
b34976b6 7775 return FALSE;
252b5132
RH
7776}
7777
7778alent *
217aa764
AM
7779_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
7780 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
7781{
7782 abort ();
7783 return NULL;
7784}
7785
b34976b6 7786bfd_boolean
217aa764
AM
7787_bfd_elf_set_arch_mach (bfd *abfd,
7788 enum bfd_architecture arch,
7789 unsigned long machine)
252b5132
RH
7790{
7791 /* If this isn't the right architecture for this backend, and this
7792 isn't the generic backend, fail. */
7793 if (arch != get_elf_backend_data (abfd)->arch
7794 && arch != bfd_arch_unknown
7795 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 7796 return FALSE;
252b5132
RH
7797
7798 return bfd_default_set_arch_mach (abfd, arch, machine);
7799}
7800
d1fad7c6
NC
7801/* Find the nearest line to a particular section and offset,
7802 for error reporting. */
7803
b34976b6 7804bfd_boolean
217aa764 7805_bfd_elf_find_nearest_line (bfd *abfd,
217aa764 7806 asymbol **symbols,
fb167eb2 7807 asection *section,
217aa764
AM
7808 bfd_vma offset,
7809 const char **filename_ptr,
7810 const char **functionname_ptr,
fb167eb2
AM
7811 unsigned int *line_ptr,
7812 unsigned int *discriminator_ptr)
d1fad7c6 7813{
b34976b6 7814 bfd_boolean found;
d1fad7c6 7815
fb167eb2 7816 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
4e8a9624 7817 filename_ptr, functionname_ptr,
fb167eb2
AM
7818 line_ptr, discriminator_ptr,
7819 dwarf_debug_sections, 0,
e00e8198
AM
7820 &elf_tdata (abfd)->dwarf2_find_line_info)
7821 || _bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
7822 filename_ptr, functionname_ptr,
7823 line_ptr))
d1fad7c6
NC
7824 {
7825 if (!*functionname_ptr)
e00e8198
AM
7826 _bfd_elf_find_function (abfd, symbols, section, offset,
7827 *filename_ptr ? NULL : filename_ptr,
7828 functionname_ptr);
b34976b6 7829 return TRUE;
d1fad7c6
NC
7830 }
7831
7832 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7833 &found, filename_ptr,
7834 functionname_ptr, line_ptr,
7835 &elf_tdata (abfd)->line_info))
b34976b6 7836 return FALSE;
dc43ada5 7837 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7838 return TRUE;
d1fad7c6
NC
7839
7840 if (symbols == NULL)
b34976b6 7841 return FALSE;
d1fad7c6 7842
e00e8198
AM
7843 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
7844 filename_ptr, functionname_ptr))
b34976b6 7845 return FALSE;
d1fad7c6 7846
252b5132 7847 *line_ptr = 0;
b34976b6 7848 return TRUE;
252b5132
RH
7849}
7850
5420f73d
L
7851/* Find the line for a symbol. */
7852
7853bfd_boolean
7854_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7855 const char **filename_ptr, unsigned int *line_ptr)
9b8d1a36 7856{
fb167eb2
AM
7857 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
7858 filename_ptr, NULL, line_ptr, NULL,
7859 dwarf_debug_sections, 0,
7860 &elf_tdata (abfd)->dwarf2_find_line_info);
5420f73d
L
7861}
7862
4ab527b0
FF
7863/* After a call to bfd_find_nearest_line, successive calls to
7864 bfd_find_inliner_info can be used to get source information about
7865 each level of function inlining that terminated at the address
7866 passed to bfd_find_nearest_line. Currently this is only supported
7867 for DWARF2 with appropriate DWARF3 extensions. */
7868
7869bfd_boolean
7870_bfd_elf_find_inliner_info (bfd *abfd,
7871 const char **filename_ptr,
7872 const char **functionname_ptr,
7873 unsigned int *line_ptr)
7874{
7875 bfd_boolean found;
7876 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7877 functionname_ptr, line_ptr,
7878 & elf_tdata (abfd)->dwarf2_find_line_info);
7879 return found;
7880}
7881
252b5132 7882int
a6b96beb 7883_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7884{
8ded5a0f
AM
7885 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7886 int ret = bed->s->sizeof_ehdr;
252b5132 7887
a6b96beb 7888 if (!info->relocatable)
8ded5a0f 7889 {
12bd6957 7890 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 7891
62d7a5f6
AM
7892 if (phdr_size == (bfd_size_type) -1)
7893 {
7894 struct elf_segment_map *m;
7895
7896 phdr_size = 0;
12bd6957 7897 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62d7a5f6 7898 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7899
62d7a5f6
AM
7900 if (phdr_size == 0)
7901 phdr_size = get_program_header_size (abfd, info);
7902 }
8ded5a0f 7903
12bd6957 7904 elf_program_header_size (abfd) = phdr_size;
8ded5a0f
AM
7905 ret += phdr_size;
7906 }
7907
252b5132
RH
7908 return ret;
7909}
7910
b34976b6 7911bfd_boolean
217aa764
AM
7912_bfd_elf_set_section_contents (bfd *abfd,
7913 sec_ptr section,
0f867abe 7914 const void *location,
217aa764
AM
7915 file_ptr offset,
7916 bfd_size_type count)
252b5132
RH
7917{
7918 Elf_Internal_Shdr *hdr;
1b6aeedb 7919 file_ptr pos;
252b5132
RH
7920
7921 if (! abfd->output_has_begun
217aa764 7922 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7923 return FALSE;
252b5132
RH
7924
7925 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7926 pos = hdr->sh_offset + offset;
7927 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7928 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7929 return FALSE;
252b5132 7930
b34976b6 7931 return TRUE;
252b5132
RH
7932}
7933
7934void
217aa764
AM
7935_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7936 arelent *cache_ptr ATTRIBUTE_UNUSED,
7937 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7938{
7939 abort ();
7940}
7941
252b5132
RH
7942/* Try to convert a non-ELF reloc into an ELF one. */
7943
b34976b6 7944bfd_boolean
217aa764 7945_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7946{
c044fabd 7947 /* Check whether we really have an ELF howto. */
252b5132
RH
7948
7949 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7950 {
7951 bfd_reloc_code_real_type code;
7952 reloc_howto_type *howto;
7953
7954 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7955 equivalent ELF reloc. */
252b5132
RH
7956
7957 if (areloc->howto->pc_relative)
7958 {
7959 switch (areloc->howto->bitsize)
7960 {
7961 case 8:
7962 code = BFD_RELOC_8_PCREL;
7963 break;
7964 case 12:
7965 code = BFD_RELOC_12_PCREL;
7966 break;
7967 case 16:
7968 code = BFD_RELOC_16_PCREL;
7969 break;
7970 case 24:
7971 code = BFD_RELOC_24_PCREL;
7972 break;
7973 case 32:
7974 code = BFD_RELOC_32_PCREL;
7975 break;
7976 case 64:
7977 code = BFD_RELOC_64_PCREL;
7978 break;
7979 default:
7980 goto fail;
7981 }
7982
7983 howto = bfd_reloc_type_lookup (abfd, code);
7984
7985 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7986 {
7987 if (howto->pcrel_offset)
7988 areloc->addend += areloc->address;
7989 else
7990 areloc->addend -= areloc->address; /* addend is unsigned!! */
7991 }
7992 }
7993 else
7994 {
7995 switch (areloc->howto->bitsize)
7996 {
7997 case 8:
7998 code = BFD_RELOC_8;
7999 break;
8000 case 14:
8001 code = BFD_RELOC_14;
8002 break;
8003 case 16:
8004 code = BFD_RELOC_16;
8005 break;
8006 case 26:
8007 code = BFD_RELOC_26;
8008 break;
8009 case 32:
8010 code = BFD_RELOC_32;
8011 break;
8012 case 64:
8013 code = BFD_RELOC_64;
8014 break;
8015 default:
8016 goto fail;
8017 }
8018
8019 howto = bfd_reloc_type_lookup (abfd, code);
8020 }
8021
8022 if (howto)
8023 areloc->howto = howto;
8024 else
8025 goto fail;
8026 }
8027
b34976b6 8028 return TRUE;
252b5132
RH
8029
8030 fail:
8031 (*_bfd_error_handler)
d003868e
AM
8032 (_("%B: unsupported relocation type %s"),
8033 abfd, areloc->howto->name);
252b5132 8034 bfd_set_error (bfd_error_bad_value);
b34976b6 8035 return FALSE;
252b5132
RH
8036}
8037
b34976b6 8038bfd_boolean
217aa764 8039_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132 8040{
d9071b0c
TG
8041 struct elf_obj_tdata *tdata = elf_tdata (abfd);
8042 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
252b5132 8043 {
c0355132 8044 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 8045 _bfd_elf_strtab_free (elf_shstrtab (abfd));
d9071b0c 8046 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
252b5132
RH
8047 }
8048
8049 return _bfd_generic_close_and_cleanup (abfd);
8050}
8051
8052/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
8053 in the relocation's offset. Thus we cannot allow any sort of sanity
8054 range-checking to interfere. There is nothing else to do in processing
8055 this reloc. */
8056
8057bfd_reloc_status_type
217aa764
AM
8058_bfd_elf_rel_vtable_reloc_fn
8059 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 8060 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
8061 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
8062 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
8063{
8064 return bfd_reloc_ok;
8065}
252b5132
RH
8066\f
8067/* Elf core file support. Much of this only works on native
8068 toolchains, since we rely on knowing the
8069 machine-dependent procfs structure in order to pick
c044fabd 8070 out details about the corefile. */
252b5132
RH
8071
8072#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
8073/* Needed for new procfs interface on sparc-solaris. */
8074# define _STRUCTURED_PROC 1
252b5132
RH
8075# include <sys/procfs.h>
8076#endif
8077
261b8d08
PA
8078/* Return a PID that identifies a "thread" for threaded cores, or the
8079 PID of the main process for non-threaded cores. */
252b5132
RH
8080
8081static int
217aa764 8082elfcore_make_pid (bfd *abfd)
252b5132 8083{
261b8d08
PA
8084 int pid;
8085
228e534f 8086 pid = elf_tdata (abfd)->core->lwpid;
261b8d08 8087 if (pid == 0)
228e534f 8088 pid = elf_tdata (abfd)->core->pid;
261b8d08
PA
8089
8090 return pid;
252b5132
RH
8091}
8092
252b5132
RH
8093/* If there isn't a section called NAME, make one, using
8094 data from SECT. Note, this function will generate a
8095 reference to NAME, so you shouldn't deallocate or
c044fabd 8096 overwrite it. */
252b5132 8097
b34976b6 8098static bfd_boolean
217aa764 8099elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 8100{
c044fabd 8101 asection *sect2;
252b5132
RH
8102
8103 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 8104 return TRUE;
252b5132 8105
117ed4f8 8106 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 8107 if (sect2 == NULL)
b34976b6 8108 return FALSE;
252b5132 8109
eea6121a 8110 sect2->size = sect->size;
252b5132 8111 sect2->filepos = sect->filepos;
252b5132 8112 sect2->alignment_power = sect->alignment_power;
b34976b6 8113 return TRUE;
252b5132
RH
8114}
8115
bb0082d6
AM
8116/* Create a pseudosection containing SIZE bytes at FILEPOS. This
8117 actually creates up to two pseudosections:
8118 - For the single-threaded case, a section named NAME, unless
8119 such a section already exists.
