]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
alpha-coff: large memory allocation
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91 2
b3adc24a 3 Copyright (C) 1993-2020 Free Software Foundation, Inc.
252b5132 4
5e8d7549 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
5e8d7549
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
5e8d7549 10 (at your option) any later version.
252b5132 11
5e8d7549
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
5e8d7549 17 You should have received a copy of the GNU General Public License
b34976b6 18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132 22
1b74d094
BW
23/*
24SECTION
252b5132
RH
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
661a3fd4 33 haven't bothered yet. */
252b5132 34
7ee38065
MS
35/* For sparc64-cross-sparc32. */
36#define _SYSCALL32
252b5132 37#include "sysdep.h"
3a551c7a 38#include <limits.h>
3db64b00 39#include "bfd.h"
252b5132
RH
40#include "bfdlink.h"
41#include "libbfd.h"
42#define ARCH_SIZE 0
43#include "elf-bfd.h"
e0e8c97f 44#include "libiberty.h"
ff59fc36 45#include "safe-ctype.h"
de64ce13 46#include "elf-linux-core.h"
252b5132 47
8bc7f138
L
48#ifdef CORE_HEADER
49#include CORE_HEADER
50#endif
51
217aa764 52static int elf_sort_sections (const void *, const void *);
c84fca4d 53static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
ef10c3ac 54static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int) ;
718175fa 55static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
276da9b3 56 file_ptr offset, size_t align);
50b2bdb7 57
252b5132
RH
58/* Swap version information in and out. The version information is
59 currently size independent. If that ever changes, this code will
60 need to move into elfcode.h. */
61
62/* Swap in a Verdef structure. */
63
64void
217aa764
AM
65_bfd_elf_swap_verdef_in (bfd *abfd,
66 const Elf_External_Verdef *src,
67 Elf_Internal_Verdef *dst)
252b5132 68{
dc810e39
AM
69 dst->vd_version = H_GET_16 (abfd, src->vd_version);
70 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
71 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
72 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
73 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
74 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
75 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
76}
77
78/* Swap out a Verdef structure. */
79
80void
217aa764
AM
81_bfd_elf_swap_verdef_out (bfd *abfd,
82 const Elf_Internal_Verdef *src,
83 Elf_External_Verdef *dst)
252b5132 84{
dc810e39
AM
85 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
86 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
87 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
88 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
89 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
90 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
91 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
92}
93
94/* Swap in a Verdaux structure. */
95
96void
217aa764
AM
97_bfd_elf_swap_verdaux_in (bfd *abfd,
98 const Elf_External_Verdaux *src,
99 Elf_Internal_Verdaux *dst)
252b5132 100{
dc810e39
AM
101 dst->vda_name = H_GET_32 (abfd, src->vda_name);
102 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
103}
104
105/* Swap out a Verdaux structure. */
106
107void
217aa764
AM
108_bfd_elf_swap_verdaux_out (bfd *abfd,
109 const Elf_Internal_Verdaux *src,
110 Elf_External_Verdaux *dst)
252b5132 111{
dc810e39
AM
112 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
113 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
114}
115
116/* Swap in a Verneed structure. */
117
118void
217aa764
AM
119_bfd_elf_swap_verneed_in (bfd *abfd,
120 const Elf_External_Verneed *src,
121 Elf_Internal_Verneed *dst)
252b5132 122{
dc810e39
AM
123 dst->vn_version = H_GET_16 (abfd, src->vn_version);
124 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
125 dst->vn_file = H_GET_32 (abfd, src->vn_file);
126 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
127 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
128}
129
130/* Swap out a Verneed structure. */
131
132void
217aa764
AM
133_bfd_elf_swap_verneed_out (bfd *abfd,
134 const Elf_Internal_Verneed *src,
135 Elf_External_Verneed *dst)
252b5132 136{
dc810e39
AM
137 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
138 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
139 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
140 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
141 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
142}
143
144/* Swap in a Vernaux structure. */
145
146void
217aa764
AM
147_bfd_elf_swap_vernaux_in (bfd *abfd,
148 const Elf_External_Vernaux *src,
149 Elf_Internal_Vernaux *dst)
252b5132 150{
dc810e39
AM
151 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
152 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
153 dst->vna_other = H_GET_16 (abfd, src->vna_other);
154 dst->vna_name = H_GET_32 (abfd, src->vna_name);
155 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
156}
157
158/* Swap out a Vernaux structure. */
159
160void
217aa764
AM
161_bfd_elf_swap_vernaux_out (bfd *abfd,
162 const Elf_Internal_Vernaux *src,
163 Elf_External_Vernaux *dst)
252b5132 164{
dc810e39
AM
165 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
166 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
167 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
168 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
169 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
170}
171
172/* Swap in a Versym structure. */
173
174void
217aa764
AM
175_bfd_elf_swap_versym_in (bfd *abfd,
176 const Elf_External_Versym *src,
177 Elf_Internal_Versym *dst)
252b5132 178{
dc810e39 179 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
180}
181
182/* Swap out a Versym structure. */
183
184void
217aa764
AM
185_bfd_elf_swap_versym_out (bfd *abfd,
186 const Elf_Internal_Versym *src,
187 Elf_External_Versym *dst)
252b5132 188{
dc810e39 189 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
190}
191
192/* Standard ELF hash function. Do not change this function; you will
193 cause invalid hash tables to be generated. */
3a99b017 194
252b5132 195unsigned long
217aa764 196bfd_elf_hash (const char *namearg)
252b5132 197{
3a99b017 198 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
199 unsigned long h = 0;
200 unsigned long g;
201 int ch;
202
203 while ((ch = *name++) != '\0')
204 {
205 h = (h << 4) + ch;
206 if ((g = (h & 0xf0000000)) != 0)
207 {
208 h ^= g >> 24;
209 /* The ELF ABI says `h &= ~g', but this is equivalent in
210 this case and on some machines one insn instead of two. */
211 h ^= g;
212 }
213 }
32dfa85d 214 return h & 0xffffffff;
252b5132
RH
215}
216
fdc90cb4
JJ
217/* DT_GNU_HASH hash function. Do not change this function; you will
218 cause invalid hash tables to be generated. */
219
220unsigned long
221bfd_elf_gnu_hash (const char *namearg)
222{
223 const unsigned char *name = (const unsigned char *) namearg;
224 unsigned long h = 5381;
225 unsigned char ch;
226
227 while ((ch = *name++) != '\0')
228 h = (h << 5) + h + ch;
229 return h & 0xffffffff;
230}
231
0c8d6e5c
AM
232/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
233 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 234bfd_boolean
0c8d6e5c 235bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 236 size_t object_size,
4dfe6ac6 237 enum elf_target_id object_id)
252b5132 238{
0ffa91dd
NC
239 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
240 abfd->tdata.any = bfd_zalloc (abfd, object_size);
241 if (abfd->tdata.any == NULL)
242 return FALSE;
252b5132 243
0ffa91dd 244 elf_object_id (abfd) = object_id;
c0355132
AM
245 if (abfd->direction != read_direction)
246 {
247 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
248 if (o == NULL)
249 return FALSE;
250 elf_tdata (abfd)->o = o;
251 elf_program_header_size (abfd) = (bfd_size_type) -1;
252 }
b34976b6 253 return TRUE;
252b5132
RH
254}
255
0ffa91dd
NC
256
257bfd_boolean
ae95ffa6 258bfd_elf_make_object (bfd *abfd)
0ffa91dd 259{
ae95ffa6 260 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 261 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 262 bed->target_id);
0ffa91dd
NC
263}
264
b34976b6 265bfd_boolean
217aa764 266bfd_elf_mkcorefile (bfd *abfd)
252b5132 267{
c044fabd 268 /* I think this can be done just like an object file. */
228e534f
AM
269 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
270 return FALSE;
271 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
272 return elf_tdata (abfd)->core != NULL;
252b5132
RH
273}
274
6d5944fc 275char *
217aa764 276bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
277{
278 Elf_Internal_Shdr **i_shdrp;
f075ee0c 279 bfd_byte *shstrtab = NULL;
dc810e39
AM
280 file_ptr offset;
281 bfd_size_type shstrtabsize;
252b5132
RH
282
283 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
284 if (i_shdrp == 0
285 || shindex >= elf_numsections (abfd)
286 || i_shdrp[shindex] == 0)
f075ee0c 287 return NULL;
252b5132 288
f075ee0c 289 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
290 if (shstrtab == NULL)
291 {
c044fabd 292 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
293 offset = i_shdrp[shindex]->sh_offset;
294 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
295
296 /* Allocate and clear an extra byte at the end, to prevent crashes
297 in case the string table is not terminated. */
3471d59d 298 if (shstrtabsize + 1 <= 1
06614111 299 || bfd_seek (abfd, offset, SEEK_SET) != 0
2bb3687b
AM
300 || (shstrtab = _bfd_alloc_and_read (abfd, shstrtabsize + 1,
301 shstrtabsize)) == NULL)
302 {
3471d59d
CC
303 /* Once we've failed to read it, make sure we don't keep
304 trying. Otherwise, we'll keep allocating space for
305 the string table over and over. */
306 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
307 }
308 else
309 shstrtab[shstrtabsize] = '\0';
217aa764 310 i_shdrp[shindex]->contents = shstrtab;
252b5132 311 }
f075ee0c 312 return (char *) shstrtab;
252b5132
RH
313}
314
315char *
217aa764
AM
316bfd_elf_string_from_elf_section (bfd *abfd,
317 unsigned int shindex,
318 unsigned int strindex)
252b5132
RH
319{
320 Elf_Internal_Shdr *hdr;
321
322 if (strindex == 0)
323 return "";
324
74f2e02b
AM
325 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
326 return NULL;
327
252b5132
RH
328 hdr = elf_elfsections (abfd)[shindex];
329
06614111
NC
330 if (hdr->contents == NULL)
331 {
332 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
333 {
334 /* PR 17512: file: f057ec89. */
695344c0 335 /* xgettext:c-format */
871b3ab2 336 _bfd_error_handler (_("%pB: attempt to load strings from"
63a5468a 337 " a non-string section (number %d)"),
06614111
NC
338 abfd, shindex);
339 return NULL;
340 }
b1fa9dd6 341
06614111
NC
342 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
343 return NULL;
344 }
eed5def8
NC
345 else
346 {
347 /* PR 24273: The string section's contents may have already
348 been loaded elsewhere, eg because a corrupt file has the
349 string section index in the ELF header pointing at a group
350 section. So be paranoid, and test that the last byte of
351 the section is zero. */
352 if (hdr->sh_size == 0 || hdr->contents[hdr->sh_size - 1] != 0)
353 return NULL;
354 }
252b5132
RH
355
356 if (strindex >= hdr->sh_size)
357 {
1b3a8575 358 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
4eca0228 359 _bfd_error_handler
695344c0 360 /* xgettext:c-format */
2dcf00ce
AM
361 (_("%pB: invalid string offset %u >= %" PRIu64 " for section `%s'"),
362 abfd, strindex, (uint64_t) hdr->sh_size,
1b3a8575 363 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 364 ? ".shstrtab"
1b3a8575 365 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 366 return NULL;
252b5132
RH
367 }
368
369 return ((char *) hdr->contents) + strindex;
370}
371
6cdc0ccc
AM
372/* Read and convert symbols to internal format.
373 SYMCOUNT specifies the number of symbols to read, starting from
374 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
375 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
376 symbols, and symbol section index extensions, respectively.
377 Returns a pointer to the internal symbol buffer (malloced if necessary)
378 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
379
380Elf_Internal_Sym *
217aa764
AM
381bfd_elf_get_elf_syms (bfd *ibfd,
382 Elf_Internal_Shdr *symtab_hdr,
383 size_t symcount,
384 size_t symoffset,
385 Elf_Internal_Sym *intsym_buf,
386 void *extsym_buf,
387 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
388{
389 Elf_Internal_Shdr *shndx_hdr;
217aa764 390 void *alloc_ext;
df622259 391 const bfd_byte *esym;
6cdc0ccc
AM
392 Elf_External_Sym_Shndx *alloc_extshndx;
393 Elf_External_Sym_Shndx *shndx;
4dd07732 394 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
395 Elf_Internal_Sym *isym;
396 Elf_Internal_Sym *isymend;
9c5bfbb7 397 const struct elf_backend_data *bed;
6cdc0ccc 398 size_t extsym_size;
1f4361a7 399 size_t amt;
6cdc0ccc
AM
400 file_ptr pos;
401
e44a2c9c
AM
402 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
403 abort ();
404
6cdc0ccc
AM
405 if (symcount == 0)
406 return intsym_buf;
407
408 /* Normal syms might have section extension entries. */
409 shndx_hdr = NULL;
6a40cf0c
NC
410 if (elf_symtab_shndx_list (ibfd) != NULL)
411 {
412 elf_section_list * entry;
413 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
414
415 /* Find an index section that is linked to this symtab section. */
416 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
315350be
NC
417 {
418 /* PR 20063. */
419 if (entry->hdr.sh_link >= elf_numsections (ibfd))
420 continue;
421
422 if (sections[entry->hdr.sh_link] == symtab_hdr)
423 {
424 shndx_hdr = & entry->hdr;
425 break;
426 };
427 }
6a40cf0c
NC
428
429 if (shndx_hdr == NULL)
430 {
431 if (symtab_hdr == & elf_symtab_hdr (ibfd))
432 /* Not really accurate, but this was how the old code used to work. */
433 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
434 /* Otherwise we do nothing. The assumption is that
435 the index table will not be needed. */
436 }
437 }
6cdc0ccc
AM
438
439 /* Read the symbols. */
440 alloc_ext = NULL;
441 alloc_extshndx = NULL;
4dd07732 442 alloc_intsym = NULL;
6cdc0ccc
AM
443 bed = get_elf_backend_data (ibfd);
444 extsym_size = bed->s->sizeof_sym;
1f4361a7
AM
445 if (_bfd_mul_overflow (symcount, extsym_size, &amt))
446 {
447 bfd_set_error (bfd_error_file_too_big);
448 intsym_buf = NULL;
449 goto out;
450 }
6cdc0ccc
AM
451 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
452 if (extsym_buf == NULL)
453 {
1f4361a7 454 alloc_ext = bfd_malloc (amt);
6cdc0ccc
AM
455 extsym_buf = alloc_ext;
456 }
457 if (extsym_buf == NULL
458 || bfd_seek (ibfd, pos, SEEK_SET) != 0
459 || bfd_bread (extsym_buf, amt, ibfd) != amt)
460 {
461 intsym_buf = NULL;
462 goto out;
463 }
464
465 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
466 extshndx_buf = NULL;
467 else
468 {
1f4361a7
AM
469 if (_bfd_mul_overflow (symcount, sizeof (Elf_External_Sym_Shndx), &amt))
470 {
471 bfd_set_error (bfd_error_file_too_big);
472 intsym_buf = NULL;
473 goto out;
474 }
6cdc0ccc
AM
475 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
476 if (extshndx_buf == NULL)
477 {
1f4361a7 478 alloc_extshndx = (Elf_External_Sym_Shndx *) bfd_malloc (amt);
6cdc0ccc
AM
479 extshndx_buf = alloc_extshndx;
480 }
481 if (extshndx_buf == NULL
482 || bfd_seek (ibfd, pos, SEEK_SET) != 0
483 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
484 {
485 intsym_buf = NULL;
486 goto out;
487 }
488 }
489
490 if (intsym_buf == NULL)
491 {
1f4361a7
AM
492 if (_bfd_mul_overflow (symcount, sizeof (Elf_Internal_Sym), &amt))
493 {
494 bfd_set_error (bfd_error_file_too_big);
495 goto out;
496 }
497 alloc_intsym = (Elf_Internal_Sym *) bfd_malloc (amt);
4dd07732 498 intsym_buf = alloc_intsym;
6cdc0ccc
AM
499 if (intsym_buf == NULL)
500 goto out;
501 }
502
503 /* Convert the symbols to internal form. */
504 isymend = intsym_buf + symcount;
a50b1753 505 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
07d6d2b8 506 shndx = extshndx_buf;
6cdc0ccc
AM
507 isym < isymend;
508 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
509 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
510 {
511 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
695344c0 512 /* xgettext:c-format */
871b3ab2 513 _bfd_error_handler (_("%pB symbol number %lu references"
63a5468a 514 " nonexistent SHT_SYMTAB_SHNDX section"),
4eca0228 515 ibfd, (unsigned long) symoffset);
4dd07732
AM
516 if (alloc_intsym != NULL)
517 free (alloc_intsym);
8384fb8f
AM
518 intsym_buf = NULL;
519 goto out;
520 }
6cdc0ccc
AM
521
522 out:
523 if (alloc_ext != NULL)
524 free (alloc_ext);
525 if (alloc_extshndx != NULL)
526 free (alloc_extshndx);
527
528 return intsym_buf;
529}
530
5cab59f6
AM
531/* Look up a symbol name. */
532const char *
be8dd2ca
AM
533bfd_elf_sym_name (bfd *abfd,
534 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
535 Elf_Internal_Sym *isym,
536 asection *sym_sec)
5cab59f6 537{
26c61ae5 538 const char *name;
5cab59f6 539 unsigned int iname = isym->st_name;
be8dd2ca 540 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 541
138f35cc
JJ
542 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
543 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 544 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
545 {
546 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
547 shindex = elf_elfheader (abfd)->e_shstrndx;
548 }
549
26c61ae5
L
550 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
551 if (name == NULL)
552 name = "(null)";
553 else if (sym_sec && *name == '\0')
fd361982 554 name = bfd_section_name (sym_sec);
26c61ae5
L
555
556 return name;
5cab59f6
AM
557}
558
dbb410c3
AM
559/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
560 sections. The first element is the flags, the rest are section
561 pointers. */
562
563typedef union elf_internal_group {
564 Elf_Internal_Shdr *shdr;
565 unsigned int flags;
566} Elf_Internal_Group;
567
b885599b
AM
568/* Return the name of the group signature symbol. Why isn't the
569 signature just a string? */
570
571static const char *
217aa764 572group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 573{
9dce4196 574 Elf_Internal_Shdr *hdr;
9dce4196
AM
575 unsigned char esym[sizeof (Elf64_External_Sym)];
576 Elf_External_Sym_Shndx eshndx;
577 Elf_Internal_Sym isym;
b885599b 578
13792e9d
L
579 /* First we need to ensure the symbol table is available. Make sure
580 that it is a symbol table section. */
4fbb74a6
AM
581 if (ghdr->sh_link >= elf_numsections (abfd))
582 return NULL;
13792e9d
L
583 hdr = elf_elfsections (abfd) [ghdr->sh_link];
584 if (hdr->sh_type != SHT_SYMTAB
585 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
586 return NULL;
587
9dce4196
AM
588 /* Go read the symbol. */
589 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
590 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
591 &isym, esym, &eshndx) == NULL)
b885599b 592 return NULL;
9dce4196 593
26c61ae5 594 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
595}
596
dbb410c3
AM
597/* Set next_in_group list pointer, and group name for NEWSECT. */
598
b34976b6 599static bfd_boolean
217aa764 600setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
601{
602 unsigned int num_group = elf_tdata (abfd)->num_group;
603
604 /* If num_group is zero, read in all SHT_GROUP sections. The count
605 is set to -1 if there are no SHT_GROUP sections. */
606 if (num_group == 0)
607 {
608 unsigned int i, shnum;
609
610 /* First count the number of groups. If we have a SHT_GROUP
611 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 612 shnum = elf_numsections (abfd);
dbb410c3 613 num_group = 0;
08a40648 614
44534af3 615#define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
1783205a 616 ( (shdr)->sh_type == SHT_GROUP \
44534af3 617 && (shdr)->sh_size >= minsize \
1783205a
NC
618 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
619 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 620
dbb410c3
AM
621 for (i = 0; i < shnum; i++)
622 {
623 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 624
44534af3 625 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3
AM
626 num_group += 1;
627 }
628
629 if (num_group == 0)
20dbb49d
L
630 {
631 num_group = (unsigned) -1;
632 elf_tdata (abfd)->num_group = num_group;
ce497010 633 elf_tdata (abfd)->group_sect_ptr = NULL;
20dbb49d
L
634 }
635 else
dbb410c3
AM
636 {
637 /* We keep a list of elf section headers for group sections,
638 so we can find them quickly. */
1f4361a7 639 size_t amt;
d0fb9a8d 640
20dbb49d 641 elf_tdata (abfd)->num_group = num_group;
1f4361a7
AM
642 amt = num_group * sizeof (Elf_Internal_Shdr *);
643 elf_tdata (abfd)->group_sect_ptr
644 = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
dbb410c3 645 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 646 return FALSE;
dbb410c3 647 num_group = 0;
ce497010 648
dbb410c3
AM
649 for (i = 0; i < shnum; i++)
650 {
651 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 652
44534af3 653 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3 654 {
973ffd63 655 unsigned char *src;
dbb410c3
AM
656 Elf_Internal_Group *dest;
657
07d6d2b8
AM
658 /* Make sure the group section has a BFD section
659 attached to it. */
660 if (!bfd_section_from_shdr (abfd, i))
661 return FALSE;
662
dbb410c3
AM
663 /* Add to list of sections. */
664 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
665 num_group += 1;
666
667 /* Read the raw contents. */
1f4361a7
AM
668 BFD_ASSERT (sizeof (*dest) >= 4 && sizeof (*dest) % 4 == 0);
669 shdr->contents = NULL;
670 if (_bfd_mul_overflow (shdr->sh_size,
671 sizeof (*dest) / 4, &amt)
1f4361a7 672 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
2bb3687b
AM
673 || !(shdr->contents
674 = _bfd_alloc_and_read (abfd, amt, shdr->sh_size)))
493a3386
NC
675 {
676 _bfd_error_handler
695344c0 677 /* xgettext:c-format */
871b3ab2 678 (_("%pB: invalid size field in group section"
2dcf00ce
AM
679 " header: %#" PRIx64 ""),
680 abfd, (uint64_t) shdr->sh_size);
493a3386
NC
681 bfd_set_error (bfd_error_bad_value);
682 -- num_group;
493a3386
NC
683 continue;
684 }
708d7d0d 685
dbb410c3
AM
686 /* Translate raw contents, a flag word followed by an
687 array of elf section indices all in target byte order,
688 to the flag word followed by an array of elf section
689 pointers. */
690 src = shdr->contents + shdr->sh_size;
691 dest = (Elf_Internal_Group *) (shdr->contents + amt);
06614111 692
dbb410c3
AM
693 while (1)
694 {
695 unsigned int idx;
696
697 src -= 4;
698 --dest;
699 idx = H_GET_32 (abfd, src);
700 if (src == shdr->contents)
701 {
327301a4 702 dest->shdr = NULL;
dbb410c3 703 dest->flags = idx;
b885599b
AM
704 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
705 shdr->bfd_section->flags
706 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
707 break;
708 }
4bba0fb1 709 if (idx < shnum)
bae363f1
L
710 {
711 dest->shdr = elf_elfsections (abfd)[idx];
712 /* PR binutils/23199: All sections in a
713 section group should be marked with
714 SHF_GROUP. But some tools generate
715 broken objects without SHF_GROUP. Fix
716 them up here. */
717 dest->shdr->sh_flags |= SHF_GROUP;
718 }
4bba0fb1
AM
719 if (idx >= shnum
720 || dest->shdr->sh_type == SHT_GROUP)
dbb410c3 721 {
4eca0228 722 _bfd_error_handler
4bba0fb1
AM
723 (_("%pB: invalid entry in SHT_GROUP section [%u]"),
724 abfd, i);
725 dest->shdr = NULL;
dbb410c3 726 }
dbb410c3
AM
727 }
728 }
729 }
493a3386
NC
730
731 /* PR 17510: Corrupt binaries might contain invalid groups. */
732 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
733 {
734 elf_tdata (abfd)->num_group = num_group;
735
736 /* If all groups are invalid then fail. */
737 if (num_group == 0)
738 {
739 elf_tdata (abfd)->group_sect_ptr = NULL;
740 elf_tdata (abfd)->num_group = num_group = -1;
4eca0228 741 _bfd_error_handler
871b3ab2 742 (_("%pB: no valid group sections found"), abfd);
493a3386
NC
743 bfd_set_error (bfd_error_bad_value);
744 }
745 }
dbb410c3
AM
746 }
747 }
748
749 if (num_group != (unsigned) -1)
750 {
564e11c9
JW
751 unsigned int search_offset = elf_tdata (abfd)->group_search_offset;
752 unsigned int j;
dbb410c3 753
564e11c9 754 for (j = 0; j < num_group; j++)
dbb410c3 755 {
564e11c9
JW
756 /* Begin search from previous found group. */
757 unsigned i = (j + search_offset) % num_group;
758
dbb410c3 759 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
ce497010 760 Elf_Internal_Group *idx;
0c54f692 761 bfd_size_type n_elt;
ce497010
NC
762
763 if (shdr == NULL)
764 continue;
765
766 idx = (Elf_Internal_Group *) shdr->contents;
0c54f692
NC
767 if (idx == NULL || shdr->sh_size < 4)
768 {
769 /* See PR 21957 for a reproducer. */
770 /* xgettext:c-format */
871b3ab2 771 _bfd_error_handler (_("%pB: group section '%pA' has no contents"),
0c54f692
NC
772 abfd, shdr->bfd_section);
773 elf_tdata (abfd)->group_sect_ptr[i] = NULL;
774 bfd_set_error (bfd_error_bad_value);
775 return FALSE;
776 }
ce497010 777 n_elt = shdr->sh_size / 4;
dbb410c3
AM
778
779 /* Look through this group's sections to see if current
780 section is a member. */
781 while (--n_elt != 0)
782 if ((++idx)->shdr == hdr)
783 {
e0e8c97f 784 asection *s = NULL;
dbb410c3
AM
785
786 /* We are a member of this group. Go looking through
787 other members to see if any others are linked via
788 next_in_group. */
789 idx = (Elf_Internal_Group *) shdr->contents;
790 n_elt = shdr->sh_size / 4;
791 while (--n_elt != 0)
4bba0fb1
AM
792 if ((++idx)->shdr != NULL
793 && (s = idx->shdr->bfd_section) != NULL
945906ff 794 && elf_next_in_group (s) != NULL)
dbb410c3
AM
795 break;
796 if (n_elt != 0)
797 {
dbb410c3
AM
798 /* Snarf the group name from other member, and
799 insert current section in circular list. */
945906ff
AM
800 elf_group_name (newsect) = elf_group_name (s);
801 elf_next_in_group (newsect) = elf_next_in_group (s);
802 elf_next_in_group (s) = newsect;
dbb410c3
AM
803 }
804 else
805 {
dbb410c3
AM
806 const char *gname;
807
b885599b
AM
808 gname = group_signature (abfd, shdr);
809 if (gname == NULL)
b34976b6 810 return FALSE;
945906ff 811 elf_group_name (newsect) = gname;
dbb410c3
AM
812
813 /* Start a circular list with one element. */
945906ff 814 elf_next_in_group (newsect) = newsect;
dbb410c3 815 }
b885599b 816
9dce4196
AM
817 /* If the group section has been created, point to the
818 new member. */
dbb410c3 819 if (shdr->bfd_section != NULL)
945906ff 820 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 821
564e11c9
JW
822 elf_tdata (abfd)->group_search_offset = i;
823 j = num_group - 1;
dbb410c3
AM
824 break;
825 }
826 }
827 }
828
945906ff 829 if (elf_group_name (newsect) == NULL)
dbb410c3 830 {
695344c0 831 /* xgettext:c-format */
871b3ab2 832 _bfd_error_handler (_("%pB: no group info for section '%pA'"),
4eca0228 833 abfd, newsect);
493a3386 834 return FALSE;
dbb410c3 835 }
b34976b6 836 return TRUE;
dbb410c3
AM
837}
838
3d7f7666 839bfd_boolean
dd863624 840_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
841{
842 unsigned int i;
843 unsigned int num_group = elf_tdata (abfd)->num_group;
844 bfd_boolean result = TRUE;
dd863624
L
845 asection *s;
846
847 /* Process SHF_LINK_ORDER. */
848 for (s = abfd->sections; s != NULL; s = s->next)
849 {
850 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
851 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
852 {
853 unsigned int elfsec = this_hdr->sh_link;
854 /* FIXME: The old Intel compiler and old strip/objcopy may
855 not set the sh_link or sh_info fields. Hence we could
856 get the situation where elfsec is 0. */
857 if (elfsec == 0)
858 {
4fbb74a6 859 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
860 if (bed->link_order_error_handler)
861 bed->link_order_error_handler
695344c0 862 /* xgettext:c-format */
871b3ab2 863 (_("%pB: warning: sh_link not set for section `%pA'"),
dd863624
L
864 abfd, s);
865 }
866 else
867 {
91d6fa6a 868 asection *linksec = NULL;
25bbc984 869
4fbb74a6
AM
870 if (elfsec < elf_numsections (abfd))
871 {
872 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 873 linksec = this_hdr->bfd_section;
4fbb74a6 874 }
25bbc984
L
875
876 /* PR 1991, 2008:
877 Some strip/objcopy may leave an incorrect value in
878 sh_link. We don't want to proceed. */
91d6fa6a 879 if (linksec == NULL)
25bbc984 880 {
4eca0228 881 _bfd_error_handler
695344c0 882 /* xgettext:c-format */
871b3ab2 883 (_("%pB: sh_link [%d] in section `%pA' is incorrect"),
c08bb8dd 884 s->owner, elfsec, s);
25bbc984
L
885 result = FALSE;
886 }
887
91d6fa6a 888 elf_linked_to_section (s) = linksec;
dd863624
L
889 }
890 }
53720c49
AM
891 else if (this_hdr->sh_type == SHT_GROUP
892 && elf_next_in_group (s) == NULL)
893 {
4eca0228 894 _bfd_error_handler
695344c0 895 /* xgettext:c-format */
871b3ab2 896 (_("%pB: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
53720c49
AM
897 abfd, elf_section_data (s)->this_idx);
898 result = FALSE;
899 }
dd863624 900 }
3d7f7666 901
dd863624 902 /* Process section groups. */
3d7f7666
L
903 if (num_group == (unsigned) -1)
904 return result;
905
906 for (i = 0; i < num_group; i++)
907 {
908 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
4b0e8a5f
NC
909 Elf_Internal_Group *idx;
910 unsigned int n_elt;
3d7f7666 911
4b0e8a5f
NC
912 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
913 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
914 {
4eca0228 915 _bfd_error_handler
695344c0 916 /* xgettext:c-format */
871b3ab2 917 (_("%pB: section group entry number %u is corrupt"),
4b0e8a5f
NC
918 abfd, i);
919 result = FALSE;
920 continue;
921 }
922
923 idx = (Elf_Internal_Group *) shdr->contents;
924 n_elt = shdr->sh_size / 4;
1b786873 925
3d7f7666 926 while (--n_elt != 0)
24d3e51b
NC
927 {
928 ++ idx;
929
930 if (idx->shdr == NULL)
931 continue;
932 else if (idx->shdr->bfd_section)
933 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
db4677b8
AM
934 else if (idx->shdr->sh_type != SHT_RELA
935 && idx->shdr->sh_type != SHT_REL)
24d3e51b
NC
936 {
937 /* There are some unknown sections in the group. */
938 _bfd_error_handler
939 /* xgettext:c-format */
871b3ab2 940 (_("%pB: unknown type [%#x] section `%s' in group [%pA]"),
24d3e51b
NC
941 abfd,
942 idx->shdr->sh_type,
943 bfd_elf_string_from_elf_section (abfd,
944 (elf_elfheader (abfd)
945 ->e_shstrndx),
946 idx->shdr->sh_name),
947 shdr->bfd_section);
948 result = FALSE;
949 }
950 }
3d7f7666 951 }
24d3e51b 952
3d7f7666
L
953 return result;
954}
955
72adc230
AM
956bfd_boolean
957bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
958{
959 return elf_next_in_group (sec) != NULL;
960}
961
cb7f4b29
AM
962const char *
963bfd_elf_group_name (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
964{
965 if (elf_sec_group (sec) != NULL)
966 return elf_group_name (sec);
967 return NULL;
968}
969
f6fe1ccd
L
970static char *
971convert_debug_to_zdebug (bfd *abfd, const char *name)
972{
973 unsigned int len = strlen (name);
974 char *new_name = bfd_alloc (abfd, len + 2);
975 if (new_name == NULL)
976 return NULL;
977 new_name[0] = '.';
978 new_name[1] = 'z';
979 memcpy (new_name + 2, name + 1, len);
980 return new_name;
981}
982
983static char *
984convert_zdebug_to_debug (bfd *abfd, const char *name)
985{
986 unsigned int len = strlen (name);
987 char *new_name = bfd_alloc (abfd, len);
988 if (new_name == NULL)
989 return NULL;
990 new_name[0] = '.';
991 memcpy (new_name + 1, name + 2, len - 1);
992 return new_name;
993}
994
cc5277b1
ML
995/* This a copy of lto_section defined in GCC (lto-streamer.h). */
996
997struct lto_section
998{
999 int16_t major_version;
1000 int16_t minor_version;
1001 unsigned char slim_object;
1002
1003 /* Flags is a private field that is not defined publicly. */
1004 uint16_t flags;
1005};
1006
252b5132
RH
1007/* Make a BFD section from an ELF section. We store a pointer to the
1008 BFD section in the bfd_section field of the header. */
1009
b34976b6 1010bfd_boolean
217aa764
AM
1011_bfd_elf_make_section_from_shdr (bfd *abfd,
1012 Elf_Internal_Shdr *hdr,
6dc132d9
L
1013 const char *name,
1014 int shindex)
252b5132
RH
1015{
1016 asection *newsect;
1017 flagword flags;
9c5bfbb7 1018 const struct elf_backend_data *bed;
252b5132
RH
1019
1020 if (hdr->bfd_section != NULL)
4e011fb5 1021 return TRUE;
252b5132
RH
1022
1023 newsect = bfd_make_section_anyway (abfd, name);
1024 if (newsect == NULL)
b34976b6 1025 return FALSE;
252b5132 1026
1829f4b2
AM
1027 hdr->bfd_section = newsect;
1028 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 1029 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 1030
2f89ff8d
L
1031 /* Always use the real type/flags. */
1032 elf_section_type (newsect) = hdr->sh_type;
1033 elf_section_flags (newsect) = hdr->sh_flags;
1034
252b5132
RH
1035 newsect->filepos = hdr->sh_offset;
1036
fd361982
AM
1037 if (!bfd_set_section_vma (newsect, hdr->sh_addr)
1038 || !bfd_set_section_size (newsect, hdr->sh_size)
1039 || !bfd_set_section_alignment (newsect, bfd_log2 (hdr->sh_addralign)))
b34976b6 1040 return FALSE;
252b5132
RH
1041
1042 flags = SEC_NO_FLAGS;
1043 if (hdr->sh_type != SHT_NOBITS)
1044 flags |= SEC_HAS_CONTENTS;
dbb410c3 1045 if (hdr->sh_type == SHT_GROUP)
7bdf4127 1046 flags |= SEC_GROUP;
252b5132
RH
1047 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1048 {
1049 flags |= SEC_ALLOC;
1050 if (hdr->sh_type != SHT_NOBITS)
1051 flags |= SEC_LOAD;
1052 }
1053 if ((hdr->sh_flags & SHF_WRITE) == 0)
1054 flags |= SEC_READONLY;
1055 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
1056 flags |= SEC_CODE;
1057 else if ((flags & SEC_LOAD) != 0)
1058 flags |= SEC_DATA;
f5fa8ca2
JJ
1059 if ((hdr->sh_flags & SHF_MERGE) != 0)
1060 {
1061 flags |= SEC_MERGE;
1062 newsect->entsize = hdr->sh_entsize;
f5fa8ca2 1063 }
84865015
NC
1064 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1065 flags |= SEC_STRINGS;
dbb410c3
AM
1066 if (hdr->sh_flags & SHF_GROUP)
1067 if (!setup_group (abfd, hdr, newsect))
b34976b6 1068 return FALSE;
13ae64f3
JJ
1069 if ((hdr->sh_flags & SHF_TLS) != 0)
1070 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
1071 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1072 flags |= SEC_EXCLUDE;
252b5132 1073
df3a023b
AM
1074 switch (elf_elfheader (abfd)->e_ident[EI_OSABI])
1075 {
1076 /* FIXME: We should not recognize SHF_GNU_MBIND for ELFOSABI_NONE,
1077 but binutils as of 2019-07-23 did not set the EI_OSABI header
1078 byte. */
1079 case ELFOSABI_NONE:
1080 case ELFOSABI_GNU:
1081 case ELFOSABI_FREEBSD:
1082 if ((hdr->sh_flags & SHF_GNU_MBIND) != 0)
1083 elf_tdata (abfd)->has_gnu_osabi |= elf_gnu_osabi_mbind;
1084 break;
1085 }
1086
3d2b39cf 1087 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 1088 {
3d2b39cf
L
1089 /* The debugging sections appear to be recognized only by name,
1090 not any sort of flag. Their SEC_ALLOC bits are cleared. */
3d2b39cf
L
1091 if (name [0] == '.')
1092 {
bb294208
AM
1093 if (strncmp (name, ".debug", 6) == 0
1094 || strncmp (name, ".gnu.linkonce.wi.", 17) == 0
1095 || strncmp (name, ".zdebug", 7) == 0)
1096 flags |= SEC_DEBUGGING | SEC_ELF_OCTETS;
1097 else if (strncmp (name, GNU_BUILD_ATTRS_SECTION_NAME, 21) == 0
1098 || strncmp (name, ".note.gnu", 9) == 0)
1099 flags |= SEC_ELF_OCTETS;
1100 else if (strncmp (name, ".line", 5) == 0
1101 || strncmp (name, ".stab", 5) == 0
1102 || strcmp (name, ".gdb_index") == 0)
3d2b39cf
L
1103 flags |= SEC_DEBUGGING;
1104 }
1105 }
252b5132
RH
1106
1107 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1108 only link a single copy of the section. This is used to support
1109 g++. g++ will emit each template expansion in its own section.
1110 The symbols will be defined as weak, so that multiple definitions
1111 are permitted. The GNU linker extension is to actually discard
1112 all but one of the sections. */
0112cd26 1113 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 1114 && elf_next_in_group (newsect) == NULL)
252b5132
RH
1115 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1116
fa152c49
JW
1117 bed = get_elf_backend_data (abfd);
1118 if (bed->elf_backend_section_flags)
1119 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 1120 return FALSE;
fa152c49 1121
fd361982 1122 if (!bfd_set_section_flags (newsect, flags))
b34976b6 1123 return FALSE;
252b5132 1124
718175fa
JK
1125 /* We do not parse the PT_NOTE segments as we are interested even in the
1126 separate debug info files which may have the segments offsets corrupted.
1127 PT_NOTEs from the core files are currently not parsed using BFD. */
1128 if (hdr->sh_type == SHT_NOTE)
1129 {
baea7ef1 1130 bfd_byte *contents;
718175fa 1131
baea7ef1 1132 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
1133 return FALSE;
1134
276da9b3
L
1135 elf_parse_notes (abfd, (char *) contents, hdr->sh_size,
1136 hdr->sh_offset, hdr->sh_addralign);
718175fa
JK
1137 free (contents);
1138 }
1139
252b5132
RH
1140 if ((flags & SEC_ALLOC) != 0)
1141 {
1142 Elf_Internal_Phdr *phdr;
6ffd7900
AM
1143 unsigned int i, nload;
1144
1145 /* Some ELF linkers produce binaries with all the program header
1146 p_paddr fields zero. If we have such a binary with more than
1147 one PT_LOAD header, then leave the section lma equal to vma
1148 so that we don't create sections with overlapping lma. */
1149 phdr = elf_tdata (abfd)->phdr;
1150 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1151 if (phdr->p_paddr != 0)
1152 break;
1153 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1154 ++nload;
1155 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1156 return TRUE;
252b5132 1157
252b5132
RH
1158 phdr = elf_tdata (abfd)->phdr;
1159 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1160 {
86b2281f
AM
1161 if (((phdr->p_type == PT_LOAD
1162 && (hdr->sh_flags & SHF_TLS) == 0)
1163 || phdr->p_type == PT_TLS)
9a83a553 1164 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 1165 {
88967714
AM
1166 if ((flags & SEC_LOAD) == 0)
1167 newsect->lma = (phdr->p_paddr
1168 + hdr->sh_addr - phdr->p_vaddr);
1169 else
1170 /* We used to use the same adjustment for SEC_LOAD
1171 sections, but that doesn't work if the segment
1172 is packed with code from multiple VMAs.
1173 Instead we calculate the section LMA based on
1174 the segment LMA. It is assumed that the
1175 segment will contain sections with contiguous
1176 LMAs, even if the VMAs are not. */
1177 newsect->lma = (phdr->p_paddr
1178 + hdr->sh_offset - phdr->p_offset);
1179
1180 /* With contiguous segments, we can't tell from file
1181 offsets whether a section with zero size should
1182 be placed at the end of one segment or the
1183 beginning of the next. Decide based on vaddr. */
1184 if (hdr->sh_addr >= phdr->p_vaddr
1185 && (hdr->sh_addr + hdr->sh_size
1186 <= phdr->p_vaddr + phdr->p_memsz))
1187 break;
252b5132
RH
1188 }
1189 }
1190 }
1191
4a114e3e
L
1192 /* Compress/decompress DWARF debug sections with names: .debug_* and
1193 .zdebug_*, after the section flags is set. */
1194 if ((flags & SEC_DEBUGGING)
1195 && ((name[1] == 'd' && name[6] == '_')
1196 || (name[1] == 'z' && name[7] == '_')))
1197 {
1198 enum { nothing, compress, decompress } action = nothing;
151411f8 1199 int compression_header_size;
dab394de 1200 bfd_size_type uncompressed_size;
4207142d 1201 unsigned int uncompressed_align_power;
151411f8
L
1202 bfd_boolean compressed
1203 = bfd_is_section_compressed_with_header (abfd, newsect,
dab394de 1204 &compression_header_size,
4207142d
MW
1205 &uncompressed_size,
1206 &uncompressed_align_power);
151411f8 1207 if (compressed)
4a114e3e
L
1208 {
1209 /* Compressed section. Check if we should decompress. */
1210 if ((abfd->flags & BFD_DECOMPRESS))
1211 action = decompress;
1212 }
151411f8
L
1213
1214 /* Compress the uncompressed section or convert from/to .zdebug*
1215 section. Check if we should compress. */
1216 if (action == nothing)
4a114e3e 1217 {
151411f8
L
1218 if (newsect->size != 0
1219 && (abfd->flags & BFD_COMPRESS)
1220 && compression_header_size >= 0
dab394de 1221 && uncompressed_size > 0
151411f8
L
1222 && (!compressed
1223 || ((compression_header_size > 0)
1224 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
4a114e3e 1225 action = compress;
151411f8
L
1226 else
1227 return TRUE;
4a114e3e
L
1228 }
1229
151411f8 1230 if (action == compress)
4a114e3e 1231 {
4a114e3e
L
1232 if (!bfd_init_section_compress_status (abfd, newsect))
1233 {
4eca0228 1234 _bfd_error_handler
695344c0 1235 /* xgettext:c-format */
871b3ab2 1236 (_("%pB: unable to initialize compress status for section %s"),
4a114e3e
L
1237 abfd, name);
1238 return FALSE;
1239 }
151411f8
L
1240 }
1241 else
1242 {
4a114e3e
L
1243 if (!bfd_init_section_decompress_status (abfd, newsect))
1244 {
4eca0228 1245 _bfd_error_handler
695344c0 1246 /* xgettext:c-format */
871b3ab2 1247 (_("%pB: unable to initialize decompress status for section %s"),
4a114e3e
L
1248 abfd, name);
1249 return FALSE;
1250 }
151411f8
L
1251 }
1252
f6fe1ccd 1253 if (abfd->is_linker_input)
151411f8 1254 {
f6fe1ccd
L
1255 if (name[1] == 'z'
1256 && (action == decompress
1257 || (action == compress
1258 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
4e011fb5 1259 {
f6fe1ccd
L
1260 /* Convert section name from .zdebug_* to .debug_* so
1261 that linker will consider this section as a debug
1262 section. */
1263 char *new_name = convert_zdebug_to_debug (abfd, name);
151411f8
L
1264 if (new_name == NULL)
1265 return FALSE;
fd361982 1266 bfd_rename_section (newsect, new_name);
151411f8 1267 }
4a114e3e 1268 }
f6fe1ccd
L
1269 else
1270 /* For objdump, don't rename the section. For objcopy, delay
1271 section rename to elf_fake_sections. */
1272 newsect->flags |= SEC_ELF_RENAME;
4a114e3e
L
1273 }
1274
cc5277b1
ML
1275 /* GCC uses .gnu.lto_.lto.<some_hash> as a LTO bytecode information
1276 section. */
1277 const char *lto_section_name = ".gnu.lto_.lto.";
1278 if (strncmp (name, lto_section_name, strlen (lto_section_name)) == 0)
1279 {
1280 struct lto_section lsection;
1281 if (bfd_get_section_contents (abfd, newsect, &lsection, 0,
1282 sizeof (struct lto_section)))
1283 abfd->lto_slim_object = lsection.slim_object;
1284 }
1285
b34976b6 1286 return TRUE;
252b5132
RH
1287}
1288
84865015
NC
1289const char *const bfd_elf_section_type_names[] =
1290{
252b5132
RH
1291 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1292 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1293 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1294};
1295
1049f94e 1296/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1297 output, and the reloc is against an external symbol, and nothing
1298 has given us any additional addend, the resulting reloc will also
1299 be against the same symbol. In such a case, we don't want to
1300 change anything about the way the reloc is handled, since it will
1301 all be done at final link time. Rather than put special case code
1302 into bfd_perform_relocation, all the reloc types use this howto
1303 function. It just short circuits the reloc if producing
1049f94e 1304 relocatable output against an external symbol. */
252b5132 1305
252b5132 1306bfd_reloc_status_type
217aa764
AM
1307bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1308 arelent *reloc_entry,
1309 asymbol *symbol,
1310 void *data ATTRIBUTE_UNUSED,
1311 asection *input_section,
1312 bfd *output_bfd,
1313 char **error_message ATTRIBUTE_UNUSED)
1314{
1315 if (output_bfd != NULL
252b5132
RH
1316 && (symbol->flags & BSF_SECTION_SYM) == 0
1317 && (! reloc_entry->howto->partial_inplace
1318 || reloc_entry->addend == 0))
1319 {
1320 reloc_entry->address += input_section->output_offset;
1321 return bfd_reloc_ok;
1322 }
1323
1324 return bfd_reloc_continue;
1325}
1326\f
84865015
NC
1327/* Returns TRUE if section A matches section B.
1328 Names, addresses and links may be different, but everything else
1329 should be the same. */
1330
1331static bfd_boolean
5522f910
NC
1332section_match (const Elf_Internal_Shdr * a,
1333 const Elf_Internal_Shdr * b)
84865015 1334{
ac85e67c
AM
1335 if (a->sh_type != b->sh_type
1336 || ((a->sh_flags ^ b->sh_flags) & ~SHF_INFO_LINK) != 0
1337 || a->sh_addralign != b->sh_addralign
1338 || a->sh_entsize != b->sh_entsize)
1339 return FALSE;
1340 if (a->sh_type == SHT_SYMTAB
1341 || a->sh_type == SHT_STRTAB)
1342 return TRUE;
1343 return a->sh_size == b->sh_size;
84865015
NC
1344}
1345
1346/* Find a section in OBFD that has the same characteristics
1347 as IHEADER. Return the index of this section or SHN_UNDEF if
1348 none can be found. Check's section HINT first, as this is likely
1349 to be the correct section. */
1350
1351static unsigned int
5cc4ca83
ST
1352find_link (const bfd *obfd, const Elf_Internal_Shdr *iheader,
1353 const unsigned int hint)
84865015
NC
1354{
1355 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1356 unsigned int i;
1357
a55c9876
NC
1358 BFD_ASSERT (iheader != NULL);
1359
1360 /* See PR 20922 for a reproducer of the NULL test. */
5cc4ca83
ST
1361 if (hint < elf_numsections (obfd)
1362 && oheaders[hint] != NULL
a55c9876 1363 && section_match (oheaders[hint], iheader))
84865015
NC
1364 return hint;
1365
1366 for (i = 1; i < elf_numsections (obfd); i++)
1367 {
1368 Elf_Internal_Shdr * oheader = oheaders[i];
1369
a55c9876
NC
1370 if (oheader == NULL)
1371 continue;
84865015
NC
1372 if (section_match (oheader, iheader))
1373 /* FIXME: Do we care if there is a potential for
1374 multiple matches ? */
1375 return i;
1376 }
1377
1378 return SHN_UNDEF;
1379}
1380
5522f910
NC
1381/* PR 19938: Attempt to set the ELF section header fields of an OS or
1382 Processor specific section, based upon a matching input section.
1383 Returns TRUE upon success, FALSE otherwise. */
07d6d2b8 1384
5522f910
NC
1385static bfd_boolean
1386copy_special_section_fields (const bfd *ibfd,
1387 bfd *obfd,
1388 const Elf_Internal_Shdr *iheader,
1389 Elf_Internal_Shdr *oheader,
1390 const unsigned int secnum)
1391{
1392 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1393 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1394 bfd_boolean changed = FALSE;
1395 unsigned int sh_link;
1396
1397 if (oheader->sh_type == SHT_NOBITS)
1398 {
1399 /* This is a feature for objcopy --only-keep-debug:
1400 When a section's type is changed to NOBITS, we preserve
1401 the sh_link and sh_info fields so that they can be
1402 matched up with the original.