8120 - For the multi-threaded case, a section named "NAME/PID", where
8121 PID is elfcore_make_pid (abfd).
8122 Both pseudosections have identical contents. */
b34976b6 8123bfd_boolean
217aa764
AM
8124_bfd_elfcore_make_pseudosection (bfd *abfd,
8125 char *name,
8126 size_t size,
8127 ufile_ptr filepos)
bb0082d6
AM
8128{
8129 char buf[100];
8130 char *threaded_name;
d4c88bbb 8131 size_t len;
bb0082d6
AM
8132 asection *sect;
8133
8134 /* Build the section name. */
8135
8136 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 8137 len = strlen (buf) + 1;
a50b1753 8138 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 8139 if (threaded_name == NULL)
b34976b6 8140 return FALSE;
d4c88bbb 8141 memcpy (threaded_name, buf, len);
bb0082d6 8142
117ed4f8
AM
8143 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
8144 SEC_HAS_CONTENTS);
bb0082d6 8145 if (sect == NULL)
b34976b6 8146 return FALSE;
eea6121a 8147 sect->size = size;
bb0082d6 8148 sect->filepos = filepos;
bb0082d6
AM
8149 sect->alignment_power = 2;
8150
936e320b 8151 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
8152}
8153
252b5132 8154/* prstatus_t exists on:
4a938328 8155 solaris 2.5+
252b5132
RH
8156 linux 2.[01] + glibc
8157 unixware 4.2
8158*/
8159
8160#if defined (HAVE_PRSTATUS_T)
a7b97311 8161
b34976b6 8162static bfd_boolean
217aa764 8163elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 8164{
eea6121a 8165 size_t size;
7ee38065 8166 int offset;
252b5132 8167
4a938328
MS
8168 if (note->descsz == sizeof (prstatus_t))
8169 {
8170 prstatus_t prstat;
252b5132 8171
eea6121a 8172 size = sizeof (prstat.pr_reg);
7ee38065 8173 offset = offsetof (prstatus_t, pr_reg);
4a938328 8174 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 8175
fa49d224
NC
8176 /* Do not overwrite the core signal if it
8177 has already been set by another thread. */
228e534f
AM
8178 if (elf_tdata (abfd)->core->signal == 0)
8179 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
8180 if (elf_tdata (abfd)->core->pid == 0)
8181 elf_tdata (abfd)->core->pid = prstat.pr_pid;
252b5132 8182
4a938328
MS
8183 /* pr_who exists on:
8184 solaris 2.5+
8185 unixware 4.2
8186 pr_who doesn't exist on:
8187 linux 2.[01]
8188 */
252b5132 8189#if defined (HAVE_PRSTATUS_T_PR_WHO)
228e534f 8190 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 8191#else
228e534f 8192 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
252b5132 8193#endif
4a938328 8194 }
7ee38065 8195#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
8196 else if (note->descsz == sizeof (prstatus32_t))
8197 {
8198 /* 64-bit host, 32-bit corefile */
8199 prstatus32_t prstat;
8200
eea6121a 8201 size = sizeof (prstat.pr_reg);
7ee38065 8202 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
8203 memcpy (&prstat, note->descdata, sizeof (prstat));
8204
fa49d224
NC
8205 /* Do not overwrite the core signal if it
8206 has already been set by another thread. */
228e534f
AM
8207 if (elf_tdata (abfd)->core->signal == 0)
8208 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
8209 if (elf_tdata (abfd)->core->pid == 0)
8210 elf_tdata (abfd)->core->pid = prstat.pr_pid;
4a938328
MS
8211
8212 /* pr_who exists on:
8213 solaris 2.5+
8214 unixware 4.2
8215 pr_who doesn't exist on:
8216 linux 2.[01]
8217 */
7ee38065 8218#if defined (HAVE_PRSTATUS32_T_PR_WHO)
228e534f 8219 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 8220#else
228e534f 8221 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
4a938328
MS
8222#endif
8223 }
7ee38065 8224#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
8225 else
8226 {
8227 /* Fail - we don't know how to handle any other
8228 note size (ie. data object type). */
b34976b6 8229 return TRUE;
4a938328 8230 }
252b5132 8231
bb0082d6 8232 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 8233 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 8234 size, note->descpos + offset);
252b5132
RH
8235}
8236#endif /* defined (HAVE_PRSTATUS_T) */
8237
bb0082d6 8238/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 8239static bfd_boolean
217aa764
AM
8240elfcore_make_note_pseudosection (bfd *abfd,
8241 char *name,
8242 Elf_Internal_Note *note)
252b5132 8243{
936e320b
AM
8244 return _bfd_elfcore_make_pseudosection (abfd, name,
8245 note->descsz, note->descpos);
252b5132
RH
8246}
8247
ff08c6bb
JB
8248/* There isn't a consistent prfpregset_t across platforms,
8249 but it doesn't matter, because we don't have to pick this
c044fabd
KH
8250 data structure apart. */
8251
b34976b6 8252static bfd_boolean
217aa764 8253elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8254{
8255 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8256}
8257
ff08c6bb 8258/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 8259 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 8260 literally. */
c044fabd 8261
b34976b6 8262static bfd_boolean
217aa764 8263elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8264{
8265 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8266}
8267
4339cae0
L
8268/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
8269 with a note type of NT_X86_XSTATE. Just include the whole note's
8270 contents literally. */
8271
8272static bfd_boolean
8273elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
8274{
8275 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
8276}
8277
97753bd5
AM
8278static bfd_boolean
8279elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
8280{
8281 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
8282}
8283
89eeb0bc
LM
8284static bfd_boolean
8285elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
8286{
8287 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
8288}
97753bd5 8289
0675e188
UW
8290static bfd_boolean
8291elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
8292{
8293 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
8294}
8295
d7eeb400
MS
8296static bfd_boolean
8297elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
8298{
8299 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
8300}
8301
8302static bfd_boolean
8303elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
8304{
8305 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
8306}
8307
8308static bfd_boolean
8309elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
8310{
8311 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
8312}
8313
8314static bfd_boolean
8315elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
8316{
8317 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
8318}
8319
8320static bfd_boolean
8321elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
8322{
8323 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
8324}
8325
355b81d9
UW
8326static bfd_boolean
8327elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
8328{
8329 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
8330}
8331
8332static bfd_boolean
8333elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
8334{
8335 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
8336}
8337
abb3f6cc
NC
8338static bfd_boolean
8339elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
8340{
8341 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
8342}
8343
4ef9f41a
AA
8344static bfd_boolean
8345elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
8346{
8347 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
8348}
8349
8350static bfd_boolean
8351elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
8352{
8353 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
8354}
8355
faa9a424
UW
8356static bfd_boolean
8357elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
8358{
8359 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
8360}
8361
652451f8
YZ
8362static bfd_boolean
8363elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
8364{
8365 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
8366}
8367
8368static bfd_boolean
8369elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
8370{
8371 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
8372}
8373
8374static bfd_boolean
8375elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
8376{
8377 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
8378}
8379
252b5132 8380#if defined (HAVE_PRPSINFO_T)
4a938328 8381typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 8382#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
8383typedef prpsinfo32_t elfcore_psinfo32_t;
8384#endif
252b5132
RH
8385#endif
8386
8387#if defined (HAVE_PSINFO_T)
4a938328 8388typedef psinfo_t elfcore_psinfo_t;
7ee38065 8389#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
8390typedef psinfo32_t elfcore_psinfo32_t;
8391#endif
252b5132
RH
8392#endif
8393
252b5132
RH
8394/* return a malloc'ed copy of a string at START which is at
8395 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 8396 the copy will always have a terminating '\0'. */
252b5132 8397
936e320b 8398char *
217aa764 8399_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 8400{
dc810e39 8401 char *dups;
a50b1753 8402 char *end = (char *) memchr (start, '\0', max);
dc810e39 8403 size_t len;
252b5132
RH
8404
8405 if (end == NULL)
8406 len = max;
8407 else
8408 len = end - start;
8409
a50b1753 8410 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 8411 if (dups == NULL)
252b5132
RH
8412 return NULL;
8413
dc810e39
AM
8414 memcpy (dups, start, len);
8415 dups[len] = '\0';
252b5132 8416
dc810e39 8417 return dups;
252b5132
RH
8418}
8419
bb0082d6 8420#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 8421static bfd_boolean