1403
1404 Note: Strictly speaking these assignments are wrong.
1405 The sh_link and sh_info fields should point to the
1406 relevent sections in the output BFD, which may not be in
1407 the same location as they were in the input BFD. But
1408 the whole point of this action is to preserve the
1409 original values of the sh_link and sh_info fields, so
1410 that they can be matched up with the section headers in
1411 the original file. So strictly speaking we may be
1412 creating an invalid ELF file, but it is only for a file
1413 that just contains debug info and only for sections
1414 without any contents. */
1415 if (oheader->sh_link == 0)
1416 oheader->sh_link = iheader->sh_link;
1417 if (oheader->sh_info == 0)
1418 oheader->sh_info = iheader->sh_info;
1419 return TRUE;
1420 }
1421
1422 /* Allow the target a chance to decide how these fields should be set. */
1423 if (bed->elf_backend_copy_special_section_fields != NULL
1424 && bed->elf_backend_copy_special_section_fields
1425 (ibfd, obfd, iheader, oheader))
1426 return TRUE;
1427
1428 /* We have an iheader which might match oheader, and which has non-zero
1429 sh_info and/or sh_link fields. Attempt to follow those links and find
1430 the section in the output bfd which corresponds to the linked section
1431 in the input bfd. */
1432 if (iheader->sh_link != SHN_UNDEF)
1433 {
4f3ca05b
NC
1434 /* See PR 20931 for a reproducer. */
1435 if (iheader->sh_link >= elf_numsections (ibfd))
1436 {
76cfced5 1437 _bfd_error_handler
4f3ca05b 1438 /* xgettext:c-format */
9793eb77 1439 (_("%pB: invalid sh_link field (%d) in section number %d"),
4f3ca05b
NC
1440 ibfd, iheader->sh_link, secnum);
1441 return FALSE;
1442 }
1443
5522f910
NC
1444 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1445 if (sh_link != SHN_UNDEF)
1446 {
1447 oheader->sh_link = sh_link;
1448 changed = TRUE;
1449 }
1450 else
1451 /* FIXME: Should we install iheader->sh_link
1452 if we could not find a match ? */
76cfced5 1453 _bfd_error_handler
695344c0 1454 /* xgettext:c-format */
9793eb77 1455 (_("%pB: failed to find link section for section %d"), obfd, secnum);
5522f910
NC
1456 }
1457
1458 if (iheader->sh_info)
1459 {
1460 /* The sh_info field can hold arbitrary information, but if the
1461 SHF_LINK_INFO flag is set then it should be interpreted as a
1462 section index. */
1463 if (iheader->sh_flags & SHF_INFO_LINK)
1464 {
1465 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1466 iheader->sh_info);
1467 if (sh_link != SHN_UNDEF)
1468 oheader->sh_flags |= SHF_INFO_LINK;
1469 }
1470 else
1471 /* No idea what it means - just copy it. */
1472 sh_link = iheader->sh_info;
1473
1474 if (sh_link != SHN_UNDEF)
1475 {
1476 oheader->sh_info = sh_link;
1477 changed = TRUE;
1478 }
1479 else
76cfced5 1480 _bfd_error_handler
695344c0 1481 /* xgettext:c-format */
9793eb77 1482 (_("%pB: failed to find info section for section %d"), obfd, secnum);
5522f910
NC
1483 }
1484
1485 return changed;
1486}
07d6d2b8 1487
0ac4564e
L
1488/* Copy the program header and other data from one object module to
1489 another. */
252b5132 1490
b34976b6 1491bfd_boolean
217aa764 1492_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050 1493{
5522f910
NC
1494 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1495 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1496 const struct elf_backend_data *bed;
84865015
NC
1497 unsigned int i;
1498
2d502050 1499 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
84865015 1500 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1501 return TRUE;
2d502050 1502
57b828ef
L
1503 if (!elf_flags_init (obfd))
1504 {
1505 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1506 elf_flags_init (obfd) = TRUE;
1507 }
2d502050 1508
0ac4564e 1509 elf_gp (obfd) = elf_gp (ibfd);
57b828ef
L
1510
1511 /* Also copy the EI_OSABI field. */
1512 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1513 elf_elfheader (ibfd)->e_ident[EI_OSABI];
104d59d1 1514
5522f910
NC
1515 /* If set, copy the EI_ABIVERSION field. */
1516 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1517 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1518 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
07d6d2b8 1519
104d59d1
JM
1520 /* Copy object attributes. */
1521 _bfd_elf_copy_obj_attributes (ibfd, obfd);
63b9bbb7 1522
84865015
NC
1523 if (iheaders == NULL || oheaders == NULL)
1524 return TRUE;
63b9bbb7 1525
5522f910
NC
1526 bed = get_elf_backend_data (obfd);
1527
1528 /* Possibly copy other fields in the section header. */
84865015 1529 for (i = 1; i < elf_numsections (obfd); i++)
63b9bbb7 1530 {
84865015
NC
1531 unsigned int j;
1532 Elf_Internal_Shdr * oheader = oheaders[i];
63b9bbb7 1533
5522f910
NC
1534 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1535 because of a special case need for generating separate debug info
1536 files. See below for more details. */
84865015
NC
1537 if (oheader == NULL
1538 || (oheader->sh_type != SHT_NOBITS
5522f910
NC
1539 && oheader->sh_type < SHT_LOOS))
1540 continue;
1541
1542 /* Ignore empty sections, and sections whose
1543 fields have already been initialised. */
1544 if (oheader->sh_size == 0
84865015
NC
1545 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1546 continue;
63b9bbb7 1547
84865015 1548 /* Scan for the matching section in the input bfd.
5522f910
NC
1549 First we try for a direct mapping between the input and output sections. */
1550 for (j = 1; j < elf_numsections (ibfd); j++)
1551 {
1552 const Elf_Internal_Shdr * iheader = iheaders[j];
1553
1554 if (iheader == NULL)
1555 continue;
1556
1557 if (oheader->bfd_section != NULL
1558 && iheader->bfd_section != NULL
1559 && iheader->bfd_section->output_section != NULL
1560 && iheader->bfd_section->output_section == oheader->bfd_section)
1561 {
1562 /* We have found a connection from the input section to the
1563 output section. Attempt to copy the header fields. If
1564 this fails then do not try any further sections - there
1565 should only be a one-to-one mapping between input and output. */
1566 if (! copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1567 j = elf_numsections (ibfd);
1568 break;
1569 }
1570 }
1571
1572 if (j < elf_numsections (ibfd))
1573 continue;
1574
1575 /* That failed. So try to deduce the corresponding input section.
84865015
NC
1576 Unfortunately we cannot compare names as the output string table
1577 is empty, so instead we check size, address and type. */
1578 for (j = 1; j < elf_numsections (ibfd); j++)
1579 {
5522f910 1580 const Elf_Internal_Shdr * iheader = iheaders[j];
84865015 1581
5522f910
NC
1582 if (iheader == NULL)
1583 continue;
1584
1585 /* Try matching fields in the input section's header.
1586 Since --only-keep-debug turns all non-debug sections into
84865015
NC
1587 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1588 input type. */
1589 if ((oheader->sh_type == SHT_NOBITS
1590 || iheader->sh_type == oheader->sh_type)
5522f910
NC
1591 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1592 == (oheader->sh_flags & ~ SHF_INFO_LINK)
84865015
NC
1593 && iheader->sh_addralign == oheader->sh_addralign
1594 && iheader->sh_entsize == oheader->sh_entsize
1595 && iheader->sh_size == oheader->sh_size
1596 && iheader->sh_addr == oheader->sh_addr
1597 && (iheader->sh_info != oheader->sh_info
1598 || iheader->sh_link != oheader->sh_link))
63b9bbb7 1599 {
5522f910
NC
1600 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1601 break;
63b9bbb7
NC
1602 }
1603 }
5522f910
NC
1604
1605 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1606 {
1607 /* Final attempt. Call the backend copy function
1608 with a NULL input section. */
1609 if (bed->elf_backend_copy_special_section_fields != NULL)
1610 bed->elf_backend_copy_special_section_fields (ibfd, obfd, NULL, oheader);
1611 }
63b9bbb7
NC
1612 }
1613
b34976b6 1614 return TRUE;
2d502050
L
1615}
1616
cedc298e
L
1617static const char *
1618get_segment_type (unsigned int p_type)
1619{
1620 const char *pt;
1621 switch (p_type)
1622 {
1623 case PT_NULL: pt = "NULL"; break;
1624 case PT_LOAD: pt = "LOAD"; break;
1625 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1626 case PT_INTERP: pt = "INTERP"; break;
1627 case PT_NOTE: pt = "NOTE"; break;
1628 case PT_SHLIB: pt = "SHLIB"; break;
1629 case PT_PHDR: pt = "PHDR"; break;
1630 case PT_TLS: pt = "TLS"; break;
1631 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1632 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1633 case PT_GNU_RELRO: pt = "RELRO"; break;
1634 default: pt = NULL; break;
1635 }
1636 return pt;
1637}
1638
f0b79d91
L
1639/* Print out the program headers. */
1640
b34976b6 1641bfd_boolean
217aa764 1642_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1643{
a50b1753 1644 FILE *f = (FILE *) farg;
252b5132
RH
1645 Elf_Internal_Phdr *p;
1646 asection *s;
1647 bfd_byte *dynbuf = NULL;
1648
1649 p = elf_tdata (abfd)->phdr;
1650 if (p != NULL)
1651 {
1652 unsigned int i, c;
1653
1654 fprintf (f, _("\nProgram Header:\n"));
1655 c = elf_elfheader (abfd)->e_phnum;
1656 for (i = 0; i < c; i++, p++)
1657 {
cedc298e 1658 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1659 char buf[20];
1660
cedc298e 1661 if (pt == NULL)
252b5132 1662 {
cedc298e
L
1663 sprintf (buf, "0x%lx", p->p_type);
1664 pt = buf;
252b5132 1665 }
dc810e39 1666 fprintf (f, "%8s off 0x", pt);
60b89a18 1667 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1668 fprintf (f, " vaddr 0x");
60b89a18 1669 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1670 fprintf (f, " paddr 0x");
60b89a18 1671 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1672 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1673 fprintf (f, " filesz 0x");
60b89a18 1674 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1675 fprintf (f, " memsz 0x");
60b89a18 1676 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1677 fprintf (f, " flags %c%c%c",
1678 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1679 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1680 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1681 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1682 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1683 fprintf (f, "\n");
1684 }
1685 }
1686
1687 s = bfd_get_section_by_name (abfd, ".dynamic");
1688 if (s != NULL)
1689 {
cb33740c 1690 unsigned int elfsec;
dc810e39 1691 unsigned long shlink;
252b5132
RH
1692 bfd_byte *extdyn, *extdynend;
1693 size_t extdynsize;
217aa764 1694 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1695
1696 fprintf (f, _("\nDynamic Section:\n"));
1697
eea6121a 1698 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1699 goto error_return;
1700
1701 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1702 if (elfsec == SHN_BAD)
252b5132 1703 goto error_return;
dc810e39 1704 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1705
1706 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1707 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1708
1709 extdyn = dynbuf;
06614111
NC
1710 /* PR 17512: file: 6f427532. */
1711 if (s->size < extdynsize)
1712 goto error_return;
eea6121a 1713 extdynend = extdyn + s->size;
1036838a 1714 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
07d6d2b8 1715 Fix range check. */
1036838a 1716 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
252b5132
RH
1717 {
1718 Elf_Internal_Dyn dyn;
ad9563d6 1719 const char *name = "";
252b5132 1720 char ab[20];
b34976b6 1721 bfd_boolean stringp;
ad9563d6 1722 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1723
217aa764 1724 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1725
1726 if (dyn.d_tag == DT_NULL)
1727 break;
1728
b34976b6 1729 stringp = FALSE;
252b5132
RH
1730 switch (dyn.d_tag)
1731 {
1732 default:
ad9563d6
CM
1733 if (bed->elf_backend_get_target_dtag)
1734 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1735
1736 if (!strcmp (name, ""))
1737 {
cd9af601 1738 sprintf (ab, "%#" BFD_VMA_FMT "x", dyn.d_tag);
ad9563d6
CM
1739 name = ab;
1740 }
252b5132
RH
1741 break;
1742
b34976b6 1743 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1744 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1745 case DT_PLTGOT: name = "PLTGOT"; break;
1746 case DT_HASH: name = "HASH"; break;
1747 case DT_STRTAB: name = "STRTAB"; break;
1748 case DT_SYMTAB: name = "SYMTAB"; break;
1749 case DT_RELA: name = "RELA"; break;
1750 case DT_RELASZ: name = "RELASZ"; break;
1751 case DT_RELAENT: name = "RELAENT"; break;
1752 case DT_STRSZ: name = "STRSZ"; break;
1753 case DT_SYMENT: name = "SYMENT"; break;
1754 case DT_INIT: name = "INIT"; break;
1755 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1756 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1757 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1758 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1759 case DT_REL: name = "REL"; break;
1760 case DT_RELSZ: name = "RELSZ"; break;
1761 case DT_RELENT: name = "RELENT"; break;
1762 case DT_PLTREL: name = "PLTREL"; break;
1763 case DT_DEBUG: name = "DEBUG"; break;
1764 case DT_TEXTREL: name = "TEXTREL"; break;
1765 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1766 case DT_BIND_NOW: name = "BIND_NOW"; break;
1767 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1768 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1769 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1770 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1771 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1772 case DT_FLAGS: name = "FLAGS"; break;
1773 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1774 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1775 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1776 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1777 case DT_MOVEENT: name = "MOVEENT"; break;
1778 case DT_MOVESZ: name = "MOVESZ"; break;
1779 case DT_FEATURE: name = "FEATURE"; break;
1780 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1781 case DT_SYMINSZ: name = "SYMINSZ"; break;
1782 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1783 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1784 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1785 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1786 case DT_PLTPAD: name = "PLTPAD"; break;
1787 case DT_MOVETAB: name = "MOVETAB"; break;
1788 case DT_SYMINFO: name = "SYMINFO"; break;
1789 case DT_RELACOUNT: name = "RELACOUNT"; break;
1790 case DT_RELCOUNT: name = "RELCOUNT"; break;
1791 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1792 case DT_VERSYM: name = "VERSYM"; break;
1793 case DT_VERDEF: name = "VERDEF"; break;
1794 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1795 case DT_VERNEED: name = "VERNEED"; break;
1796 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1797 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1798 case DT_USED: name = "USED"; break;
b34976b6 1799 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1800 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1801 }
1802
ad9563d6 1803 fprintf (f, " %-20s ", name);
252b5132 1804 if (! stringp)
a1f3c56e
AN
1805 {
1806 fprintf (f, "0x");
1807 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1808 }
252b5132
RH
1809 else
1810 {
1811 const char *string;
dc810e39 1812 unsigned int tagv = dyn.d_un.d_val;
252b5132 1813
dc810e39 1814 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1815 if (string == NULL)
1816 goto error_return;
1817 fprintf (f, "%s", string);
1818 }
1819 fprintf (f, "\n");
1820 }
1821
1822 free (dynbuf);
1823 dynbuf = NULL;
1824 }
1825
1826 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1827 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1828 {
fc0e6df6 1829 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1830 return FALSE;
252b5132
RH
1831 }
1832
1833 if (elf_dynverdef (abfd) != 0)
1834 {
1835 Elf_Internal_Verdef *t;
1836
1837 fprintf (f, _("\nVersion definitions:\n"));
1838 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1839 {
1840 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1841 t->vd_flags, t->vd_hash,
1842 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1843 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1844 {
1845 Elf_Internal_Verdaux *a;
1846
1847 fprintf (f, "\t");
1848 for (a = t->vd_auxptr->vda_nextptr;
1849 a != NULL;
1850 a = a->vda_nextptr)
d0fb9a8d
JJ
1851 fprintf (f, "%s ",
1852 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1853 fprintf (f, "\n");
1854 }
1855 }
1856 }
1857
1858 if (elf_dynverref (abfd) != 0)
1859 {
1860 Elf_Internal_Verneed *t;
1861
1862 fprintf (f, _("\nVersion References:\n"));
1863 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1864 {
1865 Elf_Internal_Vernaux *a;
1866
d0fb9a8d
JJ
1867 fprintf (f, _(" required from %s:\n"),
1868 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1869 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1870 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1871 a->vna_flags, a->vna_other,
1872 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1873 }
1874 }
1875
b34976b6 1876 return TRUE;
252b5132
RH
1877
1878 error_return:
1879 if (dynbuf != NULL)
1880 free (dynbuf);
b34976b6 1881 return FALSE;
252b5132
RH
1882}
1883
bb4d2ac2
L
1884/* Get version string. */
1885
1886const char *
60bb06bc
L
1887_bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1888 bfd_boolean *hidden)
bb4d2ac2
L
1889{
1890 const char *version_string = NULL;
1891 if (elf_dynversym (abfd) != 0
1892 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1893 {
1894 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1895
1896 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1897 vernum &= VERSYM_VERSION;
1898
1899 if (vernum == 0)
1900 version_string = "";
1f6f5dba
L
1901 else if (vernum == 1
1902 && (vernum > elf_tdata (abfd)->cverdefs
1903 || (elf_tdata (abfd)->verdef[0].vd_flags
1904 == VER_FLG_BASE)))
bb4d2ac2
L
1905 version_string = "Base";
1906 else if (vernum <= elf_tdata (abfd)->cverdefs)
1907 version_string =
1908 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1909 else
1910 {
1911 Elf_Internal_Verneed *t;
1912
7a815dd5 1913 version_string = _("<corrupt>");
bb4d2ac2
L
1914 for (t = elf_tdata (abfd)->verref;
1915 t != NULL;
1916 t = t->vn_nextref)
1917 {
1918 Elf_Internal_Vernaux *a;
1919
1920 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1921 {
1922 if (a->vna_other == vernum)
1923 {
1924 version_string = a->vna_nodename;
1925 break;
1926 }
1927 }
1928 }
1929 }
1930 }
1931 return version_string;
1932}
1933
252b5132
RH
1934/* Display ELF-specific fields of a symbol. */
1935
1936void
217aa764
AM
1937bfd_elf_print_symbol (bfd *abfd,
1938 void *filep,
1939 asymbol *symbol,
1940 bfd_print_symbol_type how)
252b5132 1941{
a50b1753 1942 FILE *file = (FILE *) filep;
252b5132
RH
1943 switch (how)
1944 {
1945 case bfd_print_symbol_name:
1946 fprintf (file, "%s", symbol->name);
1947 break;
1948 case bfd_print_symbol_more:
1949 fprintf (file, "elf ");
60b89a18 1950 bfd_fprintf_vma (abfd, file, symbol->value);
cd9af601 1951 fprintf (file, " %x", symbol->flags);
252b5132
RH
1952 break;
1953 case bfd_print_symbol_all:
1954 {
4e8a9624
AM
1955 const char *section_name;
1956 const char *name = NULL;
9c5bfbb7 1957 const struct elf_backend_data *bed;
7a13edea 1958 unsigned char st_other;
dbb410c3 1959 bfd_vma val;
bb4d2ac2
L
1960 const char *version_string;
1961 bfd_boolean hidden;
c044fabd 1962
252b5132 1963 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1964
1965 bed = get_elf_backend_data (abfd);
1966 if (bed->elf_backend_print_symbol_all)
c044fabd 1967 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1968
1969 if (name == NULL)
1970 {
7ee38065 1971 name = symbol->name;
217aa764 1972 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1973 }
1974
252b5132
RH
1975 fprintf (file, " %s\t", section_name);
1976 /* Print the "other" value for a symbol. For common symbols,
1977 we've already printed the size; now print the alignment.
1978 For other symbols, we have no specified alignment, and
1979 we've printed the address; now print the size. */
dcf6c779 1980 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1981 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1982 else
1983 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1984 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1985
1986 /* If we have version information, print it. */
60bb06bc
L
1987 version_string = _bfd_elf_get_symbol_version_string (abfd,
1988 symbol,
1989 &hidden);
bb4d2ac2 1990 if (version_string)
252b5132 1991 {
bb4d2ac2 1992 if (!hidden)
252b5132
RH
1993 fprintf (file, " %-11s", version_string);
1994 else
1995 {
1996 int i;
1997
1998 fprintf (file, " (%s)", version_string);
1999 for (i = 10 - strlen (version_string); i > 0; --i)
2000 putc (' ', file);
2001 }
2002 }
2003
2004 /* If the st_other field is not zero, print it. */
7a13edea 2005 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 2006
7a13edea
NC
2007 switch (st_other)
2008 {
2009 case 0: break;
2010 case STV_INTERNAL: fprintf (file, " .internal"); break;
2011 case STV_HIDDEN: fprintf (file, " .hidden"); break;
2012 case STV_PROTECTED: fprintf (file, " .protected"); break;
2013 default:
2014 /* Some other non-defined flags are also present, so print
2015 everything hex. */
2016 fprintf (file, " 0x%02x", (unsigned int) st_other);
2017 }
252b5132 2018
587ff49e 2019 fprintf (file, " %s", name);
252b5132
RH
2020 }
2021 break;
2022 }
2023}
252b5132
RH
2024\f
2025/* ELF .o/exec file reading */
2026
c044fabd 2027/* Create a new bfd section from an ELF section header. */
252b5132 2028
b34976b6 2029bfd_boolean
217aa764 2030bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 2031{
4fbb74a6
AM
2032 Elf_Internal_Shdr *hdr;
2033 Elf_Internal_Ehdr *ehdr;
2034 const struct elf_backend_data *bed;
90937f86 2035 const char *name;
bf67003b
NC
2036 bfd_boolean ret = TRUE;
2037 static bfd_boolean * sections_being_created = NULL;
5a4b0ccc 2038 static bfd * sections_being_created_abfd = NULL;
bf67003b 2039 static unsigned int nesting = 0;
252b5132 2040
4fbb74a6
AM
2041 if (shindex >= elf_numsections (abfd))
2042 return FALSE;
2043
bf67003b
NC
2044 if (++ nesting > 3)
2045 {
2046 /* PR17512: A corrupt ELF binary might contain a recursive group of
67ce483b 2047 sections, with each the string indices pointing to the next in the
bf67003b
NC
2048 loop. Detect this here, by refusing to load a section that we are
2049 already in the process of loading. We only trigger this test if
2050 we have nested at least three sections deep as normal ELF binaries
5a4b0ccc
NC
2051 can expect to recurse at least once.
2052
2053 FIXME: It would be better if this array was attached to the bfd,
2054 rather than being held in a static pointer. */
2055
2056 if (sections_being_created_abfd != abfd)
2057 sections_being_created = NULL;
bf67003b
NC
2058 if (sections_being_created == NULL)
2059 {
446f7ed5
AM
2060 size_t amt = elf_numsections (abfd) * sizeof (bfd_boolean);
2061 sections_being_created = (bfd_boolean *) bfd_zalloc (abfd, amt);
96d3b80f
AM
2062 if (sections_being_created == NULL)
2063 return FALSE;
5a4b0ccc 2064 sections_being_created_abfd = abfd;
bf67003b
NC
2065 }
2066 if (sections_being_created [shindex])
2067 {
4eca0228 2068 _bfd_error_handler
871b3ab2 2069 (_("%pB: warning: loop in section dependencies detected"), abfd);
bf67003b
NC
2070 return FALSE;
2071 }
2072 sections_being_created [shindex] = TRUE;
2073 }
2074
4fbb74a6
AM
2075 hdr = elf_elfsections (abfd)[shindex];
2076 ehdr = elf_elfheader (abfd);
2077 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 2078 hdr->sh_name);
933d961a 2079 if (name == NULL)
bf67003b 2080 goto fail;
252b5132 2081
4fbb74a6 2082 bed = get_elf_backend_data (abfd);
252b5132
RH
2083 switch (hdr->sh_type)
2084 {
2085 case SHT_NULL:
2086 /* Inactive section. Throw it away. */
bf67003b 2087 goto success;
252b5132 2088
bf67003b
NC
2089 case SHT_PROGBITS: /* Normal section with contents. */
2090 case SHT_NOBITS: /* .bss section. */
2091 case SHT_HASH: /* .hash section. */
2092 case SHT_NOTE: /* .note section. */
25e27870
L
2093 case SHT_INIT_ARRAY: /* .init_array section. */
2094 case SHT_FINI_ARRAY: /* .fini_array section. */
2095 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 2096 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 2097 case SHT_GNU_HASH: /* .gnu.hash section. */
bf67003b
NC
2098 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2099 goto success;
252b5132 2100
797fc050 2101 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 2102 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2103 goto fail;
2104
cfcac11d
NC
2105 if (hdr->sh_link > elf_numsections (abfd))
2106 {
caa83f8b 2107 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
2108 field set to SHN_BEFORE or SHN_AFTER. */
2109 switch (bfd_get_arch (abfd))
2110 {
caa83f8b 2111 case bfd_arch_i386:
cfcac11d
NC
2112 case bfd_arch_sparc:
2113 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
2114 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
2115 break;
2116 /* Otherwise fall through. */
2117 default:
bf67003b 2118 goto fail;
cfcac11d
NC
2119 }
2120 }
2121 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
bf67003b 2122 goto fail;
cfcac11d 2123 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
2124 {
2125 Elf_Internal_Shdr *dynsymhdr;
2126
2127 /* The shared libraries distributed with hpux11 have a bogus
2128 sh_link field for the ".dynamic" section. Find the
2129 string table for the ".dynsym" section instead. */
2130 if (elf_dynsymtab (abfd) != 0)
2131 {
2132 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2133 hdr->sh_link = dynsymhdr->sh_link;
2134 }
2135 else
2136 {
2137 unsigned int i, num_sec;
2138
2139 num_sec = elf_numsections (abfd);
2140 for (i = 1; i < num_sec; i++)
2141 {
2142 dynsymhdr = elf_elfsections (abfd)[i];
2143 if (dynsymhdr->sh_type == SHT_DYNSYM)
2144 {
2145 hdr->sh_link = dynsymhdr->sh_link;
2146 break;
2147 }
2148 }
2149 }
2150 }
bf67003b 2151 goto success;
797fc050 2152
bf67003b 2153 case SHT_SYMTAB: /* A symbol table. */
252b5132 2154 if (elf_onesymtab (abfd) == shindex)
bf67003b 2155 goto success;
252b5132 2156
a50b2160 2157 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2158 goto fail;
2159
3337c1e5 2160 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
eee3b786
AM
2161 {
2162 if (hdr->sh_size != 0)
bf67003b 2163 goto fail;
eee3b786
AM
2164 /* Some assemblers erroneously set sh_info to one with a
2165 zero sh_size. ld sees this as a global symbol count
2166 of (unsigned) -1. Fix it here. */
2167 hdr->sh_info = 0;
bf67003b 2168 goto success;
eee3b786 2169 }
bf67003b 2170
16ad13ec
NC
2171 /* PR 18854: A binary might contain more than one symbol table.
2172 Unusual, but possible. Warn, but continue. */
2173 if (elf_onesymtab (abfd) != 0)
2174 {
4eca0228 2175 _bfd_error_handler
695344c0 2176 /* xgettext:c-format */
871b3ab2 2177 (_("%pB: warning: multiple symbol tables detected"
63a5468a 2178 " - ignoring the table in section %u"),
16ad13ec
NC
2179 abfd, shindex);
2180 goto success;
2181 }
252b5132 2182 elf_onesymtab (abfd) = shindex;
6a40cf0c
NC
2183 elf_symtab_hdr (abfd) = *hdr;
2184 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
252b5132
RH
2185 abfd->flags |= HAS_SYMS;
2186
2187 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
2188 SHF_ALLOC is set, and this is a shared object, then we also
2189 treat this section as a BFD section. We can not base the
2190 decision purely on SHF_ALLOC, because that flag is sometimes
2191 set in a relocatable object file, which would confuse the
2192 linker. */
252b5132
RH
2193 if ((hdr->sh_flags & SHF_ALLOC) != 0
2194 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
2195 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2196 shindex))
bf67003b 2197 goto fail;
252b5132 2198
1b3a8575
AM
2199 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2200 can't read symbols without that section loaded as well. It
2201 is most likely specified by the next section header. */
6a40cf0c
NC
2202 {
2203 elf_section_list * entry;
2204 unsigned int i, num_sec;
1b3a8575 2205
6a40cf0c
NC
2206 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2207 if (entry->hdr.sh_link == shindex)
2208 goto success;
2209
2210 num_sec = elf_numsections (abfd);
2211 for (i = shindex + 1; i < num_sec; i++)
2212 {
2213 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2214
2215 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2216 && hdr2->sh_link == shindex)
2217 break;
2218 }
2219
2220 if (i == num_sec)
2221 for (i = 1; i < shindex; i++)
1b3a8575
AM
2222 {
2223 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
6a40cf0c 2224
1b3a8575
AM
2225 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2226 && hdr2->sh_link == shindex)
2227 break;
2228 }
6a40cf0c
NC
2229
2230 if (i != shindex)
2231 ret = bfd_section_from_shdr (abfd, i);
2232 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2233 goto success;
2234 }
252b5132 2235
bf67003b 2236 case SHT_DYNSYM: /* A dynamic symbol table. */
252b5132 2237 if (elf_dynsymtab (abfd) == shindex)
bf67003b 2238 goto success;
252b5132 2239
a50b2160 2240 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2241 goto fail;
2242
eee3b786
AM
2243 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2244 {
2245 if (hdr->sh_size != 0)
bf67003b
NC
2246 goto fail;
2247
eee3b786
AM
2248 /* Some linkers erroneously set sh_info to one with a
2249 zero sh_size. ld sees this as a global symbol count
2250 of (unsigned) -1. Fix it here. */
2251 hdr->sh_info = 0;
bf67003b 2252 goto success;
eee3b786 2253 }
bf67003b 2254
16ad13ec
NC
2255 /* PR 18854: A binary might contain more than one dynamic symbol table.
2256 Unusual, but possible. Warn, but continue. */
2257 if (elf_dynsymtab (abfd) != 0)
2258 {
4eca0228 2259 _bfd_error_handler
695344c0 2260 /* xgettext:c-format */
871b3ab2 2261 (_("%pB: warning: multiple dynamic symbol tables detected"
63a5468a 2262 " - ignoring the table in section %u"),
16ad13ec
NC
2263 abfd, shindex);
2264 goto success;
2265 }
252b5132
RH
2266 elf_dynsymtab (abfd) = shindex;
2267 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2268 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2269 abfd->flags |= HAS_SYMS;
2270
2271 /* Besides being a symbol table, we also treat this as a regular
2272 section, so that objcopy can handle it. */
bf67003b
NC
2273 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2274 goto success;
252b5132 2275
bf67003b 2276 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
6a40cf0c
NC
2277 {
2278 elf_section_list * entry;
9ad5cbcf 2279
6a40cf0c
NC
2280 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2281 if (entry->ndx == shindex)
2282 goto success;
07d6d2b8 2283
7a6e0d89 2284 entry = bfd_alloc (abfd, sizeof (*entry));
6a40cf0c
NC
2285 if (entry == NULL)
2286 goto fail;
2287 entry->ndx = shindex;
2288 entry->hdr = * hdr;
2289 entry->next = elf_symtab_shndx_list (abfd);
2290 elf_symtab_shndx_list (abfd) = entry;
2291 elf_elfsections (abfd)[shindex] = & entry->hdr;
2292 goto success;
2293 }
9ad5cbcf 2294
bf67003b 2295 case SHT_STRTAB: /* A string table. */
252b5132 2296 if (hdr->bfd_section != NULL)
bf67003b
NC
2297 goto success;
2298
252b5132
RH
2299 if (ehdr->e_shstrndx == shindex)
2300 {
2301 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2302 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
bf67003b 2303 goto success;
252b5132 2304 }
bf67003b 2305
1b3a8575
AM
2306 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2307 {
2308 symtab_strtab:
2309 elf_tdata (abfd)->strtab_hdr = *hdr;
2310 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
bf67003b 2311 goto success;
1b3a8575 2312 }
bf67003b 2313
1b3a8575
AM
2314 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2315 {
2316 dynsymtab_strtab:
2317 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2318 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2319 elf_elfsections (abfd)[shindex] = hdr;
2320 /* We also treat this as a regular section, so that objcopy
2321 can handle it. */
bf67003b
NC
2322 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2323 shindex);
2324 goto success;
1b3a8575 2325 }
252b5132 2326
1b3a8575
AM
2327 /* If the string table isn't one of the above, then treat it as a
2328 regular section. We need to scan all the headers to be sure,
2329 just in case this strtab section appeared before the above. */
2330 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2331 {
2332 unsigned int i, num_sec;
252b5132 2333
1b3a8575
AM
2334 num_sec = elf_numsections (abfd);
2335 for (i = 1; i < num_sec; i++)
2336 {
2337 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2338 if (hdr2->sh_link == shindex)
2339 {
933d961a
JJ
2340 /* Prevent endless recursion on broken objects. */
2341 if (i == shindex)
bf67003b 2342 goto fail;
1b3a8575 2343 if (! bfd_section_from_shdr (abfd, i))
bf67003b 2344 goto fail;
1b3a8575
AM
2345 if (elf_onesymtab (abfd) == i)
2346 goto symtab_strtab;
2347 if (elf_dynsymtab (abfd) == i)
2348 goto dynsymtab_strtab;
2349 }
2350 }
2351 }
bf67003b
NC
2352 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2353 goto success;
252b5132
RH
2354
2355 case SHT_REL:
2356 case SHT_RELA:
2357 /* *These* do a lot of work -- but build no sections! */
2358 {
2359 asection *target_sect;
d4730f92 2360 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 2361 unsigned int num_sec = elf_numsections (abfd);
d4730f92 2362 struct bfd_elf_section_data *esdt;
252b5132 2363
aa2ca951
JJ
2364 if (hdr->sh_entsize
2365 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160 2366 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
bf67003b 2367 goto fail;
a50b2160 2368
03ae5f59 2369 /* Check for a bogus link to avoid crashing. */
4fbb74a6 2370 if (hdr->sh_link >= num_sec)
03ae5f59 2371 {
4eca0228 2372 _bfd_error_handler
695344c0 2373 /* xgettext:c-format */
871b3ab2 2374 (_("%pB: invalid link %u for reloc section %s (index %u)"),
4eca0228 2375 abfd, hdr->sh_link, name, shindex);
bf67003b
NC
2376 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2377 shindex);
2378 goto success;
03ae5f59
ILT
2379 }
2380
252b5132
RH
2381 /* For some incomprehensible reason Oracle distributes
2382 libraries for Solaris in which some of the objects have
2383 bogus sh_link fields. It would be nice if we could just
2384 reject them, but, unfortunately, some people need to use
2385 them. We scan through the section headers; if we find only
2386 one suitable symbol table, we clobber the sh_link to point
83b89087
L
2387 to it. I hope this doesn't break anything.
2388
2389 Don't do it on executable nor shared library. */
2390 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2391 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
2392 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2393 {
9ad5cbcf 2394 unsigned int scan;
252b5132
RH
2395 int found;
2396
2397 found = 0;
9ad5cbcf 2398 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2399 {
2400 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2401 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2402 {
2403 if (found != 0)
2404 {
2405 found = 0;
2406 break;
2407 }
2408 found = scan;
2409 }
2410 }
2411 if (found != 0)
2412 hdr->sh_link = found;
2413 }
2414
2415 /* Get the symbol table. */
1b3a8575
AM
2416 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2417 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2418 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
bf67003b 2419 goto fail;
252b5132 2420
a4bcd733
AM
2421 /* If this is an alloc section in an executable or shared
2422 library, or the reloc section does not use the main symbol
2423 table we don't treat it as a reloc section. BFD can't
2424 adequately represent such a section, so at least for now,
2425 we don't try. We just present it as a normal section. We
2426 also can't use it as a reloc section if it points to the
2427 null section, an invalid section, another reloc section, or
2428 its sh_link points to the null section. */
2429 if (((abfd->flags & (DYNAMIC | EXEC_P)) != 0
2430 && (hdr->sh_flags & SHF_ALLOC) != 0)
83b89087 2431 || hdr->sh_link == SHN_UNDEF
a4bcd733 2432 || hdr->sh_link != elf_onesymtab (abfd)
185ef66d 2433 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
2434 || hdr->sh_info >= num_sec
2435 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2436 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
bf67003b
NC
2437 {
2438 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2439 shindex);
2440 goto success;
2441 }
252b5132
RH
2442
2443 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
bf67003b
NC
2444 goto fail;
2445
252b5132
RH
2446 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2447 if (target_sect == NULL)
bf67003b 2448 goto fail;
252b5132 2449
d4730f92
BS
2450 esdt = elf_section_data (target_sect);
2451 if (hdr->sh_type == SHT_RELA)
2452 p_hdr = &esdt->rela.hdr;
252b5132 2453 else
d4730f92
BS
2454 p_hdr = &esdt->rel.hdr;
2455
a7ba3896
NC
2456 /* PR 17512: file: 0b4f81b7.
2457 Also see PR 24456, for a file which deliberately has two reloc
2458 sections. */
06614111 2459 if (*p_hdr != NULL)
a7ba3896
NC
2460 {
2461 _bfd_error_handler
2462 /* xgettext:c-format */
2463 (_("%pB: warning: multiple relocation sections for section %pA \
2464found - ignoring all but the first"),
2465 abfd, target_sect);
2466 goto success;
2467 }
ef53be89 2468 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
d4730f92 2469 if (hdr2 == NULL)
bf67003b 2470 goto fail;
252b5132 2471 *hdr2 = *hdr;
d4730f92 2472 *p_hdr = hdr2;
252b5132 2473 elf_elfsections (abfd)[shindex] = hdr2;
056bafd4
MR
2474 target_sect->reloc_count += (NUM_SHDR_ENTRIES (hdr)
2475 * bed->s->int_rels_per_ext_rel);
252b5132
RH
2476 target_sect->flags |= SEC_RELOC;
2477 target_sect->relocation = NULL;
2478 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2479 /* In the section to which the relocations apply, mark whether
2480 its relocations are of the REL or RELA variety. */
72730e0c 2481 if (hdr->sh_size != 0)
d4730f92
BS
2482 {
2483 if (hdr->sh_type == SHT_RELA)
2484 target_sect->use_rela_p = 1;
2485 }
252b5132 2486 abfd->flags |= HAS_RELOC;
bf67003b 2487 goto success;
252b5132 2488 }
252b5132
RH
2489
2490 case SHT_GNU_verdef:
2491 elf_dynverdef (abfd) = shindex;
2492 elf_tdata (abfd)->dynverdef_hdr = *hdr;
bf67003b
NC
2493 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2494 goto success;
252b5132
RH
2495
2496 case SHT_GNU_versym:
a50b2160 2497 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
bf67003b
NC
2498 goto fail;
2499
252b5132
RH
2500 elf_dynversym (abfd) = shindex;
2501 elf_tdata (abfd)->dynversym_hdr = *hdr;
bf67003b
NC
2502 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2503 goto success;
252b5132
RH
2504
2505 case SHT_GNU_verneed:
2506 elf_dynverref (abfd) = shindex;
2507 elf_tdata (abfd)->dynverref_hdr = *hdr;
bf67003b
NC
2508 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2509 goto success;
252b5132
RH
2510
2511 case SHT_SHLIB:
bf67003b 2512 goto success;
252b5132 2513
dbb410c3 2514 case SHT_GROUP:
44534af3 2515 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
bf67003b
NC
2516 goto fail;
2517
6dc132d9 2518 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2519 goto fail;
2520
bf67003b 2521 goto success;
dbb410c3 2522
252b5132 2523 default:
104d59d1
JM
2524 /* Possibly an attributes section. */
2525 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2526 || hdr->sh_type == bed->obj_attrs_section_type)
2527 {
2528 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2529 goto fail;
104d59d1 2530 _bfd_elf_parse_attributes (abfd, hdr);
bf67003b 2531 goto success;
104d59d1
JM
2532 }
2533
252b5132 2534 /* Check for any processor-specific section types. */
3eb70a79 2535 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2536 goto success;
3eb70a79
L
2537
2538 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2539 {
2540 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2541 /* FIXME: How to properly handle allocated section reserved
2542 for applications? */
4eca0228 2543 _bfd_error_handler
695344c0 2544 /* xgettext:c-format */
871b3ab2 2545 (_("%pB: unknown type [%#x] section `%s'"),
76cfced5 2546 abfd, hdr->sh_type, name);
3eb70a79 2547 else
bf67003b
NC
2548 {
2549 /* Allow sections reserved for applications. */
2550 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2551 shindex);
2552 goto success;
2553 }
3eb70a79
L
2554 }
2555 else if (hdr->sh_type >= SHT_LOPROC
2556 && hdr->sh_type <= SHT_HIPROC)
2557 /* FIXME: We should handle this section. */
4eca0228 2558 _bfd_error_handler
695344c0 2559 /* xgettext:c-format */
871b3ab2 2560 (_("%pB: unknown type [%#x] section `%s'"),
76cfced5 2561 abfd, hdr->sh_type, name);
3eb70a79 2562 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
2563 {
2564 /* Unrecognised OS-specific sections. */
2565 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2566 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 2567 required to correctly process the section and the file should
ff15b240 2568 be rejected with an error message. */
4eca0228 2569 _bfd_error_handler
695344c0 2570 /* xgettext:c-format */
871b3ab2 2571 (_("%pB: unknown type [%#x] section `%s'"),
76cfced5 2572 abfd, hdr->sh_type, name);
ff15b240 2573 else
bf67003b
NC
2574 {
2575 /* Otherwise it should be processed. */
2576 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2577 goto success;
2578 }
ff15b240 2579 }
3eb70a79
L
2580 else
2581 /* FIXME: We should handle this section. */
4eca0228 2582 _bfd_error_handler
695344c0 2583 /* xgettext:c-format */
871b3ab2 2584 (_("%pB: unknown type [%#x] section `%s'"),
76cfced5 2585 abfd, hdr->sh_type, name);
3eb70a79 2586
bf67003b 2587 goto fail;
252b5132
RH
2588 }
2589
bf67003b
NC
2590 fail:
2591 ret = FALSE;
2592 success:
e5b470e2 2593 if (sections_being_created && sections_being_created_abfd == abfd)
bf67003b
NC
2594 sections_being_created [shindex] = FALSE;
2595 if (-- nesting == 0)
5a4b0ccc
NC
2596 {
2597 sections_being_created = NULL;
2598 sections_being_created_abfd = abfd;
2599 }
bf67003b 2600 return ret;
252b5132
RH
2601}
2602
87d72d41 2603/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2604
87d72d41
AM
2605Elf_Internal_Sym *
2606bfd_sym_from_r_symndx (struct sym_cache *cache,
2607 bfd *abfd,
2608 unsigned long r_symndx)
ec338859 2609{
ec338859
AM
2610 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2611
a5d1b3b5
AM
2612 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2613 {
2614 Elf_Internal_Shdr *symtab_hdr;
2615 unsigned char esym[sizeof (Elf64_External_Sym)];
2616 Elf_External_Sym_Shndx eshndx;
ec338859 2617
a5d1b3b5
AM
2618 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2619 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2620 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2621 return NULL;
9ad5cbcf 2622
a5d1b3b5
AM
2623 if (cache->abfd != abfd)
2624 {
2625 memset (cache->indx, -1, sizeof (cache->indx));
2626 cache->abfd = abfd;
2627 }
2628 cache->indx[ent] = r_symndx;
ec338859 2629 }
a5d1b3b5 2630
87d72d41 2631 return &cache->sym[ent];
ec338859
AM
2632}
2633
252b5132
RH
2634/* Given an ELF section number, retrieve the corresponding BFD
2635 section. */
2636
2637asection *
91d6fa6a 2638bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2639{
91d6fa6a 2640 if (sec_index >= elf_numsections (abfd))
252b5132 2641 return NULL;
91d6fa6a 2642 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2643}
2644
b35d266b 2645static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2646{
0112cd26 2647 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 2648 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2649};
2650
b35d266b 2651static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2652{
0112cd26 2653 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
1ff6de03 2654 { STRING_COMMA_LEN (".ctf"), 0, SHT_PROGBITS, 0 },
07d6d2b8 2655 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2656};
2657
b35d266b 2658static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2659{
07d6d2b8
AM
2660 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2661 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
a9a72a65
DE
2662 /* There are more DWARF sections than these, but they needn't be added here
2663 unless you have to cope with broken compilers that don't emit section
2664 attributes or you want to help the user writing assembler. */
07d6d2b8
AM
2665 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2666 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2667 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2668 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
0112cd26 2669 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
07d6d2b8
AM
2670 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2671 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2672 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2673 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2674};
2675
b35d266b 2676static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2677{
07d6d2b8 2678 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
6f9dbcd4 2679 { STRING_COMMA_LEN (".fini_array"), -2, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
07d6d2b8 2680 { NULL, 0 , 0, 0, 0 }
7f4d3958
L
2681};
2682
b35d266b 2683static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2684{
0112cd26 2685 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
2686 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
2687 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2688 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
0112cd26
NC
2689 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2690 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
07d6d2b8
AM
2691 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2692 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2693 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2694 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2695};
2696
b35d266b 2697static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2698{
07d6d2b8
AM
2699 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2700 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2701};
2702
b35d266b 2703static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2704{
07d6d2b8 2705 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
6f9dbcd4 2706 { STRING_COMMA_LEN (".init_array"), -2, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
2707 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2708 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2709};
2710
b35d266b 2711static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2712{
0112cd26 2713 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
07d6d2b8 2714 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2715};
2716
b35d266b 2717static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2718{
0112cd26 2719 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
07d6d2b8
AM
2720 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2721 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2722};
2723
b35d266b 2724static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2725{
6f9dbcd4 2726 { STRING_COMMA_LEN (".preinit_array"), -2, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
2727 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2728 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2729};
2730
b35d266b 2731static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2732{
0112cd26
NC
2733 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2734 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
07d6d2b8
AM
2735 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2736 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2737 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2738};
2739
b35d266b 2740static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2741{
0112cd26
NC
2742 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2743 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2744 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2745 /* See struct bfd_elf_special_section declaration for the semantics of
2746 this special case where .prefix_length != strlen (.prefix). */
2747 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
07d6d2b8 2748 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2749};
2750
b35d266b 2751static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2752{
07d6d2b8
AM
2753 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2754 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
0112cd26 2755 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
07d6d2b8 2756 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2757};
2758
1b315056
CS
2759static const struct bfd_elf_special_section special_sections_z[] =
2760{
07d6d2b8
AM
2761 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2762 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
1b315056
CS
2763 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2764 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
07d6d2b8 2765 { NULL, 0, 0, 0, 0 }
1b315056
CS
2766};
2767
e4c93b56 2768static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2769{
7f4d3958 2770 special_sections_b, /* 'b' */
98ece1b3 2771 special_sections_c, /* 'c' */
7f4d3958
L
2772 special_sections_d, /* 'd' */
2773 NULL, /* 'e' */
2774 special_sections_f, /* 'f' */
2775 special_sections_g, /* 'g' */
2776 special_sections_h, /* 'h' */
2777 special_sections_i, /* 'i' */
2778 NULL, /* 'j' */
2779 NULL, /* 'k' */
2780 special_sections_l, /* 'l' */
2781 NULL, /* 'm' */
2782 special_sections_n, /* 'n' */
2783 NULL, /* 'o' */
2784 special_sections_p, /* 'p' */
2785 NULL, /* 'q' */
2786 special_sections_r, /* 'r' */
2787 special_sections_s, /* 's' */
2788 special_sections_t, /* 't' */
1b315056
CS
2789 NULL, /* 'u' */
2790 NULL, /* 'v' */
2791 NULL, /* 'w' */
2792 NULL, /* 'x' */
2793 NULL, /* 'y' */
2794 special_sections_z /* 'z' */
7f4d3958
L
2795};
2796
551b43fd
AM
2797const struct bfd_elf_special_section *
2798_bfd_elf_get_special_section (const char *name,
2799 const struct bfd_elf_special_section *spec,
2800 unsigned int rela)
2f89ff8d
L
2801{
2802 int i;
7f4d3958 2803 int len;
7f4d3958 2804
551b43fd 2805 len = strlen (name);
7f4d3958 2806
551b43fd 2807 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2808 {
2809 int suffix_len;
551b43fd 2810 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2811
2812 if (len < prefix_len)
2813 continue;
551b43fd 2814 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2815 continue;
2816
551b43fd 2817 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2818 if (suffix_len <= 0)
2819 {
2820 if (name[prefix_len] != 0)
2821 {
2822 if (suffix_len == 0)
2823 continue;
2824 if (name[prefix_len] != '.'
2825 && (suffix_len == -2
551b43fd 2826 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2827 continue;
2828 }
2829 }
2830 else
2831 {
2832 if (len < prefix_len + suffix_len)
2833 continue;
2834 if (memcmp (name + len - suffix_len,
551b43fd 2835 spec[i].prefix + prefix_len,
7dcb9820
AM
2836 suffix_len) != 0)
2837 continue;
2838 }
551b43fd 2839 return &spec[i];
7dcb9820 2840 }
2f89ff8d
L
2841
2842 return NULL;
2843}
2844
7dcb9820 2845const struct bfd_elf_special_section *
29ef7005 2846_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2847{
551b43fd
AM
2848 int i;
2849 const struct bfd_elf_special_section *spec;
29ef7005 2850 const struct elf_backend_data *bed;
2f89ff8d
L
2851
2852 /* See if this is one of the special sections. */
551b43fd
AM
2853 if (sec->name == NULL)
2854 return NULL;
2f89ff8d 2855
29ef7005
L
2856 bed = get_elf_backend_data (abfd);
2857 spec = bed->special_sections;
2858 if (spec)
2859 {
2860 spec = _bfd_elf_get_special_section (sec->name,
2861 bed->special_sections,
2862 sec->use_rela_p);
2863 if (spec != NULL)
2864 return spec;
2865 }
2866
551b43fd
AM
2867 if (sec->name[0] != '.')
2868 return NULL;
2f89ff8d 2869
551b43fd 2870 i = sec->name[1] - 'b';
1b315056 2871 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2872 return NULL;
2873
2874 spec = special_sections[i];
2f89ff8d 2875
551b43fd
AM
2876 if (spec == NULL)
2877 return NULL;
2878
2879 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2880}
2881
b34976b6 2882bfd_boolean
217aa764 2883_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2884{
2885 struct bfd_elf_section_data *sdata;
551b43fd 2886 const struct elf_backend_data *bed;
7dcb9820 2887 const struct bfd_elf_special_section *ssect;
252b5132 2888
f0abc2a1
AM
2889 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2890 if (sdata == NULL)
2891 {
a50b1753 2892 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
07d6d2b8 2893 sizeof (*sdata));
f0abc2a1
AM
2894 if (sdata == NULL)
2895 return FALSE;
217aa764 2896 sec->used_by_bfd = sdata;
f0abc2a1 2897 }
bf572ba0 2898
551b43fd
AM
2899 /* Indicate whether or not this section should use RELA relocations. */
2900 bed = get_elf_backend_data (abfd);
2901 sec->use_rela_p = bed->default_use_rela_p;
2902
e843e0f8
L
2903 /* When we read a file, we don't need to set ELF section type and
2904 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2905 anyway. We will set ELF section type and flags for all linker
2906 created sections. If user specifies BFD section flags, we will
2907 set ELF section type and flags based on BFD section flags in
02ecc8e9
L
2908 elf_fake_sections. Special handling for .init_array/.fini_array
2909 output sections since they may contain .ctors/.dtors input
2910 sections. We don't want _bfd_elf_init_private_section_data to
2911 copy ELF section type from .ctors/.dtors input sections. */
2912 if (abfd->direction != read_direction
3496cb2a 2913 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2914 {
551b43fd 2915 ssect = (*bed->get_sec_type_attr) (abfd, sec);
02ecc8e9
L
2916 if (ssect != NULL
2917 && (!sec->flags
2918 || (sec->flags & SEC_LINKER_CREATED) != 0
2919 || ssect->type == SHT_INIT_ARRAY
2920 || ssect->type == SHT_FINI_ARRAY))
a31501e9
L
2921 {
2922 elf_section_type (sec) = ssect->type;
2923 elf_section_flags (sec) = ssect->attr;
2924 }
2f89ff8d
L
2925 }
2926
f592407e 2927 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2928}
2929
2930/* Create a new bfd section from an ELF program header.
2931
2932 Since program segments have no names, we generate a synthetic name
2933 of the form segment<NUM>, where NUM is generally the index in the
2934 program header table. For segments that are split (see below) we
2935 generate the names segment<NUM>a and segment<NUM>b.
2936
2937 Note that some program segments may have a file size that is different than
2938 (less than) the memory size. All this means is that at execution the
2939 system must allocate the amount of memory specified by the memory size,
2940 but only initialize it with the first "file size" bytes read from the
2941 file. This would occur for example, with program segments consisting
2942 of combined data+bss.
2943
2944 To handle the above situation, this routine generates TWO bfd sections
2945 for the single program segment. The first has the length specified by
2946 the file size of the segment, and the second has the length specified
2947 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2948 into its initialized and uninitialized parts.
252b5132
RH
2949
2950 */
2951
b34976b6 2952bfd_boolean
217aa764
AM
2953_bfd_elf_make_section_from_phdr (bfd *abfd,
2954 Elf_Internal_Phdr *hdr,
91d6fa6a 2955 int hdr_index,
a50b1753 2956 const char *type_name)
252b5132
RH
2957{
2958 asection *newsect;
2959 char *name;
2960 char namebuf[64];
d4c88bbb 2961 size_t len;
252b5132
RH
2962 int split;
2963
2964 split = ((hdr->p_memsz > 0)
2965 && (hdr->p_filesz > 0)
2966 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2967
2968 if (hdr->p_filesz > 0)
252b5132 2969 {
91d6fa6a 2970 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2971 len = strlen (namebuf) + 1;
a50b1753 2972 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2973 if (!name)
2974 return FALSE;
2975 memcpy (name, namebuf, len);
2976 newsect = bfd_make_section (abfd, name);
2977 if (newsect == NULL)
2978 return FALSE;
2979 newsect->vma = hdr->p_vaddr;
2980 newsect->lma = hdr->p_paddr;
2981 newsect->size = hdr->p_filesz;
2982 newsect->filepos = hdr->p_offset;
2983 newsect->flags |= SEC_HAS_CONTENTS;
2984 newsect->alignment_power = bfd_log2 (hdr->p_align);
2985 if (hdr->p_type == PT_LOAD)
252b5132 2986 {
d5191d0c
AM
2987 newsect->flags |= SEC_ALLOC;
2988 newsect->flags |= SEC_LOAD;
2989 if (hdr->p_flags & PF_X)
2990 {
2991 /* FIXME: all we known is that it has execute PERMISSION,
2992 may be data. */
2993 newsect->flags |= SEC_CODE;
2994 }
2995 }
2996 if (!(hdr->p_flags & PF_W))
2997 {
2998 newsect->flags |= SEC_READONLY;
252b5132 2999 }
252b5132
RH
3000 }
3001
d5191d0c 3002 if (hdr->p_memsz > hdr->p_filesz)
252b5132 3003 {
d5191d0c
AM
3004 bfd_vma align;
3005
91d6fa6a 3006 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 3007 len = strlen (namebuf) + 1;
a50b1753 3008 name = (char *) bfd_alloc (abfd, len);
252b5132 3009 if (!name)
b34976b6 3010 return FALSE;
d4c88bbb 3011 memcpy (name, namebuf, len);
252b5132
RH
3012 newsect = bfd_make_section (abfd, name);
3013 if (newsect == NULL)
b34976b6 3014 return FALSE;
252b5132
RH
3015 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
3016 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 3017 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
3018 newsect->filepos = hdr->p_offset + hdr->p_filesz;
3019 align = newsect->vma & -newsect->vma;
3020 if (align == 0 || align > hdr->p_align)
3021 align = hdr->p_align;
3022 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
3023 if (hdr->p_type == PT_LOAD)
3024 {
d5191d0c
AM
3025 /* Hack for gdb. Segments that have not been modified do
3026 not have their contents written to a core file, on the
3027 assumption that a debugger can find the contents in the
3028 executable. We flag this case by setting the fake
3029 section size to zero. Note that "real" bss sections will
3030 always have their contents dumped to the core file. */
3031 if (bfd_get_format (abfd) == bfd_core)
3032 newsect->size = 0;
252b5132
RH
3033 newsect->flags |= SEC_ALLOC;
3034 if (hdr->p_flags & PF_X)
3035 newsect->flags |= SEC_CODE;
3036 }
3037 if (!(hdr->p_flags & PF_W))
3038 newsect->flags |= SEC_READONLY;
3039 }
3040
b34976b6 3041 return TRUE;
252b5132
RH
3042}
3043
864619bb
KS
3044static bfd_boolean
3045_bfd_elf_core_find_build_id (bfd *templ, bfd_vma offset)
3046{
3047 /* The return value is ignored. Build-ids are considered optional. */
3048 if (templ->xvec->flavour == bfd_target_elf_flavour)
3049 return (*get_elf_backend_data (templ)->elf_backend_core_find_build_id)
3050 (templ, offset);
3051 return FALSE;
3052}
3053
b34976b6 3054bfd_boolean
91d6fa6a 3055bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 3056{
9c5bfbb7 3057 const struct elf_backend_data *bed;
20cfcaae
NC
3058
3059 switch (hdr->p_type)
3060 {
3061 case PT_NULL:
91d6fa6a 3062 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
3063
3064 case PT_LOAD:
864619bb
KS
3065 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load"))
3066 return FALSE;
3067 if (bfd_get_format (abfd) == bfd_core && abfd->build_id == NULL)
3068 _bfd_elf_core_find_build_id (abfd, hdr->p_offset);
3069 return TRUE;
20cfcaae
NC
3070
3071 case PT_DYNAMIC:
91d6fa6a 3072 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
3073
3074 case PT_INTERP:
91d6fa6a 3075 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
3076
3077 case PT_NOTE:
91d6fa6a 3078 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 3079 return FALSE;
276da9b3
L
3080 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz,
3081 hdr->p_align))
b34976b6
AM
3082 return FALSE;
3083 return TRUE;
20cfcaae
NC
3084
3085 case PT_SHLIB:
91d6fa6a 3086 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
3087
3088 case PT_PHDR:
91d6fa6a 3089 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 3090
811072d8 3091 case PT_GNU_EH_FRAME:
91d6fa6a 3092 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
3093 "eh_frame_hdr");
3094
2b05f1b7 3095 case PT_GNU_STACK:
91d6fa6a 3096 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 3097
8c37241b 3098 case PT_GNU_RELRO:
91d6fa6a 3099 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 3100
20cfcaae 3101 default:
8c1acd09 3102 /* Check for any processor-specific program segment types. */
20cfcaae 3103 bed = get_elf_backend_data (abfd);
91d6fa6a 3104 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
3105 }
3106}
3107
d4730f92
BS
3108/* Return the REL_HDR for SEC, assuming there is only a single one, either
3109 REL or RELA. */
3110
3111Elf_Internal_Shdr *
3112_bfd_elf_single_rel_hdr (asection *sec)
3113{
3114 if (elf_section_data (sec)->rel.hdr)
3115 {
3116 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3117 return elf_section_data (sec)->rel.hdr;
3118 }
3119 else
3120 return elf_section_data (sec)->rela.hdr;
3121}
3122
3e19fb8f
L
3123static bfd_boolean
3124_bfd_elf_set_reloc_sh_name (bfd *abfd,
3125 Elf_Internal_Shdr *rel_hdr,
3126 const char *sec_name,
3127 bfd_boolean use_rela_p)
3128{
3129 char *name = (char *) bfd_alloc (abfd,
3130 sizeof ".rela" + strlen (sec_name));
3131 if (name == NULL)
3132 return FALSE;
3133
3134 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3135 rel_hdr->sh_name =
3136 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3137 FALSE);
3138 if (rel_hdr->sh_name == (unsigned int) -1)
3139 return FALSE;
3140
3141 return TRUE;
3142}
3143
d4730f92
BS
3144/* Allocate and initialize a section-header for a new reloc section,
3145 containing relocations against ASECT. It is stored in RELDATA. If
3146 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3147 relocations. */
23bc299b 3148
5d13b3b3 3149static bfd_boolean
217aa764 3150_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 3151 struct bfd_elf_section_reloc_data *reldata,
f6fe1ccd 3152 const char *sec_name,
3e19fb8f
L
3153 bfd_boolean use_rela_p,
3154 bfd_boolean delay_st_name_p)
23bc299b 3155{
d4730f92 3156 Elf_Internal_Shdr *rel_hdr;
9c5bfbb7 3157 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3158
d4730f92 3159 BFD_ASSERT (reldata->hdr == NULL);
ef53be89 3160 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
d4730f92 3161 reldata->hdr = rel_hdr;
23bc299b 3162
3e19fb8f
L
3163 if (delay_st_name_p)
3164 rel_hdr->sh_name = (unsigned int) -1;
3165 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3166 use_rela_p))
b34976b6 3167 return FALSE;
23bc299b
MM
3168 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3169 rel_hdr->sh_entsize = (use_rela_p
3170 ? bed->s->sizeof_rela
3171 : bed->s->sizeof_rel);
72de5009 3172 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
28e07a05 3173 rel_hdr->sh_flags = 0;
23bc299b
MM
3174 rel_hdr->sh_addr = 0;
3175 rel_hdr->sh_size = 0;
3176 rel_hdr->sh_offset = 0;
3177
b34976b6 3178 return TRUE;
23bc299b
MM
3179}
3180
94be91de
JB
3181/* Return the default section type based on the passed in section flags. */
3182
3183int
3184bfd_elf_get_default_section_type (flagword flags)
3185{
0e41bebb 3186 if ((flags & (SEC_ALLOC | SEC_IS_COMMON)) != 0
2e76e85a 3187 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
3188 return SHT_NOBITS;
3189 return SHT_PROGBITS;
3190}
3191
d4730f92
BS
3192struct fake_section_arg
3193{
3194 struct bfd_link_info *link_info;
3195 bfd_boolean failed;
3196};
3197
252b5132
RH
3198/* Set up an ELF internal section header for a section. */
3199
252b5132 3200static void
d4730f92 3201elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 3202{
d4730f92 3203 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 3204 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3205 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 3206 Elf_Internal_Shdr *this_hdr;
0414f35b 3207 unsigned int sh_type;
0ce398f1 3208 const char *name = asect->name;
3e19fb8f 3209 bfd_boolean delay_st_name_p = FALSE;
252b5132 3210
d4730f92 3211 if (arg->failed)
252b5132
RH
3212 {
3213 /* We already failed; just get out of the bfd_map_over_sections
08a40648 3214 loop. */
252b5132
RH
3215 return;
3216 }
3217
d4730f92 3218 this_hdr = &esd->this_hdr;
252b5132 3219
f6fe1ccd 3220 if (arg->link_info)
0ce398f1 3221 {
f6fe1ccd
L
3222 /* ld: compress DWARF debug sections with names: .debug_*. */
3223 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
3224 && (asect->flags & SEC_DEBUGGING)
3225 && name[1] == 'd'
3226 && name[6] == '_')
3227 {
3228 /* Set SEC_ELF_COMPRESS to indicate this section should be
3229 compressed. */
3230 asect->flags |= SEC_ELF_COMPRESS;
0ce398f1 3231
dd905818 3232 /* If this section will be compressed, delay adding section
3e19fb8f
L
3233 name to section name section after it is compressed in
3234 _bfd_elf_assign_file_positions_for_non_load. */
3235 delay_st_name_p = TRUE;
f6fe1ccd
L
3236 }
3237 }
3238 else if ((asect->flags & SEC_ELF_RENAME))
3239 {
3240 /* objcopy: rename output DWARF debug section. */
3241 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
3242 {
3243 /* When we decompress or compress with SHF_COMPRESSED,
3244 convert section name from .zdebug_* to .debug_* if
3245 needed. */
3246 if (name[1] == 'z')
3247 {
3248 char *new_name = convert_zdebug_to_debug (abfd, name);
3249 if (new_name == NULL)
3250 {
3251 arg->failed = TRUE;
3252 return;
3253 }
3254 name = new_name;
3255 }
3256 }
3257 else if (asect->compress_status == COMPRESS_SECTION_DONE)
0ce398f1 3258 {
f6fe1ccd
L
3259 /* PR binutils/18087: Compression does not always make a
3260 section smaller. So only rename the section when
3261 compression has actually taken place. If input section
3262 name is .zdebug_*, we should never compress it again. */
3263 char *new_name = convert_debug_to_zdebug (abfd, name);
0ce398f1
L
3264 if (new_name == NULL)
3265 {
3266 arg->failed = TRUE;
3267 return;
3268 }
f6fe1ccd
L
3269 BFD_ASSERT (name[1] != 'z');
3270 name = new_name;
0ce398f1
L
3271 }
3272 }
3273
3e19fb8f
L
3274 if (delay_st_name_p)
3275 this_hdr->sh_name = (unsigned int) -1;
3276 else
252b5132 3277 {
3e19fb8f
L
3278 this_hdr->sh_name
3279 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3280 name, FALSE);
3281 if (this_hdr->sh_name == (unsigned int) -1)
3282 {
3283 arg->failed = TRUE;
3284 return;
3285 }
252b5132
RH
3286 }
3287
a4d8e49b 3288 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
3289
3290 if ((asect->flags & SEC_ALLOC) != 0
3291 || asect->user_set_vma)
3292 this_hdr->sh_addr = asect->vma;
3293 else
3294 this_hdr->sh_addr = 0;
3295
3296 this_hdr->sh_offset = 0;
eea6121a 3297 this_hdr->sh_size = asect->size;
252b5132 3298 this_hdr->sh_link = 0;
c86934ce
NC
3299 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3300 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3301 {
4eca0228 3302 _bfd_error_handler
695344c0 3303 /* xgettext:c-format */
9793eb77 3304 (_("%pB: error: alignment power %d of section `%pA' is too big"),
c08bb8dd 3305 abfd, asect->alignment_power, asect);
c86934ce
NC
3306 arg->failed = TRUE;
3307 return;
3308 }
72de5009 3309 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
3310 /* The sh_entsize and sh_info fields may have been set already by
3311 copy_private_section_data. */
3312
3313 this_hdr->bfd_section = asect;
3314 this_hdr->contents = NULL;
3315
3cddba1e
L
3316 /* If the section type is unspecified, we set it based on
3317 asect->flags. */
98ece1b3
AM
3318 if ((asect->flags & SEC_GROUP) != 0)
3319 sh_type = SHT_GROUP;
98ece1b3 3320 else
94be91de 3321 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 3322
3cddba1e 3323 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
3324 this_hdr->sh_type = sh_type;
3325 else if (this_hdr->sh_type == SHT_NOBITS
3326 && sh_type == SHT_PROGBITS
3327 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 3328 {
98ece1b3
AM
3329 /* Warn if we are changing a NOBITS section to PROGBITS, but
3330 allow the link to proceed. This can happen when users link
3331 non-bss input sections to bss output sections, or emit data
3332 to a bss output section via a linker script. */
4eca0228 3333 _bfd_error_handler
871b3ab2 3334 (_("warning: section `%pA' type changed to PROGBITS"), asect);
98ece1b3 3335 this_hdr->sh_type = sh_type;
3cddba1e
L
3336 }
3337
2f89ff8d 3338 switch (this_hdr->sh_type)
252b5132 3339 {
2f89ff8d 3340 default:
2f89ff8d
L
3341 break;
3342
3343 case SHT_STRTAB:
2f89ff8d
L
3344 case SHT_NOTE:
3345 case SHT_NOBITS:
3346 case SHT_PROGBITS:
3347 break;
606851fb
AM
3348
3349 case SHT_INIT_ARRAY:
3350 case SHT_FINI_ARRAY:
3351 case SHT_PREINIT_ARRAY:
3352 this_hdr->sh_entsize = bed->s->arch_size / 8;
3353 break;
2f89ff8d
L
3354
3355 case SHT_HASH:
c7ac6ff8 3356 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 3357 break;
5de3bf90 3358
2f89ff8d 3359 case SHT_DYNSYM:
252b5132 3360 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
3361 break;
3362
3363 case SHT_DYNAMIC:
252b5132 3364 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
3365 break;
3366
3367 case SHT_RELA:
3368 if (get_elf_backend_data (abfd)->may_use_rela_p)
3369 this_hdr->sh_entsize = bed->s->sizeof_rela;
3370 break;
3371
3372 case SHT_REL:
3373 if (get_elf_backend_data (abfd)->may_use_rel_p)
3374 this_hdr->sh_entsize = bed->s->sizeof_rel;
3375 break;
3376
3377 case SHT_GNU_versym:
252b5132 3378 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
3379 break;
3380
3381 case SHT_GNU_verdef:
252b5132
RH
3382 this_hdr->sh_entsize = 0;
3383 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3384 cverdefs. The linker will set cverdefs, but sh_info will be
3385 zero. */
252b5132
RH
3386 if (this_hdr->sh_info == 0)
3387 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3388 else
3389 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3390 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
3391 break;
3392
3393 case SHT_GNU_verneed:
252b5132
RH
3394 this_hdr->sh_entsize = 0;
3395 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3396 cverrefs. The linker will set cverrefs, but sh_info will be
3397 zero. */
252b5132
RH
3398 if (this_hdr->sh_info == 0)
3399 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3400 else
3401 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3402 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
3403 break;
3404
3405 case SHT_GROUP:
1783205a 3406 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 3407 break;
fdc90cb4
JJ
3408
3409 case SHT_GNU_HASH:
3410 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3411 break;
dbb410c3 3412 }
252b5132
RH
3413
3414 if ((asect->flags & SEC_ALLOC) != 0)
3415 this_hdr->sh_flags |= SHF_ALLOC;
3416 if ((asect->flags & SEC_READONLY) == 0)
3417 this_hdr->sh_flags |= SHF_WRITE;
3418 if ((asect->flags & SEC_CODE) != 0)
3419 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
3420 if ((asect->flags & SEC_MERGE) != 0)
3421 {
3422 this_hdr->sh_flags |= SHF_MERGE;
3423 this_hdr->sh_entsize = asect->entsize;
f5fa8ca2 3424 }
84865015
NC
3425 if ((asect->flags & SEC_STRINGS) != 0)
3426 this_hdr->sh_flags |= SHF_STRINGS;
1126897b 3427 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 3428 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 3429 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
3430 {
3431 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
3432 if (asect->size == 0
3433 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 3434 {
3a800eb9 3435 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 3436
704afa60 3437 this_hdr->sh_size = 0;
3a800eb9
AM
3438 if (o != NULL)
3439 {
704afa60 3440 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
3441 if (this_hdr->sh_size != 0)
3442 this_hdr->sh_type = SHT_NOBITS;
3443 }
704afa60
JJ
3444 }
3445 }
18ae9cc1
L
3446 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3447 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 3448
d4730f92
BS
3449 /* If the section has relocs, set up a section header for the
3450 SHT_REL[A] section. If two relocation sections are required for
3451 this section, it is up to the processor-specific back-end to
3452 create the other. */
3453 if ((asect->flags & SEC_RELOC) != 0)
3454 {
3455 /* When doing a relocatable link, create both REL and RELA sections if
3456 needed. */
3457 if (arg->link_info
3458 /* Do the normal setup if we wouldn't create any sections here. */
3459 && esd->rel.count + esd->rela.count > 0
0e1862bb
L
3460 && (bfd_link_relocatable (arg->link_info)
3461 || arg->link_info->emitrelocations))
d4730f92
BS
3462 {
3463 if (esd->rel.count && esd->rel.hdr == NULL
28e07a05 3464 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name,
db4677b8 3465 FALSE, delay_st_name_p))
d4730f92
BS
3466 {
3467 arg->failed = TRUE;
3468 return;
3469 }
3470 if (esd->rela.count && esd->rela.hdr == NULL
28e07a05 3471 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name,
db4677b8 3472 TRUE, delay_st_name_p))
d4730f92
BS
3473 {
3474 arg->failed = TRUE;
3475 return;
3476 }
3477 }
3478 else if (!_bfd_elf_init_reloc_shdr (abfd,
3479 (asect->use_rela_p
3480 ? &esd->rela : &esd->rel),
f6fe1ccd 3481 name,
3e19fb8f
L
3482 asect->use_rela_p,
3483 delay_st_name_p))
db4677b8 3484 {
d4730f92 3485 arg->failed = TRUE;
db4677b8
AM
3486 return;
3487 }
d4730f92
BS
3488 }
3489
252b5132 3490 /* Check for processor-specific section types. */
0414f35b 3491 sh_type = this_hdr->sh_type;
e1fddb6b
AO
3492 if (bed->elf_backend_fake_sections
3493 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
db4677b8
AM
3494 {
3495 arg->failed = TRUE;
3496 return;
3497 }
252b5132 3498
42bb2e33 3499 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
3500 {
3501 /* Don't change the header type from NOBITS if we are being
42bb2e33 3502 called for objcopy --only-keep-debug. */
0414f35b
AM
3503 this_hdr->sh_type = sh_type;
3504 }
252b5132
RH
3505}
3506
bcacc0f5
AM
3507/* Fill in the contents of a SHT_GROUP section. Called from
3508 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3509 when ELF targets use the generic linker, ld. Called for ld -r
3510 from bfd_elf_final_link. */
dbb410c3 3511
1126897b 3512void
217aa764 3513bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 3514{
a50b1753 3515 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 3516 asection *elt, *first;
dbb410c3 3517 unsigned char *loc;
b34976b6 3518 bfd_boolean gas;
dbb410c3 3519
7e4111ad
L
3520 /* Ignore linker created group section. See elfNN_ia64_object_p in
3521 elfxx-ia64.c. */
ce5aecf8
AM
3522 if ((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP
3523 || sec->size == 0
dbb410c3
AM
3524 || *failedptr)
3525 return;
3526
bcacc0f5
AM
3527 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3528 {
3529 unsigned long symindx = 0;
3530
3531 /* elf_group_id will have been set up by objcopy and the
3532 generic linker. */
3533 if (elf_group_id (sec) != NULL)
3534 symindx = elf_group_id (sec)->udata.i;
1126897b 3535
bcacc0f5
AM
3536 if (symindx == 0)
3537 {
3538 /* If called from the assembler, swap_out_syms will have set up
3539 elf_section_syms. */
3540 BFD_ASSERT (elf_section_syms (abfd) != NULL);
3541 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3542 }
3543 elf_section_data (sec)->this_hdr.sh_info = symindx;
3544 }
3545 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 3546 {
bcacc0f5
AM
3547 /* The ELF backend linker sets sh_info to -2 when the group
3548 signature symbol is global, and thus the index can't be
3549 set until all local symbols are output. */
53720c49
AM
3550 asection *igroup;
3551 struct bfd_elf_section_data *sec_data;
3552 unsigned long symndx;
3553 unsigned long extsymoff;
bcacc0f5
AM
3554 struct elf_link_hash_entry *h;
3555
53720c49
AM
3556 /* The point of this little dance to the first SHF_GROUP section
3557 then back to the SHT_GROUP section is that this gets us to
3558 the SHT_GROUP in the input object. */
3559 igroup = elf_sec_group (elf_next_in_group (sec));
3560 sec_data = elf_section_data (igroup);
3561 symndx = sec_data->this_hdr.sh_info;
3562 extsymoff = 0;
bcacc0f5
AM
3563 if (!elf_bad_symtab (igroup->owner))
3564 {
3565 Elf_Internal_Shdr *symtab_hdr;
3566
3567 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3568 extsymoff = symtab_hdr->sh_info;
3569 }
3570 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3571 while (h->root.type == bfd_link_hash_indirect
3572 || h->root.type == bfd_link_hash_warning)
3573 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3574
3575 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 3576 }
dbb410c3 3577
1126897b 3578 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 3579 gas = TRUE;
dbb410c3
AM
3580 if (sec->contents == NULL)
3581 {
b34976b6 3582 gas = FALSE;
a50b1753 3583 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
3584
3585 /* Arrange for the section to be written out. */
3586 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
3587 if (sec->contents == NULL)
3588 {
b34976b6 3589 *failedptr = TRUE;
dbb410c3
AM
3590 return;
3591 }
3592 }
3593
eea6121a 3594 loc = sec->contents + sec->size;
dbb410c3 3595
9dce4196
AM
3596 /* Get the pointer to the first section in the group that gas
3597 squirreled away here. objcopy arranges for this to be set to the
3598 start of the input section group. */
3599 first = elt = elf_next_in_group (sec);
dbb410c3
AM
3600
3601 /* First element is a flag word. Rest of section is elf section
3602 indices for all the sections of the group. Write them backwards
3603 just to keep the group in the same order as given in .section
3604 directives, not that it matters. */
3605 while (elt != NULL)
3606 {
9dce4196 3607 asection *s;
9dce4196 3608
9dce4196 3609 s = elt;
415f38a6
AM
3610 if (!gas)
3611 s = s->output_section;
3612 if (s != NULL
3613 && !bfd_is_abs_section (s))
01e1a5bc 3614 {
db4677b8 3615 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
28e07a05
AM
3616 struct bfd_elf_section_data *input_elf_sec = elf_section_data (elt);
3617
3618 if (elf_sec->rel.hdr != NULL
3619 && (gas
3620 || (input_elf_sec->rel.hdr != NULL
3621 && input_elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0))
db4677b8 3622 {
28e07a05 3623 elf_sec->rel.hdr->sh_flags |= SHF_GROUP;
db4677b8
AM
3624 loc -= 4;
3625 H_PUT_32 (abfd, elf_sec->rel.idx, loc);
3626 }
28e07a05
AM
3627 if (elf_sec->rela.hdr != NULL
3628 && (gas
3629 || (input_elf_sec->rela.hdr != NULL
3630 && input_elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0))
db4677b8 3631 {
28e07a05 3632 elf_sec->rela.hdr->sh_flags |= SHF_GROUP;
db4677b8
AM
3633 loc -= 4;
3634 H_PUT_32 (abfd, elf_sec->rela.idx, loc);
3635 }
01e1a5bc 3636 loc -= 4;
db4677b8 3637 H_PUT_32 (abfd, elf_sec->this_idx, loc);
01e1a5bc 3638 }
945906ff 3639 elt = elf_next_in_group (elt);
9dce4196
AM
3640 if (elt == first)
3641 break;
dbb410c3
AM
3642 }
3643
7bdf4127
AB
3644 loc -= 4;
3645 BFD_ASSERT (loc == sec->contents);
dbb410c3 3646
9dce4196 3647 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
3648}
3649
bce964aa
AM
3650/* Given NAME, the name of a relocation section stripped of its
3651 .rel/.rela prefix, return the section in ABFD to which the
3652 relocations apply. */
bd53a53a
L
3653
3654asection *
bce964aa
AM
3655_bfd_elf_plt_get_reloc_section (bfd *abfd, const char *name)
3656{
3657 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3658 section likely apply to .got.plt or .got section. */
3659 if (get_elf_backend_data (abfd)->want_got_plt
3660 && strcmp (name, ".plt") == 0)
3661 {
3662 asection *sec;
3663
3664 name = ".got.plt";
3665 sec = bfd_get_section_by_name (abfd, name);
3666 if (sec != NULL)
3667 return sec;
3668 name = ".got";
3669 }
3670
3671 return bfd_get_section_by_name (abfd, name);
3672}
3673
3674/* Return the section to which RELOC_SEC applies. */
3675
3676static asection *
3677elf_get_reloc_section (asection *reloc_sec)
bd53a53a
L
3678{
3679 const char *name;
3680 unsigned int type;
3681 bfd *abfd;
bce964aa 3682 const struct elf_backend_data *bed;
bd53a53a
L
3683
3684 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3685 if (type != SHT_REL && type != SHT_RELA)
3686 return NULL;
3687
3688 /* We look up the section the relocs apply to by name. */
3689 name = reloc_sec->name;
bce964aa
AM
3690 if (strncmp (name, ".rel", 4) != 0)
3691 return NULL;
3692 name += 4;
3693 if (type == SHT_RELA && *name++ != 'a')
3694 return NULL;
bd53a53a 3695
bd53a53a 3696 abfd = reloc_sec->owner;
bce964aa
AM
3697 bed = get_elf_backend_data (abfd);
3698 return bed->get_reloc_section (abfd, name);
bd53a53a
L
3699}
3700
252b5132
RH
3701/* Assign all ELF section numbers. The dummy first section is handled here
3702 too. The link/info pointers for the standard section types are filled
3703 in here too, while we're at it. */
3704
b34976b6 3705static bfd_boolean
da9f89d4 3706assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
3707{
3708 struct elf_obj_tdata *t = elf_tdata (abfd);
3709 asection *sec;
3e19fb8f 3710 unsigned int section_number;
252b5132 3711 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 3712 struct bfd_elf_section_data *d;
3516e984 3713 bfd_boolean need_symtab;
446f7ed5 3714 size_t amt;
252b5132
RH
3715
3716 section_number = 1;
3717
2b0f7ef9
JJ
3718 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3719
da9f89d4 3720 /* SHT_GROUP sections are in relocatable files only. */
7bdf4127 3721 if (link_info == NULL || !link_info->resolve_section_groups)
252b5132 3722 {
ef53be89 3723 size_t reloc_count = 0;
14f2c699 3724
da9f89d4 3725 /* Put SHT_GROUP sections first. */
04dd1667 3726 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 3727 {
5daa8fe7 3728 d = elf_section_data (sec);
da9f89d4
L
3729
3730 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 3731 {
5daa8fe7 3732 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
3733 {
3734 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 3735 bfd_section_list_remove (abfd, sec);
da9f89d4 3736 abfd->section_count--;
da9f89d4 3737 }
08a40648 3738 else
4fbb74a6 3739 d->this_idx = section_number++;
da9f89d4 3740 }
14f2c699
L
3741
3742 /* Count relocations. */
3743 reloc_count += sec->reloc_count;
47cc2cf5 3744 }
14f2c699
L
3745
3746 /* Clear HAS_RELOC if there are no relocations. */
3747 if (reloc_count == 0)
3748 abfd->flags &= ~HAS_RELOC;
47cc2cf5
PB
3749 }
3750
3751 for (sec = abfd->sections; sec; sec = sec->next)
3752 {
3753 d = elf_section_data (sec);
3754
3755 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 3756 d->this_idx = section_number++;
3e19fb8f
L
3757 if (d->this_hdr.sh_name != (unsigned int) -1)
3758 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 3759 if (d->rel.hdr)
2b0f7ef9 3760 {
d4730f92 3761 d->rel.idx = section_number++;
3e19fb8f
L
3762 if (d->rel.hdr->sh_name != (unsigned int) -1)
3763 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 3764 }
d4730f92
BS
3765 else
3766 d->rel.idx = 0;
23bc299b 3767
d4730f92 3768 if (d->rela.hdr)
2b0f7ef9 3769 {
d4730f92 3770 d->rela.idx = section_number++;
3e19fb8f
L
3771 if (d->rela.hdr->sh_name != (unsigned int) -1)
3772 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 3773 }
23bc299b 3774 else
d4730f92 3775 d->rela.idx = 0;
252b5132
RH
3776 }
3777
3516e984
L
3778 need_symtab = (bfd_get_symcount (abfd) > 0
3779 || (link_info == NULL
3780 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3781 == HAS_RELOC)));
3782 if (need_symtab)
252b5132 3783 {
12bd6957 3784 elf_onesymtab (abfd) = section_number++;
2b0f7ef9 3785 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 3786 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 3787 {
7a6e0d89 3788 elf_section_list *entry;
6a40cf0c
NC
3789
3790 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3791
7a6e0d89 3792 entry = bfd_zalloc (abfd, sizeof (*entry));
6a40cf0c
NC
3793 entry->ndx = section_number++;
3794 elf_symtab_shndx_list (abfd) = entry;
3795 entry->hdr.sh_name
9ad5cbcf 3796 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3797 ".symtab_shndx", FALSE);
6a40cf0c 3798 if (entry->hdr.sh_name == (unsigned int) -1)
b34976b6 3799 return FALSE;
9ad5cbcf 3800 }
12bd6957 3801 elf_strtab_sec (abfd) = section_number++;
2b0f7ef9 3802 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3803 }
3804
dd905818
NC
3805 elf_shstrtab_sec (abfd) = section_number++;
3806 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3807 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3808
1c52a645
L
3809 if (section_number >= SHN_LORESERVE)
3810 {
695344c0 3811 /* xgettext:c-format */
871b3ab2 3812 _bfd_error_handler (_("%pB: too many sections: %u"),
1c52a645
L
3813 abfd, section_number);
3814 return FALSE;
3815 }
3816
9ad5cbcf 3817 elf_numsections (abfd) = section_number;
252b5132
RH
3818 elf_elfheader (abfd)->e_shnum = section_number;
3819
3820 /* Set up the list of section header pointers, in agreement with the
3821 indices. */
446f7ed5
AM
3822 amt = section_number * sizeof (Elf_Internal_Shdr *);
3823 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
252b5132 3824 if (i_shdrp == NULL)
b34976b6 3825 return FALSE;
252b5132 3826
a50b1753 3827 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
07d6d2b8 3828 sizeof (Elf_Internal_Shdr));
252b5132
RH
3829 if (i_shdrp[0] == NULL)
3830 {
3831 bfd_release (abfd, i_shdrp);
b34976b6 3832 return FALSE;
252b5132 3833 }
252b5132
RH
3834
3835 elf_elfsections (abfd) = i_shdrp;
3836
12bd6957 3837 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3516e984 3838 if (need_symtab)
252b5132 3839 {
12bd6957 3840 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
4fbb74a6 3841 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf 3842 {
6a40cf0c
NC
3843 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3844 BFD_ASSERT (entry != NULL);
3845 i_shdrp[entry->ndx] = & entry->hdr;
3846 entry->hdr.sh_link = elf_onesymtab (abfd);
9ad5cbcf 3847 }
12bd6957
AM
3848 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3849 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
252b5132 3850 }
38ce5b11 3851
252b5132
RH
3852 for (sec = abfd->sections; sec; sec = sec->next)
3853 {
252b5132 3854 asection *s;
252b5132 3855
91d6fa6a
NC
3856 d = elf_section_data (sec);
3857
252b5132 3858 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3859 if (d->rel.idx != 0)
3860 i_shdrp[d->rel.idx] = d->rel.hdr;
3861 if (d->rela.idx != 0)
3862 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3863
3864 /* Fill in the sh_link and sh_info fields while we're at it. */
3865
3866 /* sh_link of a reloc section is the section index of the symbol
3867 table. sh_info is the section index of the section to which
3868 the relocation entries apply. */
d4730f92 3869 if (d->rel.idx != 0)
252b5132 3870 {
12bd6957 3871 d->rel.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3872 d->rel.hdr->sh_info = d->this_idx;
9ef5d938 3873 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
252b5132 3874 }
d4730f92 3875 if (d->rela.idx != 0)
23bc299b 3876 {
12bd6957 3877 d->rela.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3878 d->rela.hdr->sh_info = d->this_idx;
9ef5d938 3879 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
23bc299b 3880 }
252b5132 3881
38ce5b11
L
3882 /* We need to set up sh_link for SHF_LINK_ORDER. */
3883 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3884 {
3885 s = elf_linked_to_section (sec);
3886 if (s)
38ce5b11 3887 {
f2876037 3888 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3889 if (link_info != NULL)
38ce5b11 3890 {
f2876037 3891 /* Check discarded linkonce section. */
dbaa2011 3892 if (discarded_section (s))
38ce5b11 3893 {
ccd2ec6a 3894 asection *kept;
4eca0228 3895 _bfd_error_handler
695344c0 3896 /* xgettext:c-format */
871b3ab2
AM
3897 (_("%pB: sh_link of section `%pA' points to"
3898 " discarded section `%pA' of `%pB'"),
ccd2ec6a
L
3899 abfd, d->this_hdr.bfd_section,
3900 s, s->owner);
3901 /* Point to the kept section if it has the same
3902 size as the discarded one. */
c0f00686 3903 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3904 if (kept == NULL)
185d09ad 3905 {
ccd2ec6a
L
3906 bfd_set_error (bfd_error_bad_value);
3907 return FALSE;
185d09ad 3908 }
ccd2ec6a 3909 s = kept;
38ce5b11 3910 }
e424ecc8 3911
ccd2ec6a
L
3912 s = s->output_section;
3913 BFD_ASSERT (s != NULL);
38ce5b11 3914 }
f2876037
L
3915 else
3916 {
3917 /* Handle objcopy. */
3918 if (s->output_section == NULL)
3919 {
4eca0228 3920 _bfd_error_handler
695344c0 3921 /* xgettext:c-format */
871b3ab2
AM
3922 (_("%pB: sh_link of section `%pA' points to"
3923 " removed section `%pA' of `%pB'"),
f2876037
L
3924 abfd, d->this_hdr.bfd_section, s, s->owner);
3925 bfd_set_error (bfd_error_bad_value);
3926 return FALSE;
3927 }
3928 s = s->output_section;
3929 }
ccd2ec6a
L
3930 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3931 }
3932 else
3933 {
3934 /* PR 290:
3935 The Intel C compiler generates SHT_IA_64_UNWIND with
3936 SHF_LINK_ORDER. But it doesn't set the sh_link or
3937 sh_info fields. Hence we could get the situation
08a40648 3938 where s is NULL. */
ccd2ec6a
L
3939 const struct elf_backend_data *bed
3940 = get_elf_backend_data (abfd);
3941 if (bed->link_order_error_handler)
3942 bed->link_order_error_handler
695344c0 3943 /* xgettext:c-format */
871b3ab2 3944 (_("%pB: warning: sh_link not set for section `%pA'"),
ccd2ec6a 3945 abfd, sec);
38ce5b11
L
3946 }
3947 }
3948
252b5132
RH
3949 switch (d->this_hdr.sh_type)
3950 {
3951 case SHT_REL:
3952 case SHT_RELA:
3953 /* A reloc section which we are treating as a normal BFD
3954 section. sh_link is the section index of the symbol
3955 table. sh_info is the section index of the section to
3956 which the relocation entries apply. We assume that an
3957 allocated reloc section uses the dynamic symbol table.
3958 FIXME: How can we be sure? */
3959 s = bfd_get_section_by_name (abfd, ".dynsym");
3960 if (s != NULL)
3961 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3962
bce964aa 3963 s = elf_get_reloc_section (sec);
252b5132 3964 if (s != NULL)
9ef5d938
L
3965 {
3966 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3967 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3968 }
252b5132
RH
3969 break;
3970
3971 case SHT_STRTAB:
3972 /* We assume that a section named .stab*str is a stabs
3973 string section. We look for a section with the same name
3974 but without the trailing ``str'', and set its sh_link
3975 field to point to this section. */
0112cd26 3976 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3977 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3978 {
3979 size_t len;
3980 char *alc;
3981
3982 len = strlen (sec->name);
a50b1753 3983 alc = (char *) bfd_malloc (len - 2);
252b5132 3984 if (alc == NULL)
b34976b6 3985 return FALSE;
d4c88bbb 3986 memcpy (alc, sec->name, len - 3);
252b5132
RH
3987 alc[len - 3] = '\0';
3988 s = bfd_get_section_by_name (abfd, alc);
3989 free (alc);
3990 if (s != NULL)
3991 {
3992 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3993
3994 /* This is a .stab section. */
0594c12d
AM
3995 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3996 elf_section_data (s)->this_hdr.sh_entsize
3997 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3998 }
3999 }
4000 break;
4001
4002 case SHT_DYNAMIC:
4003 case SHT_DYNSYM:
4004 case SHT_GNU_verneed:
4005 case SHT_GNU_verdef:
4006 /* sh_link is the section header index of the string table
4007 used for the dynamic entries, or the symbol table, or the
4008 version strings. */
4009 s = bfd_get_section_by_name (abfd, ".dynstr");
4010 if (s != NULL)
4011 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4012 break;
4013
7f1204bb
JJ
4014 case SHT_GNU_LIBLIST:
4015 /* sh_link is the section header index of the prelink library
08a40648
AM
4016 list used for the dynamic entries, or the symbol table, or
4017 the version strings. */
7f1204bb
JJ
4018 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
4019 ? ".dynstr" : ".gnu.libstr");
4020 if (s != NULL)
4021 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4022 break;
4023
252b5132 4024 case SHT_HASH:
fdc90cb4 4025 case SHT_GNU_HASH:
252b5132
RH
4026 case SHT_GNU_versym:
4027 /* sh_link is the section header index of the symbol table
4028 this hash table or version table is for. */
4029 s = bfd_get_section_by_name (abfd, ".dynsym");
4030 if (s != NULL)
4031 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4032 break;
dbb410c3
AM
4033
4034 case SHT_GROUP:
12bd6957 4035 d->this_hdr.sh_link = elf_onesymtab (abfd);
252b5132
RH
4036 }
4037 }
4038
3e19fb8f
L
4039 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
4040 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
4041 debug section name from .debug_* to .zdebug_* if needed. */
4042
b34976b6 4043 return TRUE;
252b5132
RH
4044}
4045
5372391b 4046static bfd_boolean
217aa764 4047sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
4048{
4049 /* If the backend has a special mapping, use it. */
9c5bfbb7 4050 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
4051 if (bed->elf_backend_sym_is_global)
4052 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 4053
e47bf690 4054 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
e6f7f6d1
AM
4055 || bfd_is_und_section (bfd_asymbol_section (sym))
4056 || bfd_is_com_section (bfd_asymbol_section (sym)));
252b5132
RH
4057}
4058
76359541
TP
4059/* Filter global symbols of ABFD to include in the import library. All
4060 SYMCOUNT symbols of ABFD can be examined from their pointers in
4061 SYMS. Pointers of symbols to keep should be stored contiguously at
4062 the beginning of that array.