217aa764 8422elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 8423{
4a938328
MS
8424 if (note->descsz == sizeof (elfcore_psinfo_t))
8425 {
8426 elfcore_psinfo_t psinfo;
252b5132 8427
7ee38065 8428 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 8429
335e41d4 8430#if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
228e534f 8431 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 8432#endif
228e534f 8433 elf_tdata (abfd)->core->program
936e320b
AM
8434 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
8435 sizeof (psinfo.pr_fname));
252b5132 8436
228e534f 8437 elf_tdata (abfd)->core->command
936e320b
AM
8438 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
8439 sizeof (psinfo.pr_psargs));
4a938328 8440 }
7ee38065 8441#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
8442 else if (note->descsz == sizeof (elfcore_psinfo32_t))
8443 {
8444 /* 64-bit host, 32-bit corefile */
8445 elfcore_psinfo32_t psinfo;
8446
7ee38065 8447 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 8448
335e41d4 8449#if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
228e534f 8450 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 8451#endif
228e534f 8452 elf_tdata (abfd)->core->program
936e320b
AM
8453 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
8454 sizeof (psinfo.pr_fname));
4a938328 8455
228e534f 8456 elf_tdata (abfd)->core->command
936e320b
AM
8457 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
8458 sizeof (psinfo.pr_psargs));
4a938328
MS
8459 }
8460#endif
8461
8462 else
8463 {
8464 /* Fail - we don't know how to handle any other
8465 note size (ie. data object type). */
b34976b6 8466 return TRUE;
4a938328 8467 }
252b5132
RH
8468
8469 /* Note that for some reason, a spurious space is tacked
8470 onto the end of the args in some (at least one anyway)
c044fabd 8471 implementations, so strip it off if it exists. */
252b5132
RH
8472
8473 {
228e534f 8474 char *command = elf_tdata (abfd)->core->command;
252b5132
RH
8475 int n = strlen (command);
8476
8477 if (0 < n && command[n - 1] == ' ')
8478 command[n - 1] = '\0';
8479 }
8480
b34976b6 8481 return TRUE;
252b5132
RH
8482}
8483#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
8484
252b5132 8485#if defined (HAVE_PSTATUS_T)
b34976b6 8486static bfd_boolean
217aa764 8487elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 8488{
f572a39d
AM
8489 if (note->descsz == sizeof (pstatus_t)
8490#if defined (HAVE_PXSTATUS_T)
8491 || note->descsz == sizeof (pxstatus_t)
8492#endif
8493 )
4a938328
MS
8494 {
8495 pstatus_t pstat;
252b5132 8496
4a938328 8497 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 8498
228e534f 8499 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328 8500 }
7ee38065 8501#if defined (HAVE_PSTATUS32_T)
4a938328
MS
8502 else if (note->descsz == sizeof (pstatus32_t))
8503 {
8504 /* 64-bit host, 32-bit corefile */
8505 pstatus32_t pstat;
252b5132 8506
4a938328 8507 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 8508
228e534f 8509 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328
MS
8510 }
8511#endif
252b5132
RH
8512 /* Could grab some more details from the "representative"
8513 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 8514 NT_LWPSTATUS note, presumably. */
252b5132 8515
b34976b6 8516 return TRUE;
252b5132
RH
8517}
8518#endif /* defined (HAVE_PSTATUS_T) */
8519
252b5132 8520#if defined (HAVE_LWPSTATUS_T)
b34976b6 8521static bfd_boolean
217aa764 8522elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
8523{
8524 lwpstatus_t lwpstat;
8525 char buf[100];
c044fabd 8526 char *name;
d4c88bbb 8527 size_t len;
c044fabd 8528 asection *sect;
252b5132 8529
f572a39d
AM
8530 if (note->descsz != sizeof (lwpstat)
8531#if defined (HAVE_LWPXSTATUS_T)
8532 && note->descsz != sizeof (lwpxstatus_t)
8533#endif
8534 )
b34976b6 8535 return TRUE;
252b5132
RH
8536
8537 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
8538
228e534f 8539 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
a1504221
JB
8540 /* Do not overwrite the core signal if it has already been set by
8541 another thread. */
228e534f
AM
8542 if (elf_tdata (abfd)->core->signal == 0)
8543 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
252b5132 8544
c044fabd 8545 /* Make a ".reg/999" section. */
252b5132
RH
8546
8547 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 8548 len = strlen (buf) + 1;
217aa764 8549 name = bfd_alloc (abfd, len);
252b5132 8550 if (name == NULL)
b34976b6 8551 return FALSE;
d4c88bbb 8552 memcpy (name, buf, len);
252b5132 8553
117ed4f8 8554 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8555 if (sect == NULL)
b34976b6 8556 return FALSE;
252b5132
RH
8557
8558#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8559 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
8560 sect->filepos = note->descpos
8561 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
8562#endif
8563
8564#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 8565 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
8566 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
8567#endif
8568
252b5132
RH
8569 sect->alignment_power = 2;
8570
8571 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8572 return FALSE;
252b5132
RH
8573
8574 /* Make a ".reg2/999" section */
8575
8576 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 8577 len = strlen (buf) + 1;
217aa764 8578 name = bfd_alloc (abfd, len);
252b5132 8579 if (name == NULL)
b34976b6 8580 return FALSE;
d4c88bbb 8581 memcpy (name, buf, len);
252b5132 8582
117ed4f8 8583 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8584 if (sect == NULL)
b34976b6 8585 return FALSE;
252b5132
RH
8586
8587#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8588 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
8589 sect->filepos = note->descpos
8590 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
8591#endif
8592
8593#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 8594 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
8595 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
8596#endif
8597
252b5132
RH
8598 sect->alignment_power = 2;
8599
936e320b 8600 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
8601}
8602#endif /* defined (HAVE_LWPSTATUS_T) */
8603
b34976b6 8604static bfd_boolean
217aa764 8605elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
8606{
8607 char buf[30];
c044fabd 8608 char *name;
d4c88bbb 8609 size_t len;
c044fabd 8610 asection *sect;
4a6636fb
PA
8611 int type;
8612 int is_active_thread;
8613 bfd_vma base_addr;
16e9c715 8614
4a6636fb 8615 if (note->descsz < 728)
b34976b6 8616 return TRUE;
16e9c715 8617
4a6636fb
PA
8618 if (! CONST_STRNEQ (note->namedata, "win32"))
8619 return TRUE;
8620
8621 type = bfd_get_32 (abfd, note->descdata);
c044fabd 8622
4a6636fb 8623 switch (type)
16e9c715 8624 {
4a6636fb 8625 case 1 /* NOTE_INFO_PROCESS */:
228e534f 8626 /* FIXME: need to add ->core->command. */
4a6636fb 8627 /* process_info.pid */
228e534f 8628 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
4a6636fb 8629 /* process_info.signal */
228e534f 8630 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 8631 break;
16e9c715 8632
4a6636fb 8633 case 2 /* NOTE_INFO_THREAD */:
16e9c715 8634 /* Make a ".reg/999" section. */
4a6636fb
PA
8635 /* thread_info.tid */
8636 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 8637
d4c88bbb 8638 len = strlen (buf) + 1;
a50b1753 8639 name = (char *) bfd_alloc (abfd, len);
16e9c715 8640 if (name == NULL)
b34976b6 8641 return FALSE;
c044fabd 8642
d4c88bbb 8643 memcpy (name, buf, len);
16e9c715 8644
117ed4f8 8645 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 8646 if (sect == NULL)
b34976b6 8647 return FALSE;
c044fabd 8648
4a6636fb
PA
8649 /* sizeof (thread_info.thread_context) */
8650 sect->size = 716;
8651 /* offsetof (thread_info.thread_context) */
8652 sect->filepos = note->descpos + 12;
16e9c715
NC
8653 sect->alignment_power = 2;
8654
4a6636fb
PA
8655 /* thread_info.is_active_thread */
8656 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
8657
8658 if (is_active_thread)
16e9c715 8659 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8660 return FALSE;
16e9c715
NC
8661 break;
8662
4a6636fb 8663 case 3 /* NOTE_INFO_MODULE */:
16e9c715 8664 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
8665 /* module_info.base_address */
8666 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 8667 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 8668
d4c88bbb 8669 len = strlen (buf) + 1;
a50b1753 8670 name = (char *) bfd_alloc (abfd, len);
16e9c715 8671 if (name == NULL)
b34976b6 8672 return FALSE;
c044fabd 8673
d4c88bbb 8674 memcpy (name, buf, len);
252b5132 8675
117ed4f8 8676 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 8677
16e9c715 8678 if (sect == NULL)
b34976b6 8679 return FALSE;
c044fabd 8680
eea6121a 8681 sect->size = note->descsz;
16e9c715 8682 sect->filepos = note->descpos;
16e9c715
NC
8683 sect->alignment_power = 2;
8684 break;
8685
8686 default:
b34976b6 8687 return TRUE;
16e9c715
NC
8688 }
8689
b34976b6 8690 return TRUE;
16e9c715 8691}
252b5132 8692
b34976b6 8693static bfd_boolean
217aa764 8694elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 8695{
9c5bfbb7 8696 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 8697
252b5132
RH
8698 switch (note->type)
8699 {
8700 default:
b34976b6 8701 return TRUE;
252b5132 8702
252b5132 8703 case NT_PRSTATUS:
bb0082d6
AM
8704 if (bed->elf_backend_grok_prstatus)
8705 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 8706 return TRUE;
bb0082d6 8707#if defined (HAVE_PRSTATUS_T)
252b5132 8708 return elfcore_grok_prstatus (abfd, note);
bb0082d6 8709#else
b34976b6 8710 return TRUE;
252b5132
RH
8711#endif
8712
8713#if defined (HAVE_PSTATUS_T)
8714 case NT_PSTATUS:
8715 return elfcore_grok_pstatus (abfd, note);
8716#endif
8717
8718#if defined (HAVE_LWPSTATUS_T)
8719 case NT_LWPSTATUS:
8720 return elfcore_grok_lwpstatus (abfd, note);
8721#endif
8722
8723 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
8724 return elfcore_grok_prfpreg (abfd, note);
8725
c044fabd 8726 case NT_WIN32PSTATUS:
16e9c715 8727 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 8728
c044fabd 8729 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
8730 if (note->namesz == 6
8731 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
8732 return elfcore_grok_prxfpreg (abfd, note);
8733 else
b34976b6 8734 return TRUE;
ff08c6bb 8735
4339cae0
L
8736 case NT_X86_XSTATE: /* Linux XSAVE extension */
8737 if (note->namesz == 6
8738 && strcmp (note->namedata, "LINUX") == 0)
8739 return elfcore_grok_xstatereg (abfd, note);
8740 else
8741 return TRUE;
8742
97753bd5
AM
8743 case NT_PPC_VMX:
8744 if (note->namesz == 6
8745 && strcmp (note->namedata, "LINUX") == 0)
8746 return elfcore_grok_ppc_vmx (abfd, note);
8747 else
8748 return TRUE;
8749
89eeb0bc
LM
8750 case NT_PPC_VSX:
8751 if (note->namesz == 6
8752 && strcmp (note->namedata, "LINUX") == 0)
8753 return elfcore_grok_ppc_vsx (abfd, note);
8754 else
8755 return TRUE;
8756
0675e188
UW
8757 case NT_S390_HIGH_GPRS:
8758 if (note->namesz == 6
8759 && strcmp (note->namedata, "LINUX") == 0)
8760 return elfcore_grok_s390_high_gprs (abfd, note);
8761 else
8762 return TRUE;
8763
d7eeb400
MS
8764 case NT_S390_TIMER:
8765 if (note->namesz == 6
8766 && strcmp (note->namedata, "LINUX") == 0)
8767 return elfcore_grok_s390_timer (abfd, note);
8768 else
8769 return TRUE;
8770
8771 case NT_S390_TODCMP:
8772 if (note->namesz == 6
8773 && strcmp (note->namedata, "LINUX") == 0)
8774 return elfcore_grok_s390_todcmp (abfd, note);
8775 else
8776 return TRUE;
8777
8778 case NT_S390_TODPREG:
8779 if (note->namesz == 6
8780 && strcmp (note->namedata, "LINUX") == 0)
8781 return elfcore_grok_s390_todpreg (abfd, note);
8782 else
8783 return TRUE;
8784
8785 case NT_S390_CTRS:
8786 if (note->namesz == 6
8787 && strcmp (note->namedata, "LINUX") == 0)
8788 return elfcore_grok_s390_ctrs (abfd, note);
8789 else
8790 return TRUE;
8791
8792 case NT_S390_PREFIX:
8793 if (note->namesz == 6
8794 && strcmp (note->namedata, "LINUX") == 0)
8795 return elfcore_grok_s390_prefix (abfd, note);
8796 else
8797 return TRUE;
8798
355b81d9
UW
8799 case NT_S390_LAST_BREAK:
8800 if (note->namesz == 6
8801 && strcmp (note->namedata, "LINUX") == 0)
8802 return elfcore_grok_s390_last_break (abfd, note);
8803 else
8804 return TRUE;
8805
8806 case NT_S390_SYSTEM_CALL:
8807 if (note->namesz == 6
8808 && strcmp (note->namedata, "LINUX") == 0)
8809 return elfcore_grok_s390_system_call (abfd, note);
8810 else
8811 return TRUE;
8812
abb3f6cc
NC
8813 case NT_S390_TDB:
8814 if (note->namesz == 6
8815 && strcmp (note->namedata, "LINUX") == 0)
8816 return elfcore_grok_s390_tdb (abfd, note);
8817 else
8818 return TRUE;
8819
4ef9f41a
AA
8820 case NT_S390_VXRS_LOW:
8821 if (note->namesz == 6
8822 && strcmp (note->namedata, "LINUX") == 0)
8823 return elfcore_grok_s390_vxrs_low (abfd, note);
8824 else
8825 return TRUE;
8826
8827 case NT_S390_VXRS_HIGH:
8828 if (note->namesz == 6
8829 && strcmp (note->namedata, "LINUX") == 0)
8830 return elfcore_grok_s390_vxrs_high (abfd, note);
8831 else
8832 return TRUE;
8833
faa9a424
UW
8834 case NT_ARM_VFP:
8835 if (note->namesz == 6
8836 && strcmp (note->namedata, "LINUX") == 0)
8837 return elfcore_grok_arm_vfp (abfd, note);
8838 else
8839 return TRUE;
8840
652451f8
YZ
8841 case NT_ARM_TLS:
8842 if (note->namesz == 6
8843 && strcmp (note->namedata, "LINUX") == 0)
8844 return elfcore_grok_aarch_tls (abfd, note);
8845 else
8846 return TRUE;
8847
8848 case NT_ARM_HW_BREAK:
8849 if (note->namesz == 6
8850 && strcmp (note->namedata, "LINUX") == 0)
8851 return elfcore_grok_aarch_hw_break (abfd, note);
8852 else
8853 return TRUE;
8854
8855 case NT_ARM_HW_WATCH:
8856 if (note->namesz == 6
8857 && strcmp (note->namedata, "LINUX") == 0)
8858 return elfcore_grok_aarch_hw_watch (abfd, note);
8859 else
8860 return TRUE;
8861
252b5132
RH
8862 case NT_PRPSINFO:
8863 case NT_PSINFO:
bb0082d6
AM
8864 if (bed->elf_backend_grok_psinfo)
8865 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 8866 return TRUE;
bb0082d6 8867#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 8868 return elfcore_grok_psinfo (abfd, note);
bb0082d6 8869#else
b34976b6 8870 return TRUE;
252b5132 8871#endif
3333a7c3
RM
8872
8873 case NT_AUXV:
8874 {
117ed4f8
AM
8875 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8876 SEC_HAS_CONTENTS);
3333a7c3
RM
8877
8878 if (sect == NULL)
8879 return FALSE;
eea6121a 8880 sect->size = note->descsz;
3333a7c3 8881 sect->filepos = note->descpos;
3333a7c3
RM
8882 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8883
8884 return TRUE;
8885 }
9015683b 8886
451b7c33
TT
8887 case NT_FILE:
8888 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
8889 note);
8890
9015683b
TT
8891 case NT_SIGINFO:
8892 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
8893 note);
252b5132
RH
8894 }
8895}
8896
718175fa
JK
8897static bfd_boolean
8898elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
8899{
30e8ee25
AM
8900 struct elf_obj_tdata *t;
8901
8902 if (note->descsz == 0)
8903 return FALSE;
8904
8905 t = elf_tdata (abfd);
c0355132 8906 t->build_id = bfd_alloc (abfd, sizeof (*t->build_id) - 1 + note->descsz);
30e8ee25 8907 if (t->build_id == NULL)
718175fa
JK
8908 return FALSE;
8909
c0355132
AM
8910 t->build_id->size = note->descsz;
8911 memcpy (t->build_id->data, note->descdata, note->descsz);
718175fa
JK
8912
8913 return TRUE;
8914}
8915
8916static bfd_boolean
8917elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
8918{
8919 switch (note->type)
8920 {
8921 default:
8922 return TRUE;
8923
8924 case NT_GNU_BUILD_ID:
8925 return elfobj_grok_gnu_build_id (abfd, note);
8926 }
8927}
8928
e21e5835
NC
8929static bfd_boolean
8930elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
8931{
8932 struct sdt_note *cur =
8933 (struct sdt_note *) bfd_alloc (abfd, sizeof (struct sdt_note)
8934 + note->descsz);
8935
8936 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
8937 cur->size = (bfd_size_type) note->descsz;
8938 memcpy (cur->data, note->descdata, note->descsz);
8939
8940 elf_tdata (abfd)->sdt_note_head = cur;
8941
8942 return TRUE;
8943}
8944
8945static bfd_boolean
8946elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
8947{
8948 switch (note->type)
8949 {
8950 case NT_STAPSDT:
8951 return elfobj_grok_stapsdt_note_1 (abfd, note);
8952
8953 default:
8954 return TRUE;
8955 }
8956}
8957
b34976b6 8958static bfd_boolean
217aa764 8959elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
8960{
8961 char *cp;
8962
8963 cp = strchr (note->namedata, '@');
8964 if (cp != NULL)
8965 {
d2b64500 8966 *lwpidp = atoi(cp + 1);
b34976b6 8967 return TRUE;
50b2bdb7 8968 }
b34976b6 8969 return FALSE;
50b2bdb7
AM
8970}
8971
b34976b6 8972static bfd_boolean
217aa764 8973elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 8974{
50b2bdb7 8975 /* Signal number at offset 0x08. */
228e534f 8976 elf_tdata (abfd)->core->signal
50b2bdb7
AM
8977 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8978
8979 /* Process ID at offset 0x50. */
228e534f 8980 elf_tdata (abfd)->core->pid
50b2bdb7
AM
8981 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
8982
8983 /* Command name at 0x7c (max 32 bytes, including nul). */
228e534f 8984 elf_tdata (abfd)->core->command
50b2bdb7
AM
8985 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
8986
7720ba9f
MK
8987 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
8988 note);
50b2bdb7
AM
8989}
8990
b34976b6 8991static bfd_boolean
217aa764 8992elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
8993{
8994 int lwp;
8995
8996 if (elfcore_netbsd_get_lwpid (note, &lwp))
228e534f 8997 elf_tdata (abfd)->core->lwpid = lwp;
50b2bdb7 8998
b4db1224 8999 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
9000 {
9001 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
9002 find this note before any of the others, which is fine,
9003 since the kernel writes this note out first when it
9004 creates a core file. */
47d9a591 9005
50b2bdb7
AM
9006 return elfcore_grok_netbsd_procinfo (abfd, note);
9007 }
9008
b4db1224
JT
9009 /* As of Jan 2002 there are no other machine-independent notes
9010 defined for NetBSD core files. If the note type is less
9011 than the start of the machine-dependent note types, we don't
9012 understand it. */
47d9a591 9013
b4db1224 9014 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 9015 return TRUE;
50b2bdb7
AM
9016
9017
9018 switch (bfd_get_arch (abfd))
9019 {
08a40648
AM
9020 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
9021 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
9022
9023 case bfd_arch_alpha:
9024 case bfd_arch_sparc:
9025 switch (note->type)
08a40648
AM
9026 {
9027 case NT_NETBSDCORE_FIRSTMACH+0:
9028 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 9029
08a40648
AM
9030 case NT_NETBSDCORE_FIRSTMACH+2:
9031 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 9032
08a40648
AM
9033 default:
9034 return TRUE;