4063
4064 Returns the number of symbols to keep. */
4065
4066unsigned int
4067_bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
4068 asymbol **syms, long symcount)
4069{
4070 long src_count, dst_count = 0;
4071
4072 for (src_count = 0; src_count < symcount; src_count++)
4073 {
4074 asymbol *sym = syms[src_count];
4075 char *name = (char *) bfd_asymbol_name (sym);
4076 struct bfd_link_hash_entry *h;
4077
4078 if (!sym_is_global (abfd, sym))
4079 continue;
4080
4081 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, FALSE);
5df1bc57
AM
4082 if (h == NULL)
4083 continue;
76359541
TP
4084 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
4085 continue;
76359541
TP
4086 if (h->linker_def || h->ldscript_def)
4087 continue;
4088
4089 syms[dst_count++] = sym;
4090 }
4091
4092 syms[dst_count] = NULL;
4093
4094 return dst_count;
4095}
4096
5372391b 4097/* Don't output section symbols for sections that are not going to be
c6d8cab4 4098 output, that are duplicates or there is no BFD section. */
5372391b
AM
4099
4100static bfd_boolean
4101ignore_section_sym (bfd *abfd, asymbol *sym)
4102{
c6d8cab4
L
4103 elf_symbol_type *type_ptr;
4104
db0c309f
NC
4105 if (sym == NULL)
4106 return FALSE;
4107
c6d8cab4
L
4108 if ((sym->flags & BSF_SECTION_SYM) == 0)
4109 return FALSE;
4110
db0c309f
NC
4111 if (sym->section == NULL)
4112 return TRUE;
4113
c6d8cab4
L
4114 type_ptr = elf_symbol_from (abfd, sym);
4115 return ((type_ptr != NULL
4116 && type_ptr->internal_elf_sym.st_shndx != 0
4117 && bfd_is_abs_section (sym->section))
4118 || !(sym->section->owner == abfd
db0c309f
NC
4119 || (sym->section->output_section != NULL
4120 && sym->section->output_section->owner == abfd
2633a79c
AM
4121 && sym->section->output_offset == 0)
4122 || bfd_is_abs_section (sym->section)));
5372391b
AM
4123}
4124
2633a79c
AM
4125/* Map symbol from it's internal number to the external number, moving
4126 all local symbols to be at the head of the list. */
4127
b34976b6 4128static bfd_boolean
12bd6957 4129elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
252b5132 4130{
dc810e39 4131 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
4132 asymbol **syms = bfd_get_outsymbols (abfd);
4133 asymbol **sect_syms;
dc810e39
AM
4134 unsigned int num_locals = 0;
4135 unsigned int num_globals = 0;
4136 unsigned int num_locals2 = 0;
4137 unsigned int num_globals2 = 0;
7292b3ac 4138 unsigned int max_index = 0;
dc810e39 4139 unsigned int idx;
252b5132
RH
4140 asection *asect;
4141 asymbol **new_syms;
446f7ed5 4142 size_t amt;
252b5132
RH
4143
4144#ifdef DEBUG
4145 fprintf (stderr, "elf_map_symbols\n");
4146 fflush (stderr);
4147#endif
4148
252b5132
RH
4149 for (asect = abfd->sections; asect; asect = asect->next)
4150 {
4151 if (max_index < asect->index)
4152 max_index = asect->index;
4153 }
4154
4155 max_index++;
446f7ed5
AM
4156 amt = max_index * sizeof (asymbol *);
4157 sect_syms = (asymbol **) bfd_zalloc (abfd, amt);
252b5132 4158 if (sect_syms == NULL)
b34976b6 4159 return FALSE;
252b5132 4160 elf_section_syms (abfd) = sect_syms;
4e89ac30 4161 elf_num_section_syms (abfd) = max_index;
252b5132 4162
079e9a2f
AM
4163 /* Init sect_syms entries for any section symbols we have already
4164 decided to output. */
252b5132
RH
4165 for (idx = 0; idx < symcount; idx++)
4166 {
dc810e39 4167 asymbol *sym = syms[idx];
c044fabd 4168
252b5132 4169 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 4170 && sym->value == 0
2633a79c
AM
4171 && !ignore_section_sym (abfd, sym)
4172 && !bfd_is_abs_section (sym->section))
252b5132 4173 {
5372391b 4174 asection *sec = sym->section;
252b5132 4175
5372391b
AM
4176 if (sec->owner != abfd)
4177 sec = sec->output_section;
252b5132 4178
5372391b 4179 sect_syms[sec->index] = syms[idx];
252b5132
RH
4180 }
4181 }
4182
252b5132
RH
4183 /* Classify all of the symbols. */
4184 for (idx = 0; idx < symcount; idx++)
4185 {
2633a79c 4186 if (sym_is_global (abfd, syms[idx]))
252b5132 4187 num_globals++;
2633a79c
AM
4188 else if (!ignore_section_sym (abfd, syms[idx]))
4189 num_locals++;
252b5132 4190 }
079e9a2f 4191
5372391b 4192 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
4193 sections will already have a section symbol in outsymbols, but
4194 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4195 at least in that case. */
252b5132
RH
4196 for (asect = abfd->sections; asect; asect = asect->next)
4197 {
079e9a2f 4198 if (sect_syms[asect->index] == NULL)
252b5132 4199 {
079e9a2f 4200 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
4201 num_locals++;
4202 else
4203 num_globals++;
252b5132
RH
4204 }
4205 }
4206
4207 /* Now sort the symbols so the local symbols are first. */
446f7ed5
AM
4208 amt = (num_locals + num_globals) * sizeof (asymbol *);
4209 new_syms = (asymbol **) bfd_alloc (abfd, amt);
252b5132 4210 if (new_syms == NULL)
b34976b6 4211 return FALSE;
252b5132
RH
4212
4213 for (idx = 0; idx < symcount; idx++)
4214 {
4215 asymbol *sym = syms[idx];
dc810e39 4216 unsigned int i;
252b5132 4217
2633a79c
AM
4218 if (sym_is_global (abfd, sym))
4219 i = num_locals + num_globals2++;
4220 else if (!ignore_section_sym (abfd, sym))
252b5132
RH
4221 i = num_locals2++;
4222 else
2633a79c 4223 continue;
252b5132
RH
4224 new_syms[i] = sym;
4225 sym->udata.i = i + 1;
4226 }
4227 for (asect = abfd->sections; asect; asect = asect->next)
4228 {
079e9a2f 4229 if (sect_syms[asect->index] == NULL)
252b5132 4230 {
079e9a2f 4231 asymbol *sym = asect->symbol;
dc810e39 4232 unsigned int i;
252b5132 4233
079e9a2f 4234 sect_syms[asect->index] = sym;
252b5132
RH
4235 if (!sym_is_global (abfd, sym))
4236 i = num_locals2++;
4237 else
4238 i = num_locals + num_globals2++;
4239 new_syms[i] = sym;
4240 sym->udata.i = i + 1;
4241 }
4242 }
4243
4244 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4245
12bd6957 4246 *pnum_locals = num_locals;
b34976b6 4247 return TRUE;
252b5132
RH
4248}
4249
4250/* Align to the maximum file alignment that could be required for any
4251 ELF data structure. */
4252
268b6b39 4253static inline file_ptr
217aa764 4254align_file_position (file_ptr off, int align)
252b5132
RH
4255{
4256 return (off + align - 1) & ~(align - 1);
4257}
4258
4259/* Assign a file position to a section, optionally aligning to the
4260 required section alignment. */
4261
217aa764
AM
4262file_ptr
4263_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4264 file_ptr offset,
4265 bfd_boolean align)
252b5132 4266{
72de5009
AM
4267 if (align && i_shdrp->sh_addralign > 1)
4268 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
4269 i_shdrp->sh_offset = offset;
4270 if (i_shdrp->bfd_section != NULL)
4271 i_shdrp->bfd_section->filepos = offset;
4272 if (i_shdrp->sh_type != SHT_NOBITS)
4273 offset += i_shdrp->sh_size;
4274 return offset;
4275}
4276
4277/* Compute the file positions we are going to put the sections at, and
4278 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4279 is not NULL, this is being called by the ELF backend linker. */
4280
b34976b6 4281bfd_boolean
217aa764
AM
4282_bfd_elf_compute_section_file_positions (bfd *abfd,
4283 struct bfd_link_info *link_info)
252b5132 4284{
9c5bfbb7 4285 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 4286 struct fake_section_arg fsargs;
b34976b6 4287 bfd_boolean failed;
ef10c3ac 4288 struct elf_strtab_hash *strtab = NULL;
252b5132 4289 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 4290 bfd_boolean need_symtab;
252b5132
RH
4291
4292 if (abfd->output_has_begun)
b34976b6 4293 return TRUE;
252b5132
RH
4294
4295 /* Do any elf backend specific processing first. */
4296 if (bed->elf_backend_begin_write_processing)
4297 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4298
ed7e9d0b 4299 if (!(*bed->elf_backend_init_file_header) (abfd, link_info))
b34976b6 4300 return FALSE;
252b5132 4301
d4730f92
BS
4302 fsargs.failed = FALSE;
4303 fsargs.link_info = link_info;
4304 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4305 if (fsargs.failed)
b34976b6 4306 return FALSE;
252b5132 4307
da9f89d4 4308 if (!assign_section_numbers (abfd, link_info))
b34976b6 4309 return FALSE;
252b5132
RH
4310
4311 /* The backend linker builds symbol table information itself. */
3516e984
L
4312 need_symtab = (link_info == NULL
4313 && (bfd_get_symcount (abfd) > 0
4314 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4315 == HAS_RELOC)));
4316 if (need_symtab)
252b5132
RH
4317 {
4318 /* Non-zero if doing a relocatable link. */
4319 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4320
4321 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 4322 return FALSE;
252b5132
RH
4323 }
4324
d4730f92 4325 failed = FALSE;
1126897b 4326 if (link_info == NULL)
dbb410c3 4327 {
1126897b 4328 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 4329 if (failed)
b34976b6 4330 return FALSE;
dbb410c3
AM
4331 }
4332
252b5132 4333 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
ed7e9d0b 4334 /* sh_name was set in init_file_header. */
252b5132 4335 shstrtab_hdr->sh_type = SHT_STRTAB;
84865015 4336 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
252b5132 4337 shstrtab_hdr->sh_addr = 0;
946748d5 4338 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4339 shstrtab_hdr->sh_entsize = 0;
4340 shstrtab_hdr->sh_link = 0;
4341 shstrtab_hdr->sh_info = 0;
3e19fb8f 4342 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4343 shstrtab_hdr->sh_addralign = 1;
4344
c84fca4d 4345 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 4346 return FALSE;
252b5132 4347
3516e984 4348 if (need_symtab)
252b5132
RH
4349 {
4350 file_ptr off;
4351 Elf_Internal_Shdr *hdr;
4352
12bd6957 4353 off = elf_next_file_pos (abfd);
252b5132 4354
6a40cf0c 4355 hdr = & elf_symtab_hdr (abfd);
b34976b6 4356 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4357
6a40cf0c
NC
4358 if (elf_symtab_shndx_list (abfd) != NULL)
4359 {
4360 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4361 if (hdr->sh_size != 0)
4362 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4363 /* FIXME: What about other symtab_shndx sections in the list ? */
4364 }
9ad5cbcf 4365
252b5132 4366 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 4367 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4368
12bd6957 4369 elf_next_file_pos (abfd) = off;
252b5132
RH
4370
4371 /* Now that we know where the .strtab section goes, write it
08a40648 4372 out. */
252b5132 4373 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
ef10c3ac 4374 || ! _bfd_elf_strtab_emit (abfd, strtab))
b34976b6 4375 return FALSE;
ef10c3ac 4376 _bfd_elf_strtab_free (strtab);
252b5132
RH
4377 }
4378
b34976b6 4379 abfd->output_has_begun = TRUE;
252b5132 4380
b34976b6 4381 return TRUE;
252b5132
RH
4382}
4383
8ded5a0f
AM
4384/* Make an initial estimate of the size of the program header. If we
4385 get the number wrong here, we'll redo section placement. */
4386
4387static bfd_size_type
4388get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4389{
4390 size_t segs;
4391 asection *s;
2b05f1b7 4392 const struct elf_backend_data *bed;
8ded5a0f
AM
4393
4394 /* Assume we will need exactly two PT_LOAD segments: one for text
4395 and one for data. */
4396 segs = 2;
4397
4398 s = bfd_get_section_by_name (abfd, ".interp");
1b9e270b 4399 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
8ded5a0f
AM
4400 {
4401 /* If we have a loadable interpreter section, we need a
4402 PT_INTERP segment. In this case, assume we also need a
4403 PT_PHDR segment, although that may not be true for all
4404 targets. */
e9a38e0f 4405 segs += 2;
8ded5a0f
AM
4406 }
4407
4408 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4409 {
4410 /* We need a PT_DYNAMIC segment. */
4411 ++segs;
f210dcff 4412 }
08a40648 4413
ceae84aa 4414 if (info != NULL && info->relro)
f210dcff
L
4415 {
4416 /* We need a PT_GNU_RELRO segment. */
4417 ++segs;
8ded5a0f
AM
4418 }
4419
12bd6957 4420 if (elf_eh_frame_hdr (abfd))
8ded5a0f
AM
4421 {
4422 /* We need a PT_GNU_EH_FRAME segment. */
4423 ++segs;
4424 }
4425
12bd6957 4426 if (elf_stack_flags (abfd))
8ded5a0f 4427 {
2b05f1b7
L
4428 /* We need a PT_GNU_STACK segment. */
4429 ++segs;
4430 }
94b11780 4431
0a59decb
L
4432 s = bfd_get_section_by_name (abfd,
4433 NOTE_GNU_PROPERTY_SECTION_NAME);
4434 if (s != NULL && s->size != 0)
4435 {
4436 /* We need a PT_GNU_PROPERTY segment. */
4437 ++segs;
4438 }
4439
2b05f1b7
L
4440 for (s = abfd->sections; s != NULL; s = s->next)
4441 {
8ded5a0f 4442 if ((s->flags & SEC_LOAD) != 0
23e463ed 4443 && elf_section_type (s) == SHT_NOTE)
8ded5a0f 4444 {
23e463ed 4445 unsigned int alignment_power;
8ded5a0f
AM
4446 /* We need a PT_NOTE segment. */
4447 ++segs;
23e463ed
L
4448 /* Try to create just one PT_NOTE segment for all adjacent
4449 loadable SHT_NOTE sections. gABI requires that within a
4450 PT_NOTE segment (and also inside of each SHT_NOTE section)
4451 each note should have the same alignment. So we check
4452 whether the sections are correctly aligned. */
4453 alignment_power = s->alignment_power;
4454 while (s->next != NULL
4455 && s->next->alignment_power == alignment_power
4456 && (s->next->flags & SEC_LOAD) != 0
4457 && elf_section_type (s->next) == SHT_NOTE)
4458 s = s->next;
8ded5a0f
AM
4459 }
4460 }
4461
4462 for (s = abfd->sections; s != NULL; s = s->next)
4463 {
4464 if (s->flags & SEC_THREAD_LOCAL)
4465 {
4466 /* We need a PT_TLS segment. */
4467 ++segs;
4468 break;
4469 }
4470 }
4471
2b05f1b7 4472 bed = get_elf_backend_data (abfd);
a91e1603 4473
df3a023b
AM
4474 if ((abfd->flags & D_PAGED) != 0
4475 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
4476 {
4477 /* Add a PT_GNU_MBIND segment for each mbind section. */
4478 unsigned int page_align_power = bfd_log2 (bed->commonpagesize);
4479 for (s = abfd->sections; s != NULL; s = s->next)
4480 if (elf_section_flags (s) & SHF_GNU_MBIND)
4481 {
4482 if (elf_section_data (s)->this_hdr.sh_info > PT_GNU_MBIND_NUM)
4483 {
4484 _bfd_error_handler
4485 /* xgettext:c-format */
4486 (_("%pB: GNU_MBIND section `%pA' has invalid "
4487 "sh_info field: %d"),
4488 abfd, s, elf_section_data (s)->this_hdr.sh_info);
4489 continue;
4490 }
4491 /* Align mbind section to page size. */
4492 if (s->alignment_power < page_align_power)
4493 s->alignment_power = page_align_power;
4494 segs ++;
4495 }
4496 }
4497
4498 /* Let the backend count up any program headers it might need. */
4499 if (bed->elf_backend_additional_program_headers)
8ded5a0f
AM
4500 {
4501 int a;
4502
4503 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4504 if (a == -1)
4505 abort ();
4506 segs += a;
4507 }
4508
4509 return segs * bed->s->sizeof_phdr;
4510}
4511
2ea37f1c
NC
4512/* Find the segment that contains the output_section of section. */
4513
4514Elf_Internal_Phdr *
4515_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4516{
4517 struct elf_segment_map *m;
4518 Elf_Internal_Phdr *p;
4519
12bd6957 4520 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
2ea37f1c
NC
4521 m != NULL;
4522 m = m->next, p++)
4523 {
4524 int i;
4525
4526 for (i = m->count - 1; i >= 0; i--)
4527 if (m->sections[i] == section)
4528 return p;
4529 }
4530
4531 return NULL;
4532}
4533
252b5132
RH
4534/* Create a mapping from a set of sections to a program segment. */
4535
217aa764
AM
4536static struct elf_segment_map *
4537make_mapping (bfd *abfd,
4538 asection **sections,
4539 unsigned int from,
4540 unsigned int to,
4541 bfd_boolean phdr)
252b5132
RH
4542{
4543 struct elf_segment_map *m;
4544 unsigned int i;
4545 asection **hdrpp;
986f0783 4546 size_t amt;
252b5132 4547
00bee008
AM
4548 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
4549 amt += (to - from) * sizeof (asection *);
a50b1753 4550 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4551 if (m == NULL)
4552 return NULL;
4553 m->next = NULL;
4554 m->p_type = PT_LOAD;
4555 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4556 m->sections[i - from] = *hdrpp;
4557 m->count = to - from;
4558
4559 if (from == 0 && phdr)
4560 {
4561 /* Include the headers in the first PT_LOAD segment. */
4562 m->includes_filehdr = 1;
4563 m->includes_phdrs = 1;
4564 }
4565
4566 return m;
4567}
4568
229fcec5
MM
4569/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4570 on failure. */
4571
4572struct elf_segment_map *
4573_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4574{
4575 struct elf_segment_map *m;
4576
a50b1753 4577 m = (struct elf_segment_map *) bfd_zalloc (abfd,
07d6d2b8 4578 sizeof (struct elf_segment_map));
229fcec5
MM
4579 if (m == NULL)
4580 return NULL;
4581 m->next = NULL;
4582 m->p_type = PT_DYNAMIC;
4583 m->count = 1;
4584 m->sections[0] = dynsec;
08a40648 4585
229fcec5
MM
4586 return m;
4587}
4588
8ded5a0f 4589/* Possibly add or remove segments from the segment map. */
252b5132 4590
b34976b6 4591static bfd_boolean
3dea8fca
AM
4592elf_modify_segment_map (bfd *abfd,
4593 struct bfd_link_info *info,
4594 bfd_boolean remove_empty_load)
252b5132 4595{
252e386e 4596 struct elf_segment_map **m;
8ded5a0f 4597 const struct elf_backend_data *bed;
252b5132 4598
8ded5a0f
AM
4599 /* The placement algorithm assumes that non allocated sections are
4600 not in PT_LOAD segments. We ensure this here by removing such
4601 sections from the segment map. We also remove excluded
252e386e
AM
4602 sections. Finally, any PT_LOAD segment without sections is
4603 removed. */
12bd6957 4604 m = &elf_seg_map (abfd);
252e386e 4605 while (*m)
8ded5a0f
AM
4606 {
4607 unsigned int i, new_count;
252b5132 4608
252e386e 4609 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 4610 {
252e386e
AM
4611 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4612 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4613 || (*m)->p_type != PT_LOAD))
8ded5a0f 4614 {
252e386e
AM
4615 (*m)->sections[new_count] = (*m)->sections[i];
4616 new_count++;
8ded5a0f
AM
4617 }
4618 }
252e386e 4619 (*m)->count = new_count;
252b5132 4620
1a9ccd70
NC
4621 if (remove_empty_load
4622 && (*m)->p_type == PT_LOAD
4623 && (*m)->count == 0
4624 && !(*m)->includes_phdrs)
252e386e
AM
4625 *m = (*m)->next;
4626 else
4627 m = &(*m)->next;
8ded5a0f 4628 }
252b5132 4629
8ded5a0f
AM
4630 bed = get_elf_backend_data (abfd);
4631 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 4632 {
252e386e 4633 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 4634 return FALSE;
252b5132 4635 }
252b5132 4636
8ded5a0f
AM
4637 return TRUE;
4638}
252b5132 4639
dbc88fc1
AM
4640#define IS_TBSS(s) \
4641 ((s->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) == SEC_THREAD_LOCAL)
4642
8ded5a0f 4643/* Set up a mapping from BFD sections to program segments. */
252b5132 4644
8ded5a0f
AM
4645bfd_boolean
4646_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4647{
4648 unsigned int count;
4649 struct elf_segment_map *m;
4650 asection **sections = NULL;
4651 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 4652 bfd_boolean no_user_phdrs;
252b5132 4653
12bd6957 4654 no_user_phdrs = elf_seg_map (abfd) == NULL;
d324f6d6
RM
4655
4656 if (info != NULL)
4657 info->user_phdrs = !no_user_phdrs;
4658
3dea8fca 4659 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 4660 {
8ded5a0f
AM
4661 asection *s;
4662 unsigned int i;
4663 struct elf_segment_map *mfirst;
4664 struct elf_segment_map **pm;
4665 asection *last_hdr;
4666 bfd_vma last_size;
00bee008 4667 unsigned int hdr_index;
8ded5a0f
AM
4668 bfd_vma maxpagesize;
4669 asection **hdrpp;
64029e93 4670 bfd_boolean phdr_in_segment;
8ded5a0f 4671 bfd_boolean writable;
2888249f 4672 bfd_boolean executable;
446f7ed5 4673 unsigned int tls_count = 0;
8ded5a0f 4674 asection *first_tls = NULL;
a91e1603 4675 asection *first_mbind = NULL;
8ded5a0f 4676 asection *dynsec, *eh_frame_hdr;
446f7ed5 4677 size_t amt;
8d06853e 4678 bfd_vma addr_mask, wrap_to = 0;
64029e93 4679 bfd_size_type phdr_size;
252b5132 4680
8ded5a0f 4681 /* Select the allocated sections, and sort them. */
252b5132 4682
446f7ed5
AM
4683 amt = bfd_count_sections (abfd) * sizeof (asection *);
4684 sections = (asection **) bfd_malloc (amt);
8ded5a0f 4685 if (sections == NULL)
252b5132 4686 goto error_return;
252b5132 4687
8d06853e
AM
4688 /* Calculate top address, avoiding undefined behaviour of shift
4689 left operator when shift count is equal to size of type
4690 being shifted. */
4691 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4692 addr_mask = (addr_mask << 1) + 1;
4693
8ded5a0f
AM
4694 i = 0;
4695 for (s = abfd->sections; s != NULL; s = s->next)
4696 {
4697 if ((s->flags & SEC_ALLOC) != 0)
4698 {
48db3297
AM
4699 /* target_index is unused until bfd_elf_final_link
4700 starts output of section symbols. Use it to make
4701 qsort stable. */
4702 s->target_index = i;
8ded5a0f
AM
4703 sections[i] = s;
4704 ++i;
8d06853e
AM
4705 /* A wrapping section potentially clashes with header. */
4706 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
4707 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
4708 }
4709 }
4710 BFD_ASSERT (i <= bfd_count_sections (abfd));
4711 count = i;
252b5132 4712
8ded5a0f 4713 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 4714
64029e93
AM
4715 phdr_size = elf_program_header_size (abfd);
4716 if (phdr_size == (bfd_size_type) -1)
4717 phdr_size = get_program_header_size (abfd, info);
4718 phdr_size += bed->s->sizeof_ehdr;
4719 maxpagesize = bed->maxpagesize;
4720 if (maxpagesize == 0)
4721 maxpagesize = 1;
4722 phdr_in_segment = info != NULL && info->load_phdrs;
4723 if (count != 0
4724 && (((sections[0]->lma & addr_mask) & (maxpagesize - 1))
4725 >= (phdr_size & (maxpagesize - 1))))
4726 /* For compatibility with old scripts that may not be using
4727 SIZEOF_HEADERS, add headers when it looks like space has
4728 been left for them. */
4729 phdr_in_segment = TRUE;
252b5132 4730
64029e93 4731 /* Build the mapping. */
8ded5a0f
AM
4732 mfirst = NULL;
4733 pm = &mfirst;
252b5132 4734
8ded5a0f
AM
4735 /* If we have a .interp section, then create a PT_PHDR segment for
4736 the program headers and a PT_INTERP segment for the .interp
4737 section. */
4738 s = bfd_get_section_by_name (abfd, ".interp");
1b9e270b 4739 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
8ded5a0f
AM
4740 {
4741 amt = sizeof (struct elf_segment_map);
a50b1753 4742 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4743 if (m == NULL)
4744 goto error_return;
4745 m->next = NULL;
4746 m->p_type = PT_PHDR;
f882209d 4747 m->p_flags = PF_R;
8ded5a0f
AM
4748 m->p_flags_valid = 1;
4749 m->includes_phdrs = 1;
64029e93 4750 phdr_in_segment = TRUE;
8ded5a0f
AM
4751 *pm = m;
4752 pm = &m->next;
252b5132 4753
8ded5a0f 4754 amt = sizeof (struct elf_segment_map);
a50b1753 4755 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4756 if (m == NULL)
4757 goto error_return;
4758 m->next = NULL;
4759 m->p_type = PT_INTERP;
4760 m->count = 1;
4761 m->sections[0] = s;
4762
4763 *pm = m;
4764 pm = &m->next;
252b5132 4765 }
8ded5a0f
AM
4766
4767 /* Look through the sections. We put sections in the same program
4768 segment when the start of the second section can be placed within
4769 a few bytes of the end of the first section. */
4770 last_hdr = NULL;
4771 last_size = 0;
00bee008 4772 hdr_index = 0;
8ded5a0f 4773 writable = FALSE;
2888249f 4774 executable = FALSE;
8ded5a0f
AM
4775 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4776 if (dynsec != NULL
4777 && (dynsec->flags & SEC_LOAD) == 0)
4778 dynsec = NULL;
4779
64029e93
AM
4780 if ((abfd->flags & D_PAGED) == 0)
4781 phdr_in_segment = FALSE;
4782
8ded5a0f
AM
4783 /* Deal with -Ttext or something similar such that the first section
4784 is not adjacent to the program headers. This is an
4785 approximation, since at this point we don't know exactly how many
4786 program headers we will need. */
64029e93 4787 if (phdr_in_segment && count > 0)
252b5132 4788 {
64029e93
AM
4789 bfd_vma phdr_lma;
4790 bfd_boolean separate_phdr = FALSE;
4791
4792 phdr_lma = (sections[0]->lma - phdr_size) & addr_mask & -maxpagesize;
4793 if (info != NULL
4794 && info->separate_code
4795 && (sections[0]->flags & SEC_CODE) != 0)
1a9ccd70 4796 {
64029e93
AM
4797 /* If data sections should be separate from code and
4798 thus not executable, and the first section is
4799 executable then put the file and program headers in
4800 their own PT_LOAD. */
4801 separate_phdr = TRUE;
4802 if ((((phdr_lma + phdr_size - 1) & addr_mask & -maxpagesize)
4803 == (sections[0]->lma & addr_mask & -maxpagesize)))
4804 {
4805 /* The file and program headers are currently on the
4806 same page as the first section. Put them on the
4807 previous page if we can. */
4808 if (phdr_lma >= maxpagesize)
4809 phdr_lma -= maxpagesize;
4810 else
4811 separate_phdr = FALSE;
4812 }
4813 }
4814 if ((sections[0]->lma & addr_mask) < phdr_lma
4815 || (sections[0]->lma & addr_mask) < phdr_size)
4816 /* If file and program headers would be placed at the end
4817 of memory then it's probably better to omit them. */
4818 phdr_in_segment = FALSE;
4819 else if (phdr_lma < wrap_to)
4820 /* If a section wraps around to where we'll be placing
4821 file and program headers, then the headers will be
4822 overwritten. */
4823 phdr_in_segment = FALSE;
4824 else if (separate_phdr)
4825 {
4826 m = make_mapping (abfd, sections, 0, 0, phdr_in_segment);
4827 if (m == NULL)
4828 goto error_return;
4829 m->p_paddr = phdr_lma;
4830 m->p_vaddr_offset
4831 = (sections[0]->vma - phdr_size) & addr_mask & -maxpagesize;
4832 m->p_paddr_valid = 1;
4833 *pm = m;
4834 pm = &m->next;
4835 phdr_in_segment = FALSE;
1a9ccd70 4836 }
252b5132
RH
4837 }
4838
8ded5a0f 4839 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 4840 {
8ded5a0f
AM
4841 asection *hdr;
4842 bfd_boolean new_segment;
4843
4844 hdr = *hdrpp;
4845
4846 /* See if this section and the last one will fit in the same
4847 segment. */
4848
4849 if (last_hdr == NULL)
4850 {
4851 /* If we don't have a segment yet, then we don't need a new
4852 one (we build the last one after this loop). */
4853 new_segment = FALSE;
4854 }
4855 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4856 {
4857 /* If this section has a different relation between the
4858 virtual address and the load address, then we need a new
4859 segment. */
4860 new_segment = TRUE;
4861 }
b5599592
AM
4862 else if (hdr->lma < last_hdr->lma + last_size
4863 || last_hdr->lma + last_size < last_hdr->lma)
4864 {
4865 /* If this section has a load address that makes it overlap
4866 the previous section, then we need a new segment. */
4867 new_segment = TRUE;
4868 }
76cb3a89
AM
4869 else if ((abfd->flags & D_PAGED) != 0
4870 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4871 == (hdr->lma & -maxpagesize)))
4872 {
4873 /* If we are demand paged then we can't map two disk
4874 pages onto the same memory page. */
4875 new_segment = FALSE;
4876 }
39948a60
NC
4877 /* In the next test we have to be careful when last_hdr->lma is close
4878 to the end of the address space. If the aligned address wraps
4879 around to the start of the address space, then there are no more
4880 pages left in memory and it is OK to assume that the current
4881 section can be included in the current segment. */
76cb3a89
AM
4882 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4883 + maxpagesize > last_hdr->lma)
4884 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4885 + maxpagesize <= hdr->lma))
8ded5a0f
AM
4886 {
4887 /* If putting this section in this segment would force us to
4888 skip a page in the segment, then we need a new segment. */
4889 new_segment = TRUE;
4890 }
4891 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
76cb3a89 4892 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
8ded5a0f 4893 {
e5654c0f
AM
4894 /* We don't want to put a loaded section after a
4895 nonloaded (ie. bss style) section in the same segment
4896 as that will force the non-loaded section to be loaded.
76cb3a89 4897 Consider .tbss sections as loaded for this purpose. */
8ded5a0f
AM
4898 new_segment = TRUE;
4899 }
4900 else if ((abfd->flags & D_PAGED) == 0)
4901 {
4902 /* If the file is not demand paged, which means that we
4903 don't require the sections to be correctly aligned in the
4904 file, then there is no other reason for a new segment. */
4905 new_segment = FALSE;
4906 }
2888249f
L
4907 else if (info != NULL
4908 && info->separate_code
4909 && executable != ((hdr->flags & SEC_CODE) != 0))
4910 {
4911 new_segment = TRUE;
4912 }
8ded5a0f 4913 else if (! writable
76cb3a89 4914 && (hdr->flags & SEC_READONLY) == 0)
8ded5a0f
AM
4915 {
4916 /* We don't want to put a writable section in a read only
76cb3a89 4917 segment. */
8ded5a0f
AM
4918 new_segment = TRUE;
4919 }
4920 else
4921 {
4922 /* Otherwise, we can use the same segment. */
4923 new_segment = FALSE;
4924 }
4925
2889e75b 4926 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
4927 if (last_hdr != NULL
4928 && info != NULL
4929 && info->callbacks->override_segment_assignment != NULL)
4930 new_segment
4931 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4932 last_hdr,
4933 new_segment);
2889e75b 4934
8ded5a0f
AM
4935 if (! new_segment)
4936 {
4937 if ((hdr->flags & SEC_READONLY) == 0)
4938 writable = TRUE;
2888249f
L
4939 if ((hdr->flags & SEC_CODE) != 0)
4940 executable = TRUE;
8ded5a0f
AM
4941 last_hdr = hdr;
4942 /* .tbss sections effectively have zero size. */
dbc88fc1 4943 last_size = !IS_TBSS (hdr) ? hdr->size : 0;
8ded5a0f
AM
4944 continue;
4945 }
4946
4947 /* We need a new program segment. We must create a new program
00bee008 4948 header holding all the sections from hdr_index until hdr. */
8ded5a0f 4949
00bee008 4950 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
8ded5a0f
AM
4951 if (m == NULL)
4952 goto error_return;
4953
4954 *pm = m;
4955 pm = &m->next;
4956
252b5132 4957 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 4958 writable = TRUE;
8ded5a0f
AM
4959 else
4960 writable = FALSE;
4961
2888249f
L
4962 if ((hdr->flags & SEC_CODE) == 0)
4963 executable = FALSE;
4964 else
4965 executable = TRUE;
4966
baaff79e
JJ
4967 last_hdr = hdr;
4968 /* .tbss sections effectively have zero size. */
dbc88fc1 4969 last_size = !IS_TBSS (hdr) ? hdr->size : 0;
00bee008 4970 hdr_index = i;
8ded5a0f 4971 phdr_in_segment = FALSE;
252b5132
RH
4972 }
4973
86b2281f
AM
4974 /* Create a final PT_LOAD program segment, but not if it's just
4975 for .tbss. */
4976 if (last_hdr != NULL
00bee008 4977 && (i - hdr_index != 1
dbc88fc1 4978 || !IS_TBSS (last_hdr)))
8ded5a0f 4979 {
00bee008 4980 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
8ded5a0f
AM
4981 if (m == NULL)
4982 goto error_return;
252b5132 4983
8ded5a0f
AM
4984 *pm = m;
4985 pm = &m->next;
4986 }
252b5132 4987
8ded5a0f
AM
4988 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4989 if (dynsec != NULL)
4990 {
4991 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4992 if (m == NULL)
4993 goto error_return;
4994 *pm = m;
4995 pm = &m->next;
4996 }
252b5132 4997
23e463ed 4998 /* For each batch of consecutive loadable SHT_NOTE sections,
1c5265b5
JJ
4999 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
5000 because if we link together nonloadable .note sections and
5001 loadable .note sections, we will generate two .note sections
23e463ed 5002 in the output file. */
8ded5a0f
AM
5003 for (s = abfd->sections; s != NULL; s = s->next)
5004 {
5005 if ((s->flags & SEC_LOAD) != 0
23e463ed 5006 && elf_section_type (s) == SHT_NOTE)
8ded5a0f 5007 {
1c5265b5 5008 asection *s2;
23e463ed 5009 unsigned int alignment_power = s->alignment_power;
91d6fa6a
NC
5010
5011 count = 1;
23e463ed
L
5012 for (s2 = s; s2->next != NULL; s2 = s2->next)
5013 {
5014 if (s2->next->alignment_power == alignment_power
5015 && (s2->next->flags & SEC_LOAD) != 0
5016 && elf_section_type (s2->next) == SHT_NOTE
5017 && align_power (s2->lma + s2->size,
5018 alignment_power)
5019 == s2->next->lma)
5020 count++;
5021 else
5022 break;
5023 }
00bee008
AM
5024 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5025 amt += count * sizeof (asection *);
a50b1753 5026 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
5027 if (m == NULL)
5028 goto error_return;
5029 m->next = NULL;
5030 m->p_type = PT_NOTE;
1c5265b5
JJ
5031 m->count = count;
5032 while (count > 1)
5033 {
5034 m->sections[m->count - count--] = s;
5035 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5036 s = s->next;
5037 }
5038 m->sections[m->count - 1] = s;
5039 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
5040 *pm = m;
5041 pm = &m->next;
5042 }
5043 if (s->flags & SEC_THREAD_LOCAL)
5044 {
5045 if (! tls_count)
5046 first_tls = s;
5047 tls_count++;
5048 }
a91e1603
L
5049 if (first_mbind == NULL
5050 && (elf_section_flags (s) & SHF_GNU_MBIND) != 0)
5051 first_mbind = s;
8ded5a0f 5052 }
252b5132 5053
8ded5a0f
AM
5054 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
5055 if (tls_count > 0)
5056 {
00bee008
AM
5057 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5058 amt += tls_count * sizeof (asection *);
a50b1753 5059 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
5060 if (m == NULL)
5061 goto error_return;
5062 m->next = NULL;
5063 m->p_type = PT_TLS;
5064 m->count = tls_count;
5065 /* Mandated PF_R. */
5066 m->p_flags = PF_R;
5067 m->p_flags_valid = 1;
d923cae0 5068 s = first_tls;
446f7ed5 5069 for (i = 0; i < tls_count; ++i)
8ded5a0f 5070 {
d923cae0
L
5071 if ((s->flags & SEC_THREAD_LOCAL) == 0)
5072 {
5073 _bfd_error_handler
871b3ab2 5074 (_("%pB: TLS sections are not adjacent:"), abfd);
d923cae0
L
5075 s = first_tls;
5076 i = 0;
446f7ed5 5077 while (i < tls_count)
d923cae0
L
5078 {
5079 if ((s->flags & SEC_THREAD_LOCAL) != 0)
5080 {
871b3ab2 5081 _bfd_error_handler (_(" TLS: %pA"), s);
d923cae0
L
5082 i++;
5083 }
5084 else
871b3ab2 5085 _bfd_error_handler (_(" non-TLS: %pA"), s);
d923cae0
L
5086 s = s->next;
5087 }
5088 bfd_set_error (bfd_error_bad_value);
5089 goto error_return;
5090 }
5091 m->sections[i] = s;
5092 s = s->next;
8ded5a0f 5093 }
252b5132 5094
8ded5a0f
AM
5095 *pm = m;
5096 pm = &m->next;
5097 }
252b5132 5098
df3a023b
AM
5099 if (first_mbind
5100 && (abfd->flags & D_PAGED) != 0
5101 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
a91e1603
L
5102 for (s = first_mbind; s != NULL; s = s->next)
5103 if ((elf_section_flags (s) & SHF_GNU_MBIND) != 0
df3a023b 5104 && elf_section_data (s)->this_hdr.sh_info <= PT_GNU_MBIND_NUM)
a91e1603
L
5105 {
5106 /* Mandated PF_R. */
5107 unsigned long p_flags = PF_R;
5108 if ((s->flags & SEC_READONLY) == 0)
5109 p_flags |= PF_W;
5110 if ((s->flags & SEC_CODE) != 0)
5111 p_flags |= PF_X;
5112
5113 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5114 m = bfd_zalloc (abfd, amt);
5115 if (m == NULL)
5116 goto error_return;
5117 m->next = NULL;
5118 m->p_type = (PT_GNU_MBIND_LO
5119 + elf_section_data (s)->this_hdr.sh_info);
5120 m->count = 1;
5121 m->p_flags_valid = 1;
5122 m->sections[0] = s;
5123 m->p_flags = p_flags;
5124
5125 *pm = m;
5126 pm = &m->next;
5127 }
5128
0a59decb
L
5129 s = bfd_get_section_by_name (abfd,
5130 NOTE_GNU_PROPERTY_SECTION_NAME);
5131 if (s != NULL && s->size != 0)
5132 {
5133 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5134 m = bfd_zalloc (abfd, amt);
5135 if (m == NULL)
5136 goto error_return;
5137 m->next = NULL;
5138 m->p_type = PT_GNU_PROPERTY;
5139 m->count = 1;
5140 m->p_flags_valid = 1;
5141 m->sections[0] = s;
5142 m->p_flags = PF_R;
5143 *pm = m;
5144 pm = &m->next;
5145 }
5146
8ded5a0f
AM
5147 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
5148 segment. */
12bd6957 5149 eh_frame_hdr = elf_eh_frame_hdr (abfd);
8ded5a0f
AM
5150 if (eh_frame_hdr != NULL
5151 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 5152 {
dc810e39 5153 amt = sizeof (struct elf_segment_map);
a50b1753 5154 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
5155 if (m == NULL)
5156 goto error_return;
5157 m->next = NULL;
8ded5a0f 5158 m->p_type = PT_GNU_EH_FRAME;
252b5132 5159 m->count = 1;
8ded5a0f 5160 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
5161
5162 *pm = m;
5163 pm = &m->next;
5164 }
13ae64f3 5165
12bd6957 5166 if (elf_stack_flags (abfd))
13ae64f3 5167 {
8ded5a0f 5168 amt = sizeof (struct elf_segment_map);
a50b1753 5169 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
5170 if (m == NULL)
5171 goto error_return;
5172 m->next = NULL;
2b05f1b7 5173 m->p_type = PT_GNU_STACK;
12bd6957 5174 m->p_flags = elf_stack_flags (abfd);
04c3a755 5175 m->p_align = bed->stack_align;
8ded5a0f 5176 m->p_flags_valid = 1;
04c3a755
NS
5177 m->p_align_valid = m->p_align != 0;
5178 if (info->stacksize > 0)
5179 {
5180 m->p_size = info->stacksize;
5181 m->p_size_valid = 1;
5182 }
252b5132 5183
8ded5a0f
AM
5184 *pm = m;
5185 pm = &m->next;
5186 }
65765700 5187
ceae84aa 5188 if (info != NULL && info->relro)
8ded5a0f 5189 {
f210dcff
L
5190 for (m = mfirst; m != NULL; m = m->next)
5191 {
3832a4d8
AM
5192 if (m->p_type == PT_LOAD
5193 && m->count != 0
5194 && m->sections[0]->vma >= info->relro_start
5195 && m->sections[0]->vma < info->relro_end)
f210dcff 5196 {
3832a4d8
AM
5197 i = m->count;
5198 while (--i != (unsigned) -1)
5199 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
5200 == (SEC_LOAD | SEC_HAS_CONTENTS))
5201 break;
5202
43a8475c 5203 if (i != (unsigned) -1)
f210dcff
L
5204 break;
5205 }
be01b344 5206 }
f210dcff
L
5207
5208 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
5209 if (m != NULL)
5210 {
5211 amt = sizeof (struct elf_segment_map);
a50b1753 5212 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
5213 if (m == NULL)
5214 goto error_return;
5215 m->next = NULL;
5216 m->p_type = PT_GNU_RELRO;
f210dcff
L
5217 *pm = m;
5218 pm = &m->next;
5219 }
8ded5a0f 5220 }
9ee5e499 5221
8ded5a0f 5222 free (sections);
12bd6957 5223 elf_seg_map (abfd) = mfirst;
9ee5e499
JJ
5224 }
5225
3dea8fca 5226 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 5227 return FALSE;
8c37241b 5228
12bd6957 5229 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
8ded5a0f 5230 ++count;
12bd6957 5231 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
252b5132 5232
b34976b6 5233 return TRUE;
252b5132
RH
5234
5235 error_return:
5236 if (sections != NULL)
5237 free (sections);
b34976b6 5238 return FALSE;
252b5132
RH
5239}
5240
5241/* Sort sections by address. */
5242
5243static int
217aa764 5244elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
5245{
5246 const asection *sec1 = *(const asection **) arg1;
5247 const asection *sec2 = *(const asection **) arg2;
eecdbe52 5248 bfd_size_type size1, size2;
252b5132
RH
5249
5250 /* Sort by LMA first, since this is the address used to
5251 place the section into a segment. */
5252 if (sec1->lma < sec2->lma)
5253 return -1;
5254 else if (sec1->lma > sec2->lma)
5255 return 1;
5256
5257 /* Then sort by VMA. Normally the LMA and the VMA will be
5258 the same, and this will do nothing. */
5259 if (sec1->vma < sec2->vma)
5260 return -1;
5261 else if (sec1->vma > sec2->vma)
5262 return 1;
5263
5264 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
5265
07c6e936 5266#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
5267
5268 if (TOEND (sec1))
5269 {
48db3297 5270 if (!TOEND (sec2))
252b5132
RH
5271 return 1;
5272 }
00a7cdc5 5273 else if (TOEND (sec2))
252b5132
RH
5274 return -1;
5275
5276#undef TOEND
5277
00a7cdc5
NC
5278 /* Sort by size, to put zero sized sections
5279 before others at the same address. */
252b5132 5280
eea6121a
AM
5281 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
5282 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
5283
5284 if (size1 < size2)
252b5132 5285 return -1;
eecdbe52 5286 if (size1 > size2)
252b5132
RH
5287 return 1;
5288
5289 return sec1->target_index - sec2->target_index;
5290}
5291
30fe1832
AM
5292/* This qsort comparison functions sorts PT_LOAD segments first and
5293 by p_paddr, for assign_file_positions_for_load_sections. */
5294
5295static int
5296elf_sort_segments (const void *arg1, const void *arg2)
5297{
5298 const struct elf_segment_map *m1 = *(const struct elf_segment_map **) arg1;
5299 const struct elf_segment_map *m2 = *(const struct elf_segment_map **) arg2;
5300
5301 if (m1->p_type != m2->p_type)
5302 {
5303 if (m1->p_type == PT_NULL)
5304 return 1;
5305 if (m2->p_type == PT_NULL)
5306 return -1;
5307 return m1->p_type < m2->p_type ? -1 : 1;
5308 }
5309 if (m1->includes_filehdr != m2->includes_filehdr)
5310 return m1->includes_filehdr ? -1 : 1;
5311 if (m1->no_sort_lma != m2->no_sort_lma)
5312 return m1->no_sort_lma ? -1 : 1;
5313 if (m1->p_type == PT_LOAD && !m1->no_sort_lma)
5314 {
5315 bfd_vma lma1, lma2;
5316 lma1 = 0;
5317 if (m1->p_paddr_valid)
5318 lma1 = m1->p_paddr;
5319 else if (m1->count != 0)
5320 lma1 = m1->sections[0]->lma + m1->p_vaddr_offset;
5321 lma2 = 0;
5322 if (m2->p_paddr_valid)
5323 lma2 = m2->p_paddr;
5324 else if (m2->count != 0)
5325 lma2 = m2->sections[0]->lma + m2->p_vaddr_offset;
5326 if (lma1 != lma2)
5327 return lma1 < lma2 ? -1 : 1;
5328 }
5329 if (m1->idx != m2->idx)
5330 return m1->idx < m2->idx ? -1 : 1;
5331 return 0;
5332}
5333
340b6d91
AC
5334/* Ian Lance Taylor writes:
5335
5336 We shouldn't be using % with a negative signed number. That's just
5337 not good. We have to make sure either that the number is not
5338 negative, or that the number has an unsigned type. When the types
5339 are all the same size they wind up as unsigned. When file_ptr is a
5340 larger signed type, the arithmetic winds up as signed long long,
5341 which is wrong.
5342
5343 What we're trying to say here is something like ``increase OFF by
5344 the least amount that will cause it to be equal to the VMA modulo
5345 the page size.'' */
5346/* In other words, something like:
5347
5348 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5349 off_offset = off % bed->maxpagesize;
5350 if (vma_offset < off_offset)
5351 adjustment = vma_offset + bed->maxpagesize - off_offset;
5352 else
5353 adjustment = vma_offset - off_offset;
08a40648 5354
de194d85 5355 which can be collapsed into the expression below. */
340b6d91
AC
5356
5357static file_ptr
5358vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5359{
dc9155b2
NC
5360 /* PR binutils/16199: Handle an alignment of zero. */
5361 if (maxpagesize == 0)
5362 maxpagesize = 1;
340b6d91
AC
5363 return ((vma - off) % maxpagesize);
5364}
5365
6d33f217
L
5366static void
5367print_segment_map (const struct elf_segment_map *m)
5368{
5369 unsigned int j;
5370 const char *pt = get_segment_type (m->p_type);
5371 char buf[32];
5372
5373 if (pt == NULL)
5374 {
5375 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5376 sprintf (buf, "LOPROC+%7.7x",
5377 (unsigned int) (m->p_type - PT_LOPROC));
5378 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5379 sprintf (buf, "LOOS+%7.7x",
5380 (unsigned int) (m->p_type - PT_LOOS));
5381 else
5382 snprintf (buf, sizeof (buf), "%8.8x",
5383 (unsigned int) m->p_type);
5384 pt = buf;
5385 }
4a97a0e5 5386 fflush (stdout);
6d33f217
L
5387 fprintf (stderr, "%s:", pt);
5388 for (j = 0; j < m->count; j++)
5389 fprintf (stderr, " %s", m->sections [j]->name);
5390 putc ('\n',stderr);
4a97a0e5 5391 fflush (stderr);
6d33f217
L
5392}
5393
32812159
AM
5394static bfd_boolean
5395write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5396{
5397 void *buf;
5398 bfd_boolean ret;
5399
5400 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5401 return FALSE;
5402 buf = bfd_zmalloc (len);
5403 if (buf == NULL)
5404 return FALSE;
5405 ret = bfd_bwrite (buf, len, abfd) == len;
5406 free (buf);
5407 return ret;
5408}
5409
252b5132
RH
5410/* Assign file positions to the sections based on the mapping from
5411 sections to segments. This function also sets up some fields in
f3520d2f 5412 the file header. */
252b5132 5413
b34976b6 5414static bfd_boolean
f3520d2f
AM
5415assign_file_positions_for_load_sections (bfd *abfd,
5416 struct bfd_link_info *link_info)
252b5132
RH
5417{
5418 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5419 struct elf_segment_map *m;
30fe1832 5420 struct elf_segment_map *phdr_load_seg;
252b5132 5421 Elf_Internal_Phdr *phdrs;
252b5132 5422 Elf_Internal_Phdr *p;
02bf8d82 5423 file_ptr off;
3f570048 5424 bfd_size_type maxpagesize;
30fe1832 5425 unsigned int alloc, actual;
0920dee7 5426 unsigned int i, j;
30fe1832 5427 struct elf_segment_map **sorted_seg_map;
252b5132 5428
e36284ab 5429 if (link_info == NULL
ceae84aa 5430 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 5431 return FALSE;
252b5132 5432
8ded5a0f 5433 alloc = 0;
12bd6957 5434 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
30fe1832 5435 m->idx = alloc++;
252b5132 5436
82f2dbf7
NC
5437 if (alloc)
5438 {
5439 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5440 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5441 }
5442 else
5443 {
5444 /* PR binutils/12467. */
5445 elf_elfheader (abfd)->e_phoff = 0;
5446 elf_elfheader (abfd)->e_phentsize = 0;
5447 }
d324f6d6 5448
8ded5a0f 5449 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 5450
12bd6957 5451 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
30fe1832
AM
5452 {
5453 actual = alloc;
5454 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
5455 }
8ded5a0f 5456 else
30fe1832
AM
5457 {
5458 actual = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
5459 BFD_ASSERT (elf_program_header_size (abfd)
5460 == actual * bed->s->sizeof_phdr);
5461 BFD_ASSERT (actual >= alloc);
5462 }
252b5132
RH
5463
5464 if (alloc == 0)
f3520d2f 5465 {
12bd6957 5466 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
8ded5a0f 5467 return TRUE;
f3520d2f 5468 }
252b5132 5469
12bd6957 5470 /* We're writing the size in elf_program_header_size (abfd),
57268894
HPN
5471 see assign_file_positions_except_relocs, so make sure we have
5472 that amount allocated, with trailing space cleared.
12bd6957
AM
5473 The variable alloc contains the computed need, while
5474 elf_program_header_size (abfd) contains the size used for the
57268894
HPN
5475 layout.
5476 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5477 where the layout is forced to according to a larger size in the
5478 last iterations for the testcase ld-elf/header. */
30fe1832
AM
5479 phdrs = bfd_zalloc (abfd, (actual * sizeof (*phdrs)
5480 + alloc * sizeof (*sorted_seg_map)));
5481 sorted_seg_map = (struct elf_segment_map **) (phdrs + actual);
f3520d2f 5482 elf_tdata (abfd)->phdr = phdrs;
252b5132 5483 if (phdrs == NULL)
b34976b6 5484 return FALSE;
252b5132 5485
30fe1832 5486 for (m = elf_seg_map (abfd), j = 0; m != NULL; m = m->next, j++)
252b5132 5487 {
30fe1832 5488 sorted_seg_map[j] = m;
252b5132 5489 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 5490 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
5491 not be done to the PT_NOTE section of a corefile, which may
5492 contain several pseudo-sections artificially created by bfd.
5493 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
5494 if (m->count > 1
5495 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 5496 && m->p_type == PT_NOTE))
48db3297
AM
5497 {
5498 for (i = 0; i < m->count; i++)
5499 m->sections[i]->target_index = i;
5500 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5501 elf_sort_sections);
5502 }
30fe1832
AM
5503 }
5504 if (alloc > 1)
5505 qsort (sorted_seg_map, alloc, sizeof (*sorted_seg_map),
5506 elf_sort_segments);
5507
5508 maxpagesize = 1;
5509 if ((abfd->flags & D_PAGED) != 0)
5510 maxpagesize = bed->maxpagesize;
5511
5512 /* Sections must map to file offsets past the ELF file header. */
5513 off = bed->s->sizeof_ehdr;
5514 /* And if one of the PT_LOAD headers doesn't include the program
5515 headers then we'll be mapping program headers in the usual
5516 position after the ELF file header. */
5517 phdr_load_seg = NULL;
5518 for (j = 0; j < alloc; j++)
5519 {
5520 m = sorted_seg_map[j];
5521 if (m->p_type != PT_LOAD)
5522 break;
5523 if (m->includes_phdrs)
5524 {
5525 phdr_load_seg = m;
5526 break;
5527 }
5528 }
5529 if (phdr_load_seg == NULL)
5530 off += actual * bed->s->sizeof_phdr;
5531
5532 for (j = 0; j < alloc; j++)
5533 {
5534 asection **secpp;
5535 bfd_vma off_adjust;
5536 bfd_boolean no_contents;
252b5132 5537
b301b248
AM
5538 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5539 number of sections with contents contributing to both p_filesz
5540 and p_memsz, followed by a number of sections with no contents
5541 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 5542 available file offset for PT_LOAD and PT_NOTE segments. */
30fe1832
AM
5543 m = sorted_seg_map[j];
5544 p = phdrs + m->idx;
252b5132 5545 p->p_type = m->p_type;
28a7f3e7 5546 p->p_flags = m->p_flags;
252b5132 5547
3f570048 5548 if (m->count == 0)
5d695627 5549 p->p_vaddr = m->p_vaddr_offset;
3f570048 5550 else
5d695627 5551 p->p_vaddr = m->sections[0]->vma + m->p_vaddr_offset;
3f570048
AM
5552
5553 if (m->p_paddr_valid)
5554 p->p_paddr = m->p_paddr;
5555 else if (m->count == 0)
5556 p->p_paddr = 0;
5557 else
5d695627 5558 p->p_paddr = m->sections[0]->lma + m->p_vaddr_offset;
3f570048
AM
5559
5560 if (p->p_type == PT_LOAD
5561 && (abfd->flags & D_PAGED) != 0)
5562 {
5563 /* p_align in demand paged PT_LOAD segments effectively stores
5564 the maximum page size. When copying an executable with
5565 objcopy, we set m->p_align from the input file. Use this
5566 value for maxpagesize rather than bed->maxpagesize, which
5567 may be different. Note that we use maxpagesize for PT_TLS
5568 segment alignment later in this function, so we are relying
5569 on at least one PT_LOAD segment appearing before a PT_TLS
5570 segment. */
5571 if (m->p_align_valid)
5572 maxpagesize = m->p_align;
5573
5574 p->p_align = maxpagesize;
5575 }
3271a814
NS
5576 else if (m->p_align_valid)
5577 p->p_align = m->p_align;
e970b90a
DJ
5578 else if (m->count == 0)
5579 p->p_align = 1 << bed->s->log_file_align;
30fe1832
AM
5580
5581 if (m == phdr_load_seg)
5582 {
5583 if (!m->includes_filehdr)
5584 p->p_offset = off;
5585 off += actual * bed->s->sizeof_phdr;
5586 }
3f570048 5587
bf988460
AM
5588 no_contents = FALSE;
5589 off_adjust = 0;
252b5132 5590 if (p->p_type == PT_LOAD
b301b248 5591 && m->count > 0)
252b5132 5592 {
b301b248 5593 bfd_size_type align;
a49e53ed 5594 unsigned int align_power = 0;
b301b248 5595
3271a814
NS
5596 if (m->p_align_valid)
5597 align = p->p_align;
5598 else
252b5132 5599 {
3271a814
NS
5600 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5601 {
5602 unsigned int secalign;
08a40648 5603
fd361982 5604 secalign = bfd_section_alignment (*secpp);
3271a814
NS
5605 if (secalign > align_power)
5606 align_power = secalign;
5607 }
5608 align = (bfd_size_type) 1 << align_power;
5609 if (align < maxpagesize)
5610 align = maxpagesize;
b301b248 5611 }
252b5132 5612
02bf8d82
AM
5613 for (i = 0; i < m->count; i++)
5614 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5615 /* If we aren't making room for this section, then
5616 it must be SHT_NOBITS regardless of what we've
5617 set via struct bfd_elf_special_section. */
5618 elf_section_type (m->sections[i]) = SHT_NOBITS;
5619
bf988460 5620 /* Find out whether this segment contains any loadable
aea274d3
AM
5621 sections. */
5622 no_contents = TRUE;
5623 for (i = 0; i < m->count; i++)
5624 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5625 {
5626 no_contents = FALSE;
5627 break;
5628 }
bf988460 5629
85cfcbfb 5630 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
a8c75b76
AM
5631
5632 /* Broken hardware and/or kernel require that files do not
5633 map the same page with different permissions on some hppa
5634 processors. */
30fe1832
AM
5635 if (j != 0
5636 && (abfd->flags & D_PAGED) != 0
a8c75b76
AM
5637 && bed->no_page_alias
5638 && (off & (maxpagesize - 1)) != 0
5639 && (off & -maxpagesize) == ((off + off_adjust) & -maxpagesize))
5640 off_adjust += maxpagesize;
bf988460
AM
5641 off += off_adjust;
5642 if (no_contents)
5643 {
5644 /* We shouldn't need to align the segment on disk since
5645 the segment doesn't need file space, but the gABI
5646 arguably requires the alignment and glibc ld.so
5647 checks it. So to comply with the alignment
5648 requirement but not waste file space, we adjust
5649 p_offset for just this segment. (OFF_ADJUST is
5650 subtracted from OFF later.) This may put p_offset
5651 past the end of file, but that shouldn't matter. */
5652 }
5653 else
5654 off_adjust = 0;
252b5132 5655 }
b1a6d0b1
NC
5656 /* Make sure the .dynamic section is the first section in the
5657 PT_DYNAMIC segment. */
5658 else if (p->p_type == PT_DYNAMIC
5659 && m->count > 1
5660 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5661 {
5662 _bfd_error_handler
871b3ab2 5663 (_("%pB: The first section in the PT_DYNAMIC segment"
63a5468a 5664 " is not the .dynamic section"),
b301b248 5665 abfd);
b1a6d0b1
NC
5666 bfd_set_error (bfd_error_bad_value);
5667 return FALSE;
5668 }
3f001e84
JK
5669 /* Set the note section type to SHT_NOTE. */
5670 else if (p->p_type == PT_NOTE)
5671 for (i = 0; i < m->count; i++)
5672 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 5673
252b5132
RH
5674 if (m->includes_filehdr)
5675 {
bf988460 5676 if (!m->p_flags_valid)
252b5132 5677 p->p_flags |= PF_R;
252b5132
RH
5678 p->p_filesz = bed->s->sizeof_ehdr;
5679 p->p_memsz = bed->s->sizeof_ehdr;
30fe1832 5680 if (p->p_type == PT_LOAD)
252b5132 5681 {
30fe1832 5682 if (m->count > 0)
252b5132 5683 {
30fe1832
AM
5684 if (p->p_vaddr < (bfd_vma) off
5685 || (!m->p_paddr_valid
5686 && p->p_paddr < (bfd_vma) off))
5687 {
5688 _bfd_error_handler
5689 (_("%pB: not enough room for program headers,"
5690 " try linking with -N"),
5691 abfd);
5692 bfd_set_error (bfd_error_bad_value);
5693 return FALSE;
5694 }
5695 p->p_vaddr -= off;
5696 if (!m->p_paddr_valid)
5697 p->p_paddr -= off;
252b5132 5698 }
30fe1832
AM
5699 }
5700 else if (sorted_seg_map[0]->includes_filehdr)
5701 {
5702 Elf_Internal_Phdr *filehdr = phdrs + sorted_seg_map[0]->idx;
5703 p->p_vaddr = filehdr->p_vaddr;
bf988460 5704 if (!m->p_paddr_valid)
30fe1832 5705 p->p_paddr = filehdr->p_paddr;
252b5132 5706 }
252b5132
RH
5707 }
5708
5709 if (m->includes_phdrs)
5710 {
bf988460 5711 if (!m->p_flags_valid)
252b5132 5712 p->p_flags |= PF_R;
30fe1832
AM
5713 p->p_filesz += actual * bed->s->sizeof_phdr;
5714 p->p_memsz += actual * bed->s->sizeof_phdr;
f3520d2f 5715 if (!m->includes_filehdr)
252b5132 5716 {
30fe1832 5717 if (p->p_type == PT_LOAD)
252b5132 5718 {
30fe1832
AM
5719 elf_elfheader (abfd)->e_phoff = p->p_offset;
5720 if (m->count > 0)
5721 {
5722 p->p_vaddr -= off - p->p_offset;
5723 if (!m->p_paddr_valid)
5724 p->p_paddr -= off - p->p_offset;
5725 }
5726 }
5727 else if (phdr_load_seg != NULL)
5728 {
5729 Elf_Internal_Phdr *phdr = phdrs + phdr_load_seg->idx;
5730 bfd_vma phdr_off = 0;
5731 if (phdr_load_seg->includes_filehdr)
5732 phdr_off = bed->s->sizeof_ehdr;
5733 p->p_vaddr = phdr->p_vaddr + phdr_off;
bf988460 5734 if (!m->p_paddr_valid)
30fe1832
AM
5735 p->p_paddr = phdr->p_paddr + phdr_off;
5736 p->p_offset = phdr->p_offset + phdr_off;
252b5132 5737 }
30fe1832
AM
5738 else
5739 p->p_offset = bed->s->sizeof_ehdr;
2b0bc088 5740 }
252b5132
RH
5741 }
5742
5743 if (p->p_type == PT_LOAD
5744 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5745 {
bf988460 5746 if (!m->includes_filehdr && !m->includes_phdrs)
0bc3450e
AM
5747 {
5748 p->p_offset = off;
5749 if (no_contents)
67641dd3
AM
5750 {
5751 /* Put meaningless p_offset for PT_LOAD segments
5752 without file contents somewhere within the first
5753 page, in an attempt to not point past EOF. */
5754 bfd_size_type align = maxpagesize;
5755 if (align < p->p_align)
5756 align = p->p_align;
5757 if (align < 1)
5758 align = 1;
5759 p->p_offset = off % align;
5760 }
0bc3450e 5761 }
252b5132
RH
5762 else
5763 {
5764 file_ptr adjust;
5765
5766 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
5767 if (!no_contents)
5768 p->p_filesz += adjust;
252b5132
RH
5769 p->p_memsz += adjust;
5770 }
5771 }
5772
1ea63fd2
AM
5773 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5774 maps. Set filepos for sections in PT_LOAD segments, and in
5775 core files, for sections in PT_NOTE segments.