9035 }
50b2bdb7 9036
08a40648
AM
9037 /* On all other arch's, PT_GETREGS == mach+1 and
9038 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
9039
9040 default:
9041 switch (note->type)
08a40648
AM
9042 {
9043 case NT_NETBSDCORE_FIRSTMACH+1:
9044 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 9045
08a40648
AM
9046 case NT_NETBSDCORE_FIRSTMACH+3:
9047 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 9048
08a40648
AM
9049 default:
9050 return TRUE;
9051 }
50b2bdb7
AM
9052 }
9053 /* NOTREACHED */
9054}
9055
67cc5033
MK
9056static bfd_boolean
9057elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
9058{
9059 /* Signal number at offset 0x08. */
228e534f 9060 elf_tdata (abfd)->core->signal
67cc5033
MK
9061 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
9062
9063 /* Process ID at offset 0x20. */
228e534f 9064 elf_tdata (abfd)->core->pid
67cc5033
MK
9065 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
9066
9067 /* Command name at 0x48 (max 32 bytes, including nul). */
228e534f 9068 elf_tdata (abfd)->core->command
67cc5033
MK
9069 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
9070
9071 return TRUE;
9072}
9073
9074static bfd_boolean
9075elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
9076{
9077 if (note->type == NT_OPENBSD_PROCINFO)
9078 return elfcore_grok_openbsd_procinfo (abfd, note);
9079
9080 if (note->type == NT_OPENBSD_REGS)
9081 return elfcore_make_note_pseudosection (abfd, ".reg", note);
9082
9083 if (note->type == NT_OPENBSD_FPREGS)
9084 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9085
9086 if (note->type == NT_OPENBSD_XFPREGS)
9087 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9088
9089 if (note->type == NT_OPENBSD_AUXV)
9090 {
9091 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9092 SEC_HAS_CONTENTS);
9093
9094 if (sect == NULL)
9095 return FALSE;
9096 sect->size = note->descsz;
9097 sect->filepos = note->descpos;
9098 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9099
9100 return TRUE;
9101 }
9102
9103 if (note->type == NT_OPENBSD_WCOOKIE)
9104 {
9105 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
9106 SEC_HAS_CONTENTS);
9107
9108 if (sect == NULL)
9109 return FALSE;
9110 sect->size = note->descsz;
9111 sect->filepos = note->descpos;
9112 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9113
9114 return TRUE;
9115 }
9116
9117 return TRUE;
9118}
9119
07c6e936 9120static bfd_boolean
d3fd4074 9121elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
9122{
9123 void *ddata = note->descdata;
9124 char buf[100];
9125 char *name;
9126 asection *sect;
f8843e87
AM
9127 short sig;
9128 unsigned flags;
07c6e936
NC
9129
9130 /* nto_procfs_status 'pid' field is at offset 0. */
228e534f 9131 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
07c6e936 9132
f8843e87
AM
9133 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
9134 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
9135
9136 /* nto_procfs_status 'flags' field is at offset 8. */
9137 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
9138
9139 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
9140 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
9141 {
228e534f
AM
9142 elf_tdata (abfd)->core->signal = sig;
9143 elf_tdata (abfd)->core->lwpid = *tid;
f8843e87 9144 }
07c6e936 9145
f8843e87
AM
9146 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
9147 do not come from signals so we make sure we set the current
9148 thread just in case. */
9149 if (flags & 0x00000080)
228e534f 9150 elf_tdata (abfd)->core->lwpid = *tid;
07c6e936
NC
9151
9152 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 9153 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 9154
a50b1753 9155 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
9156 if (name == NULL)
9157 return FALSE;
9158 strcpy (name, buf);
9159
117ed4f8 9160 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
9161 if (sect == NULL)
9162 return FALSE;
9163
eea6121a 9164 sect->size = note->descsz;
07c6e936 9165 sect->filepos = note->descpos;
07c6e936
NC
9166 sect->alignment_power = 2;
9167
9168 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
9169}
9170
9171static bfd_boolean
d69f560c
KW
9172elfcore_grok_nto_regs (bfd *abfd,
9173 Elf_Internal_Note *note,
d3fd4074 9174 long tid,
d69f560c 9175 char *base)
07c6e936
NC
9176{
9177 char buf[100];
9178 char *name;
9179 asection *sect;
9180
d69f560c 9181 /* Make a "(base)/%d" section. */
d3fd4074 9182 sprintf (buf, "%s/%ld", base, tid);
07c6e936 9183
a50b1753 9184 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
9185 if (name == NULL)
9186 return FALSE;
9187 strcpy (name, buf);
9188
117ed4f8 9189 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
9190 if (sect == NULL)
9191 return FALSE;
9192
eea6121a 9193 sect->size = note->descsz;
07c6e936 9194 sect->filepos = note->descpos;
07c6e936
NC
9195 sect->alignment_power = 2;
9196
f8843e87 9197 /* This is the current thread. */
228e534f 9198 if (elf_tdata (abfd)->core->lwpid == tid)
d69f560c 9199 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
9200
9201 return TRUE;
07c6e936
NC
9202}
9203
9204#define BFD_QNT_CORE_INFO 7
9205#define BFD_QNT_CORE_STATUS 8
9206#define BFD_QNT_CORE_GREG 9
9207#define BFD_QNT_CORE_FPREG 10
9208
9209static bfd_boolean
217aa764 9210elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
9211{
9212 /* Every GREG section has a STATUS section before it. Store the
811072d8 9213 tid from the previous call to pass down to the next gregs
07c6e936 9214 function. */
d3fd4074 9215 static long tid = 1;
07c6e936
NC
9216
9217 switch (note->type)
9218 {
d69f560c
KW
9219 case BFD_QNT_CORE_INFO:
9220 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
9221 case BFD_QNT_CORE_STATUS:
9222 return elfcore_grok_nto_status (abfd, note, &tid);
9223 case BFD_QNT_CORE_GREG:
9224 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
9225 case BFD_QNT_CORE_FPREG:
9226 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
9227 default:
9228 return TRUE;
07c6e936
NC
9229 }
9230}
9231
b15fa79e
AM
9232static bfd_boolean
9233elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
9234{
9235 char *name;
9236 asection *sect;
9237 size_t len;
9238
9239 /* Use note name as section name. */
9240 len = note->namesz;
a50b1753 9241 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
9242 if (name == NULL)
9243 return FALSE;
9244 memcpy (name, note->namedata, len);
9245 name[len - 1] = '\0';
9246
9247 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
9248 if (sect == NULL)
9249 return FALSE;
9250
9251 sect->size = note->descsz;
9252 sect->filepos = note->descpos;
9253 sect->alignment_power = 1;
9254
9255 return TRUE;
9256}
9257
7c76fa91
MS
9258/* Function: elfcore_write_note
9259
47d9a591 9260 Inputs:
a39f3346 9261 buffer to hold note, and current size of buffer
7c76fa91
MS
9262 name of note
9263 type of note
9264 data for note
9265 size of data for note
9266
a39f3346
AM
9267 Writes note to end of buffer. ELF64 notes are written exactly as
9268 for ELF32, despite the current (as of 2006) ELF gabi specifying
9269 that they ought to have 8-byte namesz and descsz field, and have
9270 8-byte alignment. Other writers, eg. Linux kernel, do the same.
9271
7c76fa91 9272 Return:
a39f3346 9273 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
9274
9275char *
a39f3346 9276elfcore_write_note (bfd *abfd,
217aa764 9277 char *buf,
a39f3346 9278 int *bufsiz,
217aa764 9279 const char *name,
a39f3346 9280 int type,
217aa764 9281 const void *input,
a39f3346 9282 int size)
7c76fa91
MS
9283{
9284 Elf_External_Note *xnp;
d4c88bbb 9285 size_t namesz;
d4c88bbb 9286 size_t newspace;
a39f3346 9287 char *dest;
7c76fa91 9288
d4c88bbb 9289 namesz = 0;
d4c88bbb 9290 if (name != NULL)
a39f3346 9291 namesz = strlen (name) + 1;
d4c88bbb 9292
a39f3346 9293 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 9294
a50b1753 9295 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
9296 if (buf == NULL)
9297 return buf;
a39f3346 9298 dest = buf + *bufsiz;
7c76fa91
MS
9299 *bufsiz += newspace;
9300 xnp = (Elf_External_Note *) dest;
9301 H_PUT_32 (abfd, namesz, xnp->namesz);
9302 H_PUT_32 (abfd, size, xnp->descsz);
9303 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
9304 dest = xnp->name;
9305 if (name != NULL)
9306 {
9307 memcpy (dest, name, namesz);
9308 dest += namesz;
a39f3346 9309 while (namesz & 3)
d4c88bbb
AM
9310 {
9311 *dest++ = '\0';
a39f3346 9312 ++namesz;
d4c88bbb
AM
9313 }
9314 }
9315 memcpy (dest, input, size);
a39f3346
AM
9316 dest += size;
9317 while (size & 3)
9318 {
9319 *dest++ = '\0';
9320 ++size;
9321 }
9322 return buf;
7c76fa91
MS
9323}
9324
7c76fa91 9325char *
217aa764
AM
9326elfcore_write_prpsinfo (bfd *abfd,
9327 char *buf,
9328 int *bufsiz,
9329 const char *fname,
9330 const char *psargs)
7c76fa91 9331{
183e98be
AM
9332 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9333
9334 if (bed->elf_backend_write_core_note != NULL)
9335 {
9336 char *ret;
9337 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
9338 NT_PRPSINFO, fname, psargs);
9339 if (ret != NULL)
9340 return ret;
9341 }
7c76fa91 9342
1f20dca5 9343#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
183e98be
AM
9344#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
9345 if (bed->s->elfclass == ELFCLASS32)
9346 {
9347#if defined (HAVE_PSINFO32_T)
9348 psinfo32_t data;
9349 int note_type = NT_PSINFO;
9350#else
9351 prpsinfo32_t data;
9352 int note_type = NT_PRPSINFO;
9353#endif
9354
9355 memset (&data, 0, sizeof (data));