5776 assign_file_positions_for_non_load_sections will set filepos
5777 for other sections and update p_filesz for other segments. */
252b5132
RH
5778 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5779 {
5780 asection *sec;
252b5132 5781 bfd_size_type align;
627b32bc 5782 Elf_Internal_Shdr *this_hdr;
252b5132
RH
5783
5784 sec = *secpp;
02bf8d82 5785 this_hdr = &elf_section_data (sec)->this_hdr;
fd361982 5786 align = (bfd_size_type) 1 << bfd_section_alignment (sec);
252b5132 5787
88967714
AM
5788 if ((p->p_type == PT_LOAD
5789 || p->p_type == PT_TLS)
5790 && (this_hdr->sh_type != SHT_NOBITS
5791 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5792 && ((this_hdr->sh_flags & SHF_TLS) == 0
5793 || p->p_type == PT_TLS))))
252b5132 5794 {
b5599592
AM
5795 bfd_vma p_start = p->p_paddr;
5796 bfd_vma p_end = p_start + p->p_memsz;
5797 bfd_vma s_start = sec->lma;
5798 bfd_vma adjust = s_start - p_end;
252b5132 5799
a2d1e028
L
5800 if (adjust != 0
5801 && (s_start < p_end
5802 || p_end < p_start))
252b5132 5803 {
4eca0228 5804 _bfd_error_handler
695344c0 5805 /* xgettext:c-format */
2dcf00ce
AM
5806 (_("%pB: section %pA lma %#" PRIx64 " adjusted to %#" PRIx64),
5807 abfd, sec, (uint64_t) s_start, (uint64_t) p_end);
88967714 5808 adjust = 0;
b5599592 5809 sec->lma = p_end;
1cfb7d1e 5810 }
3ac9b6c9 5811 p->p_memsz += adjust;
1cfb7d1e 5812
88967714
AM
5813 if (this_hdr->sh_type != SHT_NOBITS)
5814 {
30fe1832 5815 if (p->p_type == PT_LOAD)
32812159 5816 {
30fe1832
AM
5817 if (p->p_filesz + adjust < p->p_memsz)
5818 {
5819 /* We have a PROGBITS section following NOBITS ones.
5820 Allocate file space for the NOBITS section(s) and
5821 zero it. */
5822 adjust = p->p_memsz - p->p_filesz;
5823 if (!write_zeros (abfd, off, adjust))
5824 return FALSE;
5825 }
5826 off += adjust;
32812159 5827 }
88967714 5828 p->p_filesz += adjust;
252b5132 5829 }
252b5132
RH
5830 }
5831
5832 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5833 {
b301b248
AM
5834 /* The section at i == 0 is the one that actually contains
5835 everything. */
4a938328
MS
5836 if (i == 0)
5837 {
627b32bc 5838 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
5839 off += this_hdr->sh_size;
5840 p->p_filesz = this_hdr->sh_size;
b301b248
AM
5841 p->p_memsz = 0;
5842 p->p_align = 1;
252b5132 5843 }
4a938328 5844 else
252b5132 5845 {
b301b248 5846 /* The rest are fake sections that shouldn't be written. */
252b5132 5847 sec->filepos = 0;
eea6121a 5848 sec->size = 0;
b301b248
AM
5849 sec->flags = 0;
5850 continue;
252b5132 5851 }
252b5132
RH
5852 }
5853 else
5854 {
1e951488 5855 if (p->p_type == PT_LOAD)
b301b248 5856 {
1e951488
AM
5857 this_hdr->sh_offset = sec->filepos = off;
5858 if (this_hdr->sh_type != SHT_NOBITS)
5859 off += this_hdr->sh_size;
5860 }
5861 else if (this_hdr->sh_type == SHT_NOBITS
5862 && (this_hdr->sh_flags & SHF_TLS) != 0
5863 && this_hdr->sh_offset == 0)
5864 {
5865 /* This is a .tbss section that didn't get a PT_LOAD.
5866 (See _bfd_elf_map_sections_to_segments "Create a
5867 final PT_LOAD".) Set sh_offset to the value it
5868 would have if we had created a zero p_filesz and
5869 p_memsz PT_LOAD header for the section. This
5870 also makes the PT_TLS header have the same
5871 p_offset value. */
5872 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5873 off, align);
5874 this_hdr->sh_offset = sec->filepos = off + adjust;
b301b248 5875 }
252b5132 5876
02bf8d82 5877 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 5878 {
6a3cd2b4 5879 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
5880 /* A load section without SHF_ALLOC is something like
5881 a note section in a PT_NOTE segment. These take
5882 file space but are not loaded into memory. */
5883 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 5884 p->p_memsz += this_hdr->sh_size;
b301b248 5885 }
6a3cd2b4 5886 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 5887 {
6a3cd2b4
AM
5888 if (p->p_type == PT_TLS)
5889 p->p_memsz += this_hdr->sh_size;
5890
5891 /* .tbss is special. It doesn't contribute to p_memsz of
5892 normal segments. */
5893 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5894 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
5895 }
5896
b10a8ae0
L
5897 if (align > p->p_align
5898 && !m->p_align_valid
5899 && (p->p_type != PT_LOAD
5900 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
5901 p->p_align = align;
5902 }
5903
bf988460 5904 if (!m->p_flags_valid)
252b5132
RH
5905 {
5906 p->p_flags |= PF_R;
02bf8d82 5907 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 5908 p->p_flags |= PF_X;
02bf8d82 5909 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
5910 p->p_flags |= PF_W;
5911 }
5912 }
43a8475c 5913
bf988460 5914 off -= off_adjust;
0920dee7 5915
30fe1832
AM
5916 /* PR ld/20815 - Check that the program header segment, if
5917 present, will be loaded into memory. */
5918 if (p->p_type == PT_PHDR
5919 && phdr_load_seg == NULL
5920 && !(bed->elf_backend_allow_non_load_phdr != NULL
5921 && bed->elf_backend_allow_non_load_phdr (abfd, phdrs, alloc)))
5922 {
5923 /* The fix for this error is usually to edit the linker script being
5924 used and set up the program headers manually. Either that or
5925 leave room for the headers at the start of the SECTIONS. */
5926 _bfd_error_handler (_("%pB: error: PHDR segment not covered"
5927 " by LOAD segment"),
5928 abfd);
7b3c2715
AM
5929 if (link_info == NULL)
5930 return FALSE;
5931 /* Arrange for the linker to exit with an error, deleting
5932 the output file unless --noinhibit-exec is given. */
5933 link_info->callbacks->info ("%X");
30fe1832
AM
5934 }
5935
7c928300
AM
5936 /* Check that all sections are in a PT_LOAD segment.
5937 Don't check funky gdb generated core files. */
5938 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
5939 {
5940 bfd_boolean check_vma = TRUE;
5941
5942 for (i = 1; i < m->count; i++)
5943 if (m->sections[i]->vma == m->sections[i - 1]->vma
5944 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5945 ->this_hdr), p) != 0
5946 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5947 ->this_hdr), p) != 0)
0920dee7 5948 {
9a83a553
AM
5949 /* Looks like we have overlays packed into the segment. */
5950 check_vma = FALSE;
5951 break;
0920dee7 5952 }
9a83a553
AM
5953
5954 for (i = 0; i < m->count; i++)
5955 {
5956 Elf_Internal_Shdr *this_hdr;
5957 asection *sec;
5958
5959 sec = m->sections[i];
5960 this_hdr = &(elf_section_data(sec)->this_hdr);
86b2281f
AM
5961 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5962 && !ELF_TBSS_SPECIAL (this_hdr, p))
9a83a553 5963 {
4eca0228 5964 _bfd_error_handler
695344c0 5965 /* xgettext:c-format */
871b3ab2 5966 (_("%pB: section `%pA' can't be allocated in segment %d"),
9a83a553
AM
5967 abfd, sec, j);
5968 print_segment_map (m);
5969 }
5970 }
5971 }
252b5132
RH
5972 }
5973
12bd6957 5974 elf_next_file_pos (abfd) = off;
30fe1832
AM
5975
5976 if (link_info != NULL
5977 && phdr_load_seg != NULL
5978 && phdr_load_seg->includes_filehdr)
5979 {
5980 /* There is a segment that contains both the file headers and the
5981 program headers, so provide a symbol __ehdr_start pointing there.
5982 A program can use this to examine itself robustly. */
5983
5984 struct elf_link_hash_entry *hash
5985 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5986 FALSE, FALSE, TRUE);
5987 /* If the symbol was referenced and not defined, define it. */
5988 if (hash != NULL
5989 && (hash->root.type == bfd_link_hash_new
5990 || hash->root.type == bfd_link_hash_undefined
5991 || hash->root.type == bfd_link_hash_undefweak
5992 || hash->root.type == bfd_link_hash_common))
5993 {
5994 asection *s = NULL;
5995 bfd_vma filehdr_vaddr = phdrs[phdr_load_seg->idx].p_vaddr;
5996
5997 if (phdr_load_seg->count != 0)
5998 /* The segment contains sections, so use the first one. */
5999 s = phdr_load_seg->sections[0];
6000 else
6001 /* Use the first (i.e. lowest-addressed) section in any segment. */
6002 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
6003 if (m->p_type == PT_LOAD && m->count != 0)
6004 {
6005 s = m->sections[0];
6006 break;
6007 }
6008
6009 if (s != NULL)
6010 {
6011 hash->root.u.def.value = filehdr_vaddr - s->vma;
6012 hash->root.u.def.section = s;
6013 }
6014 else
6015 {
6016 hash->root.u.def.value = filehdr_vaddr;
6017 hash->root.u.def.section = bfd_abs_section_ptr;
6018 }
6019
6020 hash->root.type = bfd_link_hash_defined;
6021 hash->def_regular = 1;
6022 hash->non_elf = 0;
6023 }
6024 }
6025
f3520d2f
AM
6026 return TRUE;
6027}
6028
1faa385f
NC
6029/* Determine if a bfd is a debuginfo file. Unfortunately there
6030 is no defined method for detecting such files, so we have to
6031 use heuristics instead. */
6032
6033bfd_boolean
6034is_debuginfo_file (bfd *abfd)
6035{
6036 if (abfd == NULL || bfd_get_flavour (abfd) != bfd_target_elf_flavour)
6037 return FALSE;
6038
6039 Elf_Internal_Shdr **start_headers = elf_elfsections (abfd);
6040 Elf_Internal_Shdr **end_headers = start_headers + elf_numsections (abfd);
6041 Elf_Internal_Shdr **headerp;
6042
6043 for (headerp = start_headers; headerp < end_headers; headerp ++)
6044 {
6045 Elf_Internal_Shdr *header = * headerp;
6046
6047 /* Debuginfo files do not have any allocated SHT_PROGBITS sections.
6048 The only allocated sections are SHT_NOBITS or SHT_NOTES. */
6049 if ((header->sh_flags & SHF_ALLOC) == SHF_ALLOC
6050 && header->sh_type != SHT_NOBITS
6051 && header->sh_type != SHT_NOTE)
6052 return FALSE;
6053 }
6054
6055 return TRUE;
6056}
6057
1ff6de03
NA
6058/* Assign file positions for the other sections, except for compressed debugging
6059 and other sections assigned in _bfd_elf_assign_file_positions_for_non_load(). */
f3520d2f
AM
6060
6061static bfd_boolean
6062assign_file_positions_for_non_load_sections (bfd *abfd,
6063 struct bfd_link_info *link_info)
6064{
6065 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6066 Elf_Internal_Shdr **i_shdrpp;
e06efbf1 6067 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
f3520d2f
AM
6068 Elf_Internal_Phdr *phdrs;
6069 Elf_Internal_Phdr *p;
6070 struct elf_segment_map *m;
f3520d2f 6071 file_ptr off;
f3520d2f 6072
5c182d5f 6073 i_shdrpp = elf_elfsections (abfd);
e06efbf1 6074 end_hdrpp = i_shdrpp + elf_numsections (abfd);
12bd6957 6075 off = elf_next_file_pos (abfd);
e06efbf1 6076 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
5c182d5f 6077 {
5c182d5f
AM
6078 Elf_Internal_Shdr *hdr;
6079
6080 hdr = *hdrpp;
6081 if (hdr->bfd_section != NULL
252e386e
AM
6082 && (hdr->bfd_section->filepos != 0
6083 || (hdr->sh_type == SHT_NOBITS
6084 && hdr->contents == NULL)))
627b32bc 6085 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
6086 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
6087 {
1faa385f
NC
6088 if (hdr->sh_size != 0
6089 /* PR 24717 - debuginfo files are known to be not strictly
6090 compliant with the ELF standard. In particular they often
6091 have .note.gnu.property sections that are outside of any
6092 loadable segment. This is not a problem for such files,
6093 so do not warn about them. */
6094 && ! is_debuginfo_file (abfd))
4eca0228 6095 _bfd_error_handler
695344c0 6096 /* xgettext:c-format */
871b3ab2 6097 (_("%pB: warning: allocated section `%s' not in segment"),
e8d2ba53
AM
6098 abfd,
6099 (hdr->bfd_section == NULL
6100 ? "*unknown*"
6101 : hdr->bfd_section->name));
3ba71138
L
6102 /* We don't need to page align empty sections. */
6103 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
6104 off += vma_page_aligned_bias (hdr->sh_addr, off,
6105 bed->maxpagesize);
6106 else
6107 off += vma_page_aligned_bias (hdr->sh_addr, off,
6108 hdr->sh_addralign);
6109 off = _bfd_elf_assign_file_position_for_section (hdr, off,
6110 FALSE);
6111 }
6112 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6113 && hdr->bfd_section == NULL)
1ff6de03
NA
6114 /* We don't know the offset of these sections yet: their size has
6115 not been decided. */
0ce398f1 6116 || (hdr->bfd_section != NULL
1ff6de03
NA
6117 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6118 || (bfd_section_is_ctf (hdr->bfd_section)
6119 && abfd->is_linker_output)))
12bd6957 6120 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6a40cf0c
NC
6121 || (elf_symtab_shndx_list (abfd) != NULL
6122 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
6123 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
6124 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
5c182d5f
AM
6125 hdr->sh_offset = -1;
6126 else
6127 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f 6128 }
30fe1832 6129 elf_next_file_pos (abfd) = off;
5c182d5f 6130
252b5132
RH
6131 /* Now that we have set the section file positions, we can set up
6132 the file positions for the non PT_LOAD segments. */
f3520d2f 6133 phdrs = elf_tdata (abfd)->phdr;
12bd6957 6134 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
252b5132 6135 {
129af99f 6136 if (p->p_type == PT_GNU_RELRO)
252b5132 6137 {
f2731e0c 6138 bfd_vma start, end;
01f7e10c 6139 bfd_boolean ok;
1ea63fd2 6140
129af99f 6141 if (link_info != NULL)
8c37241b 6142 {
129af99f 6143 /* During linking the range of the RELRO segment is passed
f2731e0c
AM
6144 in link_info. Note that there may be padding between
6145 relro_start and the first RELRO section. */
6146 start = link_info->relro_start;
6147 end = link_info->relro_end;
6148 }
6149 else if (m->count != 0)
6150 {
6151 if (!m->p_size_valid)
6152 abort ();
6153 start = m->sections[0]->vma;
6154 end = start + m->p_size;
6155 }
6156 else
6157 {
6158 start = 0;
6159 end = 0;
6160 }
6161
01f7e10c 6162 ok = FALSE;
f2731e0c
AM
6163 if (start < end)
6164 {
6165 struct elf_segment_map *lm;
6166 const Elf_Internal_Phdr *lp;
6167 unsigned int i;
6168
6169 /* Find a LOAD segment containing a section in the RELRO
6170 segment. */
12bd6957 6171 for (lm = elf_seg_map (abfd), lp = phdrs;
3146fac4
AM
6172 lm != NULL;
6173 lm = lm->next, lp++)
8c37241b
JJ
6174 {
6175 if (lp->p_type == PT_LOAD
3146fac4 6176 && lm->count != 0
dbc88fc1
AM
6177 && (lm->sections[lm->count - 1]->vma
6178 + (!IS_TBSS (lm->sections[lm->count - 1])
6179 ? lm->sections[lm->count - 1]->size
6180 : 0)) > start
f2731e0c 6181 && lm->sections[0]->vma < end)
8c37241b
JJ
6182 break;
6183 }
f2731e0c 6184
01f7e10c 6185 if (lm != NULL)
129af99f 6186 {
01f7e10c
AM
6187 /* Find the section starting the RELRO segment. */
6188 for (i = 0; i < lm->count; i++)
6189 {
6190 asection *s = lm->sections[i];
6191 if (s->vma >= start
6192 && s->vma < end
6193 && s->size != 0)
6194 break;
6195 }
6196
6197 if (i < lm->count)
6198 {
6199 p->p_vaddr = lm->sections[i]->vma;
6200 p->p_paddr = lm->sections[i]->lma;
6201 p->p_offset = lm->sections[i]->filepos;
6202 p->p_memsz = end - p->p_vaddr;
6203 p->p_filesz = p->p_memsz;
6204
6205 /* The RELRO segment typically ends a few bytes
6206 into .got.plt but other layouts are possible.
6207 In cases where the end does not match any
6208 loaded section (for instance is in file
6209 padding), trim p_filesz back to correspond to
6210 the end of loaded section contents. */
6211 if (p->p_filesz > lp->p_vaddr + lp->p_filesz - p->p_vaddr)
6212 p->p_filesz = lp->p_vaddr + lp->p_filesz - p->p_vaddr;
6213
6214 /* Preserve the alignment and flags if they are
6215 valid. The gold linker generates RW/4 for
6216 the PT_GNU_RELRO section. It is better for
6217 objcopy/strip to honor these attributes
6218 otherwise gdb will choke when using separate
6219 debug files. */
6220 if (!m->p_align_valid)
6221 p->p_align = 1;
6222 if (!m->p_flags_valid)
6223 p->p_flags = PF_R;
6224 ok = TRUE;
6225 }
129af99f 6226 }
b84a33b5 6227 }
01f7e10c
AM
6228 if (link_info != NULL)
6229 BFD_ASSERT (ok);
6230 if (!ok)
6231 memset (p, 0, sizeof *p);
129af99f 6232 }
04c3a755
NS
6233 else if (p->p_type == PT_GNU_STACK)
6234 {
6235 if (m->p_size_valid)
6236 p->p_memsz = m->p_size;
6237 }
129af99f
AS
6238 else if (m->count != 0)
6239 {
e06efbf1 6240 unsigned int i;
1a9ccd70 6241
129af99f
AS
6242 if (p->p_type != PT_LOAD
6243 && (p->p_type != PT_NOTE
6244 || bfd_get_format (abfd) != bfd_core))
6245 {
1a9ccd70
NC
6246 /* A user specified segment layout may include a PHDR
6247 segment that overlaps with a LOAD segment... */
6248 if (p->p_type == PT_PHDR)
6249 {
6250 m->count = 0;
6251 continue;
6252 }
6253
c86934ce
NC
6254 if (m->includes_filehdr || m->includes_phdrs)
6255 {
b1fa9dd6 6256 /* PR 17512: file: 2195325e. */
4eca0228 6257 _bfd_error_handler
871b3ab2 6258 (_("%pB: error: non-load segment %d includes file header "
76cfced5
AM
6259 "and/or program header"),
6260 abfd, (int) (p - phdrs));
c86934ce
NC
6261 return FALSE;
6262 }
129af99f 6263
86b2281f 6264 p->p_filesz = 0;
129af99f 6265 p->p_offset = m->sections[0]->filepos;
86b2281f
AM
6266 for (i = m->count; i-- != 0;)
6267 {
6268 asection *sect = m->sections[i];
6269 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
6270 if (hdr->sh_type != SHT_NOBITS)
6271 {
6272 p->p_filesz = (sect->filepos - m->sections[0]->filepos
6273 + hdr->sh_size);
6274 break;
6275 }
6276 }
129af99f
AS
6277 }
6278 }
252b5132
RH
6279 }
6280
b34976b6 6281 return TRUE;
252b5132
RH
6282}
6283
6a40cf0c
NC
6284static elf_section_list *
6285find_section_in_list (unsigned int i, elf_section_list * list)
6286{
6287 for (;list != NULL; list = list->next)
6288 if (list->ndx == i)
6289 break;
6290 return list;
6291}
6292
252b5132
RH
6293/* Work out the file positions of all the sections. This is called by
6294 _bfd_elf_compute_section_file_positions. All the section sizes and
6295 VMAs must be known before this is called.
6296
e0638f70 6297 Reloc sections come in two flavours: Those processed specially as
1ff6de03
NA
6298 "side-channel" data attached to a section to which they apply, and those that
6299 bfd doesn't process as relocations. The latter sort are stored in a normal
6300 bfd section by bfd_section_from_shdr. We don't consider the former sort
6301 here, unless they form part of the loadable image. Reloc sections not
6302 assigned here (and compressed debugging sections and CTF sections which
6303 nothing else in the file can rely upon) will be handled later by
e0638f70 6304 assign_file_positions_for_relocs.
252b5132
RH
6305
6306 We also don't set the positions of the .symtab and .strtab here. */
6307
b34976b6 6308static bfd_boolean
c84fca4d
AO
6309assign_file_positions_except_relocs (bfd *abfd,
6310 struct bfd_link_info *link_info)
252b5132 6311{
5c182d5f
AM
6312 struct elf_obj_tdata *tdata = elf_tdata (abfd);
6313 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
9c5bfbb7 6314 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6d6c25c8 6315 unsigned int alloc;
252b5132
RH
6316
6317 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
6318 && bfd_get_format (abfd) != bfd_core)
6319 {
5c182d5f
AM
6320 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
6321 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
6322 Elf_Internal_Shdr **hdrpp;
6323 unsigned int i;
a485e98e 6324 file_ptr off;
252b5132
RH
6325
6326 /* Start after the ELF header. */
6327 off = i_ehdrp->e_ehsize;
6328
6329 /* We are not creating an executable, which means that we are
6330 not creating a program header, and that the actual order of
6331 the sections in the file is unimportant. */
9ad5cbcf 6332 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
6333 {
6334 Elf_Internal_Shdr *hdr;
6335
6336 hdr = *hdrpp;
e0638f70
AM
6337 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6338 && hdr->bfd_section == NULL)
1ff6de03
NA
6339 /* Do not assign offsets for these sections yet: we don't know
6340 their sizes. */
0ce398f1 6341 || (hdr->bfd_section != NULL
1ff6de03
NA
6342 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6343 || (bfd_section_is_ctf (hdr->bfd_section)
6344 && abfd->is_linker_output)))
12bd6957 6345 || i == elf_onesymtab (abfd)
6a40cf0c
NC
6346 || (elf_symtab_shndx_list (abfd) != NULL
6347 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
6348 || i == elf_strtab_sec (abfd)
6349 || i == elf_shstrtab_sec (abfd))
252b5132
RH
6350 {
6351 hdr->sh_offset = -1;
252b5132 6352 }
9ad5cbcf 6353 else
b34976b6 6354 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 6355 }
a485e98e
AM
6356
6357 elf_next_file_pos (abfd) = off;
6d6c25c8 6358 elf_program_header_size (abfd) = 0;
252b5132
RH
6359 }
6360 else
6361 {
252b5132 6362 /* Assign file positions for the loaded sections based on the
08a40648 6363 assignment of sections to segments. */
f3520d2f
AM
6364 if (!assign_file_positions_for_load_sections (abfd, link_info))
6365 return FALSE;
6366
6367 /* And for non-load sections. */
6368 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
6369 return FALSE;
6d6c25c8 6370 }
f3520d2f 6371
6d6c25c8
AM
6372 if (!(*bed->elf_backend_modify_headers) (abfd, link_info))
6373 return FALSE;
1a9ccd70 6374
6d6c25c8
AM
6375 /* Write out the program headers. */
6376 alloc = i_ehdrp->e_phnum;
6377 if (alloc != 0)
6378 {
30fe1832 6379 if (bfd_seek (abfd, i_ehdrp->e_phoff, SEEK_SET) != 0
cd584857
NC
6380 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
6381 return FALSE;
252b5132
RH
6382 }
6383
b34976b6 6384 return TRUE;
252b5132
RH
6385}
6386
ed7e9d0b
AM
6387bfd_boolean
6388_bfd_elf_init_file_header (bfd *abfd,
6389 struct bfd_link_info *info ATTRIBUTE_UNUSED)
252b5132 6390{
3d540e93 6391 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 6392 struct elf_strtab_hash *shstrtab;
9c5bfbb7 6393 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
6394
6395 i_ehdrp = elf_elfheader (abfd);
252b5132 6396
2b0f7ef9 6397 shstrtab = _bfd_elf_strtab_init ();
252b5132 6398 if (shstrtab == NULL)
b34976b6 6399 return FALSE;
252b5132
RH
6400
6401 elf_shstrtab (abfd) = shstrtab;
6402
6403 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
6404 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
6405 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
6406 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
6407
6408 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
6409 i_ehdrp->e_ident[EI_DATA] =
6410 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
6411 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
6412
252b5132
RH
6413 if ((abfd->flags & DYNAMIC) != 0)
6414 i_ehdrp->e_type = ET_DYN;
6415 else if ((abfd->flags & EXEC_P) != 0)
6416 i_ehdrp->e_type = ET_EXEC;
6417 else if (bfd_get_format (abfd) == bfd_core)
6418 i_ehdrp->e_type = ET_CORE;
6419 else
6420 i_ehdrp->e_type = ET_REL;
6421
6422 switch (bfd_get_arch (abfd))
6423 {
6424 case bfd_arch_unknown:
6425 i_ehdrp->e_machine = EM_NONE;
6426 break;
aa4f99bb
AO
6427
6428 /* There used to be a long list of cases here, each one setting
6429 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6430 in the corresponding bfd definition. To avoid duplication,
6431 the switch was removed. Machines that need special handling
6432 can generally do it in elf_backend_final_write_processing(),
6433 unless they need the information earlier than the final write.
6434 Such need can generally be supplied by replacing the tests for
6435 e_machine with the conditions used to determine it. */
252b5132 6436 default:
9c5bfbb7
AM
6437 i_ehdrp->e_machine = bed->elf_machine_code;
6438 }
aa4f99bb 6439
252b5132
RH
6440 i_ehdrp->e_version = bed->s->ev_current;
6441 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
6442
c044fabd 6443 /* No program header, for now. */
252b5132
RH
6444 i_ehdrp->e_phoff = 0;
6445 i_ehdrp->e_phentsize = 0;
6446 i_ehdrp->e_phnum = 0;
6447
c044fabd 6448 /* Each bfd section is section header entry. */
252b5132
RH
6449 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6450 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6451
252b5132 6452 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 6453 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 6454 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 6455 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 6456 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 6457 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132 6458 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
17ca87fc 6459 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
252b5132 6460 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 6461 return FALSE;
252b5132 6462
b34976b6 6463 return TRUE;
252b5132
RH
6464}
6465
6d6c25c8
AM
6466/* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=.
6467
6468 FIXME: We used to have code here to sort the PT_LOAD segments into
6469 ascending order, as per the ELF spec. But this breaks some programs,
6470 including the Linux kernel. But really either the spec should be
6471 changed or the programs updated. */
6472
6473bfd_boolean
6474_bfd_elf_modify_headers (bfd *obfd, struct bfd_link_info *link_info)
6475{
6476 if (link_info != NULL && bfd_link_pie (link_info))
6477 {
6478 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (obfd);
6479 unsigned int num_segments = i_ehdrp->e_phnum;
6480 struct elf_obj_tdata *tdata = elf_tdata (obfd);
6481 Elf_Internal_Phdr *segment = tdata->phdr;
6482 Elf_Internal_Phdr *end_segment = &segment[num_segments];
6483
6484 /* Find the lowest p_vaddr in PT_LOAD segments. */
6485 bfd_vma p_vaddr = (bfd_vma) -1;
6486 for (; segment < end_segment; segment++)
6487 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
6488 p_vaddr = segment->p_vaddr;
6489
6490 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
6491 segments is non-zero. */
6492 if (p_vaddr)
6493 i_ehdrp->e_type = ET_EXEC;
6494 }
6495 return TRUE;
6496}
6497
252b5132 6498/* Assign file positions for all the reloc sections which are not part
a485e98e 6499 of the loadable file image, and the file position of section headers. */
252b5132 6500
0ce398f1
L
6501static bfd_boolean
6502_bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
252b5132
RH
6503{
6504 file_ptr off;
e06efbf1 6505 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
3e19fb8f 6506 Elf_Internal_Shdr *shdrp;
a485e98e
AM
6507 Elf_Internal_Ehdr *i_ehdrp;
6508 const struct elf_backend_data *bed;
252b5132 6509
12bd6957 6510 off = elf_next_file_pos (abfd);
252b5132 6511
e06efbf1
L
6512 shdrpp = elf_elfsections (abfd);
6513 end_shdrpp = shdrpp + elf_numsections (abfd);
6514 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
252b5132 6515 {
252b5132 6516 shdrp = *shdrpp;
0ce398f1
L
6517 if (shdrp->sh_offset == -1)
6518 {
3e19fb8f 6519 asection *sec = shdrp->bfd_section;
0ce398f1
L
6520 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
6521 || shdrp->sh_type == SHT_RELA);
1ff6de03 6522 bfd_boolean is_ctf = sec && bfd_section_is_ctf (sec);
0ce398f1 6523 if (is_rel
1ff6de03 6524 || is_ctf
3e19fb8f 6525 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
0ce398f1 6526 {
1ff6de03 6527 if (!is_rel && !is_ctf)
0ce398f1 6528 {
3e19fb8f
L
6529 const char *name = sec->name;
6530 struct bfd_elf_section_data *d;
6531
0ce398f1 6532 /* Compress DWARF debug sections. */
3e19fb8f 6533 if (!bfd_compress_section (abfd, sec,
0ce398f1
L
6534 shdrp->contents))
6535 return FALSE;
3e19fb8f
L
6536
6537 if (sec->compress_status == COMPRESS_SECTION_DONE
6538 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
6539 {
6540 /* If section is compressed with zlib-gnu, convert
6541 section name from .debug_* to .zdebug_*. */
6542 char *new_name
6543 = convert_debug_to_zdebug (abfd, name);
6544 if (new_name == NULL)
6545 return FALSE;
6546 name = new_name;
6547 }
dd905818 6548 /* Add section name to section name section. */
3e19fb8f
L
6549 if (shdrp->sh_name != (unsigned int) -1)
6550 abort ();
6551 shdrp->sh_name
6552 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6553 name, FALSE);
6554 d = elf_section_data (sec);
6555
dd905818 6556 /* Add reloc section name to section name section. */
3e19fb8f
L
6557 if (d->rel.hdr
6558 && !_bfd_elf_set_reloc_sh_name (abfd,
6559 d->rel.hdr,
6560 name, FALSE))
6561 return FALSE;
6562 if (d->rela.hdr
6563 && !_bfd_elf_set_reloc_sh_name (abfd,
6564 d->rela.hdr,
91cb26da 6565 name, TRUE))
3e19fb8f
L
6566 return FALSE;
6567
0ce398f1 6568 /* Update section size and contents. */
3e19fb8f
L
6569 shdrp->sh_size = sec->size;
6570 shdrp->contents = sec->contents;
0ce398f1
L
6571 shdrp->bfd_section->contents = NULL;
6572 }
1ff6de03
NA
6573 else if (is_ctf)
6574 {
6575 /* Update section size and contents. */
6576 shdrp->sh_size = sec->size;
6577 shdrp->contents = sec->contents;
6578 }
6579
0ce398f1
L
6580 off = _bfd_elf_assign_file_position_for_section (shdrp,
6581 off,
6582 TRUE);
6583 }
6584 }
252b5132
RH
6585 }
6586
3e19fb8f
L
6587 /* Place section name section after DWARF debug sections have been
6588 compressed. */
6589 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6590 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6591 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6592 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
6593
6594 /* Place the section headers. */
a485e98e
AM
6595 i_ehdrp = elf_elfheader (abfd);
6596 bed = get_elf_backend_data (abfd);
6597 off = align_file_position (off, 1 << bed->s->log_file_align);
6598 i_ehdrp->e_shoff = off;
6599 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
12bd6957 6600 elf_next_file_pos (abfd) = off;
0ce398f1
L
6601
6602 return TRUE;
252b5132
RH
6603}
6604
b34976b6 6605bfd_boolean
217aa764 6606_bfd_elf_write_object_contents (bfd *abfd)
252b5132 6607{
9c5bfbb7 6608 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6609 Elf_Internal_Shdr **i_shdrp;
b34976b6 6610 bfd_boolean failed;
9ad5cbcf 6611 unsigned int count, num_sec;
30e8ee25 6612 struct elf_obj_tdata *t;
252b5132
RH
6613
6614 if (! abfd->output_has_begun
217aa764 6615 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6616 return FALSE;
db727370
JL
6617 /* Do not rewrite ELF data when the BFD has been opened for update.
6618 abfd->output_has_begun was set to TRUE on opening, so creation of new
6619 sections, and modification of existing section sizes was restricted.
6620 This means the ELF header, program headers and section headers can't have
6621 changed.
6622 If the contents of any sections has been modified, then those changes have
6623 already been written to the BFD. */
6624 else if (abfd->direction == both_direction)
6625 {
6626 BFD_ASSERT (abfd->output_has_begun);
6627 return TRUE;
6628 }
252b5132
RH
6629
6630 i_shdrp = elf_elfsections (abfd);
252b5132 6631
b34976b6 6632 failed = FALSE;
252b5132
RH
6633 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6634 if (failed)
b34976b6 6635 return FALSE;
252b5132 6636
0ce398f1
L
6637 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6638 return FALSE;
252b5132 6639
c044fabd 6640 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
6641 num_sec = elf_numsections (abfd);
6642 for (count = 1; count < num_sec; count++)
252b5132 6643 {
3e19fb8f
L
6644 i_shdrp[count]->sh_name
6645 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6646 i_shdrp[count]->sh_name);
252b5132 6647 if (bed->elf_backend_section_processing)
75506100
MR
6648 if (!(*bed->elf_backend_section_processing) (abfd, i_shdrp[count]))
6649 return FALSE;
252b5132
RH
6650 if (i_shdrp[count]->contents)
6651 {
dc810e39
AM
6652 bfd_size_type amt = i_shdrp[count]->sh_size;
6653
252b5132 6654 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 6655 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 6656 return FALSE;
252b5132
RH
6657 }
6658 }
6659
6660 /* Write out the section header names. */
30e8ee25 6661 t = elf_tdata (abfd);
26ae6d5e 6662 if (elf_shstrtab (abfd) != NULL
30e8ee25 6663 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 6664 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 6665 return FALSE;
252b5132 6666
cc364be6
AM
6667 if (!(*bed->elf_backend_final_write_processing) (abfd))
6668 return FALSE;
252b5132 6669
ff59fc36
RM
6670 if (!bed->s->write_shdrs_and_ehdr (abfd))
6671 return FALSE;
6672
6673 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
c0355132
AM
6674 if (t->o->build_id.after_write_object_contents != NULL)
6675 return (*t->o->build_id.after_write_object_contents) (abfd);
ff59fc36
RM
6676
6677 return TRUE;
252b5132
RH
6678}
6679
b34976b6 6680bfd_boolean
217aa764 6681_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 6682{
c044fabd 6683 /* Hopefully this can be done just like an object file. */
252b5132
RH
6684 return _bfd_elf_write_object_contents (abfd);
6685}
c044fabd
KH
6686
6687/* Given a section, search the header to find them. */
6688
cb33740c 6689unsigned int
198beae2 6690_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 6691{
9c5bfbb7 6692 const struct elf_backend_data *bed;
91d6fa6a 6693 unsigned int sec_index;
252b5132 6694
9ad5cbcf
AM
6695 if (elf_section_data (asect) != NULL
6696 && elf_section_data (asect)->this_idx != 0)
6697 return elf_section_data (asect)->this_idx;
6698
6699 if (bfd_is_abs_section (asect))
91d6fa6a 6700 sec_index = SHN_ABS;
af746e92 6701 else if (bfd_is_com_section (asect))
91d6fa6a 6702 sec_index = SHN_COMMON;
af746e92 6703 else if (bfd_is_und_section (asect))
91d6fa6a 6704 sec_index = SHN_UNDEF;
af746e92 6705 else
91d6fa6a 6706 sec_index = SHN_BAD;
252b5132 6707
af746e92 6708 bed = get_elf_backend_data (abfd);
252b5132
RH
6709 if (bed->elf_backend_section_from_bfd_section)
6710 {
91d6fa6a 6711 int retval = sec_index;
9ad5cbcf 6712
af746e92
AM
6713 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6714 return retval;
252b5132
RH
6715 }
6716
91d6fa6a 6717 if (sec_index == SHN_BAD)
af746e92 6718 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 6719
91d6fa6a 6720 return sec_index;
252b5132
RH
6721}
6722
6723/* Given a BFD symbol, return the index in the ELF symbol table, or -1
6724 on error. */
6725
6726int
217aa764 6727_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
6728{
6729 asymbol *asym_ptr = *asym_ptr_ptr;
6730 int idx;
6731 flagword flags = asym_ptr->flags;
6732
6733 /* When gas creates relocations against local labels, it creates its
6734 own symbol for the section, but does put the symbol into the
6735 symbol chain, so udata is 0. When the linker is generating
6736 relocatable output, this section symbol may be for one of the
6737 input sections rather than the output section. */
6738 if (asym_ptr->udata.i == 0
6739 && (flags & BSF_SECTION_SYM)
6740 && asym_ptr->section)
6741 {
5372391b 6742 asection *sec;
252b5132
RH
6743 int indx;
6744
5372391b
AM
6745 sec = asym_ptr->section;
6746 if (sec->owner != abfd && sec->output_section != NULL)
6747 sec = sec->output_section;
6748 if (sec->owner == abfd
6749 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 6750 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
6751 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
6752 }
6753
6754 idx = asym_ptr->udata.i;
6755
6756 if (idx == 0)
6757 {
6758 /* This case can occur when using --strip-symbol on a symbol
08a40648 6759 which is used in a relocation entry. */
4eca0228 6760 _bfd_error_handler
695344c0 6761 /* xgettext:c-format */
871b3ab2 6762 (_("%pB: symbol `%s' required but not present"),
d003868e 6763 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
6764 bfd_set_error (bfd_error_no_symbols);
6765 return -1;
6766 }
6767
6768#if DEBUG & 4
6769 {
6770 fprintf (stderr,
cd9af601
AM
6771 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8x\n",
6772 (long) asym_ptr, asym_ptr->name, idx, flags);
252b5132
RH
6773 fflush (stderr);
6774 }
6775#endif
6776
6777 return idx;
6778}
6779
84d1d650 6780/* Rewrite program header information. */
252b5132 6781
b34976b6 6782static bfd_boolean
84d1d650 6783rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 6784{
b34976b6
AM
6785 Elf_Internal_Ehdr *iehdr;
6786 struct elf_segment_map *map;
6787 struct elf_segment_map *map_first;
6788 struct elf_segment_map **pointer_to_map;
6789 Elf_Internal_Phdr *segment;
6790 asection *section;
6791 unsigned int i;
6792 unsigned int num_segments;
6793 bfd_boolean phdr_included = FALSE;
5c44b38e 6794 bfd_boolean p_paddr_valid;
b34976b6
AM
6795 bfd_vma maxpagesize;
6796 struct elf_segment_map *phdr_adjust_seg = NULL;
6797 unsigned int phdr_adjust_num = 0;
9c5bfbb7 6798 const struct elf_backend_data *bed;
bc67d8a6 6799
caf47ea6 6800 bed = get_elf_backend_data (ibfd);
252b5132
RH
6801 iehdr = elf_elfheader (ibfd);
6802
bc67d8a6 6803 map_first = NULL;
c044fabd 6804 pointer_to_map = &map_first;
252b5132
RH
6805
6806 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
6807 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6808
6809 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
6810#define SEGMENT_END(segment, start) \
6811 (start + (segment->p_memsz > segment->p_filesz \
6812 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 6813
eecdbe52
JJ
6814#define SECTION_SIZE(section, segment) \
6815 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6816 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 6817 ? section->size : 0)
eecdbe52 6818
b34976b6 6819 /* Returns TRUE if the given section is contained within
bc67d8a6 6820 the given segment. VMA addresses are compared. */
aecc8f8a
AM
6821#define IS_CONTAINED_BY_VMA(section, segment) \
6822 (section->vma >= segment->p_vaddr \
eecdbe52 6823 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 6824 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 6825
b34976b6 6826 /* Returns TRUE if the given section is contained within
bc67d8a6 6827 the given segment. LMA addresses are compared. */
aecc8f8a
AM
6828#define IS_CONTAINED_BY_LMA(section, segment, base) \
6829 (section->lma >= base \
beab4532 6830 && (section->lma + SECTION_SIZE (section, segment) >= section->lma) \
eecdbe52 6831 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 6832 <= SEGMENT_END (segment, base)))
252b5132 6833
0efc80c8
L
6834 /* Handle PT_NOTE segment. */
6835#define IS_NOTE(p, s) \
aecc8f8a 6836 (p->p_type == PT_NOTE \
0efc80c8 6837 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 6838 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6839 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6840 <= p->p_offset + p->p_filesz))
252b5132 6841
0efc80c8
L
6842 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6843 etc. */
6844#define IS_COREFILE_NOTE(p, s) \
6845 (IS_NOTE (p, s) \
6846 && bfd_get_format (ibfd) == bfd_core \
6847 && s->vma == 0 \
6848 && s->lma == 0)
6849
252b5132
RH
6850 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6851 linker, which generates a PT_INTERP section with p_vaddr and
6852 p_memsz set to 0. */
aecc8f8a
AM
6853#define IS_SOLARIS_PT_INTERP(p, s) \
6854 (p->p_vaddr == 0 \
6855 && p->p_paddr == 0 \
6856 && p->p_memsz == 0 \
6857 && p->p_filesz > 0 \
6858 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 6859 && s->size > 0 \
aecc8f8a 6860 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6861 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6862 <= p->p_offset + p->p_filesz))
5c440b1e 6863
bc67d8a6
NC
6864 /* Decide if the given section should be included in the given segment.
6865 A section will be included if:
f5ffc919 6866 1. It is within the address space of the segment -- we use the LMA
08a40648 6867 if that is set for the segment and the VMA otherwise,
0efc80c8 6868 2. It is an allocated section or a NOTE section in a PT_NOTE
d324f6d6 6869 segment.
bc67d8a6 6870 3. There is an output section associated with it,
eecdbe52 6871 4. The section has not already been allocated to a previous segment.
2b05f1b7 6872 5. PT_GNU_STACK segments do not include any sections.
03394ac9 6873 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
6874 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6875 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 6876 (with the possible exception of .dynamic). */
9f17e2a6 6877#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
6878 ((((segment->p_paddr \
6879 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
6880 : IS_CONTAINED_BY_VMA (section, segment)) \
6881 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 6882 || IS_NOTE (segment, section)) \
2b05f1b7
L
6883 && segment->p_type != PT_GNU_STACK \
6884 && (segment->p_type != PT_TLS \
6885 || (section->flags & SEC_THREAD_LOCAL)) \
6886 && (segment->p_type == PT_LOAD \
6887 || segment->p_type == PT_TLS \
6888 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6889 && (segment->p_type != PT_DYNAMIC \
6890 || SECTION_SIZE (section, segment) > 0 \
6891 || (segment->p_paddr \
6892 ? segment->p_paddr != section->lma \
6893 : segment->p_vaddr != section->vma) \
fd361982 6894 || (strcmp (bfd_section_name (section), ".dynamic") == 0)) \
9933dc52 6895 && (segment->p_type != PT_LOAD || !section->segment_mark))
bc67d8a6 6896
9f17e2a6
L
6897/* If the output section of a section in the input segment is NULL,
6898 it is removed from the corresponding output segment. */
6899#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
6900 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
6901 && section->output_section != NULL)
6902
b34976b6 6903 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
6904#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6905 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6906
6907 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6908 their VMA address ranges and their LMA address ranges overlap.
6909 It is possible to have overlapping VMA ranges without overlapping LMA
6910 ranges. RedBoot images for example can have both .data and .bss mapped
6911 to the same VMA range, but with the .data section mapped to a different
6912 LMA. */
aecc8f8a 6913#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 6914 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 6915 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 6916 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 6917 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
6918
6919 /* Initialise the segment mark field. */
6920 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 6921 section->segment_mark = FALSE;
bc67d8a6 6922
5c44b38e
AM
6923 /* The Solaris linker creates program headers in which all the
6924 p_paddr fields are zero. When we try to objcopy or strip such a
6925 file, we get confused. Check for this case, and if we find it
6926 don't set the p_paddr_valid fields. */
6927 p_paddr_valid = FALSE;
6928 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6929 i < num_segments;
6930 i++, segment++)
6931 if (segment->p_paddr != 0)
6932 {
6933 p_paddr_valid = TRUE;
6934 break;
6935 }
6936
252b5132 6937 /* Scan through the segments specified in the program header
bc67d8a6 6938 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 6939 in the loadable segments. These can be created by weird
aecc8f8a 6940 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
6941 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6942 i < num_segments;
c044fabd 6943 i++, segment++)
252b5132 6944 {
252b5132 6945 unsigned int j;
c044fabd 6946 Elf_Internal_Phdr *segment2;
252b5132 6947
aecc8f8a
AM
6948 if (segment->p_type == PT_INTERP)
6949 for (section = ibfd->sections; section; section = section->next)
6950 if (IS_SOLARIS_PT_INTERP (segment, section))
6951 {
6952 /* Mininal change so that the normal section to segment
4cc11e76 6953 assignment code will work. */
aecc8f8a
AM
6954 segment->p_vaddr = section->vma;
6955 break;
6956 }
6957
bc67d8a6 6958 if (segment->p_type != PT_LOAD)
b10a8ae0
L
6959 {
6960 /* Remove PT_GNU_RELRO segment. */
6961 if (segment->p_type == PT_GNU_RELRO)
6962 segment->p_type = PT_NULL;
6963 continue;
6964 }
c044fabd 6965
bc67d8a6 6966 /* Determine if this segment overlaps any previous segments. */
0067a569 6967 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
6968 {
6969 bfd_signed_vma extra_length;
c044fabd 6970
bc67d8a6 6971 if (segment2->p_type != PT_LOAD
0067a569 6972 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 6973 continue;
c044fabd 6974
bc67d8a6
NC
6975 /* Merge the two segments together. */
6976 if (segment2->p_vaddr < segment->p_vaddr)
6977 {
c044fabd 6978 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 6979 SEGMENT. */
0067a569
AM
6980 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
6981 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 6982
bc67d8a6
NC
6983 if (extra_length > 0)
6984 {
0067a569 6985 segment2->p_memsz += extra_length;
bc67d8a6
NC
6986 segment2->p_filesz += extra_length;
6987 }
c044fabd 6988
bc67d8a6 6989 segment->p_type = PT_NULL;
c044fabd 6990
bc67d8a6
NC
6991 /* Since we have deleted P we must restart the outer loop. */
6992 i = 0;
6993 segment = elf_tdata (ibfd)->phdr;
6994 break;
6995 }
6996 else
6997 {
c044fabd 6998 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 6999 SEGMENT2. */
0067a569
AM
7000 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
7001 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 7002
bc67d8a6
NC
7003 if (extra_length > 0)
7004 {
0067a569 7005 segment->p_memsz += extra_length;
bc67d8a6
NC
7006 segment->p_filesz += extra_length;
7007 }
c044fabd 7008
bc67d8a6
NC
7009 segment2->p_type = PT_NULL;
7010 }
7011 }
7012 }
c044fabd 7013
bc67d8a6
NC
7014 /* The second scan attempts to assign sections to segments. */
7015 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7016 i < num_segments;
0067a569 7017 i++, segment++)
bc67d8a6 7018 {
0067a569
AM
7019 unsigned int section_count;
7020 asection **sections;
7021 asection *output_section;
7022 unsigned int isec;
9933dc52
AM
7023 asection *matching_lma;
7024 asection *suggested_lma;
0067a569 7025 unsigned int j;
446f7ed5 7026 size_t amt;
0067a569 7027 asection *first_section;
bc67d8a6
NC
7028
7029 if (segment->p_type == PT_NULL)
7030 continue;
c044fabd 7031
9f17e2a6 7032 first_section = NULL;
bc67d8a6 7033 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
7034 for (section = ibfd->sections, section_count = 0;
7035 section != NULL;
7036 section = section->next)
9f17e2a6
L
7037 {
7038 /* Find the first section in the input segment, which may be
7039 removed from the corresponding output segment. */
7040 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
7041 {
7042 if (first_section == NULL)
7043 first_section = section;
7044 if (section->output_section != NULL)
7045 ++section_count;
7046 }
7047 }
811072d8 7048
b5f852ea
NC
7049 /* Allocate a segment map big enough to contain
7050 all of the sections we have selected. */
00bee008 7051 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
446f7ed5 7052 amt += section_count * sizeof (asection *);
a50b1753 7053 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 7054 if (map == NULL)
b34976b6 7055 return FALSE;
252b5132
RH
7056
7057 /* Initialise the fields of the segment map. Default to
7058 using the physical address of the segment in the input BFD. */
0067a569
AM
7059 map->next = NULL;
7060 map->p_type = segment->p_type;
7061 map->p_flags = segment->p_flags;
bc67d8a6 7062 map->p_flags_valid = 1;
55d55ac7 7063
9f17e2a6
L
7064 /* If the first section in the input segment is removed, there is
7065 no need to preserve segment physical address in the corresponding
7066 output segment. */
945c025a 7067 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
7068 {
7069 map->p_paddr = segment->p_paddr;
5c44b38e 7070 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 7071 }
252b5132
RH
7072
7073 /* Determine if this segment contains the ELF file header
7074 and if it contains the program headers themselves. */
bc67d8a6
NC
7075 map->includes_filehdr = (segment->p_offset == 0
7076 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 7077 map->includes_phdrs = 0;
252b5132 7078
0067a569 7079 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 7080 {
bc67d8a6
NC
7081 map->includes_phdrs =
7082 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7083 && (segment->p_offset + segment->p_filesz
252b5132
RH
7084 >= ((bfd_vma) iehdr->e_phoff
7085 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 7086
bc67d8a6 7087 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 7088 phdr_included = TRUE;
252b5132
RH
7089 }
7090
bc67d8a6 7091 if (section_count == 0)
252b5132
RH
7092 {
7093 /* Special segments, such as the PT_PHDR segment, may contain
7094 no sections, but ordinary, loadable segments should contain
1ed89aa9 7095 something. They are allowed by the ELF spec however, so only
07d6d2b8 7096 a warning is produced.
f98450c6
NC
7097 There is however the valid use case of embedded systems which
7098 have segments with p_filesz of 0 and a p_memsz > 0 to initialize
7099 flash memory with zeros. No warning is shown for that case. */
7100 if (segment->p_type == PT_LOAD
7101 && (segment->p_filesz > 0 || segment->p_memsz == 0))
7102 /* xgettext:c-format */
9793eb77
AM
7103 _bfd_error_handler
7104 (_("%pB: warning: empty loadable segment detected"
7105 " at vaddr=%#" PRIx64 ", is this intentional?"),
7106 ibfd, (uint64_t) segment->p_vaddr);
252b5132 7107
5d695627 7108 map->p_vaddr_offset = segment->p_vaddr;
bc67d8a6 7109 map->count = 0;
c044fabd
KH
7110 *pointer_to_map = map;
7111 pointer_to_map = &map->next;
252b5132
RH
7112
7113 continue;
7114 }
7115
7116 /* Now scan the sections in the input BFD again and attempt
7117 to add their corresponding output sections to the segment map.
7118 The problem here is how to handle an output section which has
7119 been moved (ie had its LMA changed). There are four possibilities:
7120
7121 1. None of the sections have been moved.
7122 In this case we can continue to use the segment LMA from the
7123 input BFD.
7124
7125 2. All of the sections have been moved by the same amount.
7126 In this case we can change the segment's LMA to match the LMA
7127 of the first section.
7128
7129 3. Some of the sections have been moved, others have not.
7130 In this case those sections which have not been moved can be
7131 placed in the current segment which will have to have its size,
7132 and possibly its LMA changed, and a new segment or segments will
7133 have to be created to contain the other sections.
7134
b5f852ea 7135 4. The sections have been moved, but not by the same amount.
252b5132
RH
7136 In this case we can change the segment's LMA to match the LMA
7137 of the first section and we will have to create a new segment
7138 or segments to contain the other sections.
7139
7140 In order to save time, we allocate an array to hold the section
7141 pointers that we are interested in. As these sections get assigned
7142 to a segment, they are removed from this array. */
7143
446f7ed5
AM
7144 amt = section_count * sizeof (asection *);
7145 sections = (asection **) bfd_malloc (amt);
252b5132 7146 if (sections == NULL)
b34976b6 7147 return FALSE;
252b5132
RH
7148
7149 /* Step One: Scan for segment vs section LMA conflicts.
7150 Also add the sections to the section array allocated above.
7151 Also add the sections to the current segment. In the common
7152 case, where the sections have not been moved, this means that
7153 we have completely filled the segment, and there is nothing
7154 more to do. */
252b5132 7155 isec = 0;
9933dc52
AM
7156 matching_lma = NULL;
7157 suggested_lma = NULL;
252b5132 7158
461c4b2e 7159 for (section = first_section, j = 0;
bc67d8a6
NC
7160 section != NULL;
7161 section = section->next)
252b5132 7162 {
caf47ea6 7163 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 7164 {
bc67d8a6
NC
7165 output_section = section->output_section;
7166
0067a569 7167 sections[j++] = section;
252b5132
RH
7168
7169 /* The Solaris native linker always sets p_paddr to 0.
7170 We try to catch that case here, and set it to the
5e8d7549
NC
7171 correct value. Note - some backends require that
7172 p_paddr be left as zero. */
5c44b38e 7173 if (!p_paddr_valid
4455705d 7174 && segment->p_vaddr != 0
0067a569 7175 && !bed->want_p_paddr_set_to_zero
252b5132 7176 && isec == 0
bc67d8a6 7177 && output_section->lma != 0
9933dc52
AM
7178 && (align_power (segment->p_vaddr
7179 + (map->includes_filehdr
7180 ? iehdr->e_ehsize : 0)
7181 + (map->includes_phdrs
7182 ? iehdr->e_phnum * iehdr->e_phentsize
7183 : 0),
7184 output_section->alignment_power)
7185 == output_section->vma))
bc67d8a6 7186 map->p_paddr = segment->p_vaddr;
252b5132
RH
7187
7188 /* Match up the physical address of the segment with the
7189 LMA address of the output section. */
bc67d8a6 7190 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 7191 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
7192 || (bed->want_p_paddr_set_to_zero
7193 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 7194 {
9933dc52
AM
7195 if (matching_lma == NULL
7196 || output_section->lma < matching_lma->lma)
7197 matching_lma = output_section;
252b5132
RH
7198
7199 /* We assume that if the section fits within the segment
bc67d8a6 7200 then it does not overlap any other section within that
252b5132 7201 segment. */
0067a569
AM
7202 map->sections[isec++] = output_section;
7203 }
9933dc52
AM
7204 else if (suggested_lma == NULL)
7205 suggested_lma = output_section;
147d51c2
L
7206
7207 if (j == section_count)
7208 break;
252b5132
RH
7209 }
7210 }
7211
bc67d8a6 7212 BFD_ASSERT (j == section_count);
252b5132
RH
7213
7214 /* Step Two: Adjust the physical address of the current segment,
7215 if necessary. */
bc67d8a6 7216 if (isec == section_count)
252b5132
RH
7217 {
7218 /* All of the sections fitted within the segment as currently
7219 specified. This is the default case. Add the segment to
7220 the list of built segments and carry on to process the next
7221 program header in the input BFD. */
bc67d8a6 7222 map->count = section_count;
c044fabd
KH
7223 *pointer_to_map = map;
7224 pointer_to_map = &map->next;
08a40648 7225
5c44b38e 7226 if (p_paddr_valid
30fe1832
AM
7227 && !bed->want_p_paddr_set_to_zero)
7228 {
7229 bfd_vma hdr_size = 0;
7230 if (map->includes_filehdr)
7231 hdr_size = iehdr->e_ehsize;
7232 if (map->includes_phdrs)
7233 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7234
7235 /* Account for padding before the first section in the
7236 segment. */
7237 map->p_vaddr_offset = map->p_paddr + hdr_size - matching_lma->lma;
7238 }
08a40648 7239
252b5132
RH
7240 free (sections);
7241 continue;
7242 }
252b5132
RH
7243 else
7244 {
9933dc52
AM
7245 /* Change the current segment's physical address to match
7246 the LMA of the first section that fitted, or if no
7247 section fitted, the first section. */
7248 if (matching_lma == NULL)
7249 matching_lma = suggested_lma;
7250
7251 map->p_paddr = matching_lma->lma;
72730e0c 7252
bc67d8a6
NC
7253 /* Offset the segment physical address from the lma
7254 to allow for space taken up by elf headers. */
9933dc52 7255 if (map->includes_phdrs)
010c8431 7256 {
9933dc52
AM
7257 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
7258
7259 /* iehdr->e_phnum is just an estimate of the number
7260 of program headers that we will need. Make a note
7261 here of the number we used and the segment we chose
7262 to hold these headers, so that we can adjust the
7263 offset when we know the correct value. */
7264 phdr_adjust_num = iehdr->e_phnum;
7265 phdr_adjust_seg = map;
010c8431 7266 }
252b5132 7267
9933dc52 7268 if (map->includes_filehdr)
bc67d8a6 7269 {
9933dc52
AM
7270 bfd_vma align = (bfd_vma) 1 << matching_lma->alignment_power;
7271 map->p_paddr -= iehdr->e_ehsize;
7272 /* We've subtracted off the size of headers from the
7273 first section lma, but there may have been some
7274 alignment padding before that section too. Try to
7275 account for that by adjusting the segment lma down to
7276 the same alignment. */
7277 if (segment->p_align != 0 && segment->p_align < align)
7278 align = segment->p_align;
7279 map->p_paddr &= -align;
bc67d8a6 7280 }
252b5132
RH
7281 }
7282
7283 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 7284 those that fit to the current segment and removing them from the
252b5132
RH
7285 sections array; but making sure not to leave large gaps. Once all
7286 possible sections have been assigned to the current segment it is
7287 added to the list of built segments and if sections still remain
7288 to be assigned, a new segment is constructed before repeating
7289 the loop. */
7290 isec = 0;
7291 do
7292 {
bc67d8a6 7293 map->count = 0;
9933dc52 7294 suggested_lma = NULL;
252b5132
RH
7295
7296 /* Fill the current segment with sections that fit. */
bc67d8a6 7297 for (j = 0; j < section_count; j++)
252b5132 7298 {
bc67d8a6 7299 section = sections[j];
252b5132 7300
bc67d8a6 7301 if (section == NULL)
252b5132
RH
7302 continue;
7303
bc67d8a6 7304 output_section = section->output_section;
252b5132 7305
bc67d8a6 7306 BFD_ASSERT (output_section != NULL);
c044fabd 7307
bc67d8a6
NC
7308 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
7309 || IS_COREFILE_NOTE (segment, section))
252b5132 7310 {
bc67d8a6 7311 if (map->count == 0)
252b5132
RH
7312 {
7313 /* If the first section in a segment does not start at
bc67d8a6
NC
7314 the beginning of the segment, then something is
7315 wrong. */
9933dc52
AM
7316 if (align_power (map->p_paddr
7317 + (map->includes_filehdr
7318 ? iehdr->e_ehsize : 0)
7319 + (map->includes_phdrs
7320 ? iehdr->e_phnum * iehdr->e_phentsize
7321 : 0),
7322 output_section->alignment_power)
7323 != output_section->lma)
9aea1e31 7324 goto sorry;
252b5132
RH
7325 }
7326 else
7327 {
0067a569 7328 asection *prev_sec;
252b5132 7329
bc67d8a6 7330 prev_sec = map->sections[map->count - 1];
252b5132
RH
7331
7332 /* If the gap between the end of the previous section
bc67d8a6
NC
7333 and the start of this section is more than
7334 maxpagesize then we need to start a new segment. */
eea6121a 7335 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 7336 maxpagesize)
caf47ea6 7337 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 7338 || (prev_sec->lma + prev_sec->size
079e9a2f 7339 > output_section->lma))
252b5132 7340 {
9933dc52
AM
7341 if (suggested_lma == NULL)
7342 suggested_lma = output_section;
252b5132
RH
7343
7344 continue;
7345 }
7346 }
7347
bc67d8a6 7348 map->sections[map->count++] = output_section;
252b5132
RH
7349 ++isec;
7350 sections[j] = NULL;
9933dc52
AM
7351 if (segment->p_type == PT_LOAD)
7352 section->segment_mark = TRUE;
0067a569 7353 }
9933dc52
AM
7354 else if (suggested_lma == NULL)
7355 suggested_lma = output_section;
252b5132
RH
7356 }
7357
beab4532
NC
7358 /* PR 23932. A corrupt input file may contain sections that cannot
7359 be assigned to any segment - because for example they have a
9984857c
NC
7360 negative size - or segments that do not contain any sections.
7361 But there are also valid reasons why a segment can be empty.
7362 So allow a count of zero. */
252b5132
RH
7363
7364 /* Add the current segment to the list of built segments. */
c044fabd
KH
7365 *pointer_to_map = map;
7366 pointer_to_map = &map->next;
252b5132 7367
bc67d8a6 7368 if (isec < section_count)
252b5132
RH
7369 {
7370 /* We still have not allocated all of the sections to
7371 segments. Create a new segment here, initialise it
7372 and carry on looping. */
00bee008 7373 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
446f7ed5 7374 amt += section_count * sizeof (asection *);
5964fc3a 7375 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 7376 if (map == NULL)
5ed6aba4
NC
7377 {
7378 free (sections);
7379 return FALSE;
7380 }
252b5132
RH
7381
7382 /* Initialise the fields of the segment map. Set the physical
7383 physical address to the LMA of the first section that has
7384 not yet been assigned. */
0067a569
AM
7385 map->next = NULL;
7386 map->p_type = segment->p_type;
7387 map->p_flags = segment->p_flags;
7388 map->p_flags_valid = 1;
9933dc52 7389 map->p_paddr = suggested_lma->lma;
5c44b38e 7390 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 7391 map->includes_filehdr = 0;
0067a569 7392 map->includes_phdrs = 0;
252b5132 7393 }
9984857c
NC
7394
7395 continue;
7396 sorry:
7397 bfd_set_error (bfd_error_sorry);
7398 free (sections);
7399 return FALSE;
252b5132 7400 }
bc67d8a6 7401 while (isec < section_count);
252b5132
RH
7402
7403 free (sections);
7404 }
7405
12bd6957 7406 elf_seg_map (obfd) = map_first;
bc67d8a6
NC
7407
7408 /* If we had to estimate the number of program headers that were
9ad5cbcf 7409 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
7410 the offset if necessary. */
7411 if (phdr_adjust_seg != NULL)
7412 {
7413 unsigned int count;
c044fabd 7414
bc67d8a6 7415 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 7416 count++;
252b5132 7417
bc67d8a6
NC
7418 if (count > phdr_adjust_num)
7419 phdr_adjust_seg->p_paddr
7420 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
9933dc52
AM
7421
7422 for (map = map_first; map != NULL; map = map->next)
7423 if (map->p_type == PT_PHDR)
7424 {
7425 bfd_vma adjust
7426 = phdr_adjust_seg->includes_filehdr ? iehdr->e_ehsize : 0;
7427 map->p_paddr = phdr_adjust_seg->p_paddr + adjust;
7428 break;
7429 }
bc67d8a6 7430 }
c044fabd 7431
bc67d8a6 7432#undef SEGMENT_END
eecdbe52 7433#undef SECTION_SIZE
bc67d8a6
NC
7434#undef IS_CONTAINED_BY_VMA
7435#undef IS_CONTAINED_BY_LMA
0efc80c8 7436#undef IS_NOTE
252b5132 7437#undef IS_COREFILE_NOTE
bc67d8a6 7438#undef IS_SOLARIS_PT_INTERP
9f17e2a6 7439#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
7440#undef INCLUDE_SECTION_IN_SEGMENT
7441#undef SEGMENT_AFTER_SEGMENT
7442#undef SEGMENT_OVERLAPS
b34976b6 7443 return TRUE;
252b5132
RH
7444}
7445
84d1d650
L
7446/* Copy ELF program header information. */
7447
7448static bfd_boolean
7449copy_elf_program_header (bfd *ibfd, bfd *obfd)
7450{
7451 Elf_Internal_Ehdr *iehdr;
7452 struct elf_segment_map *map;
7453 struct elf_segment_map *map_first;
7454 struct elf_segment_map **pointer_to_map;
7455 Elf_Internal_Phdr *segment;
7456 unsigned int i;
7457 unsigned int num_segments;
7458 bfd_boolean phdr_included = FALSE;
88967714 7459 bfd_boolean p_paddr_valid;
84d1d650
L
7460
7461 iehdr = elf_elfheader (ibfd);
7462
7463 map_first = NULL;
7464 pointer_to_map = &map_first;
7465
88967714
AM
7466 /* If all the segment p_paddr fields are zero, don't set
7467 map->p_paddr_valid. */
7468 p_paddr_valid = FALSE;
84d1d650 7469 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
7470 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7471 i < num_segments;
7472 i++, segment++)
7473 if (segment->p_paddr != 0)
7474 {
7475 p_paddr_valid = TRUE;
7476 break;
7477 }
7478
84d1d650
L
7479 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7480 i < num_segments;
7481 i++, segment++)
7482 {
7483 asection *section;
7484 unsigned int section_count;
986f0783 7485 size_t amt;
84d1d650 7486 Elf_Internal_Shdr *this_hdr;
53020534 7487 asection *first_section = NULL;
a76e6f2f 7488 asection *lowest_section;
84d1d650 7489
84d1d650
L
7490 /* Compute how many sections are in this segment. */
7491 for (section = ibfd->sections, section_count = 0;
7492 section != NULL;
7493 section = section->next)
7494 {
7495 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7496 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 7497 {
a76e6f2f
AM
7498 if (first_section == NULL)
7499 first_section = section;
3271a814
NS
7500 section_count++;
7501 }
84d1d650
L
7502 }
7503
7504 /* Allocate a segment map big enough to contain
7505 all of the sections we have selected. */
00bee008 7506 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
986f0783 7507 amt += section_count * sizeof (asection *);
a50b1753 7508 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
7509 if (map == NULL)
7510 return FALSE;
7511
7512 /* Initialize the fields of the output segment map with the
7513 input segment. */
7514 map->next = NULL;
7515 map->p_type = segment->p_type;
7516 map->p_flags = segment->p_flags;
7517 map->p_flags_valid = 1;
7518 map->p_paddr = segment->p_paddr;
88967714 7519 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
7520 map->p_align = segment->p_align;
7521 map->p_align_valid = 1;
3271a814 7522 map->p_vaddr_offset = 0;
84d1d650 7523
04c3a755
NS
7524 if (map->p_type == PT_GNU_RELRO
7525 || map->p_type == PT_GNU_STACK)
b10a8ae0
L
7526 {
7527 /* The PT_GNU_RELRO segment may contain the first a few
7528 bytes in the .got.plt section even if the whole .got.plt
7529 section isn't in the PT_GNU_RELRO segment. We won't
04c3a755
NS
7530 change the size of the PT_GNU_RELRO segment.
7531 Similarly, PT_GNU_STACK size is significant on uclinux
7532 systems. */
9433b9b1 7533 map->p_size = segment->p_memsz;
b10a8ae0
L
7534 map->p_size_valid = 1;
7535 }
7536
84d1d650
L
7537 /* Determine if this segment contains the ELF file header
7538 and if it contains the program headers themselves. */
7539 map->includes_filehdr = (segment->p_offset == 0
7540 && segment->p_filesz >= iehdr->e_ehsize);
7541
7542 map->includes_phdrs = 0;
7543 if (! phdr_included || segment->p_type != PT_LOAD)
7544 {
7545 map->includes_phdrs =
7546 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7547 && (segment->p_offset + segment->p_filesz
7548 >= ((bfd_vma) iehdr->e_phoff
7549 + iehdr->e_phnum * iehdr->e_phentsize)));
7550
7551 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7552 phdr_included = TRUE;
7553 }
7554
bbefd0a9 7555 lowest_section = NULL;
84d1d650
L
7556 if (section_count != 0)
7557 {
7558 unsigned int isec = 0;
7559
53020534 7560 for (section = first_section;
84d1d650
L
7561 section != NULL;
7562 section = section->next)
7563 {
7564 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7565 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
7566 {
7567 map->sections[isec++] = section->output_section;
a76e6f2f
AM
7568 if ((section->flags & SEC_ALLOC) != 0)
7569 {
7570 bfd_vma seg_off;
7571
bbefd0a9
AM
7572 if (lowest_section == NULL
7573 || section->lma < lowest_section->lma)
fb8a5684
AM
7574 lowest_section = section;
7575
a76e6f2f
AM
7576 /* Section lmas are set up from PT_LOAD header
7577 p_paddr in _bfd_elf_make_section_from_shdr.
7578 If this header has a p_paddr that disagrees
7579 with the section lma, flag the p_paddr as
7580 invalid. */
7581 if ((section->flags & SEC_LOAD) != 0)
7582 seg_off = this_hdr->sh_offset - segment->p_offset;
7583 else
7584 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7585 if (section->lma - segment->p_paddr != seg_off)
7586 map->p_paddr_valid = FALSE;
7587 }
53020534
L
7588 if (isec == section_count)
7589 break;
7590 }
84d1d650
L
7591 }
7592 }
7593
5d695627
AM
7594 if (section_count == 0)
7595 map->p_vaddr_offset = segment->p_vaddr;
30fe1832
AM
7596 else if (map->p_paddr_valid)
7597 {
7598 /* Account for padding before the first section in the segment. */
7599 bfd_vma hdr_size = 0;
7600 if (map->includes_filehdr)
7601 hdr_size = iehdr->e_ehsize;
7602 if (map->includes_phdrs)
7603 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7604
7605 map->p_vaddr_offset = (map->p_paddr + hdr_size
7606 - (lowest_section ? lowest_section->lma : 0));
7607 }
a76e6f2f 7608
84d1d650
L
7609 map->count = section_count;
7610 *pointer_to_map = map;
7611 pointer_to_map = &map->next;
7612 }
7613
12bd6957 7614 elf_seg_map (obfd) = map_first;
84d1d650
L
7615 return TRUE;
7616}
7617
7618/* Copy private BFD data. This copies or rewrites ELF program header
7619 information. */
7620
7621static bfd_boolean
7622copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7623{
84d1d650
L
7624 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7625 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7626 return TRUE;
7627
7628 if (elf_tdata (ibfd)->phdr == NULL)
7629 return TRUE;
7630
7631 if (ibfd->xvec == obfd->xvec)
7632 {
cb3ff1e5
NC
7633 /* Check to see if any sections in the input BFD
7634 covered by ELF program header have changed. */
d55ce4e2 7635 Elf_Internal_Phdr *segment;
84d1d650
L
7636 asection *section, *osec;
7637 unsigned int i, num_segments;
7638 Elf_Internal_Shdr *this_hdr;
147d51c2
L
7639 const struct elf_backend_data *bed;
7640
7641 bed = get_elf_backend_data (ibfd);
7642
7643 /* Regenerate the segment map if p_paddr is set to 0. */
7644 if (bed->want_p_paddr_set_to_zero)
7645 goto rewrite;
84d1d650
L
7646
7647 /* Initialize the segment mark field. */
7648 for (section = obfd->sections; section != NULL;
7649 section = section->next)
7650 section->segment_mark = FALSE;
7651
7652 num_segments = elf_elfheader (ibfd)->e_phnum;
7653 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7654 i < num_segments;
7655 i++, segment++)
7656 {
5f6999aa
NC
7657 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7658 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7659 which severly confuses things, so always regenerate the segment
7660 map in this case. */
7661 if (segment->p_paddr == 0
7662 && segment->p_memsz == 0
7663 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 7664 goto rewrite;
5f6999aa 7665
84d1d650
L
7666 for (section = ibfd->sections;
7667 section != NULL; section = section->next)
7668 {
7669 /* We mark the output section so that we know it comes
7670 from the input BFD. */
7671 osec = section->output_section;
7672 if (osec)
7673 osec->segment_mark = TRUE;
7674
7675 /* Check if this section is covered by the segment. */
7676 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7677 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
7678 {
7679 /* FIXME: Check if its output section is changed or
7680 removed. What else do we need to check? */
7681 if (osec == NULL
7682 || section->flags != osec->flags
7683 || section->lma != osec->lma
7684 || section->vma != osec->vma
7685 || section->size != osec->size
7686 || section->rawsize != osec->rawsize
7687 || section->alignment_power != osec->alignment_power)
7688 goto rewrite;
7689 }
7690 }
7691 }
7692
cb3ff1e5 7693 /* Check to see if any output section do not come from the
84d1d650
L
7694 input BFD. */
7695 for (section = obfd->sections; section != NULL;
7696 section = section->next)
7697 {
535b785f 7698 if (!section->segment_mark)
84d1d650
L
7699 goto rewrite;
7700 else
7701 section->segment_mark = FALSE;
7702 }
7703
7704 return copy_elf_program_header (ibfd, obfd);
7705 }
7706
dc1e8a47 7707 rewrite:
f1d85785
L
7708 if (ibfd->xvec == obfd->xvec)
7709 {
7710 /* When rewriting program header, set the output maxpagesize to
7711 the maximum alignment of input PT_LOAD segments. */
7712 Elf_Internal_Phdr *segment;
7713 unsigned int i;
7714 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7715 bfd_vma maxpagesize = 0;
7716
7717 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7718 i < num_segments;
7719 i++, segment++)
7720 if (segment->p_type == PT_LOAD
7721 && maxpagesize < segment->p_align)
c86934ce
NC
7722 {
7723 /* PR 17512: file: f17299af. */
7724 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
695344c0 7725 /* xgettext:c-format */
2dcf00ce
AM
7726 _bfd_error_handler (_("%pB: warning: segment alignment of %#"
7727 PRIx64 " is too large"),
7728 ibfd, (uint64_t) segment->p_align);
c86934ce
NC
7729 else
7730 maxpagesize = segment->p_align;
7731 }
f1d85785
L
7732
7733 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
7734 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
7735 }
7736
84d1d650
L
7737 return rewrite_elf_program_header (ibfd, obfd);
7738}
7739
ccd2ec6a
L
7740/* Initialize private output section information from input section. */
7741
7742bfd_boolean
7743_bfd_elf_init_private_section_data (bfd *ibfd,
7744 asection *isec,
7745 bfd *obfd,
7746 asection *osec,
7747 struct bfd_link_info *link_info)
7748
7749{
7750 Elf_Internal_Shdr *ihdr, *ohdr;
0e1862bb
L
7751 bfd_boolean final_link = (link_info != NULL
7752 && !bfd_link_relocatable (link_info));
ccd2ec6a
L
7753
7754 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7755 || obfd->xvec->flavour != bfd_target_elf_flavour)
7756 return TRUE;
7757
ba85c43e
NC
7758 BFD_ASSERT (elf_section_data (osec) != NULL);
7759
dfa7b0b8
AM
7760 /* For objcopy and relocatable link, don't copy the output ELF
7761 section type from input if the output BFD section flags have been
7762 set to something different. For a final link allow some flags
7763 that the linker clears to differ. */
42bb2e33 7764 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
7765 && (osec->flags == isec->flags
7766 || (final_link
7767 && ((osec->flags ^ isec->flags)
0814be7d 7768 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 7769 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
7770
7771 /* FIXME: Is this correct for all OS/PROC specific flags? */
7772 elf_section_flags (osec) |= (elf_section_flags (isec)
7773 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a 7774
a91e1603 7775 /* Copy sh_info from input for mbind section. */
df3a023b
AM
7776 if ((elf_tdata (ibfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0
7777 && elf_section_flags (isec) & SHF_GNU_MBIND)
a91e1603
L
7778 elf_section_data (osec)->this_hdr.sh_info
7779 = elf_section_data (isec)->this_hdr.sh_info;
7780
ccd2ec6a
L
7781 /* Set things up for objcopy and relocatable link. The output
7782 SHT_GROUP section will have its elf_next_in_group pointing back
7783 to the input group members. Ignore linker created group section.
7784 See elfNN_ia64_object_p in elfxx-ia64.c. */
7bdf4127
AB
7785 if ((link_info == NULL
7786 || !link_info->resolve_section_groups)
7787 && (elf_sec_group (isec) == NULL
7788 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0))
ccd2ec6a 7789 {
7bdf4127
AB
7790 if (elf_section_flags (isec) & SHF_GROUP)
7791 elf_section_flags (osec) |= SHF_GROUP;
7792 elf_next_in_group (osec) = elf_next_in_group (isec);
7793 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
7794 }
7795
7bdf4127
AB
7796 /* If not decompress, preserve SHF_COMPRESSED. */
7797 if (!final_link && (ibfd->flags & BFD_DECOMPRESS) == 0)
7798 elf_section_flags (osec) |= (elf_section_flags (isec)
7799 & SHF_COMPRESSED);
7800
ccd2ec6a
L
7801 ihdr = &elf_section_data (isec)->this_hdr;
7802
7803 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7804 don't use the output section of the linked-to section since it
7805 may be NULL at this point. */
7806 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7807 {
7808 ohdr = &elf_section_data (osec)->this_hdr;
7809 ohdr->sh_flags |= SHF_LINK_ORDER;
7810 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7811 }
7812
7813 osec->use_rela_p = isec->use_rela_p;
7814
7815 return TRUE;
7816}
7817
252b5132
RH
7818/* Copy private section information. This copies over the entsize
7819 field, and sometimes the info field. */
7820
b34976b6 7821bfd_boolean
217aa764
AM
7822_bfd_elf_copy_private_section_data (bfd *ibfd,
7823 asection *isec,
7824 bfd *obfd,
7825 asection *osec)
252b5132
RH
7826{
7827 Elf_Internal_Shdr *ihdr, *ohdr;
7828
7829 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7830 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 7831 return TRUE;
252b5132 7832
252b5132
RH
7833 ihdr = &elf_section_data (isec)->this_hdr;
7834 ohdr = &elf_section_data (osec)->this_hdr;
7835
7836 ohdr->sh_entsize = ihdr->sh_entsize;
7837
7838 if (ihdr->sh_type == SHT_SYMTAB
7839 || ihdr->sh_type == SHT_DYNSYM
7840 || ihdr->sh_type == SHT_GNU_verneed
7841 || ihdr->sh_type == SHT_GNU_verdef)
7842 ohdr->sh_info = ihdr->sh_info;
7843
ccd2ec6a
L
7844 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7845 NULL);
252b5132
RH
7846}
7847
d0bf826b
AM
7848/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7849 necessary if we are removing either the SHT_GROUP section or any of
7850 the group member sections. DISCARDED is the value that a section's
7851 output_section has if the section will be discarded, NULL when this
7852 function is called from objcopy, bfd_abs_section_ptr when called
7853 from the linker. */
80fccad2
BW
7854
7855bfd_boolean
d0bf826b 7856_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 7857{
30288845
AM
7858 asection *isec;
7859
30288845 7860 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 7861 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
7862 {
7863 asection *first = elf_next_in_group (isec);
7864 asection *s = first;
d0bf826b
AM
7865 bfd_size_type removed = 0;
7866
30288845
AM
7867 while (s != NULL)
7868 {
415f38a6
AM
7869 /* If this member section is being output but the
7870 SHT_GROUP section is not, then clear the group info
7871 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
7872 if (s->output_section != discarded
7873 && isec->output_section == discarded)
30288845
AM
7874 {
7875 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7876 elf_group_name (s->output_section) = NULL;
7877 }
415f38a6
AM
7878 /* Conversely, if the member section is not being output
7879 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
7880 else if (s->output_section == discarded
7881 && isec->output_section != discarded)
6e5e9d58
AM
7882 {
7883 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
7884 removed += 4;
7885 if (elf_sec->rel.hdr != NULL
7886 && (elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0)
7887 removed += 4;
7888 if (elf_sec->rela.hdr != NULL
7889 && (elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0)
7890 removed += 4;
7891 }
30288845
AM
7892 s = elf_next_in_group (s);
7893 if (s == first)
7894 break;
7895 }
d0bf826b
AM
7896 if (removed != 0)
7897 {
7898 if (discarded != NULL)
7899 {
7900 /* If we've been called for ld -r, then we need to
6e5e9d58 7901 adjust the input section size. */
d0bf826b
AM
7902 if (isec->rawsize == 0)
7903 isec->rawsize = isec->size;
7904 isec->size = isec->rawsize - removed;
6e5e9d58
AM
7905 if (isec->size <= 4)
7906 {
7907 isec->size = 0;
7908 isec->flags |= SEC_EXCLUDE;
7909 }
d0bf826b
AM
7910 }
7911 else
7912 {
7913 /* Adjust the output section size when called from
7914 objcopy. */
7915 isec->output_section->size -= removed;
6e5e9d58
AM
7916 if (isec->output_section->size <= 4)
7917 {
7918 isec->output_section->size = 0;
7919 isec->output_section->flags |= SEC_EXCLUDE;
7920 }
d0bf826b
AM
7921 }
7922 }
30288845
AM
7923 }
7924
80fccad2
BW
7925 return TRUE;
7926}
7927
d0bf826b
AM
7928/* Copy private header information. */
7929
7930bfd_boolean
7931_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
7932{
7933 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7934 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7935 return TRUE;
7936
7937 /* Copy over private BFD data if it has not already been copied.
7938 This must be done here, rather than in the copy_private_bfd_data
7939 entry point, because the latter is called after the section
7940 contents have been set, which means that the program headers have
7941 already been worked out. */
12bd6957 7942 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
d0bf826b
AM
7943 {
7944 if (! copy_private_bfd_data (ibfd, obfd))
7945 return FALSE;
7946 }
7947
7948 return _bfd_elf_fixup_group_sections (ibfd, NULL);
7949}
7950
252b5132
RH
7951/* Copy private symbol information. If this symbol is in a section
7952 which we did not map into a BFD section, try to map the section
7953 index correctly. We use special macro definitions for the mapped
7954 section indices; these definitions are interpreted by the
7955 swap_out_syms function. */
7956
9ad5cbcf
AM
7957#define MAP_ONESYMTAB (SHN_HIOS + 1)
7958#define MAP_DYNSYMTAB (SHN_HIOS + 2)
7959#define MAP_STRTAB (SHN_HIOS + 3)
7960#define MAP_SHSTRTAB (SHN_HIOS + 4)
7961#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 7962
b34976b6 7963bfd_boolean
217aa764
AM
7964_bfd_elf_copy_private_symbol_data (bfd *ibfd,
7965 asymbol *isymarg,
7966 bfd *obfd,
7967 asymbol *osymarg)
252b5132
RH
7968{
7969 elf_symbol_type *isym, *osym;
7970
7971 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7972 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 7973 return TRUE;
252b5132
RH
7974
7975 isym = elf_symbol_from (ibfd, isymarg);
7976 osym = elf_symbol_from (obfd, osymarg);
7977
7978 if (isym != NULL
8424d8f5 7979 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
7980 && osym != NULL
7981 && bfd_is_abs_section (isym->symbol.section))
7982 {
7983 unsigned int shndx;
7984
7985 shndx = isym->internal_elf_sym.st_shndx;
7986 if (shndx == elf_onesymtab (ibfd))
7987 shndx = MAP_ONESYMTAB;
7988 else if (shndx == elf_dynsymtab (ibfd))
7989 shndx = MAP_DYNSYMTAB;
12bd6957 7990 else if (shndx == elf_strtab_sec (ibfd))
252b5132 7991 shndx = MAP_STRTAB;
12bd6957 7992 else if (shndx == elf_shstrtab_sec (ibfd))
252b5132 7993 shndx = MAP_SHSTRTAB;
6a40cf0c 7994 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
9ad5cbcf 7995 shndx = MAP_SYM_SHNDX;
252b5132
RH
7996 osym->internal_elf_sym.st_shndx = shndx;
7997 }
7998
b34976b6 7999 return TRUE;
252b5132
RH
8000}
8001
8002/* Swap out the symbols. */
8003
b34976b6 8004static bfd_boolean
217aa764 8005swap_out_syms (bfd *abfd,
ef10c3ac 8006 struct elf_strtab_hash **sttp,
217aa764 8007 int relocatable_p)
252b5132 8008{
9c5bfbb7 8009 const struct elf_backend_data *bed;
1f4361a7 8010 unsigned int symcount;
079e9a2f 8011 asymbol **syms;
ef10c3ac 8012 struct elf_strtab_hash *stt;
079e9a2f 8013 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 8014 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 8015 Elf_Internal_Shdr *symstrtab_hdr;
ef10c3ac 8016 struct elf_sym_strtab *symstrtab;
f075ee0c
AM
8017 bfd_byte *outbound_syms;
8018 bfd_byte *outbound_shndx;
ef10c3ac
L
8019 unsigned long outbound_syms_index;
8020 unsigned long outbound_shndx_index;
1f4361a7 8021 unsigned int idx;
12bd6957 8022 unsigned int num_locals;
1f4361a7 8023 size_t amt;
174fd7f9 8024 bfd_boolean name_local_sections;
252b5132 8025
12bd6957 8026 if (!elf_map_symbols (abfd, &num_locals))
b34976b6 8027 return FALSE;
252b5132 8028
c044fabd 8029 /* Dump out the symtabs. */
ef10c3ac 8030 stt = _bfd_elf_strtab_init ();
079e9a2f 8031 if (stt == NULL)
b34976b6 8032 return FALSE;
252b5132 8033
079e9a2f
AM
8034 bed = get_elf_backend_data (abfd);
8035 symcount = bfd_get_symcount (abfd);
8036 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
8037 symtab_hdr->sh_type = SHT_SYMTAB;
8038 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
8039 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
12bd6957 8040 symtab_hdr->sh_info = num_locals + 1;
72de5009 8041 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
8042
8043 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
8044 symstrtab_hdr->sh_type = SHT_STRTAB;
8045
ef10c3ac 8046 /* Allocate buffer to swap out the .strtab section. */
1f4361a7
AM
8047 if (_bfd_mul_overflow (symcount + 1, sizeof (*symstrtab), &amt)
8048 || (symstrtab = (struct elf_sym_strtab *) bfd_malloc (amt)) == NULL)
ef10c3ac 8049 {
1f4361a7 8050 bfd_set_error (bfd_error_no_memory);
ef10c3ac
L
8051 _bfd_elf_strtab_free (stt);
8052 return FALSE;
8053 }
8054
1f4361a7
AM
8055 if (_bfd_mul_overflow (symcount + 1, bed->s->sizeof_sym, &amt)
8056 || (outbound_syms = (bfd_byte *) bfd_alloc (abfd, amt)) == NULL)
5ed6aba4 8057 {
1f4361a7
AM
8058 error_no_mem:
8059 bfd_set_error (bfd_error_no_memory);
8060 error_return:
ef10c3ac 8061 free (symstrtab);
1f4361a7 8062 _bfd_elf_strtab_free (stt);
5ed6aba4
NC
8063 return FALSE;
8064 }
217aa764 8065 symtab_hdr->contents = outbound_syms;
ef10c3ac 8066 outbound_syms_index = 0;
252b5132 8067
9ad5cbcf 8068 outbound_shndx = NULL;
ef10c3ac 8069 outbound_shndx_index = 0;
6a40cf0c
NC
8070
8071 if (elf_symtab_shndx_list (abfd))
9ad5cbcf 8072 {
6a40cf0c
NC
8073 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
8074 if (symtab_shndx_hdr->sh_name != 0)
8075 {
1f4361a7
AM
8076 if (_bfd_mul_overflow (symcount + 1,
8077 sizeof (Elf_External_Sym_Shndx), &amt))
8078 goto error_no_mem;
8079 outbound_shndx = (bfd_byte *) bfd_zalloc (abfd, amt);
6a40cf0c
NC
8080 if (outbound_shndx == NULL)
8081 goto error_return;
5ed6aba4 8082
6a40cf0c
NC
8083 symtab_shndx_hdr->contents = outbound_shndx;
8084 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
8085 symtab_shndx_hdr->sh_size = amt;
8086 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
8087 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
8088 }
8089 /* FIXME: What about any other headers in the list ? */
9ad5cbcf
AM
8090 }
8091
589e6347 8092 /* Now generate the data (for "contents"). */
079e9a2f
AM
8093 {
8094 /* Fill in zeroth symbol and swap it out. */
8095 Elf_Internal_Sym sym;
8096 sym.st_name = 0;
8097 sym.st_value = 0;
8098 sym.st_size = 0;
8099 sym.st_info = 0;
8100 sym.st_other = 0;
8101 sym.st_shndx = SHN_UNDEF;
35fc36a8 8102 sym.st_target_internal = 0;
ef10c3ac
L
8103 symstrtab[0].sym = sym;
8104 symstrtab[0].dest_index = outbound_syms_index;
8105 symstrtab[0].destshndx_index = outbound_shndx_index;
8106 outbound_syms_index++;
9ad5cbcf 8107 if (outbound_shndx != NULL)
ef10c3ac 8108 outbound_shndx_index++;
079e9a2f 8109 }
252b5132 8110
174fd7f9
RS
8111 name_local_sections
8112 = (bed->elf_backend_name_local_section_symbols
8113 && bed->elf_backend_name_local_section_symbols (abfd));
8114
079e9a2f 8115 syms = bfd_get_outsymbols (abfd);
ef10c3ac 8116 for (idx = 0; idx < symcount;)
252b5132 8117 {
252b5132 8118 Elf_Internal_Sym sym;
079e9a2f
AM
8119 bfd_vma value = syms[idx]->value;
8120 elf_symbol_type *type_ptr;
8121 flagword flags = syms[idx]->flags;
8122 int type;
252b5132 8123
174fd7f9
RS
8124 if (!name_local_sections
8125 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
8126 {
8127 /* Local section symbols have no name. */
ef10c3ac 8128 sym.st_name = (unsigned long) -1;
079e9a2f
AM
8129 }
8130 else
8131 {
ef10c3ac
L
8132 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
8133 to get the final offset for st_name. */
8134 sym.st_name
8135 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
8136 FALSE);
079e9a2f 8137 if (sym.st_name == (unsigned long) -1)
ef10c3ac 8138 goto error_return;
079e9a2f 8139 }
252b5132 8140
079e9a2f 8141 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 8142
079e9a2f
AM
8143 if ((flags & BSF_SECTION_SYM) == 0
8144 && bfd_is_com_section (syms[idx]->section))
8145 {
8146 /* ELF common symbols put the alignment into the `value' field,
8147 and the size into the `size' field. This is backwards from
8148 how BFD handles it, so reverse it here. */
8149 sym.st_size = value;
8150 if (type_ptr == NULL
8151 || type_ptr->internal_elf_sym.st_value == 0)
8152 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
8153 else
8154 sym.st_value = type_ptr->internal_elf_sym.st_value;
8155 sym.st_shndx = _bfd_elf_section_from_bfd_section
8156 (abfd, syms[idx]->section);
8157 }
8158 else
8159 {
8160 asection *sec = syms[idx]->section;
cb33740c 8161 unsigned int shndx;
252b5132 8162
079e9a2f
AM
8163 if (sec->output_section)
8164 {
8165 value += sec->output_offset;
8166 sec = sec->output_section;
8167 }
589e6347 8168
079e9a2f
AM
8169 /* Don't add in the section vma for relocatable output. */
8170 if (! relocatable_p)
8171 value += sec->vma;
8172 sym.st_value = value;
8173 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
8174
8175 if (bfd_is_abs_section (sec)
8176 && type_ptr != NULL
8177 && type_ptr->internal_elf_sym.st_shndx != 0)
8178 {
8179 /* This symbol is in a real ELF section which we did
8180 not create as a BFD section. Undo the mapping done
8181 by copy_private_symbol_data. */
8182 shndx = type_ptr->internal_elf_sym.st_shndx;
8183 switch (shndx)
8184 {
8185 case MAP_ONESYMTAB:
8186 shndx = elf_onesymtab (abfd);
8187 break;
8188 case MAP_DYNSYMTAB:
8189 shndx = elf_dynsymtab (abfd);
8190 break;
8191 case MAP_STRTAB:
12bd6957 8192 shndx = elf_strtab_sec (abfd);
079e9a2f
AM
8193 break;
8194 case MAP_SHSTRTAB:
12bd6957 8195 shndx = elf_shstrtab_sec (abfd);
079e9a2f 8196 break;
9ad5cbcf 8197 case MAP_SYM_SHNDX:
6a40cf0c
NC
8198 if (elf_symtab_shndx_list (abfd))
8199 shndx = elf_symtab_shndx_list (abfd)->ndx;
9ad5cbcf 8200 break;
00e49dff
NC
8201 case SHN_COMMON:
8202 case SHN_ABS:
15bc576a 8203 shndx = SHN_ABS;
079e9a2f 8204 break;
00e49dff
NC
8205 default:
8206 if (shndx >= SHN_LOPROC && shndx <= SHN_HIOS)
8207 {
8208 if (bed->symbol_section_index)
8209 shndx = bed->symbol_section_index (abfd, type_ptr);
8210 /* Otherwise just leave the index alone. */
8211 }
8212 else
8213 {
8214 if (shndx > SHN_HIOS && shndx < SHN_HIRESERVE)
8215 _bfd_error_handler (_("%pB: \
8216Unable to handle section index %x in ELF symbol. Using ABS instead."),
8217 abfd, shndx);
8218 shndx = SHN_ABS;
8219 }
8220 break;
079e9a2f
AM
8221 }
8222 }
8223 else
8224 {
8225 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 8226
cb33740c 8227 if (shndx == SHN_BAD)
079e9a2f
AM
8228 {
8229 asection *sec2;
8230
8231 /* Writing this would be a hell of a lot easier if
8232 we had some decent documentation on bfd, and
8233 knew what to expect of the library, and what to
8234 demand of applications. For example, it
8235 appears that `objcopy' might not set the
8236 section of a symbol to be a section that is
8237 actually in the output file. */
8238 sec2 = bfd_get_section_by_name (abfd, sec->name);
5df1bc57
AM
8239 if (sec2 != NULL)
8240 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
8241 if (shndx == SHN_BAD)
589e6347 8242 {
695344c0 8243 /* xgettext:c-format */
9793eb77
AM
8244 _bfd_error_handler
8245 (_("unable to find equivalent output section"
8246 " for symbol '%s' from section '%s'"),
8247 syms[idx]->name ? syms[idx]->name : "<Local sym>",
8248 sec->name);
811072d8 8249 bfd_set_error (bfd_error_invalid_operation);
ef10c3ac 8250 goto error_return;
589e6347 8251 }
079e9a2f
AM
8252 }
8253 }
252b5132 8254
079e9a2f
AM
8255 sym.st_shndx = shndx;
8256 }
252b5132 8257
13ae64f3
JJ
8258 if ((flags & BSF_THREAD_LOCAL) != 0)
8259 type = STT_TLS;
d8045f23
NC
8260 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
8261 type = STT_GNU_IFUNC;
13ae64f3 8262 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
8263 type = STT_FUNC;
8264 else if ((flags & BSF_OBJECT) != 0)
8265 type = STT_OBJECT;
d9352518
DB
8266 else if ((flags & BSF_RELC) != 0)
8267 type = STT_RELC;
8268 else if ((flags & BSF_SRELC) != 0)
8269 type = STT_SRELC;
079e9a2f
AM
8270 else
8271 type = STT_NOTYPE;
252b5132 8272
13ae64f3
JJ
8273 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
8274 type = STT_TLS;
8275
589e6347 8276 /* Processor-specific types. */
079e9a2f
AM
8277 if (type_ptr != NULL
8278 && bed->elf_backend_get_symbol_type)
8279 type = ((*bed->elf_backend_get_symbol_type)
8280 (&type_ptr->internal_elf_sym, type));
252b5132 8281
079e9a2f
AM
8282 if (flags & BSF_SECTION_SYM)
8283 {
8284 if (flags & BSF_GLOBAL)
8285 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
8286 else
8287 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8288 }
8289 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 8290 {
b8871f35
L
8291 if (type != STT_TLS)
8292 {
8293 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
8294 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
8295 ? STT_COMMON : STT_OBJECT);
8296 else
8297 type = ((flags & BSF_ELF_COMMON) != 0
8298 ? STT_COMMON : STT_OBJECT);
8299 }
8300 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 8301 }
079e9a2f
AM
8302 else if (bfd_is_und_section (syms[idx]->section))
8303 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
8304 ? STB_WEAK
8305 : STB_GLOBAL),
8306 type);
8307 else if (flags & BSF_FILE)
8308 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
8309 else
8310 {
8311 int bind = STB_LOCAL;
252b5132 8312
079e9a2f
AM
8313 if (flags & BSF_LOCAL)
8314 bind = STB_LOCAL;
3e7a7d11
NC
8315 else if (flags & BSF_GNU_UNIQUE)
8316 bind = STB_GNU_UNIQUE;
079e9a2f
AM
8317 else if (flags & BSF_WEAK)
8318 bind = STB_WEAK;
8319 else if (flags & BSF_GLOBAL)
8320 bind = STB_GLOBAL;
252b5132 8321
079e9a2f
AM
8322 sym.st_info = ELF_ST_INFO (bind, type);
8323 }
252b5132 8324
079e9a2f 8325 if (type_ptr != NULL)
35fc36a8
RS
8326 {
8327 sym.st_other = type_ptr->internal_elf_sym.st_other;
8328 sym.st_target_internal
8329 = type_ptr->internal_elf_sym.st_target_internal;
8330 }
079e9a2f 8331 else
35fc36a8
RS
8332 {
8333 sym.st_other = 0;
8334 sym.st_target_internal = 0;
8335 }
252b5132 8336
ef10c3ac
L
8337 idx++;
8338 symstrtab[idx].sym = sym;
8339 symstrtab[idx].dest_index = outbound_syms_index;
8340 symstrtab[idx].destshndx_index = outbound_shndx_index;
8341
8342 outbound_syms_index++;
9ad5cbcf 8343 if (outbound_shndx != NULL)
ef10c3ac
L
8344 outbound_shndx_index++;
8345 }
8346
8347 /* Finalize the .strtab section. */
8348 _bfd_elf_strtab_finalize (stt);
8349
8350 /* Swap out the .strtab section. */
8351 for (idx = 0; idx <= symcount; idx++)
8352 {
8353 struct elf_sym_strtab *elfsym = &symstrtab[idx];
8354 if (elfsym->sym.st_name == (unsigned long) -1)
8355 elfsym->sym.st_name = 0;
8356 else
8357 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
8358 elfsym->sym.st_name);
8359 bed->s->swap_symbol_out (abfd, &elfsym->sym,
8360 (outbound_syms
8361 + (elfsym->dest_index
8362 * bed->s->sizeof_sym)),
8363 (outbound_shndx
8364 + (elfsym->destshndx_index
8365 * sizeof (Elf_External_Sym_Shndx))));
079e9a2f 8366 }
ef10c3ac 8367 free (symstrtab);
252b5132 8368
079e9a2f 8369 *sttp = stt;
ef10c3ac 8370 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
079e9a2f 8371 symstrtab_hdr->sh_type = SHT_STRTAB;
84865015 8372 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
079e9a2f
AM
8373 symstrtab_hdr->sh_addr = 0;
8374 symstrtab_hdr->sh_entsize = 0;
8375 symstrtab_hdr->sh_link = 0;
8376 symstrtab_hdr->sh_info = 0;
8377 symstrtab_hdr->sh_addralign = 1;
252b5132 8378
b34976b6 8379 return TRUE;
252b5132
RH
8380}
8381
8382/* Return the number of bytes required to hold the symtab vector.