9356 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
9357 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
9358 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 9359 "CORE", note_type, &data, sizeof (data));
183e98be
AM
9360 }
9361 else
9362#endif
9363 {
7c76fa91 9364#if defined (HAVE_PSINFO_T)
183e98be
AM
9365 psinfo_t data;
9366 int note_type = NT_PSINFO;
7c76fa91 9367#else
183e98be
AM
9368 prpsinfo_t data;
9369 int note_type = NT_PRPSINFO;
7c76fa91
MS
9370#endif
9371
183e98be
AM
9372 memset (&data, 0, sizeof (data));
9373 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
9374 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
9375 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 9376 "CORE", note_type, &data, sizeof (data));
183e98be 9377 }
7c76fa91
MS
9378#endif /* PSINFO_T or PRPSINFO_T */
9379
1f20dca5
UW
9380 free (buf);
9381 return NULL;
9382}
9383
70a38d42
SDJ
9384char *
9385elfcore_write_linux_prpsinfo32
9386 (bfd *abfd, char *buf, int *bufsiz,
9387 const struct elf_internal_linux_prpsinfo *prpsinfo)
9388{
9389 struct elf_external_linux_prpsinfo32 data;
9390
9391 memset (&data, 0, sizeof (data));
9392 LINUX_PRPSINFO32_SWAP_FIELDS (abfd, prpsinfo, data);
9393
9394 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
9395 &data, sizeof (data));
9396}
9397
9398char *
9399elfcore_write_linux_prpsinfo64
9400 (bfd *abfd, char *buf, int *bufsiz,
9401 const struct elf_internal_linux_prpsinfo *prpsinfo)
9402{
9403 struct elf_external_linux_prpsinfo64 data;
9404
9405 memset (&data, 0, sizeof (data));
9406 LINUX_PRPSINFO64_SWAP_FIELDS (abfd, prpsinfo, data);
9407
9408 return elfcore_write_note (abfd, buf, bufsiz,
9409 "CORE", NT_PRPSINFO, &data, sizeof (data));
9410}
9411
7c76fa91 9412char *
217aa764
AM
9413elfcore_write_prstatus (bfd *abfd,
9414 char *buf,
9415 int *bufsiz,
9416 long pid,
9417 int cursig,
9418 const void *gregs)
7c76fa91 9419{
183e98be 9420 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 9421
183e98be
AM
9422 if (bed->elf_backend_write_core_note != NULL)
9423 {
9424 char *ret;
9425 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
9426 NT_PRSTATUS,
9427 pid, cursig, gregs);
9428 if (ret != NULL)
9429 return ret;
9430 }
9431
1f20dca5 9432#if defined (HAVE_PRSTATUS_T)
183e98be
AM
9433#if defined (HAVE_PRSTATUS32_T)
9434 if (bed->s->elfclass == ELFCLASS32)
9435 {
9436 prstatus32_t prstat;
9437
9438 memset (&prstat, 0, sizeof (prstat));
9439 prstat.pr_pid = pid;
9440 prstat.pr_cursig = cursig;
9441 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 9442 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
9443 NT_PRSTATUS, &prstat, sizeof (prstat));
9444 }
9445 else
9446#endif
9447 {
9448 prstatus_t prstat;
9449
9450 memset (&prstat, 0, sizeof (prstat));
9451 prstat.pr_pid = pid;
9452 prstat.pr_cursig = cursig;
9453 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 9454 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
9455 NT_PRSTATUS, &prstat, sizeof (prstat));
9456 }
7c76fa91
MS
9457#endif /* HAVE_PRSTATUS_T */
9458
1f20dca5
UW
9459 free (buf);
9460 return NULL;
9461}
9462
51316059
MS
9463#if defined (HAVE_LWPSTATUS_T)
9464char *
217aa764
AM
9465elfcore_write_lwpstatus (bfd *abfd,
9466 char *buf,
9467 int *bufsiz,
9468 long pid,
9469 int cursig,
9470 const void *gregs)
51316059
MS
9471{
9472 lwpstatus_t lwpstat;
183e98be 9473 const char *note_name = "CORE";
51316059
MS
9474
9475 memset (&lwpstat, 0, sizeof (lwpstat));
9476 lwpstat.pr_lwpid = pid >> 16;
9477 lwpstat.pr_cursig = cursig;
9478#if defined (HAVE_LWPSTATUS_T_PR_REG)
d1e8523e 9479 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
51316059
MS
9480#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
9481#if !defined(gregs)
9482 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
9483 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
9484#else
9485 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
9486 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
9487#endif
9488#endif
47d9a591 9489 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
9490 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
9491}
9492#endif /* HAVE_LWPSTATUS_T */
9493
7c76fa91
MS
9494#if defined (HAVE_PSTATUS_T)
9495char *
217aa764
AM
9496elfcore_write_pstatus (bfd *abfd,
9497 char *buf,
9498 int *bufsiz,
9499 long pid,
6c10990d
NC
9500 int cursig ATTRIBUTE_UNUSED,
9501 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 9502{
183e98be
AM
9503 const char *note_name = "CORE";
9504#if defined (HAVE_PSTATUS32_T)
9505 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 9506
183e98be
AM
9507 if (bed->s->elfclass == ELFCLASS32)
9508 {
9509 pstatus32_t pstat;
9510
9511 memset (&pstat, 0, sizeof (pstat));
9512 pstat.pr_pid = pid & 0xffff;
9513 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
9514 NT_PSTATUS, &pstat, sizeof (pstat));
9515 return buf;
9516 }
9517 else
9518#endif
9519 {
9520 pstatus_t pstat;
9521
9522 memset (&pstat, 0, sizeof (pstat));
9523 pstat.pr_pid = pid & 0xffff;
9524 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
9525 NT_PSTATUS, &pstat, sizeof (pstat));
9526 return buf;
9527 }
7c76fa91
MS
9528}
9529#endif /* HAVE_PSTATUS_T */
9530
9531char *
217aa764
AM
9532elfcore_write_prfpreg (bfd *abfd,
9533 char *buf,
9534 int *bufsiz,
9535 const void *fpregs,
9536 int size)
7c76fa91 9537{
183e98be 9538 const char *note_name = "CORE";
47d9a591 9539 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
9540 note_name, NT_FPREGSET, fpregs, size);
9541}
9542
9543char *
217aa764
AM
9544elfcore_write_prxfpreg (bfd *abfd,
9545 char *buf,
9546 int *bufsiz,
9547 const void *xfpregs,
9548 int size)
7c76fa91
MS
9549{
9550 char *note_name = "LINUX";
47d9a591 9551 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
9552 note_name, NT_PRXFPREG, xfpregs, size);
9553}
9554
4339cae0
L
9555char *
9556elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
9557 const void *xfpregs, int size)
9558{
9559 char *note_name = "LINUX";
9560 return elfcore_write_note (abfd, buf, bufsiz,
9561 note_name, NT_X86_XSTATE, xfpregs, size);
9562}
9563
97753bd5
AM
9564char *
9565elfcore_write_ppc_vmx (bfd *abfd,
9566 char *buf,
9567 int *bufsiz,
9568 const void *ppc_vmx,
9569 int size)
9570{
9571 char *note_name = "LINUX";
9572 return elfcore_write_note (abfd, buf, bufsiz,
9573 note_name, NT_PPC_VMX, ppc_vmx, size);
9574}
9575
89eeb0bc
LM
9576char *
9577elfcore_write_ppc_vsx (bfd *abfd,
9578 char *buf,
9579 int *bufsiz,
9580 const void *ppc_vsx,
9581 int size)
9582{
9583 char *note_name = "LINUX";
9584 return elfcore_write_note (abfd, buf, bufsiz,
9585 note_name, NT_PPC_VSX, ppc_vsx, size);
9586}
9587
0675e188
UW
9588static char *
9589elfcore_write_s390_high_gprs (bfd *abfd,
9590 char *buf,
9591 int *bufsiz,
9592 const void *s390_high_gprs,
9593 int size)
9594{
9595 char *note_name = "LINUX";
9596 return elfcore_write_note (abfd, buf, bufsiz,
9597 note_name, NT_S390_HIGH_GPRS,
9598 s390_high_gprs, size);
9599}
9600
d7eeb400
MS
9601char *
9602elfcore_write_s390_timer (bfd *abfd,
9603 char *buf,
9604 int *bufsiz,
9605 const void *s390_timer,
9606 int size)
9607{
9608 char *note_name = "LINUX";
9609 return elfcore_write_note (abfd, buf, bufsiz,
9610 note_name, NT_S390_TIMER, s390_timer, size);
9611}
9612
9613char *
9614elfcore_write_s390_todcmp (bfd *abfd,
9615 char *buf,
9616 int *bufsiz,
9617 const void *s390_todcmp,
9618 int size)
9619{
9620 char *note_name = "LINUX";
9621 return elfcore_write_note (abfd, buf, bufsiz,
9622 note_name, NT_S390_TODCMP, s390_todcmp, size);
9623}
9624
9625char *
9626elfcore_write_s390_todpreg (bfd *abfd,
9627 char *buf,
9628 int *bufsiz,
9629 const void *s390_todpreg,
9630 int size)
9631{
9632 char *note_name = "LINUX";
9633 return elfcore_write_note (abfd, buf, bufsiz,
9634 note_name, NT_S390_TODPREG, s390_todpreg, size);
9635}
9636
9637char *
9638elfcore_write_s390_ctrs (bfd *abfd,
9639 char *buf,
9640 int *bufsiz,
9641 const void *s390_ctrs,
9642 int size)
9643{
9644 char *note_name = "LINUX";
9645 return elfcore_write_note (abfd, buf, bufsiz,
9646 note_name, NT_S390_CTRS, s390_ctrs, size);
9647}
9648
9649char *
9650elfcore_write_s390_prefix (bfd *abfd,
9651 char *buf,
9652 int *bufsiz,
9653 const void *s390_prefix,
9654 int size)
9655{
9656 char *note_name = "LINUX";
9657 return elfcore_write_note (abfd, buf, bufsiz,
9658 note_name, NT_S390_PREFIX, s390_prefix, size);
9659}
9660
355b81d9
UW
9661char *
9662elfcore_write_s390_last_break (bfd *abfd,
9663 char *buf,
9664 int *bufsiz,
9665 const void *s390_last_break,
9666 int size)
9667{
9668 char *note_name = "LINUX";
9669 return elfcore_write_note (abfd, buf, bufsiz,
9670 note_name, NT_S390_LAST_BREAK,
9671 s390_last_break, size);
9672}
9673
9674char *
9675elfcore_write_s390_system_call (bfd *abfd,
9676 char *buf,
9677 int *bufsiz,
9678 const void *s390_system_call,
9679 int size)
9680{
9681 char *note_name = "LINUX";
9682 return elfcore_write_note (abfd, buf, bufsiz,
9683 note_name, NT_S390_SYSTEM_CALL,
9684 s390_system_call, size);
9685}
9686
abb3f6cc
NC
9687char *
9688elfcore_write_s390_tdb (bfd *abfd,
9689 char *buf,
9690 int *bufsiz,
9691 const void *s390_tdb,
9692 int size)
9693{
9694 char *note_name = "LINUX";
9695 return elfcore_write_note (abfd, buf, bufsiz,
9696 note_name, NT_S390_TDB, s390_tdb, size);
9697}
9698
4ef9f41a
AA
9699char *
9700elfcore_write_s390_vxrs_low (bfd *abfd,
9701 char *buf,
9702 int *bufsiz,
9703 const void *s390_vxrs_low,
9704 int size)
9705{
9706 char *note_name = "LINUX";