8383
8384 Note that we base it on the count plus 1, since we will null terminate
8385 the vector allocated based on this size. However, the ELF symbol table
8386 always has a dummy entry as symbol #0, so it ends up even. */
8387
8388long
217aa764 8389_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132 8390{
3a551c7a 8391 bfd_size_type symcount;
252b5132
RH
8392 long symtab_size;
8393 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
8394
8395 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
3a551c7a
AM
8396 if (symcount >= LONG_MAX / sizeof (asymbol *))
8397 {
8398 bfd_set_error (bfd_error_file_too_big);
8399 return -1;
8400 }
b99d1833
AM
8401 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8402 if (symcount > 0)
8403 symtab_size -= sizeof (asymbol *);
252b5132
RH
8404
8405 return symtab_size;
8406}
8407
8408long
217aa764 8409_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132 8410{
3a551c7a 8411 bfd_size_type symcount;
252b5132
RH
8412 long symtab_size;
8413 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
8414
8415 if (elf_dynsymtab (abfd) == 0)
8416 {
8417 bfd_set_error (bfd_error_invalid_operation);
8418 return -1;
8419 }
8420
8421 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
3a551c7a
AM
8422 if (symcount >= LONG_MAX / sizeof (asymbol *))
8423 {
8424 bfd_set_error (bfd_error_file_too_big);
8425 return -1;
8426 }
b99d1833
AM
8427 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8428 if (symcount > 0)
8429 symtab_size -= sizeof (asymbol *);
252b5132
RH
8430
8431 return symtab_size;
8432}
8433
8434long
217aa764
AM
8435_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
8436 sec_ptr asect)
252b5132 8437{
242a1159 8438#if SIZEOF_LONG == SIZEOF_INT
7a6e0d89
AM
8439 if (asect->reloc_count >= LONG_MAX / sizeof (arelent *))
8440 {
8441 bfd_set_error (bfd_error_file_too_big);
8442 return -1;
8443 }
242a1159 8444#endif
252b5132
RH
8445 return (asect->reloc_count + 1) * sizeof (arelent *);
8446}
8447
8448/* Canonicalize the relocs. */
8449
8450long
217aa764
AM
8451_bfd_elf_canonicalize_reloc (bfd *abfd,
8452 sec_ptr section,
8453 arelent **relptr,
8454 asymbol **symbols)
252b5132
RH
8455{
8456 arelent *tblptr;
8457 unsigned int i;
9c5bfbb7 8458 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 8459
b34976b6 8460 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
8461 return -1;
8462
8463 tblptr = section->relocation;
8464 for (i = 0; i < section->reloc_count; i++)
8465 *relptr++ = tblptr++;
8466
8467 *relptr = NULL;
8468
8469 return section->reloc_count;
8470}
8471
8472long
6cee3f79 8473_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 8474{
9c5bfbb7 8475 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 8476 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
8477
8478 if (symcount >= 0)
ed48ec2e 8479 abfd->symcount = symcount;
252b5132
RH
8480 return symcount;
8481}
8482
8483long
217aa764
AM
8484_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
8485 asymbol **allocation)
252b5132 8486{
9c5bfbb7 8487 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 8488 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
8489
8490 if (symcount >= 0)
ed48ec2e 8491 abfd->dynsymcount = symcount;
1f70368c 8492 return symcount;
252b5132
RH
8493}
8494
8615f3f2
AM
8495/* Return the size required for the dynamic reloc entries. Any loadable
8496 section that was actually installed in the BFD, and has type SHT_REL
8497 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
8498 dynamic reloc section. */
252b5132
RH
8499
8500long
217aa764 8501_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132 8502{
3a551c7a 8503 bfd_size_type count;
252b5132
RH
8504 asection *s;
8505
8506 if (elf_dynsymtab (abfd) == 0)
8507 {
8508 bfd_set_error (bfd_error_invalid_operation);
8509 return -1;
8510 }
8511
3a551c7a 8512 count = 1;
252b5132 8513 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 8514 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
8515 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8516 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
3a551c7a
AM
8517 {
8518 count += s->size / elf_section_data (s)->this_hdr.sh_entsize;
8519 if (count > LONG_MAX / sizeof (arelent *))
8520 {
8521 bfd_set_error (bfd_error_file_too_big);
8522 return -1;
8523 }
8524 }
8525 return count * sizeof (arelent *);
252b5132
RH
8526}
8527
8615f3f2
AM
8528/* Canonicalize the dynamic relocation entries. Note that we return the
8529 dynamic relocations as a single block, although they are actually
8530 associated with particular sections; the interface, which was
8531 designed for SunOS style shared libraries, expects that there is only
8532 one set of dynamic relocs. Any loadable section that was actually
8533 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8534 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
8535
8536long
217aa764
AM
8537_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
8538 arelent **storage,
8539 asymbol **syms)
252b5132 8540{
217aa764 8541 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
8542 asection *s;
8543 long ret;
8544
8545 if (elf_dynsymtab (abfd) == 0)
8546 {
8547 bfd_set_error (bfd_error_invalid_operation);
8548 return -1;
8549 }
8550
8551 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
8552 ret = 0;
8553 for (s = abfd->sections; s != NULL; s = s->next)
8554 {
266b05cf 8555 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
8556 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8557 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8558 {
8559 arelent *p;
8560 long count, i;
8561
b34976b6 8562 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 8563 return -1;
eea6121a 8564 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
8565 p = s->relocation;
8566 for (i = 0; i < count; i++)
8567 *storage++ = p++;
8568 ret += count;
8569 }
8570 }
8571
8572 *storage = NULL;
8573
8574 return ret;
8575}
8576\f
8577/* Read in the version information. */
8578
b34976b6 8579bfd_boolean
fc0e6df6 8580_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
8581{
8582 bfd_byte *contents = NULL;
fc0e6df6 8583 unsigned int freeidx = 0;
1f4361a7 8584 size_t amt;
fc0e6df6
PB
8585
8586 if (elf_dynverref (abfd) != 0)
8587 {
8588 Elf_Internal_Shdr *hdr;
8589 Elf_External_Verneed *everneed;
8590 Elf_Internal_Verneed *iverneed;
8591 unsigned int i;
d0fb9a8d 8592 bfd_byte *contents_end;
fc0e6df6
PB
8593
8594 hdr = &elf_tdata (abfd)->dynverref_hdr;
8595
bd61e135
AM
8596 if (hdr->sh_info == 0
8597 || hdr->sh_info > hdr->sh_size / sizeof (Elf_External_Verneed))
d0fb9a8d 8598 {
dc1e8a47 8599 error_return_bad_verref:
4eca0228 8600 _bfd_error_handler
871b3ab2 8601 (_("%pB: .gnu.version_r invalid entry"), abfd);
601a03ba 8602 bfd_set_error (bfd_error_bad_value);
dc1e8a47 8603 error_return_verref:
d0fb9a8d
JJ
8604 elf_tdata (abfd)->verref = NULL;
8605 elf_tdata (abfd)->cverrefs = 0;
8606 goto error_return;
8607 }
601a03ba 8608
2bb3687b
AM
8609 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8610 goto error_return_verref;
8611 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8612 if (contents == NULL)
d0fb9a8d 8613 goto error_return_verref;
fc0e6df6 8614
1f4361a7
AM
8615 if (_bfd_mul_overflow (hdr->sh_info, sizeof (Elf_Internal_Verneed), &amt))
8616 {
8617 bfd_set_error (bfd_error_file_too_big);
8618 goto error_return_verref;
8619 }
8620 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *) bfd_alloc (abfd, amt);
601a03ba 8621 if (elf_tdata (abfd)->verref == NULL)
d0fb9a8d
JJ
8622 goto error_return_verref;
8623
8624 BFD_ASSERT (sizeof (Elf_External_Verneed)
8625 == sizeof (Elf_External_Vernaux));
8626 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
8627 everneed = (Elf_External_Verneed *) contents;
8628 iverneed = elf_tdata (abfd)->verref;
8629 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8630 {
8631 Elf_External_Vernaux *evernaux;
8632 Elf_Internal_Vernaux *ivernaux;
8633 unsigned int j;
8634
8635 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8636
8637 iverneed->vn_bfd = abfd;
8638
8639 iverneed->vn_filename =
8640 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8641 iverneed->vn_file);
8642 if (iverneed->vn_filename == NULL)
601a03ba 8643 goto error_return_bad_verref;
fc0e6df6 8644
d0fb9a8d
JJ
8645 if (iverneed->vn_cnt == 0)
8646 iverneed->vn_auxptr = NULL;
8647 else
8648 {
1f4361a7
AM
8649 if (_bfd_mul_overflow (iverneed->vn_cnt,
8650 sizeof (Elf_Internal_Vernaux), &amt))
8651 {
8652 bfd_set_error (bfd_error_file_too_big);
8653 goto error_return_verref;
8654 }
a50b1753 8655 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
1f4361a7 8656 bfd_alloc (abfd, amt);
d0fb9a8d
JJ
8657 if (iverneed->vn_auxptr == NULL)
8658 goto error_return_verref;
8659 }
8660
8661 if (iverneed->vn_aux
8662 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8663 goto error_return_bad_verref;
fc0e6df6
PB
8664
8665 evernaux = ((Elf_External_Vernaux *)
8666 ((bfd_byte *) everneed + iverneed->vn_aux));
8667 ivernaux = iverneed->vn_auxptr;
8668 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8669 {
8670 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8671
8672 ivernaux->vna_nodename =
8673 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8674 ivernaux->vna_name);
8675 if (ivernaux->vna_nodename == NULL)
601a03ba 8676 goto error_return_bad_verref;
fc0e6df6 8677
25ff461f
AM
8678 if (ivernaux->vna_other > freeidx)
8679 freeidx = ivernaux->vna_other;
8680
8681 ivernaux->vna_nextptr = NULL;
8682 if (ivernaux->vna_next == 0)
8683 {
8684 iverneed->vn_cnt = j + 1;
8685 break;
8686 }
fc0e6df6
PB
8687 if (j + 1 < iverneed->vn_cnt)
8688 ivernaux->vna_nextptr = ivernaux + 1;
fc0e6df6 8689
d0fb9a8d
JJ
8690 if (ivernaux->vna_next
8691 > (size_t) (contents_end - (bfd_byte *) evernaux))
601a03ba 8692 goto error_return_bad_verref;
d0fb9a8d 8693
fc0e6df6
PB
8694 evernaux = ((Elf_External_Vernaux *)
8695 ((bfd_byte *) evernaux + ivernaux->vna_next));
fc0e6df6
PB
8696 }
8697
25ff461f
AM
8698 iverneed->vn_nextref = NULL;
8699 if (iverneed->vn_next == 0)
8700 break;
fc0e6df6
PB
8701 if (i + 1 < hdr->sh_info)
8702 iverneed->vn_nextref = iverneed + 1;
fc0e6df6 8703
d0fb9a8d
JJ
8704 if (iverneed->vn_next
8705 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8706 goto error_return_bad_verref;
d0fb9a8d 8707
fc0e6df6
PB
8708 everneed = ((Elf_External_Verneed *)
8709 ((bfd_byte *) everneed + iverneed->vn_next));
8710 }
25ff461f 8711 elf_tdata (abfd)->cverrefs = i;
fc0e6df6
PB
8712
8713 free (contents);
8714 contents = NULL;
8715 }
252b5132
RH
8716
8717 if (elf_dynverdef (abfd) != 0)
8718 {
8719 Elf_Internal_Shdr *hdr;
8720 Elf_External_Verdef *everdef;
8721 Elf_Internal_Verdef *iverdef;
f631889e
UD
8722 Elf_Internal_Verdef *iverdefarr;
8723 Elf_Internal_Verdef iverdefmem;
252b5132 8724 unsigned int i;
062e2358 8725 unsigned int maxidx;
d0fb9a8d 8726 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
8727
8728 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8729
601a03ba
AM
8730 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
8731 {
8732 error_return_bad_verdef:
4eca0228 8733 _bfd_error_handler
871b3ab2 8734 (_("%pB: .gnu.version_d invalid entry"), abfd);
601a03ba
AM
8735 bfd_set_error (bfd_error_bad_value);
8736 error_return_verdef:
8737 elf_tdata (abfd)->verdef = NULL;
8738 elf_tdata (abfd)->cverdefs = 0;
8739 goto error_return;
8740 }
8741
2bb3687b 8742 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
601a03ba 8743 goto error_return_verdef;
2bb3687b
AM
8744 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8745 if (contents == NULL)
601a03ba 8746 goto error_return_verdef;
d0fb9a8d
JJ
8747
8748 BFD_ASSERT (sizeof (Elf_External_Verdef)
8749 >= sizeof (Elf_External_Verdaux));
8750 contents_end_def = contents + hdr->sh_size
8751 - sizeof (Elf_External_Verdef);
8752 contents_end_aux = contents + hdr->sh_size
8753 - sizeof (Elf_External_Verdaux);
8754
f631889e
UD
8755 /* We know the number of entries in the section but not the maximum
8756 index. Therefore we have to run through all entries and find
8757 the maximum. */
252b5132 8758 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
8759 maxidx = 0;
8760 for (i = 0; i < hdr->sh_info; ++i)
8761 {
8762 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8763
601a03ba
AM
8764 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
8765 goto error_return_bad_verdef;
062e2358
AM
8766 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
8767 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 8768
25ff461f
AM
8769 if (iverdefmem.vd_next == 0)
8770 break;
8771
d0fb9a8d
JJ
8772 if (iverdefmem.vd_next
8773 > (size_t) (contents_end_def - (bfd_byte *) everdef))
601a03ba 8774 goto error_return_bad_verdef;
d0fb9a8d 8775
f631889e
UD
8776 everdef = ((Elf_External_Verdef *)
8777 ((bfd_byte *) everdef + iverdefmem.vd_next));
8778 }
8779
fc0e6df6
PB
8780 if (default_imported_symver)
8781 {
8782 if (freeidx > maxidx)
8783 maxidx = ++freeidx;
8784 else
8785 freeidx = ++maxidx;
8786 }
1f4361a7
AM
8787 if (_bfd_mul_overflow (maxidx, sizeof (Elf_Internal_Verdef), &amt))
8788 {
8789 bfd_set_error (bfd_error_file_too_big);
8790 goto error_return_verdef;
8791 }
8792 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
f631889e 8793 if (elf_tdata (abfd)->verdef == NULL)
601a03ba 8794 goto error_return_verdef;
f631889e
UD
8795
8796 elf_tdata (abfd)->cverdefs = maxidx;
8797
8798 everdef = (Elf_External_Verdef *) contents;
8799 iverdefarr = elf_tdata (abfd)->verdef;
8800 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
8801 {
8802 Elf_External_Verdaux *everdaux;
8803 Elf_Internal_Verdaux *iverdaux;
8804 unsigned int j;
8805
f631889e
UD
8806 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8807
d0fb9a8d 8808 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
601a03ba 8809 goto error_return_bad_verdef;
d0fb9a8d 8810
f631889e 8811 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
595bce75 8812 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
252b5132
RH
8813
8814 iverdef->vd_bfd = abfd;
8815
d0fb9a8d
JJ
8816 if (iverdef->vd_cnt == 0)
8817 iverdef->vd_auxptr = NULL;
8818 else
8819 {
1f4361a7
AM
8820 if (_bfd_mul_overflow (iverdef->vd_cnt,
8821 sizeof (Elf_Internal_Verdaux), &amt))
8822 {
8823 bfd_set_error (bfd_error_file_too_big);
8824 goto error_return_verdef;
8825 }
a50b1753 8826 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
1f4361a7 8827 bfd_alloc (abfd, amt);
d0fb9a8d
JJ
8828 if (iverdef->vd_auxptr == NULL)
8829 goto error_return_verdef;
8830 }
8831
8832 if (iverdef->vd_aux
8833 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
601a03ba 8834 goto error_return_bad_verdef;
252b5132
RH
8835
8836 everdaux = ((Elf_External_Verdaux *)
8837 ((bfd_byte *) everdef + iverdef->vd_aux));
8838 iverdaux = iverdef->vd_auxptr;
8839 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
8840 {
8841 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
8842
8843 iverdaux->vda_nodename =
8844 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8845 iverdaux->vda_name);
8846 if (iverdaux->vda_nodename == NULL)
601a03ba 8847 goto error_return_bad_verdef;
252b5132 8848
25ff461f
AM
8849 iverdaux->vda_nextptr = NULL;
8850 if (iverdaux->vda_next == 0)
8851 {
8852 iverdef->vd_cnt = j + 1;
8853 break;
8854 }
252b5132
RH
8855 if (j + 1 < iverdef->vd_cnt)
8856 iverdaux->vda_nextptr = iverdaux + 1;
252b5132 8857
d0fb9a8d
JJ
8858 if (iverdaux->vda_next
8859 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
601a03ba 8860 goto error_return_bad_verdef;
d0fb9a8d 8861
252b5132
RH
8862 everdaux = ((Elf_External_Verdaux *)
8863 ((bfd_byte *) everdaux + iverdaux->vda_next));
8864 }
8865
595bce75 8866 iverdef->vd_nodename = NULL;
d0fb9a8d
JJ
8867 if (iverdef->vd_cnt)
8868 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 8869
25ff461f
AM
8870 iverdef->vd_nextdef = NULL;
8871 if (iverdef->vd_next == 0)
8872 break;
d0fb9a8d 8873 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132 8874 iverdef->vd_nextdef = iverdef + 1;
252b5132
RH
8875
8876 everdef = ((Elf_External_Verdef *)
8877 ((bfd_byte *) everdef + iverdef->vd_next));
8878 }
8879
8880 free (contents);
8881 contents = NULL;
8882 }
fc0e6df6 8883 else if (default_imported_symver)
252b5132 8884 {
fc0e6df6
PB
8885 if (freeidx < 3)
8886 freeidx = 3;
8887 else
8888 freeidx++;
252b5132 8889
1f4361a7
AM
8890 if (_bfd_mul_overflow (freeidx, sizeof (Elf_Internal_Verdef), &amt))
8891 {
8892 bfd_set_error (bfd_error_file_too_big);
8893 goto error_return;
8894 }
8895 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
fc0e6df6 8896 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
8897 goto error_return;
8898
fc0e6df6
PB
8899 elf_tdata (abfd)->cverdefs = freeidx;
8900 }
252b5132 8901
fc0e6df6
PB
8902 /* Create a default version based on the soname. */
8903 if (default_imported_symver)
8904 {
8905 Elf_Internal_Verdef *iverdef;
8906 Elf_Internal_Verdaux *iverdaux;
252b5132 8907
5bb3703f 8908 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
252b5132 8909
fc0e6df6
PB
8910 iverdef->vd_version = VER_DEF_CURRENT;
8911 iverdef->vd_flags = 0;
8912 iverdef->vd_ndx = freeidx;
8913 iverdef->vd_cnt = 1;
252b5132 8914
fc0e6df6 8915 iverdef->vd_bfd = abfd;
252b5132 8916
fc0e6df6
PB
8917 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
8918 if (iverdef->vd_nodename == NULL)
d0fb9a8d 8919 goto error_return_verdef;
fc0e6df6 8920 iverdef->vd_nextdef = NULL;
601a03ba
AM
8921 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
8922 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
d0fb9a8d
JJ
8923 if (iverdef->vd_auxptr == NULL)
8924 goto error_return_verdef;
252b5132 8925
fc0e6df6
PB
8926 iverdaux = iverdef->vd_auxptr;
8927 iverdaux->vda_nodename = iverdef->vd_nodename;
252b5132
RH
8928 }
8929
b34976b6 8930 return TRUE;
252b5132
RH
8931
8932 error_return:
5ed6aba4 8933 if (contents != NULL)
252b5132 8934 free (contents);
b34976b6 8935 return FALSE;
252b5132
RH
8936}
8937\f
8938asymbol *
217aa764 8939_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
8940{
8941 elf_symbol_type *newsym;
8942
7a6e0d89 8943 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof (*newsym));
252b5132
RH
8944 if (!newsym)
8945 return NULL;
201159ec
NC
8946 newsym->symbol.the_bfd = abfd;
8947 return &newsym->symbol;
252b5132
RH
8948}
8949
8950void
217aa764
AM
8951_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
8952 asymbol *symbol,
8953 symbol_info *ret)
252b5132
RH
8954{
8955 bfd_symbol_info (symbol, ret);
8956}
8957
8958/* Return whether a symbol name implies a local symbol. Most targets
8959 use this function for the is_local_label_name entry point, but some
8960 override it. */
8961
b34976b6 8962bfd_boolean
217aa764
AM
8963_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
8964 const char *name)
252b5132
RH
8965{
8966 /* Normal local symbols start with ``.L''. */
8967 if (name[0] == '.' && name[1] == 'L')
b34976b6 8968 return TRUE;
252b5132
RH
8969
8970 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
8971 DWARF debugging symbols starting with ``..''. */
8972 if (name[0] == '.' && name[1] == '.')
b34976b6 8973 return TRUE;
252b5132
RH
8974
8975 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
8976 emitting DWARF debugging output. I suspect this is actually a
8977 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
8978 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
8979 underscore to be emitted on some ELF targets). For ease of use,
8980 we treat such symbols as local. */
8981 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 8982 return TRUE;
252b5132 8983
b1fa9dd6
NC
8984 /* Treat assembler generated fake symbols, dollar local labels and
8985 forward-backward labels (aka local labels) as locals.
8986 These labels have the form:
8987
07d6d2b8 8988 L0^A.* (fake symbols)
b1fa9dd6
NC
8989
8990 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
8991
8992 Versions which start with .L will have already been matched above,
8993 so we only need to match the rest. */
8994 if (name[0] == 'L' && ISDIGIT (name[1]))
8995 {
8996 bfd_boolean ret = FALSE;
8997 const char * p;
8998 char c;
8999
9000 for (p = name + 2; (c = *p); p++)
9001 {
9002 if (c == 1 || c == 2)
9003 {
9004 if (c == 1 && p == name + 2)
9005 /* A fake symbol. */
9006 return TRUE;
9007
9008 /* FIXME: We are being paranoid here and treating symbols like
9009 L0^Bfoo as if there were non-local, on the grounds that the
9010 assembler will never generate them. But can any symbol
9011 containing an ASCII value in the range 1-31 ever be anything
9012 other than some kind of local ? */
9013 ret = TRUE;
9014 }
9015
9016 if (! ISDIGIT (c))
9017 {
9018 ret = FALSE;
9019 break;
9020 }
9021 }
9022 return ret;
9023 }
ffa54770 9024
b34976b6 9025 return FALSE;
252b5132
RH
9026}
9027
9028alent *
217aa764
AM
9029_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
9030 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
9031{
9032 abort ();
9033 return NULL;
9034}
9035
b34976b6 9036bfd_boolean
217aa764
AM
9037_bfd_elf_set_arch_mach (bfd *abfd,
9038 enum bfd_architecture arch,
9039 unsigned long machine)
252b5132
RH
9040{
9041 /* If this isn't the right architecture for this backend, and this
9042 isn't the generic backend, fail. */
9043 if (arch != get_elf_backend_data (abfd)->arch
9044 && arch != bfd_arch_unknown
9045 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 9046 return FALSE;
252b5132
RH
9047
9048 return bfd_default_set_arch_mach (abfd, arch, machine);
9049}
9050
d1fad7c6
NC
9051/* Find the nearest line to a particular section and offset,
9052 for error reporting. */
9053
b34976b6 9054bfd_boolean
217aa764 9055_bfd_elf_find_nearest_line (bfd *abfd,
217aa764 9056 asymbol **symbols,
fb167eb2 9057 asection *section,
217aa764
AM
9058 bfd_vma offset,
9059 const char **filename_ptr,
9060 const char **functionname_ptr,
fb167eb2
AM
9061 unsigned int *line_ptr,
9062 unsigned int *discriminator_ptr)
d1fad7c6 9063{
b34976b6 9064 bfd_boolean found;
d1fad7c6 9065
fb167eb2 9066 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
4e8a9624 9067 filename_ptr, functionname_ptr,
fb167eb2 9068 line_ptr, discriminator_ptr,
9defd221 9069 dwarf_debug_sections,
e7679060
AM
9070 &elf_tdata (abfd)->dwarf2_find_line_info))
9071 return TRUE;
9072
9073 if (_bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
9074 filename_ptr, functionname_ptr, line_ptr))
d1fad7c6
NC
9075 {
9076 if (!*functionname_ptr)
e00e8198
AM
9077 _bfd_elf_find_function (abfd, symbols, section, offset,
9078 *filename_ptr ? NULL : filename_ptr,
9079 functionname_ptr);
b34976b6 9080 return TRUE;
d1fad7c6
NC
9081 }
9082
9083 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
9084 &found, filename_ptr,
9085 functionname_ptr, line_ptr,
9086 &elf_tdata (abfd)->line_info))
b34976b6 9087 return FALSE;
dc43ada5 9088 if (found && (*functionname_ptr || *line_ptr))
b34976b6 9089 return TRUE;
d1fad7c6
NC
9090
9091 if (symbols == NULL)
b34976b6 9092 return FALSE;
d1fad7c6 9093
e00e8198
AM
9094 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
9095 filename_ptr, functionname_ptr))
b34976b6 9096 return FALSE;
d1fad7c6 9097
252b5132 9098 *line_ptr = 0;
b34976b6 9099 return TRUE;
252b5132
RH
9100}
9101
5420f73d
L
9102/* Find the line for a symbol. */
9103
9104bfd_boolean
9105_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
9106 const char **filename_ptr, unsigned int *line_ptr)
9b8d1a36 9107{
fb167eb2
AM
9108 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
9109 filename_ptr, NULL, line_ptr, NULL,
9defd221 9110 dwarf_debug_sections,
fb167eb2 9111 &elf_tdata (abfd)->dwarf2_find_line_info);
5420f73d
L
9112}
9113
4ab527b0
FF
9114/* After a call to bfd_find_nearest_line, successive calls to
9115 bfd_find_inliner_info can be used to get source information about
9116 each level of function inlining that terminated at the address
9117 passed to bfd_find_nearest_line. Currently this is only supported
9118 for DWARF2 with appropriate DWARF3 extensions. */
9119
9120bfd_boolean
9121_bfd_elf_find_inliner_info (bfd *abfd,
9122 const char **filename_ptr,
9123 const char **functionname_ptr,
9124 unsigned int *line_ptr)
9125{
9126 bfd_boolean found;
9127 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
9128 functionname_ptr, line_ptr,
9129 & elf_tdata (abfd)->dwarf2_find_line_info);
9130 return found;
9131}
9132
252b5132 9133int
a6b96beb 9134_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 9135{
8ded5a0f
AM
9136 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9137 int ret = bed->s->sizeof_ehdr;
252b5132 9138
0e1862bb 9139 if (!bfd_link_relocatable (info))
8ded5a0f 9140 {
12bd6957 9141 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 9142
62d7a5f6
AM
9143 if (phdr_size == (bfd_size_type) -1)
9144 {
9145 struct elf_segment_map *m;
9146
9147 phdr_size = 0;
12bd6957 9148 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62d7a5f6 9149 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 9150
62d7a5f6
AM
9151 if (phdr_size == 0)
9152 phdr_size = get_program_header_size (abfd, info);
9153 }
8ded5a0f 9154
12bd6957 9155 elf_program_header_size (abfd) = phdr_size;
8ded5a0f
AM
9156 ret += phdr_size;
9157 }
9158
252b5132
RH
9159 return ret;
9160}
9161
b34976b6 9162bfd_boolean
217aa764
AM
9163_bfd_elf_set_section_contents (bfd *abfd,
9164 sec_ptr section,
0f867abe 9165 const void *location,
217aa764
AM
9166 file_ptr offset,
9167 bfd_size_type count)
252b5132
RH
9168{
9169 Elf_Internal_Shdr *hdr;
1b6aeedb 9170 file_ptr pos;
252b5132
RH
9171
9172 if (! abfd->output_has_begun
217aa764 9173 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 9174 return FALSE;
252b5132 9175
0ce398f1
L
9176 if (!count)
9177 return TRUE;
9178
252b5132 9179 hdr = &elf_section_data (section)->this_hdr;
0ce398f1
L
9180 if (hdr->sh_offset == (file_ptr) -1)
9181 {
1ff6de03
NA
9182 if (bfd_section_is_ctf (section))
9183 /* Nothing to do with this section: the contents are generated
9184 later. */
9185 return TRUE;
9186
0ce398f1
L
9187 /* We must compress this section. Write output to the buffer. */
9188 unsigned char *contents = hdr->contents;
9189 if ((offset + count) > hdr->sh_size
9190 || (section->flags & SEC_ELF_COMPRESS) == 0
9191 || contents == NULL)
9192 abort ();
9193 memcpy (contents + offset, location, count);
9194 return TRUE;
9195 }
dc810e39
AM
9196 pos = hdr->sh_offset + offset;
9197 if (bfd_seek (abfd, pos, SEEK_SET) != 0
9198 || bfd_bwrite (location, count, abfd) != count)
b34976b6 9199 return FALSE;
252b5132 9200
b34976b6 9201 return TRUE;
252b5132
RH
9202}
9203
f3185997 9204bfd_boolean
217aa764
AM
9205_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
9206 arelent *cache_ptr ATTRIBUTE_UNUSED,
9207 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
9208{
9209 abort ();
f3185997 9210 return FALSE;
252b5132
RH
9211}
9212
252b5132
RH
9213/* Try to convert a non-ELF reloc into an ELF one. */
9214
b34976b6 9215bfd_boolean
217aa764 9216_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 9217{
c044fabd 9218 /* Check whether we really have an ELF howto. */
252b5132
RH
9219
9220 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
9221 {
9222 bfd_reloc_code_real_type code;
9223 reloc_howto_type *howto;
9224
9225 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 9226 equivalent ELF reloc. */
252b5132
RH
9227
9228 if (areloc->howto->pc_relative)
9229 {
9230 switch (areloc->howto->bitsize)
9231 {
9232 case 8:
9233 code = BFD_RELOC_8_PCREL;
9234 break;
9235 case 12:
9236 code = BFD_RELOC_12_PCREL;
9237 break;
9238 case 16:
9239 code = BFD_RELOC_16_PCREL;
9240 break;
9241 case 24:
9242 code = BFD_RELOC_24_PCREL;
9243 break;
9244 case 32:
9245 code = BFD_RELOC_32_PCREL;
9246 break;
9247 case 64:
9248 code = BFD_RELOC_64_PCREL;
9249 break;
9250 default:
9251 goto fail;
9252 }
9253
9254 howto = bfd_reloc_type_lookup (abfd, code);
9255
94698d01 9256 if (howto && areloc->howto->pcrel_offset != howto->pcrel_offset)
252b5132
RH
9257 {
9258 if (howto->pcrel_offset)
9259 areloc->addend += areloc->address;
9260 else
9261 areloc->addend -= areloc->address; /* addend is unsigned!! */
9262 }
9263 }
9264 else
9265 {
9266 switch (areloc->howto->bitsize)
9267 {
9268 case 8:
9269 code = BFD_RELOC_8;
9270 break;
9271 case 14:
9272 code = BFD_RELOC_14;
9273 break;
9274 case 16:
9275 code = BFD_RELOC_16;
9276 break;
9277 case 26:
9278 code = BFD_RELOC_26;
9279 break;
9280 case 32:
9281 code = BFD_RELOC_32;
9282 break;
9283 case 64:
9284 code = BFD_RELOC_64;
9285 break;
9286 default:
9287 goto fail;
9288 }
9289
9290 howto = bfd_reloc_type_lookup (abfd, code);
9291 }
9292
9293 if (howto)
9294 areloc->howto = howto;
9295 else
9296 goto fail;
9297 }
9298
b34976b6 9299 return TRUE;
252b5132
RH
9300
9301 fail:
0aa13fee
AM
9302 /* xgettext:c-format */
9303 _bfd_error_handler (_("%pB: %s unsupported"),
9304 abfd, areloc->howto->name);
9aea1e31 9305 bfd_set_error (bfd_error_sorry);
b34976b6 9306 return FALSE;
252b5132
RH
9307}
9308
b34976b6 9309bfd_boolean
217aa764 9310_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132 9311{
d9071b0c
TG
9312 struct elf_obj_tdata *tdata = elf_tdata (abfd);
9313 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
252b5132 9314 {
c0355132 9315 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 9316 _bfd_elf_strtab_free (elf_shstrtab (abfd));
d9071b0c 9317 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
252b5132
RH
9318 }
9319
9320 return _bfd_generic_close_and_cleanup (abfd);
9321}
9322
9323/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
9324 in the relocation's offset. Thus we cannot allow any sort of sanity
9325 range-checking to interfere. There is nothing else to do in processing
9326 this reloc. */
9327
9328bfd_reloc_status_type
217aa764
AM
9329_bfd_elf_rel_vtable_reloc_fn
9330 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 9331 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
9332 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
9333 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
9334{
9335 return bfd_reloc_ok;
9336}
252b5132
RH
9337\f
9338/* Elf core file support. Much of this only works on native
9339 toolchains, since we rely on knowing the
9340 machine-dependent procfs structure in order to pick
c044fabd 9341 out details about the corefile. */
252b5132
RH
9342
9343#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
9344/* Needed for new procfs interface on sparc-solaris. */
9345# define _STRUCTURED_PROC 1
252b5132
RH
9346# include <sys/procfs.h>
9347#endif
9348
261b8d08
PA
9349/* Return a PID that identifies a "thread" for threaded cores, or the
9350 PID of the main process for non-threaded cores. */
252b5132
RH
9351
9352static int
217aa764 9353elfcore_make_pid (bfd *abfd)
252b5132 9354{
261b8d08
PA
9355 int pid;
9356
228e534f 9357 pid = elf_tdata (abfd)->core->lwpid;
261b8d08 9358 if (pid == 0)
228e534f 9359 pid = elf_tdata (abfd)->core->pid;
261b8d08
PA
9360
9361 return pid;
252b5132
RH
9362}
9363
252b5132
RH
9364/* If there isn't a section called NAME, make one, using
9365 data from SECT. Note, this function will generate a
9366 reference to NAME, so you shouldn't deallocate or
c044fabd 9367 overwrite it. */
252b5132 9368
b34976b6 9369static bfd_boolean
217aa764 9370elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 9371{
c044fabd 9372 asection *sect2;
252b5132
RH
9373
9374 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 9375 return TRUE;
252b5132 9376
117ed4f8 9377 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 9378 if (sect2 == NULL)
b34976b6 9379 return FALSE;
252b5132 9380
eea6121a 9381 sect2->size = sect->size;
252b5132 9382 sect2->filepos = sect->filepos;
252b5132 9383 sect2->alignment_power = sect->alignment_power;
b34976b6 9384 return TRUE;
252b5132
RH
9385}
9386
bb0082d6
AM
9387/* Create a pseudosection containing SIZE bytes at FILEPOS. This
9388 actually creates up to two pseudosections:
9389 - For the single-threaded case, a section named NAME, unless
9390 such a section already exists.
9391 - For the multi-threaded case, a section named "NAME/PID", where
9392 PID is elfcore_make_pid (abfd).
24d3e51b 9393 Both pseudosections have identical contents. */
b34976b6 9394bfd_boolean
217aa764
AM
9395_bfd_elfcore_make_pseudosection (bfd *abfd,
9396 char *name,
9397 size_t size,
9398 ufile_ptr filepos)
bb0082d6
AM
9399{
9400 char buf[100];
9401 char *threaded_name;
d4c88bbb 9402 size_t len;
bb0082d6
AM
9403 asection *sect;
9404
9405 /* Build the section name. */
9406
9407 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 9408 len = strlen (buf) + 1;
a50b1753 9409 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 9410 if (threaded_name == NULL)
b34976b6 9411 return FALSE;
d4c88bbb 9412 memcpy (threaded_name, buf, len);
bb0082d6 9413
117ed4f8
AM
9414 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
9415 SEC_HAS_CONTENTS);
bb0082d6 9416 if (sect == NULL)
b34976b6 9417 return FALSE;
eea6121a 9418 sect->size = size;
bb0082d6 9419 sect->filepos = filepos;
bb0082d6
AM
9420 sect->alignment_power = 2;
9421
936e320b 9422 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
9423}
9424
58e07198
CZ
9425static bfd_boolean
9426elfcore_make_auxv_note_section (bfd *abfd, Elf_Internal_Note *note,
9427 size_t offs)
9428{
9429 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9430 SEC_HAS_CONTENTS);
9431
9432 if (sect == NULL)
9433 return FALSE;
9434
9435 sect->size = note->descsz - offs;
9436 sect->filepos = note->descpos + offs;
9437 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9438
9439 return TRUE;
9440}
9441
252b5132 9442/* prstatus_t exists on:
4a938328 9443 solaris 2.5+
252b5132
RH
9444 linux 2.[01] + glibc
9445 unixware 4.2
9446*/
9447
9448#if defined (HAVE_PRSTATUS_T)
a7b97311 9449
b34976b6 9450static bfd_boolean
217aa764 9451elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 9452{
eea6121a 9453 size_t size;
7ee38065 9454 int offset;
252b5132 9455
4a938328
MS
9456 if (note->descsz == sizeof (prstatus_t))
9457 {
9458 prstatus_t prstat;
252b5132 9459
eea6121a 9460 size = sizeof (prstat.pr_reg);
7ee38065 9461 offset = offsetof (prstatus_t, pr_reg);
4a938328 9462 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 9463
fa49d224
NC
9464 /* Do not overwrite the core signal if it
9465 has already been set by another thread. */
228e534f
AM
9466 if (elf_tdata (abfd)->core->signal == 0)
9467 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9468 if (elf_tdata (abfd)->core->pid == 0)
9469 elf_tdata (abfd)->core->pid = prstat.pr_pid;
252b5132 9470
4a938328
MS
9471 /* pr_who exists on:
9472 solaris 2.5+
9473 unixware 4.2
9474 pr_who doesn't exist on:
9475 linux 2.[01]
9476 */
252b5132 9477#if defined (HAVE_PRSTATUS_T_PR_WHO)
228e534f 9478 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 9479#else
228e534f 9480 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
252b5132 9481#endif
4a938328 9482 }
7ee38065 9483#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
9484 else if (note->descsz == sizeof (prstatus32_t))
9485 {
9486 /* 64-bit host, 32-bit corefile */
9487 prstatus32_t prstat;
9488
eea6121a 9489 size = sizeof (prstat.pr_reg);
7ee38065 9490 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
9491 memcpy (&prstat, note->descdata, sizeof (prstat));
9492
fa49d224
NC
9493 /* Do not overwrite the core signal if it
9494 has already been set by another thread. */
228e534f
AM
9495 if (elf_tdata (abfd)->core->signal == 0)
9496 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9497 if (elf_tdata (abfd)->core->pid == 0)
9498 elf_tdata (abfd)->core->pid = prstat.pr_pid;
4a938328
MS
9499
9500 /* pr_who exists on:
9501 solaris 2.5+
9502 unixware 4.2
9503 pr_who doesn't exist on:
9504 linux 2.[01]
9505 */
7ee38065 9506#if defined (HAVE_PRSTATUS32_T_PR_WHO)
228e534f 9507 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 9508#else
228e534f 9509 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
4a938328
MS
9510#endif
9511 }
7ee38065 9512#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
9513 else
9514 {
9515 /* Fail - we don't know how to handle any other
9516 note size (ie. data object type). */
b34976b6 9517 return TRUE;
4a938328 9518 }
252b5132 9519
bb0082d6 9520 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 9521 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 9522 size, note->descpos + offset);
252b5132
RH
9523}
9524#endif /* defined (HAVE_PRSTATUS_T) */
9525
bb0082d6 9526/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 9527static bfd_boolean
217aa764
AM
9528elfcore_make_note_pseudosection (bfd *abfd,
9529 char *name,
9530 Elf_Internal_Note *note)
252b5132 9531{
936e320b
AM
9532 return _bfd_elfcore_make_pseudosection (abfd, name,
9533 note->descsz, note->descpos);
252b5132
RH
9534}
9535
ff08c6bb
JB
9536/* There isn't a consistent prfpregset_t across platforms,
9537 but it doesn't matter, because we don't have to pick this
c044fabd
KH
9538 data structure apart. */
9539
b34976b6 9540static bfd_boolean
217aa764 9541elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
9542{
9543 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9544}
9545
ff08c6bb 9546/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 9547 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 9548 literally. */
c044fabd 9549
b34976b6 9550static bfd_boolean
217aa764 9551elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
9552{
9553 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9554}
9555
4339cae0
L
9556/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9557 with a note type of NT_X86_XSTATE. Just include the whole note's
9558 contents literally. */
9559
9560static bfd_boolean
9561elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
9562{
9563 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
9564}
9565
97753bd5
AM
9566static bfd_boolean
9567elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
9568{
9569 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
9570}
9571
89eeb0bc
LM
9572static bfd_boolean
9573elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
9574{
9575 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
9576}
97753bd5 9577
cb2366c1
EBM
9578static bfd_boolean
9579elfcore_grok_ppc_tar (bfd *abfd, Elf_Internal_Note *note)
9580{
9581 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tar", note);
9582}
9583
9584static bfd_boolean
9585elfcore_grok_ppc_ppr (bfd *abfd, Elf_Internal_Note *note)
9586{
9587 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ppr", note);
9588}
9589
9590static bfd_boolean
9591elfcore_grok_ppc_dscr (bfd *abfd, Elf_Internal_Note *note)
9592{
9593 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-dscr", note);
9594}
9595
9596static bfd_boolean
9597elfcore_grok_ppc_ebb (bfd *abfd, Elf_Internal_Note *note)
9598{
9599 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ebb", note);
9600}
9601
9602static bfd_boolean
9603elfcore_grok_ppc_pmu (bfd *abfd, Elf_Internal_Note *note)
9604{
9605 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-pmu", note);
9606}
9607
9608static bfd_boolean
9609elfcore_grok_ppc_tm_cgpr (bfd *abfd, Elf_Internal_Note *note)
9610{
9611 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cgpr", note);
9612}
9613
9614static bfd_boolean
9615elfcore_grok_ppc_tm_cfpr (bfd *abfd, Elf_Internal_Note *note)
9616{
9617 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cfpr", note);
9618}
9619
9620static bfd_boolean
9621elfcore_grok_ppc_tm_cvmx (bfd *abfd, Elf_Internal_Note *note)
9622{
9623 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvmx", note);
9624}
9625
9626static bfd_boolean
9627elfcore_grok_ppc_tm_cvsx (bfd *abfd, Elf_Internal_Note *note)
9628{
9629 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvsx", note);
9630}
9631
9632static bfd_boolean
9633elfcore_grok_ppc_tm_spr (bfd *abfd, Elf_Internal_Note *note)
9634{
9635 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-spr", note);
9636}
9637
9638static bfd_boolean
9639elfcore_grok_ppc_tm_ctar (bfd *abfd, Elf_Internal_Note *note)
9640{
9641 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-ctar", note);
9642}
9643
9644static bfd_boolean
9645elfcore_grok_ppc_tm_cppr (bfd *abfd, Elf_Internal_Note *note)
9646{
9647 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cppr", note);
9648}
9649
9650static bfd_boolean
9651elfcore_grok_ppc_tm_cdscr (bfd *abfd, Elf_Internal_Note *note)
9652{
9653 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cdscr", note);
9654}
9655
0675e188
UW
9656static bfd_boolean
9657elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
9658{
9659 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
9660}
9661
d7eeb400
MS
9662static bfd_boolean
9663elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
9664{
9665 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
9666}
9667
9668static bfd_boolean
9669elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
9670{
9671 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
9672}
9673
9674static bfd_boolean
9675elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
9676{
9677 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
9678}
9679
9680static bfd_boolean
9681elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
9682{
9683 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
9684}
9685
9686static bfd_boolean
9687elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9688{
9689 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9690}
9691
355b81d9
UW
9692static bfd_boolean
9693elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9694{
9695 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9696}
9697
9698static bfd_boolean
9699elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9700{
9701 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9702}
9703
abb3f6cc
NC
9704static bfd_boolean
9705elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9706{
9707 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9708}
9709
4ef9f41a
AA
9710static bfd_boolean
9711elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
9712{
9713 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
9714}
9715
9716static bfd_boolean
9717elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
9718{
9719 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
9720}
9721
88ab90e8
AA
9722static bfd_boolean
9723elfcore_grok_s390_gs_cb (bfd *abfd, Elf_Internal_Note *note)
9724{
9725 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-cb", note);
9726}
9727
9728static bfd_boolean
9729elfcore_grok_s390_gs_bc (bfd *abfd, Elf_Internal_Note *note)
9730{
9731 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-bc", note);
9732}
9733
faa9a424
UW
9734static bfd_boolean
9735elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
9736{
9737 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
9738}
9739
652451f8
YZ
9740static bfd_boolean
9741elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
9742{
9743 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
9744}
9745
9746static bfd_boolean
9747elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
9748{
9749 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
9750}
9751
9752static bfd_boolean
9753elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
9754{
9755 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
9756}
9757
ad1cc4e4
AH
9758static bfd_boolean
9759elfcore_grok_aarch_sve (bfd *abfd, Elf_Internal_Note *note)
9760{
9761 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-sve", note);
9762}
9763
e6c3b5bf
AH
9764static bfd_boolean
9765elfcore_grok_aarch_pauth (bfd *abfd, Elf_Internal_Note *note)
9766{
9767 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-pauth", note);
9768}
9769
252b5132 9770#if defined (HAVE_PRPSINFO_T)
4a938328 9771typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 9772#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9773typedef prpsinfo32_t elfcore_psinfo32_t;
9774#endif
252b5132
RH
9775#endif
9776
9777#if defined (HAVE_PSINFO_T)
4a938328 9778typedef psinfo_t elfcore_psinfo_t;
7ee38065 9779#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9780typedef psinfo32_t elfcore_psinfo32_t;
9781#endif
252b5132
RH
9782#endif
9783
252b5132
RH
9784/* return a malloc'ed copy of a string at START which is at
9785 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 9786 the copy will always have a terminating '\0'. */
252b5132 9787
936e320b 9788char *
217aa764 9789_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 9790{
dc810e39 9791 char *dups;
a50b1753 9792 char *end = (char *) memchr (start, '\0', max);
dc810e39 9793 size_t len;
252b5132
RH
9794
9795 if (end == NULL)
9796 len = max;
9797 else
9798 len = end - start;
9799
a50b1753 9800 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 9801 if (dups == NULL)
252b5132
RH
9802 return NULL;
9803
dc810e39
AM
9804 memcpy (dups, start, len);
9805 dups[len] = '\0';
252b5132 9806
dc810e39 9807 return dups;
252b5132
RH
9808}
9809
bb0082d6 9810#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 9811static bfd_boolean
217aa764 9812elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 9813{
4a938328
MS
9814 if (note->descsz == sizeof (elfcore_psinfo_t))
9815 {
9816 elfcore_psinfo_t psinfo;
252b5132 9817
7ee38065 9818 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9819
335e41d4 9820#if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
228e534f 9821 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9822#endif
228e534f 9823 elf_tdata (abfd)->core->program
936e320b
AM
9824 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9825 sizeof (psinfo.pr_fname));
252b5132 9826
228e534f 9827 elf_tdata (abfd)->core->command
936e320b
AM
9828 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9829 sizeof (psinfo.pr_psargs));
4a938328 9830 }
7ee38065 9831#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
9832 else if (note->descsz == sizeof (elfcore_psinfo32_t))
9833 {
9834 /* 64-bit host, 32-bit corefile */
9835 elfcore_psinfo32_t psinfo;
9836
7ee38065 9837 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9838
335e41d4 9839#if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
228e534f 9840 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9841#endif
228e534f 9842 elf_tdata (abfd)->core->program
936e320b
AM
9843 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9844 sizeof (psinfo.pr_fname));
4a938328 9845
228e534f 9846 elf_tdata (abfd)->core->command
936e320b
AM
9847 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9848 sizeof (psinfo.pr_psargs));
4a938328
MS
9849 }
9850#endif
9851
9852 else
9853 {
9854 /* Fail - we don't know how to handle any other
9855 note size (ie. data object type). */
b34976b6 9856 return TRUE;
4a938328 9857 }
252b5132
RH
9858
9859 /* Note that for some reason, a spurious space is tacked
9860 onto the end of the args in some (at least one anyway)
c044fabd 9861 implementations, so strip it off if it exists. */
252b5132
RH
9862
9863 {
228e534f 9864 char *command = elf_tdata (abfd)->core->command;
252b5132
RH
9865 int n = strlen (command);
9866
9867 if (0 < n && command[n - 1] == ' ')
9868 command[n - 1] = '\0';
9869 }
9870
b34976b6 9871 return TRUE;
252b5132
RH
9872}
9873#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
9874
252b5132 9875#if defined (HAVE_PSTATUS_T)
b34976b6 9876static bfd_boolean
217aa764 9877elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 9878{
f572a39d
AM
9879 if (note->descsz == sizeof (pstatus_t)
9880#if defined (HAVE_PXSTATUS_T)
9881 || note->descsz == sizeof (pxstatus_t)
9882#endif
9883 )
4a938328
MS
9884 {
9885 pstatus_t pstat;
252b5132 9886
4a938328 9887 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9888
228e534f 9889 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328 9890 }
7ee38065 9891#if defined (HAVE_PSTATUS32_T)
4a938328
MS
9892 else if (note->descsz == sizeof (pstatus32_t))
9893 {
9894 /* 64-bit host, 32-bit corefile */
9895 pstatus32_t pstat;
252b5132 9896
4a938328 9897 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9898
228e534f 9899 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328
MS
9900 }