9707 return elfcore_write_note (abfd, buf, bufsiz,
9708 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
9709}
9710
9711char *
9712elfcore_write_s390_vxrs_high (bfd *abfd,
9713 char *buf,
9714 int *bufsiz,
9715 const void *s390_vxrs_high,
9716 int size)
9717{
9718 char *note_name = "LINUX";
9719 return elfcore_write_note (abfd, buf, bufsiz,
9720 note_name, NT_S390_VXRS_HIGH,
9721 s390_vxrs_high, size);
9722}
9723
faa9a424
UW
9724char *
9725elfcore_write_arm_vfp (bfd *abfd,
9726 char *buf,
9727 int *bufsiz,
9728 const void *arm_vfp,
9729 int size)
9730{
9731 char *note_name = "LINUX";
9732 return elfcore_write_note (abfd, buf, bufsiz,
9733 note_name, NT_ARM_VFP, arm_vfp, size);
9734}
9735
652451f8
YZ
9736char *
9737elfcore_write_aarch_tls (bfd *abfd,
9738 char *buf,
9739 int *bufsiz,
9740 const void *aarch_tls,
9741 int size)
9742{
9743 char *note_name = "LINUX";
9744 return elfcore_write_note (abfd, buf, bufsiz,
9745 note_name, NT_ARM_TLS, aarch_tls, size);
9746}
9747
9748char *
9749elfcore_write_aarch_hw_break (bfd *abfd,
9750 char *buf,
9751 int *bufsiz,
9752 const void *aarch_hw_break,
9753 int size)
9754{
9755 char *note_name = "LINUX";
9756 return elfcore_write_note (abfd, buf, bufsiz,
9757 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
9758}
9759
9760char *
9761elfcore_write_aarch_hw_watch (bfd *abfd,
9762 char *buf,
9763 int *bufsiz,
9764 const void *aarch_hw_watch,
9765 int size)
9766{
9767 char *note_name = "LINUX";
9768 return elfcore_write_note (abfd, buf, bufsiz,
9769 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
9770}
9771
bb864ac1
CES
9772char *
9773elfcore_write_register_note (bfd *abfd,
9774 char *buf,
9775 int *bufsiz,
9776 const char *section,
9777 const void *data,
9778 int size)
9779{
9780 if (strcmp (section, ".reg2") == 0)
9781 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
9782 if (strcmp (section, ".reg-xfp") == 0)
9783 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
9784 if (strcmp (section, ".reg-xstate") == 0)
9785 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
9786 if (strcmp (section, ".reg-ppc-vmx") == 0)
9787 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
9788 if (strcmp (section, ".reg-ppc-vsx") == 0)
9789 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
9790 if (strcmp (section, ".reg-s390-high-gprs") == 0)
9791 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
9792 if (strcmp (section, ".reg-s390-timer") == 0)
9793 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
9794 if (strcmp (section, ".reg-s390-todcmp") == 0)
9795 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
9796 if (strcmp (section, ".reg-s390-todpreg") == 0)
9797 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
9798 if (strcmp (section, ".reg-s390-ctrs") == 0)
9799 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
9800 if (strcmp (section, ".reg-s390-prefix") == 0)
9801 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
355b81d9
UW
9802 if (strcmp (section, ".reg-s390-last-break") == 0)
9803 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
9804 if (strcmp (section, ".reg-s390-system-call") == 0)
9805 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
abb3f6cc
NC
9806 if (strcmp (section, ".reg-s390-tdb") == 0)
9807 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
4ef9f41a
AA
9808 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
9809 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
9810 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
9811 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
faa9a424
UW
9812 if (strcmp (section, ".reg-arm-vfp") == 0)
9813 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
652451f8
YZ
9814 if (strcmp (section, ".reg-aarch-tls") == 0)
9815 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
9816 if (strcmp (section, ".reg-aarch-hw-break") == 0)
9817 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
9818 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
9819 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
bb864ac1
CES
9820 return NULL;
9821}
9822
b34976b6 9823static bfd_boolean
718175fa 9824elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 9825{
c044fabd 9826 char *p;
252b5132 9827
252b5132
RH
9828 p = buf;
9829 while (p < buf + size)
9830 {
c044fabd
KH
9831 /* FIXME: bad alignment assumption. */
9832 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
9833 Elf_Internal_Note in;
9834
baea7ef1
AM
9835 if (offsetof (Elf_External_Note, name) > buf - p + size)
9836 return FALSE;
9837
dc810e39 9838 in.type = H_GET_32 (abfd, xnp->type);
252b5132 9839
dc810e39 9840 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 9841 in.namedata = xnp->name;
baea7ef1
AM
9842 if (in.namesz > buf - in.namedata + size)
9843 return FALSE;
252b5132 9844
dc810e39 9845 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
9846 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
9847 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
9848 if (in.descsz != 0
9849 && (in.descdata >= buf + size
9850 || in.descsz > buf - in.descdata + size))
9851 return FALSE;
252b5132 9852
718175fa
JK
9853 switch (bfd_get_format (abfd))
9854 {
9855 default:
9856 return TRUE;
9857
9858 case bfd_core:
f64e188b 9859 {
8acbedd6 9860#define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
f64e188b 9861 struct
718175fa 9862 {
f64e188b 9863 const char * string;
8acbedd6 9864 size_t len;
f64e188b 9865 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
718175fa 9866 }
f64e188b 9867 grokers[] =
b15fa79e 9868 {
8acbedd6
KS
9869 GROKER_ELEMENT ("", elfcore_grok_note),
9870 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
9871 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
9872 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
9873 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note)
f64e188b 9874 };
8acbedd6 9875#undef GROKER_ELEMENT
f64e188b
NC
9876 int i;
9877
9878 for (i = ARRAY_SIZE (grokers); i--;)
8acbedd6
KS
9879 {
9880 if (in.namesz >= grokers[i].len
9881 && strncmp (in.namedata, grokers[i].string,
9882 grokers[i].len) == 0)
9883 {
9884 if (! grokers[i].func (abfd, & in))
9885 return FALSE;
9886 break;
9887 }
9888 }
f64e188b
NC
9889 break;
9890 }
718175fa
JK
9891
9892 case bfd_object:
9893 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
9894 {
9895 if (! elfobj_grok_gnu_note (abfd, &in))
9896 return FALSE;
9897 }
e21e5835
NC
9898 else if (in.namesz == sizeof "stapsdt"
9899 && strcmp (in.namedata, "stapsdt") == 0)
9900 {
9901 if (! elfobj_grok_stapsdt_note (abfd, &in))
9902 return FALSE;
9903 }
718175fa 9904 break;
08a40648 9905 }
252b5132
RH
9906
9907 p = in.descdata + BFD_ALIGN (in.descsz, 4);
9908 }
9909
718175fa
JK
9910 return TRUE;
9911}
9912
9913static bfd_boolean
9914elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
9915{
9916 char *buf;
9917
9918 if (size <= 0)
9919 return TRUE;
9920
9921 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
9922 return FALSE;
9923
f64e188b 9924 buf = (char *) bfd_malloc (size + 1);
718175fa
JK
9925 if (buf == NULL)
9926 return FALSE;
9927
f64e188b
NC
9928 /* PR 17512: file: ec08f814
9929 0-termintate the buffer so that string searches will not overflow. */
9930 buf[size] = 0;
9931
718175fa
JK
9932 if (bfd_bread (buf, size, abfd) != size
9933 || !elf_parse_notes (abfd, buf, size, offset))
9934 {
9935 free (buf);
9936 return FALSE;
9937 }
9938
252b5132 9939 free (buf);
b34976b6 9940 return TRUE;
252b5132 9941}
98d8431c
JB
9942\f
9943/* Providing external access to the ELF program header table. */
9944
9945/* Return an upper bound on the number of bytes required to store a
9946 copy of ABFD's program header table entries. Return -1 if an error
9947 occurs; bfd_get_error will return an appropriate code. */
c044fabd 9948
98d8431c 9949long
217aa764 9950bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
9951{
9952 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9953 {
9954 bfd_set_error (bfd_error_wrong_format);
9955 return -1;
9956 }
9957
936e320b 9958 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
9959}
9960
98d8431c
JB
9961/* Copy ABFD's program header table entries to *PHDRS. The entries
9962 will be stored as an array of Elf_Internal_Phdr structures, as
9963 defined in include/elf/internal.h. To find out how large the
9964 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
9965
9966 Return the number of program header table entries read, or -1 if an
9967 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 9968
98d8431c 9969int
217aa764 9970bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
9971{
9972 int num_phdrs;
9973
9974 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9975 {
9976 bfd_set_error (bfd_error_wrong_format);
9977 return -1;
9978 }
9979
9980 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 9981 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
9982 num_phdrs * sizeof (Elf_Internal_Phdr));
9983
9984 return num_phdrs;
9985}
ae4221d7 9986
db6751f2 9987enum elf_reloc_type_class
7e612e98
AM
9988_bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
9989 const asection *rel_sec ATTRIBUTE_UNUSED,
9990 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
9991{
9992 return reloc_class_normal;
9993}
f8df10f4 9994
47d9a591 9995/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
9996 relocation against a local symbol. */
9997
9998bfd_vma
217aa764
AM
9999_bfd_elf_rela_local_sym (bfd *abfd,
10000 Elf_Internal_Sym *sym,
8517fae7 10001 asection **psec,
217aa764 10002 Elf_Internal_Rela *rel)
f8df10f4 10003{
8517fae7 10004 asection *sec = *psec;
f8df10f4
JJ
10005 bfd_vma relocation;
10006
10007 relocation = (sec->output_section->vma
10008 + sec->output_offset
10009 + sym->st_value);
10010 if ((sec->flags & SEC_MERGE)
c629eae0 10011 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 10012 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
f8df10f4 10013 {
f8df10f4 10014 rel->r_addend =
8517fae7 10015 _bfd_merged_section_offset (abfd, psec,
65765700 10016 elf_section_data (sec)->sec_info,
753731ee
AM
10017 sym->st_value + rel->r_addend);
10018 if (sec != *psec)
10019 {
10020 /* If we have changed the section, and our original section is
10021 marked with SEC_EXCLUDE, it means that the original
10022 SEC_MERGE section has been completely subsumed in some
10023 other SEC_MERGE section. In this case, we need to leave
10024 some info around for --emit-relocs. */
10025 if ((sec->flags & SEC_EXCLUDE) != 0)
10026 sec->kept_section = *psec;
10027 sec = *psec;
10028 }
8517fae7
AM
10029 rel->r_addend -= relocation;
10030 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
10031 }
10032 return relocation;
10033}
c629eae0
JJ
10034
10035bfd_vma
217aa764
AM
10036_bfd_elf_rel_local_sym (bfd *abfd,
10037 Elf_Internal_Sym *sym,
10038 asection **psec,
10039 bfd_vma addend)
47d9a591 10040{
c629eae0
JJ
10041 asection *sec = *psec;
10042
dbaa2011 10043 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
c629eae0
JJ
10044 return sym->st_value + addend;
10045
10046 return _bfd_merged_section_offset (abfd, psec,
65765700 10047 elf_section_data (sec)->sec_info,
753731ee 10048 sym->st_value + addend);
c629eae0
JJ
10049}
10050
10051bfd_vma
217aa764 10052_bfd_elf_section_offset (bfd *abfd,
92e4ec35 10053 struct bfd_link_info *info,
217aa764
AM
10054 asection *sec,
10055 bfd_vma offset)
c629eae0 10056{
68bfbfcc 10057 switch (sec->sec_info_type)
65765700 10058 {
dbaa2011 10059 case SEC_INFO_TYPE_STABS:
eea6121a
AM
10060 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
10061 offset);
dbaa2011 10062 case SEC_INFO_TYPE_EH_FRAME:
92e4ec35 10063 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700 10064 default:
310fd250
L
10065 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
10066 {
10067 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10068 bfd_size_type address_size = bed->s->arch_size / 8;
10069 offset = sec->size - offset - address_size;
10070 }
65765700
JJ
10071 return offset;
10072 }
c629eae0 10073}
3333a7c3
RM
10074\f
10075/* Create a new BFD as if by bfd_openr. Rather than opening a file,
10076 reconstruct an ELF file by reading the segments out of remote memory
10077 based on the ELF file header at EHDR_VMA and the ELF program headers it
10078 points to. If not null, *LOADBASEP is filled in with the difference
10079 between the VMAs from which the segments were read, and the VMAs the
10080 file headers (and hence BFD's idea of each section's VMA) put them at.
10081
10082 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
10083 remote memory at target address VMA into the local buffer at MYADDR; it
10084 should return zero on success or an `errno' code on failure. TEMPL must
10085 be a BFD for an ELF target with the word size and byte order found in
10086 the remote memory. */
10087
10088bfd *
217aa764
AM
10089bfd_elf_bfd_from_remote_memory
10090 (bfd *templ,
10091 bfd_vma ehdr_vma,
f0a5d95a 10092 bfd_size_type size,
217aa764 10093 bfd_vma *loadbasep,
fe78531d 10094 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
3333a7c3
RM
10095{
10096 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
5979d6b6 10097 (templ, ehdr_vma, size, loadbasep, target_read_memory);
3333a7c3 10098}
4c45e5c9
JJ
10099\f
10100long
c9727e01
AM
10101_bfd_elf_get_synthetic_symtab (bfd *abfd,
10102 long symcount ATTRIBUTE_UNUSED,
10103 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 10104 long dynsymcount,
c9727e01
AM
10105 asymbol **dynsyms,
10106 asymbol **ret)
4c45e5c9
JJ
10107{
10108 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10109 asection *relplt;
10110 asymbol *s;
10111 const char *relplt_name;
10112 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
10113 arelent *p;
10114 long count, i, n;
10115 size_t size;
10116 Elf_Internal_Shdr *hdr;
10117 char *names;
10118 asection *plt;
10119
8615f3f2
AM
10120 *ret = NULL;
10121
90e3cdf2
JJ
10122 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
10123 return 0;
10124
8615f3f2
AM
10125 if (dynsymcount <= 0)
10126 return 0;
10127
4c45e5c9
JJ
10128 if (!bed->plt_sym_val)
10129 return 0;
10130
10131 relplt_name = bed->relplt_name;
10132 if (relplt_name == NULL)
d35fd659 10133 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
10134 relplt = bfd_get_section_by_name (abfd, relplt_name);
10135 if (relplt == NULL)
10136 return 0;
10137
10138 hdr = &elf_section_data (relplt)->this_hdr;
10139 if (hdr->sh_link != elf_dynsymtab (abfd)
10140 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
10141 return 0;
10142
10143 plt = bfd_get_section_by_name (abfd, ".plt");
10144 if (plt == NULL)
10145 return 0;
10146
10147 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 10148 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
10149 return -1;
10150
eea6121a 10151 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
10152 size = count * sizeof (asymbol);
10153 p = relplt->relocation;
cb53bf42 10154 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
10155 {
10156 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
10157 if (p->addend != 0)
10158 {
10159#ifdef BFD64
10160 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
10161#else
10162 size += sizeof ("+0x") - 1 + 8;
10163#endif
10164 }
10165 }
4c45e5c9 10166
a50b1753 10167 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
10168 if (s == NULL)
10169 return -1;
10170
10171 names = (char *) (s + count);
10172 p = relplt->relocation;
10173 n = 0;
cb53bf42 10174 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
10175 {
10176 size_t len;
10177 bfd_vma addr;
10178
10179 addr = bed->plt_sym_val (i, plt, p);
10180 if (addr == (bfd_vma) -1)
10181 continue;
10182
10183 *s = **p->sym_ptr_ptr;
65a7a66f
AM
10184 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
10185 we are defining a symbol, ensure one of them is set. */
10186 if ((s->flags & BSF_LOCAL) == 0)
10187 s->flags |= BSF_GLOBAL;
6ba2a415 10188 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
10189 s->section = plt;
10190 s->value = addr - plt->vma;
10191 s->name = names;
8f39ba8e 10192 s->udata.p = NULL;
4c45e5c9
JJ
10193 len = strlen ((*p->sym_ptr_ptr)->name);
10194 memcpy (names, (*p->sym_ptr_ptr)->name, len);
10195 names += len;
041de40d
AM
10196 if (p->addend != 0)
10197 {
1d770845 10198 char buf[30], *a;
d324f6d6 10199
041de40d
AM
10200 memcpy (names, "+0x", sizeof ("+0x") - 1);
10201 names += sizeof ("+0x") - 1;
1d770845
L
10202 bfd_sprintf_vma (abfd, buf, p->addend);
10203 for (a = buf; *a == '0'; ++a)
10204 ;
10205 len = strlen (a);
10206 memcpy (names, a, len);
10207 names += len;
041de40d 10208 }
4c45e5c9
JJ
10209 memcpy (names, "@plt", sizeof ("@plt"));
10210 names += sizeof ("@plt");
8f39ba8e 10211 ++s, ++n;
4c45e5c9
JJ
10212 }
10213
10214 return n;
10215}
3d7f7666 10216
3b22753a
L
10217/* It is only used by x86-64 so far. */
10218asection _bfd_elf_large_com_section
10219 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 10220 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 10221
d1036acb 10222void
78245035
L
10223_bfd_elf_post_process_headers (bfd * abfd,
10224 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
d1036acb
L
10225{
10226 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
10227
10228 i_ehdrp = elf_elfheader (abfd);
10229
10230 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
10231
10232 /* To make things simpler for the loader on Linux systems we set the
9c55345c 10233 osabi field to ELFOSABI_GNU if the binary contains symbols of
f64b2e8d 10234 the STT_GNU_IFUNC type or STB_GNU_UNIQUE binding. */
d8045f23 10235 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
f64b2e8d 10236 && elf_tdata (abfd)->has_gnu_symbols)
9c55345c 10237 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
d1036acb 10238}
fcb93ecf
PB
10239
10240
10241/* Return TRUE for ELF symbol types that represent functions.
10242 This is the default version of this function, which is sufficient for
d8045f23 10243 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
10244
10245bfd_boolean
10246_bfd_elf_is_function_type (unsigned int type)
10247{
d8045f23
NC
10248 return (type == STT_FUNC
10249 || type == STT_GNU_IFUNC);
fcb93ecf 10250}
9f296da3 10251
aef36ac1
AM
10252/* If the ELF symbol SYM might be a function in SEC, return the
10253 function size and set *CODE_OFF to the function's entry point,
10254 otherwise return zero. */
9f296da3 10255
aef36ac1
AM
10256bfd_size_type
10257_bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
10258 bfd_vma *code_off)
9f296da3 10259{
aef36ac1
AM
10260 bfd_size_type size;
10261
ff9e0f5b 10262 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
aef36ac1
AM
10263 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
10264 || sym->section != sec)
10265 return 0;
ff9e0f5b 10266
ff9e0f5b 10267 *code_off = sym->value;
aef36ac1
AM
10268 size = 0;
10269 if (!(sym->flags & BSF_SYNTHETIC))
10270 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
10271 if (size == 0)
10272 size = 1;
10273 return size;
9f296da3 10274}