9901#endif
252b5132
RH
9902 /* Could grab some more details from the "representative"
9903 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 9904 NT_LWPSTATUS note, presumably. */
252b5132 9905
b34976b6 9906 return TRUE;
252b5132
RH
9907}
9908#endif /* defined (HAVE_PSTATUS_T) */
9909
252b5132 9910#if defined (HAVE_LWPSTATUS_T)
b34976b6 9911static bfd_boolean
217aa764 9912elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
9913{
9914 lwpstatus_t lwpstat;
9915 char buf[100];
c044fabd 9916 char *name;
d4c88bbb 9917 size_t len;
c044fabd 9918 asection *sect;
252b5132 9919
f572a39d
AM
9920 if (note->descsz != sizeof (lwpstat)
9921#if defined (HAVE_LWPXSTATUS_T)
9922 && note->descsz != sizeof (lwpxstatus_t)
9923#endif
9924 )
b34976b6 9925 return TRUE;
252b5132
RH
9926
9927 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
9928
228e534f 9929 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
a1504221
JB
9930 /* Do not overwrite the core signal if it has already been set by
9931 another thread. */
228e534f
AM
9932 if (elf_tdata (abfd)->core->signal == 0)
9933 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
252b5132 9934
c044fabd 9935 /* Make a ".reg/999" section. */
252b5132
RH
9936
9937 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 9938 len = strlen (buf) + 1;
217aa764 9939 name = bfd_alloc (abfd, len);
252b5132 9940 if (name == NULL)
b34976b6 9941 return FALSE;
d4c88bbb 9942 memcpy (name, buf, len);
252b5132 9943
117ed4f8 9944 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9945 if (sect == NULL)
b34976b6 9946 return FALSE;
252b5132
RH
9947
9948#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9949 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
9950 sect->filepos = note->descpos
9951 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
9952#endif
9953
9954#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 9955 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
9956 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
9957#endif
9958
252b5132
RH
9959 sect->alignment_power = 2;
9960
9961 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9962 return FALSE;
252b5132
RH
9963
9964 /* Make a ".reg2/999" section */
9965
9966 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 9967 len = strlen (buf) + 1;
217aa764 9968 name = bfd_alloc (abfd, len);
252b5132 9969 if (name == NULL)
b34976b6 9970 return FALSE;
d4c88bbb 9971 memcpy (name, buf, len);
252b5132 9972
117ed4f8 9973 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9974 if (sect == NULL)
b34976b6 9975 return FALSE;
252b5132
RH
9976
9977#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9978 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
9979 sect->filepos = note->descpos
9980 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
9981#endif
9982
9983#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 9984 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
9985 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
9986#endif
9987
252b5132
RH
9988 sect->alignment_power = 2;
9989
936e320b 9990 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
9991}
9992#endif /* defined (HAVE_LWPSTATUS_T) */
9993
b34976b6 9994static bfd_boolean
217aa764 9995elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
9996{
9997 char buf[30];
c044fabd 9998 char *name;
d4c88bbb 9999 size_t len;
c044fabd 10000 asection *sect;
4a6636fb
PA
10001 int type;
10002 int is_active_thread;
10003 bfd_vma base_addr;
16e9c715 10004
4a6636fb 10005 if (note->descsz < 728)
b34976b6 10006 return TRUE;
16e9c715 10007
4a6636fb
PA
10008 if (! CONST_STRNEQ (note->namedata, "win32"))
10009 return TRUE;
10010
10011 type = bfd_get_32 (abfd, note->descdata);
c044fabd 10012
4a6636fb 10013 switch (type)
16e9c715 10014 {
4a6636fb 10015 case 1 /* NOTE_INFO_PROCESS */:
228e534f 10016 /* FIXME: need to add ->core->command. */
4a6636fb 10017 /* process_info.pid */
228e534f 10018 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
4a6636fb 10019 /* process_info.signal */
228e534f 10020 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 10021 break;
16e9c715 10022
4a6636fb 10023 case 2 /* NOTE_INFO_THREAD */:
16e9c715 10024 /* Make a ".reg/999" section. */
4a6636fb
PA
10025 /* thread_info.tid */
10026 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 10027
d4c88bbb 10028 len = strlen (buf) + 1;
a50b1753 10029 name = (char *) bfd_alloc (abfd, len);
16e9c715 10030 if (name == NULL)
b34976b6 10031 return FALSE;
c044fabd 10032
d4c88bbb 10033 memcpy (name, buf, len);
16e9c715 10034
117ed4f8 10035 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 10036 if (sect == NULL)
b34976b6 10037 return FALSE;
c044fabd 10038
4a6636fb
PA
10039 /* sizeof (thread_info.thread_context) */
10040 sect->size = 716;
10041 /* offsetof (thread_info.thread_context) */
10042 sect->filepos = note->descpos + 12;
16e9c715
NC
10043 sect->alignment_power = 2;
10044
4a6636fb
PA
10045 /* thread_info.is_active_thread */
10046 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
10047
10048 if (is_active_thread)
16e9c715 10049 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 10050 return FALSE;
16e9c715
NC
10051 break;
10052
4a6636fb 10053 case 3 /* NOTE_INFO_MODULE */:
16e9c715 10054 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
10055 /* module_info.base_address */
10056 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 10057 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 10058
d4c88bbb 10059 len = strlen (buf) + 1;
a50b1753 10060 name = (char *) bfd_alloc (abfd, len);
16e9c715 10061 if (name == NULL)
b34976b6 10062 return FALSE;
c044fabd 10063
d4c88bbb 10064 memcpy (name, buf, len);
252b5132 10065
117ed4f8 10066 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 10067
16e9c715 10068 if (sect == NULL)
b34976b6 10069 return FALSE;
c044fabd 10070
eea6121a 10071 sect->size = note->descsz;
16e9c715 10072 sect->filepos = note->descpos;
16e9c715
NC
10073 sect->alignment_power = 2;
10074 break;
10075
10076 default:
b34976b6 10077 return TRUE;
16e9c715
NC
10078 }
10079
b34976b6 10080 return TRUE;
16e9c715 10081}
252b5132 10082
b34976b6 10083static bfd_boolean
217aa764 10084elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 10085{
9c5bfbb7 10086 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 10087
252b5132
RH
10088 switch (note->type)
10089 {
10090 default:
b34976b6 10091 return TRUE;
252b5132 10092
252b5132 10093 case NT_PRSTATUS:
bb0082d6
AM
10094 if (bed->elf_backend_grok_prstatus)
10095 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 10096 return TRUE;
bb0082d6 10097#if defined (HAVE_PRSTATUS_T)
252b5132 10098 return elfcore_grok_prstatus (abfd, note);
bb0082d6 10099#else
b34976b6 10100 return TRUE;
252b5132
RH
10101#endif
10102
10103#if defined (HAVE_PSTATUS_T)
10104 case NT_PSTATUS:
10105 return elfcore_grok_pstatus (abfd, note);
10106#endif
10107
10108#if defined (HAVE_LWPSTATUS_T)
10109 case NT_LWPSTATUS:
10110 return elfcore_grok_lwpstatus (abfd, note);
10111#endif
10112
10113 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
10114 return elfcore_grok_prfpreg (abfd, note);
10115
c044fabd 10116 case NT_WIN32PSTATUS:
16e9c715 10117 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 10118
c044fabd 10119 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
10120 if (note->namesz == 6
10121 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
10122 return elfcore_grok_prxfpreg (abfd, note);
10123 else
b34976b6 10124 return TRUE;
ff08c6bb 10125
4339cae0
L
10126 case NT_X86_XSTATE: /* Linux XSAVE extension */
10127 if (note->namesz == 6
10128 && strcmp (note->namedata, "LINUX") == 0)
10129 return elfcore_grok_xstatereg (abfd, note);
10130 else
10131 return TRUE;
10132
97753bd5
AM
10133 case NT_PPC_VMX:
10134 if (note->namesz == 6
10135 && strcmp (note->namedata, "LINUX") == 0)
10136 return elfcore_grok_ppc_vmx (abfd, note);
10137 else
10138 return TRUE;
10139
89eeb0bc
LM
10140 case NT_PPC_VSX:
10141 if (note->namesz == 6
07d6d2b8
AM
10142 && strcmp (note->namedata, "LINUX") == 0)
10143 return elfcore_grok_ppc_vsx (abfd, note);
89eeb0bc 10144 else
07d6d2b8 10145 return TRUE;
89eeb0bc 10146
cb2366c1
EBM
10147 case NT_PPC_TAR:
10148 if (note->namesz == 6
4b24dd1a
AM
10149 && strcmp (note->namedata, "LINUX") == 0)
10150 return elfcore_grok_ppc_tar (abfd, note);
cb2366c1 10151 else
4b24dd1a 10152 return TRUE;
cb2366c1
EBM
10153
10154 case NT_PPC_PPR:
10155 if (note->namesz == 6
4b24dd1a
AM
10156 && strcmp (note->namedata, "LINUX") == 0)
10157 return elfcore_grok_ppc_ppr (abfd, note);
cb2366c1 10158 else
4b24dd1a 10159 return TRUE;
cb2366c1
EBM
10160
10161 case NT_PPC_DSCR:
10162 if (note->namesz == 6
4b24dd1a
AM
10163 && strcmp (note->namedata, "LINUX") == 0)
10164 return elfcore_grok_ppc_dscr (abfd, note);
cb2366c1 10165 else
4b24dd1a 10166 return TRUE;
cb2366c1
EBM
10167
10168 case NT_PPC_EBB:
10169 if (note->namesz == 6
4b24dd1a
AM
10170 && strcmp (note->namedata, "LINUX") == 0)
10171 return elfcore_grok_ppc_ebb (abfd, note);
cb2366c1 10172 else
4b24dd1a 10173 return TRUE;
cb2366c1
EBM
10174
10175 case NT_PPC_PMU:
10176 if (note->namesz == 6
4b24dd1a
AM
10177 && strcmp (note->namedata, "LINUX") == 0)
10178 return elfcore_grok_ppc_pmu (abfd, note);
cb2366c1 10179 else
4b24dd1a 10180 return TRUE;
cb2366c1
EBM
10181
10182 case NT_PPC_TM_CGPR:
10183 if (note->namesz == 6
4b24dd1a
AM
10184 && strcmp (note->namedata, "LINUX") == 0)
10185 return elfcore_grok_ppc_tm_cgpr (abfd, note);
cb2366c1 10186 else
4b24dd1a 10187 return TRUE;
cb2366c1
EBM
10188
10189 case NT_PPC_TM_CFPR:
10190 if (note->namesz == 6
4b24dd1a
AM
10191 && strcmp (note->namedata, "LINUX") == 0)
10192 return elfcore_grok_ppc_tm_cfpr (abfd, note);
cb2366c1 10193 else
4b24dd1a 10194 return TRUE;
cb2366c1
EBM
10195
10196 case NT_PPC_TM_CVMX:
10197 if (note->namesz == 6
4b24dd1a
AM
10198 && strcmp (note->namedata, "LINUX") == 0)
10199 return elfcore_grok_ppc_tm_cvmx (abfd, note);
cb2366c1 10200 else
4b24dd1a 10201 return TRUE;
cb2366c1
EBM
10202
10203 case NT_PPC_TM_CVSX:
10204 if (note->namesz == 6
4b24dd1a
AM
10205 && strcmp (note->namedata, "LINUX") == 0)
10206 return elfcore_grok_ppc_tm_cvsx (abfd, note);
cb2366c1 10207 else
4b24dd1a 10208 return TRUE;
cb2366c1
EBM
10209
10210 case NT_PPC_TM_SPR:
10211 if (note->namesz == 6
4b24dd1a
AM
10212 && strcmp (note->namedata, "LINUX") == 0)
10213 return elfcore_grok_ppc_tm_spr (abfd, note);
cb2366c1 10214 else
4b24dd1a 10215 return TRUE;
cb2366c1
EBM
10216
10217 case NT_PPC_TM_CTAR:
10218 if (note->namesz == 6
4b24dd1a
AM
10219 && strcmp (note->namedata, "LINUX") == 0)
10220 return elfcore_grok_ppc_tm_ctar (abfd, note);
cb2366c1 10221 else
4b24dd1a 10222 return TRUE;
cb2366c1
EBM
10223
10224 case NT_PPC_TM_CPPR:
10225 if (note->namesz == 6
4b24dd1a
AM
10226 && strcmp (note->namedata, "LINUX") == 0)
10227 return elfcore_grok_ppc_tm_cppr (abfd, note);
cb2366c1 10228 else
4b24dd1a 10229 return TRUE;
cb2366c1
EBM
10230
10231 case NT_PPC_TM_CDSCR:
10232 if (note->namesz == 6
4b24dd1a
AM
10233 && strcmp (note->namedata, "LINUX") == 0)
10234 return elfcore_grok_ppc_tm_cdscr (abfd, note);
cb2366c1 10235 else
4b24dd1a 10236 return TRUE;
cb2366c1 10237
0675e188
UW
10238 case NT_S390_HIGH_GPRS:
10239 if (note->namesz == 6
07d6d2b8
AM
10240 && strcmp (note->namedata, "LINUX") == 0)
10241 return elfcore_grok_s390_high_gprs (abfd, note);
0675e188 10242 else
07d6d2b8 10243 return TRUE;
0675e188 10244
d7eeb400
MS
10245 case NT_S390_TIMER:
10246 if (note->namesz == 6
07d6d2b8
AM
10247 && strcmp (note->namedata, "LINUX") == 0)
10248 return elfcore_grok_s390_timer (abfd, note);
d7eeb400 10249 else
07d6d2b8 10250 return TRUE;
d7eeb400
MS
10251
10252 case NT_S390_TODCMP:
10253 if (note->namesz == 6
07d6d2b8
AM
10254 && strcmp (note->namedata, "LINUX") == 0)
10255 return elfcore_grok_s390_todcmp (abfd, note);
d7eeb400 10256 else
07d6d2b8 10257 return TRUE;
d7eeb400
MS
10258
10259 case NT_S390_TODPREG:
10260 if (note->namesz == 6
07d6d2b8
AM
10261 && strcmp (note->namedata, "LINUX") == 0)
10262 return elfcore_grok_s390_todpreg (abfd, note);
d7eeb400 10263 else
07d6d2b8 10264 return TRUE;
d7eeb400
MS
10265
10266 case NT_S390_CTRS:
10267 if (note->namesz == 6
07d6d2b8
AM
10268 && strcmp (note->namedata, "LINUX") == 0)
10269 return elfcore_grok_s390_ctrs (abfd, note);
d7eeb400 10270 else
07d6d2b8 10271 return TRUE;
d7eeb400
MS
10272
10273 case NT_S390_PREFIX:
10274 if (note->namesz == 6
07d6d2b8
AM
10275 && strcmp (note->namedata, "LINUX") == 0)
10276 return elfcore_grok_s390_prefix (abfd, note);
d7eeb400 10277 else
07d6d2b8 10278 return TRUE;
d7eeb400 10279
355b81d9
UW
10280 case NT_S390_LAST_BREAK:
10281 if (note->namesz == 6
07d6d2b8
AM
10282 && strcmp (note->namedata, "LINUX") == 0)
10283 return elfcore_grok_s390_last_break (abfd, note);
355b81d9 10284 else
07d6d2b8 10285 return TRUE;
355b81d9
UW
10286
10287 case NT_S390_SYSTEM_CALL:
10288 if (note->namesz == 6
07d6d2b8
AM
10289 && strcmp (note->namedata, "LINUX") == 0)
10290 return elfcore_grok_s390_system_call (abfd, note);
355b81d9 10291 else
07d6d2b8 10292 return TRUE;
355b81d9 10293
abb3f6cc
NC
10294 case NT_S390_TDB:
10295 if (note->namesz == 6
07d6d2b8
AM
10296 && strcmp (note->namedata, "LINUX") == 0)
10297 return elfcore_grok_s390_tdb (abfd, note);
abb3f6cc 10298 else
07d6d2b8 10299 return TRUE;
abb3f6cc 10300
4ef9f41a
AA
10301 case NT_S390_VXRS_LOW:
10302 if (note->namesz == 6
10303 && strcmp (note->namedata, "LINUX") == 0)
10304 return elfcore_grok_s390_vxrs_low (abfd, note);
10305 else
10306 return TRUE;
10307
10308 case NT_S390_VXRS_HIGH:
10309 if (note->namesz == 6
10310 && strcmp (note->namedata, "LINUX") == 0)
10311 return elfcore_grok_s390_vxrs_high (abfd, note);
10312 else
10313 return TRUE;
10314
88ab90e8
AA
10315 case NT_S390_GS_CB:
10316 if (note->namesz == 6
10317 && strcmp (note->namedata, "LINUX") == 0)
8fe09d74 10318 return elfcore_grok_s390_gs_cb (abfd, note);
88ab90e8
AA
10319 else
10320 return TRUE;
10321
10322 case NT_S390_GS_BC:
10323 if (note->namesz == 6
10324 && strcmp (note->namedata, "LINUX") == 0)
8fe09d74 10325 return elfcore_grok_s390_gs_bc (abfd, note);
88ab90e8
AA
10326 else
10327 return TRUE;
10328
faa9a424
UW
10329 case NT_ARM_VFP:
10330 if (note->namesz == 6
10331 && strcmp (note->namedata, "LINUX") == 0)
10332 return elfcore_grok_arm_vfp (abfd, note);
10333 else
10334 return TRUE;
10335
652451f8
YZ
10336 case NT_ARM_TLS:
10337 if (note->namesz == 6
10338 && strcmp (note->namedata, "LINUX") == 0)
10339 return elfcore_grok_aarch_tls (abfd, note);
10340 else
10341 return TRUE;
10342
10343 case NT_ARM_HW_BREAK:
10344 if (note->namesz == 6
10345 && strcmp (note->namedata, "LINUX") == 0)
10346 return elfcore_grok_aarch_hw_break (abfd, note);
10347 else
10348 return TRUE;
10349
10350 case NT_ARM_HW_WATCH:
10351 if (note->namesz == 6
10352 && strcmp (note->namedata, "LINUX") == 0)
10353 return elfcore_grok_aarch_hw_watch (abfd, note);
10354 else
10355 return TRUE;
10356
ad1cc4e4
AH
10357 case NT_ARM_SVE:
10358 if (note->namesz == 6
10359 && strcmp (note->namedata, "LINUX") == 0)
10360 return elfcore_grok_aarch_sve (abfd, note);
10361 else
10362 return TRUE;
10363
e6c3b5bf
AH
10364 case NT_ARM_PAC_MASK:
10365 if (note->namesz == 6
10366 && strcmp (note->namedata, "LINUX") == 0)
10367 return elfcore_grok_aarch_pauth (abfd, note);
10368 else
10369 return TRUE;
10370
252b5132
RH
10371 case NT_PRPSINFO:
10372 case NT_PSINFO:
bb0082d6
AM
10373 if (bed->elf_backend_grok_psinfo)
10374 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 10375 return TRUE;
bb0082d6 10376#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 10377 return elfcore_grok_psinfo (abfd, note);
bb0082d6 10378#else
b34976b6 10379 return TRUE;
252b5132 10380#endif
3333a7c3
RM
10381
10382 case NT_AUXV:
58e07198 10383 return elfcore_make_auxv_note_section (abfd, note, 0);
9015683b 10384
451b7c33
TT
10385 case NT_FILE:
10386 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
10387 note);
10388
9015683b
TT
10389 case NT_SIGINFO:
10390 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
10391 note);
5b2c414d 10392
252b5132
RH
10393 }
10394}
10395
718175fa
JK
10396static bfd_boolean
10397elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
10398{
c74f7d1c 10399 struct bfd_build_id* build_id;
30e8ee25
AM
10400
10401 if (note->descsz == 0)
10402 return FALSE;
10403
c74f7d1c
JT
10404 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
10405 if (build_id == NULL)
718175fa
JK
10406 return FALSE;
10407
c74f7d1c
JT
10408 build_id->size = note->descsz;
10409 memcpy (build_id->data, note->descdata, note->descsz);
10410 abfd->build_id = build_id;
718175fa
JK
10411
10412 return TRUE;
10413}
10414
10415static bfd_boolean
10416elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
10417{
10418 switch (note->type)
10419 {
10420 default:
10421 return TRUE;
10422
46bed679
L
10423 case NT_GNU_PROPERTY_TYPE_0:
10424 return _bfd_elf_parse_gnu_properties (abfd, note);
10425
718175fa
JK
10426 case NT_GNU_BUILD_ID:
10427 return elfobj_grok_gnu_build_id (abfd, note);
10428 }
10429}
10430
e21e5835
NC
10431static bfd_boolean
10432elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
10433{
10434 struct sdt_note *cur =
7a6e0d89
AM
10435 (struct sdt_note *) bfd_alloc (abfd,
10436 sizeof (struct sdt_note) + note->descsz);
e21e5835
NC
10437
10438 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
10439 cur->size = (bfd_size_type) note->descsz;
10440 memcpy (cur->data, note->descdata, note->descsz);
10441
10442 elf_tdata (abfd)->sdt_note_head = cur;
10443
10444 return TRUE;
10445}
10446
10447static bfd_boolean
10448elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
10449{
10450 switch (note->type)
10451 {
10452 case NT_STAPSDT:
10453 return elfobj_grok_stapsdt_note_1 (abfd, note);
10454
10455 default:
10456 return TRUE;
10457 }
10458}
10459
aa1ed4a9
JB
10460static bfd_boolean
10461elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
10462{
10463 size_t offset;
10464
b5430a3c 10465 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
aa1ed4a9 10466 {
b5430a3c 10467 case ELFCLASS32:
0064d223
JB
10468 if (note->descsz < 108)
10469 return FALSE;
aa1ed4a9
JB
10470 break;
10471
b5430a3c 10472 case ELFCLASS64:
0064d223
JB
10473 if (note->descsz < 120)
10474 return FALSE;
aa1ed4a9
JB
10475 break;
10476
10477 default:
10478 return FALSE;
10479 }
10480
0064d223
JB
10481 /* Check for version 1 in pr_version. */
10482 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10483 return FALSE;
80a04378 10484
0064d223
JB
10485 offset = 4;
10486
10487 /* Skip over pr_psinfosz. */
b5430a3c 10488 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
0064d223
JB
10489 offset += 4;
10490 else
10491 {
10492 offset += 4; /* Padding before pr_psinfosz. */
10493 offset += 8;
10494 }
10495
aa1ed4a9
JB
10496 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
10497 elf_tdata (abfd)->core->program
10498 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
10499 offset += 17;
10500
10501 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
10502 elf_tdata (abfd)->core->command
10503 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
0064d223
JB
10504 offset += 81;
10505
10506 /* Padding before pr_pid. */
10507 offset += 2;
10508
10509 /* The pr_pid field was added in version "1a". */
10510 if (note->descsz < offset + 4)
10511 return TRUE;
10512
10513 elf_tdata (abfd)->core->pid
10514 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
aa1ed4a9
JB
10515
10516 return TRUE;
10517}
10518
10519static bfd_boolean
10520elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
10521{
10522 size_t offset;
10523 size_t size;
24d3e51b 10524 size_t min_size;
aa1ed4a9 10525
24d3e51b
NC
10526 /* Compute offset of pr_getregsz, skipping over pr_statussz.
10527 Also compute minimum size of this note. */
b5430a3c 10528 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
aa1ed4a9 10529 {
b5430a3c 10530 case ELFCLASS32:
24d3e51b
NC
10531 offset = 4 + 4;
10532 min_size = offset + (4 * 2) + 4 + 4 + 4;
aa1ed4a9
JB
10533 break;
10534
b5430a3c 10535 case ELFCLASS64:
24d3e51b
NC
10536 offset = 4 + 4 + 8; /* Includes padding before pr_statussz. */
10537 min_size = offset + (8 * 2) + 4 + 4 + 4 + 4;
aa1ed4a9
JB
10538 break;
10539
10540 default:
10541 return FALSE;
10542 }
10543
24d3e51b
NC
10544 if (note->descsz < min_size)
10545 return FALSE;
10546
10547 /* Check for version 1 in pr_version. */
10548 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10549 return FALSE;
aa1ed4a9 10550
24d3e51b
NC
10551 /* Extract size of pr_reg from pr_gregsetsz. */
10552 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
b5430a3c 10553 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
24d3e51b
NC
10554 {
10555 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10556 offset += 4 * 2;
10557 }
b5430a3c 10558 else
24d3e51b
NC
10559 {
10560 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
10561 offset += 8 * 2;
10562 }
aa1ed4a9 10563
24d3e51b 10564 /* Skip over pr_osreldate. */
aa1ed4a9
JB
10565 offset += 4;
10566
24d3e51b 10567 /* Read signal from pr_cursig. */
aa1ed4a9
JB
10568 if (elf_tdata (abfd)->core->signal == 0)
10569 elf_tdata (abfd)->core->signal
10570 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10571 offset += 4;
10572
24d3e51b 10573 /* Read TID from pr_pid. */
aa1ed4a9
JB
10574 elf_tdata (abfd)->core->lwpid
10575 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10576 offset += 4;
10577
24d3e51b 10578 /* Padding before pr_reg. */
b5430a3c 10579 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS64)
aa1ed4a9
JB
10580 offset += 4;
10581
24d3e51b
NC
10582 /* Make sure that there is enough data remaining in the note. */
10583 if ((note->descsz - offset) < size)
10584 return FALSE;
10585
aa1ed4a9
JB
10586 /* Make a ".reg/999" section and a ".reg" section. */
10587 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
10588 size, note->descpos + offset);
10589}
10590
10591static bfd_boolean
10592elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
10593{
544c67cd
JB
10594 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10595
aa1ed4a9
JB
10596 switch (note->type)
10597 {
10598 case NT_PRSTATUS:
544c67cd
JB
10599 if (bed->elf_backend_grok_freebsd_prstatus)
10600 if ((*bed->elf_backend_grok_freebsd_prstatus) (abfd, note))
10601 return TRUE;
aa1ed4a9
JB
10602 return elfcore_grok_freebsd_prstatus (abfd, note);
10603
10604 case NT_FPREGSET:
10605 return elfcore_grok_prfpreg (abfd, note);
10606
10607 case NT_PRPSINFO:
10608 return elfcore_grok_freebsd_psinfo (abfd, note);
10609
10610 case NT_FREEBSD_THRMISC:
10611 if (note->namesz == 8)
10612 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
10613 else
10614 return TRUE;
10615
ddb2bbcf
JB
10616 case NT_FREEBSD_PROCSTAT_PROC:
10617 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.proc",
10618 note);
10619
10620 case NT_FREEBSD_PROCSTAT_FILES:
10621 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.files",
10622 note);
10623
10624 case NT_FREEBSD_PROCSTAT_VMMAP:
10625 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.vmmap",
10626 note);
10627
3350c5f5 10628 case NT_FREEBSD_PROCSTAT_AUXV:
58e07198 10629 return elfcore_make_auxv_note_section (abfd, note, 4);
3350c5f5 10630
aa1ed4a9
JB
10631 case NT_X86_XSTATE:
10632 if (note->namesz == 8)
10633 return elfcore_grok_xstatereg (abfd, note);
10634 else
10635 return TRUE;
10636
e6f3b9c3
JB
10637 case NT_FREEBSD_PTLWPINFO:
10638 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.lwpinfo",
10639 note);
10640
6d5be5d6
JB
10641 case NT_ARM_VFP:
10642 return elfcore_grok_arm_vfp (abfd, note);
10643
aa1ed4a9
JB
10644 default:
10645 return TRUE;
10646 }
10647}
10648
b34976b6 10649static bfd_boolean
217aa764 10650elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
10651{
10652 char *cp;
10653
10654 cp = strchr (note->namedata, '@');
10655 if (cp != NULL)
10656 {
d2b64500 10657 *lwpidp = atoi(cp + 1);
b34976b6 10658 return TRUE;
50b2bdb7 10659 }
b34976b6 10660 return FALSE;
50b2bdb7
AM
10661}
10662
b34976b6 10663static bfd_boolean
217aa764 10664elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 10665{
80a04378
NC
10666 if (note->descsz <= 0x7c + 31)
10667 return FALSE;
10668
50b2bdb7 10669 /* Signal number at offset 0x08. */
228e534f 10670 elf_tdata (abfd)->core->signal
50b2bdb7
AM
10671 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10672
10673 /* Process ID at offset 0x50. */
228e534f 10674 elf_tdata (abfd)->core->pid
50b2bdb7
AM
10675 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
10676
10677 /* Command name at 0x7c (max 32 bytes, including nul). */
228e534f 10678 elf_tdata (abfd)->core->command
50b2bdb7
AM
10679 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
10680
7720ba9f
MK
10681 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
10682 note);
50b2bdb7
AM
10683}
10684
b34976b6 10685static bfd_boolean
217aa764 10686elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
10687{
10688 int lwp;
10689
10690 if (elfcore_netbsd_get_lwpid (note, &lwp))
228e534f 10691 elf_tdata (abfd)->core->lwpid = lwp;
50b2bdb7 10692
58e07198 10693 switch (note->type)
50b2bdb7 10694 {
58e07198 10695 case NT_NETBSDCORE_PROCINFO:
50b2bdb7 10696 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
10697 find this note before any of the others, which is fine,
10698 since the kernel writes this note out first when it
10699 creates a core file. */
50b2bdb7 10700 return elfcore_grok_netbsd_procinfo (abfd, note);
58e07198
CZ
10701#ifdef NT_NETBSDCORE_AUXV
10702 case NT_NETBSDCORE_AUXV:
10703 /* NetBSD-specific Elf Auxiliary Vector data. */
10704 return elfcore_make_auxv_note_section (abfd, note, 4);
10705#endif
10706 default:
10707 break;
50b2bdb7
AM
10708 }
10709
58e07198 10710 /* As of March 2017 there are no other machine-independent notes
b4db1224
JT
10711 defined for NetBSD core files. If the note type is less
10712 than the start of the machine-dependent note types, we don't
10713 understand it. */
47d9a591 10714
b4db1224 10715 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 10716 return TRUE;
50b2bdb7
AM
10717
10718
10719 switch (bfd_get_arch (abfd))
10720 {
08a40648
AM
10721 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
10722 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
10723
10724 case bfd_arch_alpha:
10725 case bfd_arch_sparc:
10726 switch (note->type)
08a40648
AM
10727 {
10728 case NT_NETBSDCORE_FIRSTMACH+0:
10729 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 10730
08a40648
AM
10731 case NT_NETBSDCORE_FIRSTMACH+2:
10732 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 10733
08a40648
AM
10734 default:
10735 return TRUE;
10736 }
50b2bdb7 10737
58e07198
CZ
10738 /* On SuperH, PT_GETREGS == mach+3 and PT_GETFPREGS == mach+5.
10739 There's also old PT___GETREGS40 == mach + 1 for old reg
10740 structure which lacks GBR. */
10741
10742 case bfd_arch_sh:
10743 switch (note->type)
10744 {
10745 case NT_NETBSDCORE_FIRSTMACH+3:
10746 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10747
10748 case NT_NETBSDCORE_FIRSTMACH+5:
10749 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10750
10751 default:
10752 return TRUE;
10753 }
10754
08a40648
AM
10755 /* On all other arch's, PT_GETREGS == mach+1 and
10756 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
10757
10758 default:
10759 switch (note->type)
08a40648
AM
10760 {
10761 case NT_NETBSDCORE_FIRSTMACH+1:
10762 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 10763
08a40648
AM
10764 case NT_NETBSDCORE_FIRSTMACH+3:
10765 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 10766
08a40648
AM
10767 default:
10768 return TRUE;
10769 }
50b2bdb7
AM
10770 }
10771 /* NOTREACHED */
10772}
10773
67cc5033
MK
10774static bfd_boolean
10775elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10776{
80a04378
NC
10777 if (note->descsz <= 0x48 + 31)
10778 return FALSE;
10779
67cc5033 10780 /* Signal number at offset 0x08. */
228e534f 10781 elf_tdata (abfd)->core->signal
67cc5033
MK
10782 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10783
10784 /* Process ID at offset 0x20. */
228e534f 10785 elf_tdata (abfd)->core->pid
67cc5033
MK
10786 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
10787
10788 /* Command name at 0x48 (max 32 bytes, including nul). */
228e534f 10789 elf_tdata (abfd)->core->command
67cc5033
MK
10790 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
10791
10792 return TRUE;
10793}
10794
10795static bfd_boolean
10796elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
10797{
10798 if (note->type == NT_OPENBSD_PROCINFO)
10799 return elfcore_grok_openbsd_procinfo (abfd, note);
10800
10801 if (note->type == NT_OPENBSD_REGS)
10802 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10803
10804 if (note->type == NT_OPENBSD_FPREGS)
10805 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10806
10807 if (note->type == NT_OPENBSD_XFPREGS)
10808 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
10809
10810 if (note->type == NT_OPENBSD_AUXV)
58e07198 10811 return elfcore_make_auxv_note_section (abfd, note, 0);
67cc5033
MK
10812
10813 if (note->type == NT_OPENBSD_WCOOKIE)
10814 {
10815 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
10816 SEC_HAS_CONTENTS);
10817
10818 if (sect == NULL)
10819 return FALSE;
10820 sect->size = note->descsz;
10821 sect->filepos = note->descpos;
10822 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10823
10824 return TRUE;
10825 }
10826
10827 return TRUE;
10828}
10829
07c6e936 10830static bfd_boolean
d3fd4074 10831elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
10832{
10833 void *ddata = note->descdata;
10834 char buf[100];
10835 char *name;
10836 asection *sect;
f8843e87
AM
10837 short sig;
10838 unsigned flags;
07c6e936 10839
80a04378
NC
10840 if (note->descsz < 16)
10841 return FALSE;
10842
07c6e936 10843 /* nto_procfs_status 'pid' field is at offset 0. */
228e534f 10844 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
07c6e936 10845
f8843e87
AM
10846 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
10847 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
10848
10849 /* nto_procfs_status 'flags' field is at offset 8. */
10850 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
10851
10852 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
10853 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
10854 {
228e534f
AM
10855 elf_tdata (abfd)->core->signal = sig;
10856 elf_tdata (abfd)->core->lwpid = *tid;
f8843e87 10857 }
07c6e936 10858
f8843e87
AM
10859 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
10860 do not come from signals so we make sure we set the current
10861 thread just in case. */
10862 if (flags & 0x00000080)
228e534f 10863 elf_tdata (abfd)->core->lwpid = *tid;
07c6e936
NC
10864
10865 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 10866 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 10867
a50b1753 10868 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10869 if (name == NULL)
10870 return FALSE;
10871 strcpy (name, buf);
10872
117ed4f8 10873 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10874 if (sect == NULL)
10875 return FALSE;
10876
07d6d2b8
AM
10877 sect->size = note->descsz;
10878 sect->filepos = note->descpos;
07c6e936
NC
10879 sect->alignment_power = 2;
10880
10881 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
10882}
10883
10884static bfd_boolean
d69f560c
KW
10885elfcore_grok_nto_regs (bfd *abfd,
10886 Elf_Internal_Note *note,
d3fd4074 10887 long tid,
d69f560c 10888 char *base)
07c6e936
NC
10889{
10890 char buf[100];
10891 char *name;
10892 asection *sect;
10893
d69f560c 10894 /* Make a "(base)/%d" section. */
d3fd4074 10895 sprintf (buf, "%s/%ld", base, tid);
07c6e936 10896
a50b1753 10897 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10898 if (name == NULL)
10899 return FALSE;
10900 strcpy (name, buf);
10901
117ed4f8 10902 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10903 if (sect == NULL)
10904 return FALSE;
10905
07d6d2b8
AM
10906 sect->size = note->descsz;
10907 sect->filepos = note->descpos;
07c6e936
NC
10908 sect->alignment_power = 2;
10909
f8843e87 10910 /* This is the current thread. */
228e534f 10911 if (elf_tdata (abfd)->core->lwpid == tid)
d69f560c 10912 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
10913
10914 return TRUE;
07c6e936
NC
10915}
10916
10917#define BFD_QNT_CORE_INFO 7
10918#define BFD_QNT_CORE_STATUS 8
10919#define BFD_QNT_CORE_GREG 9
10920#define BFD_QNT_CORE_FPREG 10
10921
10922static bfd_boolean
217aa764 10923elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
10924{
10925 /* Every GREG section has a STATUS section before it. Store the
811072d8 10926 tid from the previous call to pass down to the next gregs
07c6e936 10927 function. */
d3fd4074 10928 static long tid = 1;
07c6e936
NC
10929
10930 switch (note->type)
10931 {
d69f560c
KW
10932 case BFD_QNT_CORE_INFO:
10933 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
10934 case BFD_QNT_CORE_STATUS:
10935 return elfcore_grok_nto_status (abfd, note, &tid);
10936 case BFD_QNT_CORE_GREG:
10937 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
10938 case BFD_QNT_CORE_FPREG:
10939 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
10940 default:
10941 return TRUE;
07c6e936
NC
10942 }
10943}
10944
b15fa79e
AM
10945static bfd_boolean
10946elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
10947{
10948 char *name;
10949 asection *sect;
10950 size_t len;
10951
10952 /* Use note name as section name. */
10953 len = note->namesz;
a50b1753 10954 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
10955 if (name == NULL)
10956 return FALSE;
10957 memcpy (name, note->namedata, len);
10958 name[len - 1] = '\0';
10959
10960 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10961 if (sect == NULL)
10962 return FALSE;
10963
07d6d2b8
AM
10964 sect->size = note->descsz;
10965 sect->filepos = note->descpos;
b15fa79e
AM
10966 sect->alignment_power = 1;
10967
10968 return TRUE;
10969}
10970
7c76fa91
MS
10971/* Function: elfcore_write_note
10972
47d9a591 10973 Inputs:
a39f3346 10974 buffer to hold note, and current size of buffer
7c76fa91
MS
10975 name of note
10976 type of note
10977 data for note
10978 size of data for note
10979
a39f3346
AM
10980 Writes note to end of buffer. ELF64 notes are written exactly as
10981 for ELF32, despite the current (as of 2006) ELF gabi specifying
10982 that they ought to have 8-byte namesz and descsz field, and have
10983 8-byte alignment. Other writers, eg. Linux kernel, do the same.
10984
7c76fa91 10985 Return:
a39f3346 10986 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
10987
10988char *
a39f3346 10989elfcore_write_note (bfd *abfd,
217aa764 10990 char *buf,
a39f3346 10991 int *bufsiz,
217aa764 10992 const char *name,
a39f3346 10993 int type,
217aa764 10994 const void *input,
a39f3346 10995 int size)
7c76fa91
MS
10996{
10997 Elf_External_Note *xnp;
d4c88bbb 10998 size_t namesz;
d4c88bbb 10999 size_t newspace;
a39f3346 11000 char *dest;
7c76fa91 11001
d4c88bbb 11002 namesz = 0;
d4c88bbb 11003 if (name != NULL)
a39f3346 11004 namesz = strlen (name) + 1;
d4c88bbb 11005
a39f3346 11006 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 11007
a50b1753 11008 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
11009 if (buf == NULL)
11010 return buf;
a39f3346 11011 dest = buf + *bufsiz;
7c76fa91
MS
11012 *bufsiz += newspace;
11013 xnp = (Elf_External_Note *) dest;
11014 H_PUT_32 (abfd, namesz, xnp->namesz);
11015 H_PUT_32 (abfd, size, xnp->descsz);
11016 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
11017 dest = xnp->name;
11018 if (name != NULL)
11019 {
11020 memcpy (dest, name, namesz);
11021 dest += namesz;
a39f3346 11022 while (namesz & 3)
d4c88bbb
AM
11023 {
11024 *dest++ = '\0';
a39f3346 11025 ++namesz;
d4c88bbb
AM
11026 }
11027 }
11028 memcpy (dest, input, size);
a39f3346
AM
11029 dest += size;
11030 while (size & 3)
11031 {
11032 *dest++ = '\0';
11033 ++size;
11034 }
11035 return buf;
7c76fa91
MS
11036}
11037
602f1657
AM
11038/* gcc-8 warns (*) on all the strncpy calls in this function about
11039 possible string truncation. The "truncation" is not a bug. We
11040 have an external representation of structs with fields that are not
11041 necessarily NULL terminated and corresponding internal
11042 representation fields that are one larger so that they can always
11043 be NULL terminated.
11044 gcc versions between 4.2 and 4.6 do not allow pragma control of
11045 diagnostics inside functions, giving a hard error if you try to use
11046 the finer control available with later versions.
11047 gcc prior to 4.2 warns about diagnostic push and pop.
11048 gcc-5, gcc-6 and gcc-7 warn that -Wstringop-truncation is unknown,
11049 unless you also add #pragma GCC diagnostic ignored "-Wpragma".
11050 (*) Depending on your system header files! */
d99b4b92 11051#if GCC_VERSION >= 8000
602f1657
AM
11052# pragma GCC diagnostic push
11053# pragma GCC diagnostic ignored "-Wstringop-truncation"
d99b4b92 11054#endif
7c76fa91 11055char *
217aa764
AM
11056elfcore_write_prpsinfo (bfd *abfd,
11057 char *buf,
11058 int *bufsiz,
11059 const char *fname,
11060 const char *psargs)
7c76fa91 11061{
183e98be
AM
11062 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11063
11064 if (bed->elf_backend_write_core_note != NULL)
11065 {
11066 char *ret;
11067 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11068 NT_PRPSINFO, fname, psargs);
11069 if (ret != NULL)
11070 return ret;
11071 }
7c76fa91 11072
1f20dca5 11073#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
602f1657 11074# if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
183e98be
AM
11075 if (bed->s->elfclass == ELFCLASS32)
11076 {
602f1657 11077# if defined (HAVE_PSINFO32_T)
183e98be
AM
11078 psinfo32_t data;
11079 int note_type = NT_PSINFO;
602f1657 11080# else
183e98be
AM
11081 prpsinfo32_t data;
11082 int note_type = NT_PRPSINFO;
602f1657 11083# endif
183e98be
AM
11084
11085 memset (&data, 0, sizeof (data));
11086 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11087 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11088 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 11089 "CORE", note_type, &data, sizeof (data));
183e98be
AM
11090 }
11091 else
602f1657 11092# endif
183e98be 11093 {
602f1657 11094# if defined (HAVE_PSINFO_T)
183e98be
AM
11095 psinfo_t data;
11096 int note_type = NT_PSINFO;
602f1657 11097# else
183e98be
AM
11098 prpsinfo_t data;
11099 int note_type = NT_PRPSINFO;
602f1657 11100# endif
7c76fa91 11101
183e98be
AM
11102 memset (&data, 0, sizeof (data));
11103 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11104 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11105 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 11106 "CORE", note_type, &data, sizeof (data));
183e98be 11107 }
7c76fa91
MS
11108#endif /* PSINFO_T or PRPSINFO_T */
11109
1f20dca5
UW
11110 free (buf);
11111 return NULL;
11112}
d99b4b92 11113#if GCC_VERSION >= 8000
602f1657 11114# pragma GCC diagnostic pop
d99b4b92 11115#endif
1f20dca5 11116
70a38d42
SDJ
11117char *
11118elfcore_write_linux_prpsinfo32
11119 (bfd *abfd, char *buf, int *bufsiz,
11120 const struct elf_internal_linux_prpsinfo *prpsinfo)
11121{
a2f63b2e
MR
11122 if (get_elf_backend_data (abfd)->linux_prpsinfo32_ugid16)
11123 {
11124 struct elf_external_linux_prpsinfo32_ugid16 data;
11125
11126 swap_linux_prpsinfo32_ugid16_out (abfd, prpsinfo, &data);
11127 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11128 &data, sizeof (data));
11129 }
11130 else
11131 {
11132 struct elf_external_linux_prpsinfo32_ugid32 data;
70a38d42 11133
a2f63b2e
MR
11134 swap_linux_prpsinfo32_ugid32_out (abfd, prpsinfo, &data);
11135 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11136 &data, sizeof (data));
11137 }
70a38d42
SDJ
11138}
11139
11140char *
11141elfcore_write_linux_prpsinfo64
11142 (bfd *abfd, char *buf, int *bufsiz,
11143 const struct elf_internal_linux_prpsinfo *prpsinfo)
11144{
3c9a7b0d
MR
11145 if (get_elf_backend_data (abfd)->linux_prpsinfo64_ugid16)
11146 {
11147 struct elf_external_linux_prpsinfo64_ugid16 data;
11148
11149 swap_linux_prpsinfo64_ugid16_out (abfd, prpsinfo, &data);
11150 return elfcore_write_note (abfd, buf, bufsiz,
11151 "CORE", NT_PRPSINFO, &data, sizeof (data));
11152 }
11153 else
11154 {
11155 struct elf_external_linux_prpsinfo64_ugid32 data;
70a38d42 11156
3c9a7b0d
MR
11157 swap_linux_prpsinfo64_ugid32_out (abfd, prpsinfo, &data);
11158 return elfcore_write_note (abfd, buf, bufsiz,
11159 "CORE", NT_PRPSINFO, &data, sizeof (data));
11160 }
70a38d42
SDJ
11161}
11162
7c76fa91 11163char *
217aa764
AM
11164elfcore_write_prstatus (bfd *abfd,
11165 char *buf,
11166 int *bufsiz,
11167 long pid,
11168 int cursig,
11169 const void *gregs)
7c76fa91 11170{
183e98be 11171 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 11172
183e98be
AM
11173 if (bed->elf_backend_write_core_note != NULL)
11174 {
11175 char *ret;
11176 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11177 NT_PRSTATUS,
11178 pid, cursig, gregs);
11179 if (ret != NULL)
11180 return ret;
11181 }
11182
1f20dca5 11183#if defined (HAVE_PRSTATUS_T)
183e98be
AM
11184#if defined (HAVE_PRSTATUS32_T)
11185 if (bed->s->elfclass == ELFCLASS32)
11186 {
11187 prstatus32_t prstat;
11188
11189 memset (&prstat, 0, sizeof (prstat));
11190 prstat.pr_pid = pid;
11191 prstat.pr_cursig = cursig;
11192 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 11193 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
11194 NT_PRSTATUS, &prstat, sizeof (prstat));
11195 }
11196 else
11197#endif
11198 {
11199 prstatus_t prstat;
11200
11201 memset (&prstat, 0, sizeof (prstat));
11202 prstat.pr_pid = pid;
11203 prstat.pr_cursig = cursig;
11204 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 11205 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
11206 NT_PRSTATUS, &prstat, sizeof (prstat));
11207 }
7c76fa91
MS
11208#endif /* HAVE_PRSTATUS_T */
11209
1f20dca5
UW
11210 free (buf);
11211 return NULL;
11212}
11213
51316059
MS
11214#if defined (HAVE_LWPSTATUS_T)
11215char *
217aa764
AM
11216elfcore_write_lwpstatus (bfd *abfd,
11217 char *buf,
11218 int *bufsiz,
11219 long pid,
11220 int cursig,
11221 const void *gregs)
51316059
MS
11222{
11223 lwpstatus_t lwpstat;
183e98be 11224 const char *note_name = "CORE";
51316059
MS
11225
11226 memset (&lwpstat, 0, sizeof (lwpstat));
11227 lwpstat.pr_lwpid = pid >> 16;
11228 lwpstat.pr_cursig = cursig;
11229#if defined (HAVE_LWPSTATUS_T_PR_REG)
d1e8523e 11230 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
51316059
MS
11231#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
11232#if !defined(gregs)
11233 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
11234 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
11235#else
11236 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
11237 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
11238#endif
11239#endif
47d9a591 11240 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
11241 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
11242}
11243#endif /* HAVE_LWPSTATUS_T */
11244
7c76fa91
MS
11245#if defined (HAVE_PSTATUS_T)
11246char *
217aa764
AM
11247elfcore_write_pstatus (bfd *abfd,
11248 char *buf,
11249 int *bufsiz,
11250 long pid,
6c10990d
NC
11251 int cursig ATTRIBUTE_UNUSED,
11252 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 11253{
183e98be
AM
11254 const char *note_name = "CORE";
11255#if defined (HAVE_PSTATUS32_T)
11256 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 11257
183e98be
AM
11258 if (bed->s->elfclass == ELFCLASS32)
11259 {
11260 pstatus32_t pstat;
11261
11262 memset (&pstat, 0, sizeof (pstat));
11263 pstat.pr_pid = pid & 0xffff;
11264 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11265 NT_PSTATUS, &pstat, sizeof (pstat));
11266 return buf;
11267 }
11268 else
11269#endif
11270 {
11271 pstatus_t pstat;
11272
11273 memset (&pstat, 0, sizeof (pstat));
11274 pstat.pr_pid = pid & 0xffff;
11275 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11276 NT_PSTATUS, &pstat, sizeof (pstat));
11277 return buf;
11278 }
7c76fa91
MS
11279}
11280#endif /* HAVE_PSTATUS_T */
11281
11282char *
217aa764
AM
11283elfcore_write_prfpreg (bfd *abfd,
11284 char *buf,
11285 int *bufsiz,
11286 const void *fpregs,
11287 int size)
7c76fa91 11288{
183e98be 11289 const char *note_name = "CORE";
47d9a591 11290 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
11291 note_name, NT_FPREGSET, fpregs, size);
11292}
11293
11294char *
217aa764
AM
11295elfcore_write_prxfpreg (bfd *abfd,
11296 char *buf,
11297 int *bufsiz,
11298 const void *xfpregs,
11299 int size)
7c76fa91
MS
11300{
11301 char *note_name = "LINUX";
47d9a591 11302 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
11303 note_name, NT_PRXFPREG, xfpregs, size);
11304}
11305
4339cae0
L
11306char *
11307elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
11308 const void *xfpregs, int size)
11309{
97de3545
JB
11310 char *note_name;
11311 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
11312 note_name = "FreeBSD";
11313 else
11314 note_name = "LINUX";
4339cae0
L
11315 return elfcore_write_note (abfd, buf, bufsiz,
11316 note_name, NT_X86_XSTATE, xfpregs, size);
11317}
11318
97753bd5
AM
11319char *
11320elfcore_write_ppc_vmx (bfd *abfd,
11321 char *buf,
11322 int *bufsiz,
11323 const void *ppc_vmx,
11324 int size)
11325{
11326 char *note_name = "LINUX";
11327 return elfcore_write_note (abfd, buf, bufsiz,
11328 note_name, NT_PPC_VMX, ppc_vmx, size);
11329}
11330
89eeb0bc
LM
11331char *
11332elfcore_write_ppc_vsx (bfd *abfd,
07d6d2b8
AM
11333 char *buf,
11334 int *bufsiz,
11335 const void *ppc_vsx,
11336 int size)
89eeb0bc
LM
11337{
11338 char *note_name = "LINUX";
11339 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11340 note_name, NT_PPC_VSX, ppc_vsx, size);
89eeb0bc
LM
11341}
11342
cb2366c1
EBM
11343char *
11344elfcore_write_ppc_tar (bfd *abfd,
4b24dd1a
AM
11345 char *buf,
11346 int *bufsiz,
11347 const void *ppc_tar,
11348 int size)
cb2366c1
EBM
11349{
11350 char *note_name = "LINUX";
11351 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11352 note_name, NT_PPC_TAR, ppc_tar, size);
cb2366c1
EBM
11353}
11354
11355char *
11356elfcore_write_ppc_ppr (bfd *abfd,
4b24dd1a
AM
11357 char *buf,
11358 int *bufsiz,
11359 const void *ppc_ppr,
11360 int size)
cb2366c1
EBM
11361{
11362 char *note_name = "LINUX";
11363 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11364 note_name, NT_PPC_PPR, ppc_ppr, size);
cb2366c1
EBM
11365}
11366
11367char *
11368elfcore_write_ppc_dscr (bfd *abfd,
4b24dd1a
AM
11369 char *buf,
11370 int *bufsiz,
11371 const void *ppc_dscr,
11372 int size)
cb2366c1
EBM
11373{
11374 char *note_name = "LINUX";
11375 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11376 note_name, NT_PPC_DSCR, ppc_dscr, size);
cb2366c1
EBM
11377}
11378
11379char *
11380elfcore_write_ppc_ebb (bfd *abfd,
4b24dd1a
AM
11381 char *buf,
11382 int *bufsiz,
11383 const void *ppc_ebb,
11384 int size)
cb2366c1
EBM
11385{
11386 char *note_name = "LINUX";
11387 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11388 note_name, NT_PPC_EBB, ppc_ebb, size);
cb2366c1
EBM
11389}
11390
11391char *
11392elfcore_write_ppc_pmu (bfd *abfd,
4b24dd1a
AM
11393 char *buf,
11394 int *bufsiz,
11395 const void *ppc_pmu,
11396 int size)
cb2366c1
EBM
11397{
11398 char *note_name = "LINUX";
11399 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11400 note_name, NT_PPC_PMU, ppc_pmu, size);
cb2366c1
EBM
11401}
11402
11403char *
11404elfcore_write_ppc_tm_cgpr (bfd *abfd,
4b24dd1a
AM
11405 char *buf,
11406 int *bufsiz,
11407 const void *ppc_tm_cgpr,
11408 int size)
cb2366c1
EBM
11409{
11410 char *note_name = "LINUX";
11411 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11412 note_name, NT_PPC_TM_CGPR, ppc_tm_cgpr, size);
cb2366c1
EBM
11413}
11414
11415char *
11416elfcore_write_ppc_tm_cfpr (bfd *abfd,
4b24dd1a
AM
11417 char *buf,
11418 int *bufsiz,
11419 const void *ppc_tm_cfpr,
11420 int size)
cb2366c1
EBM
11421{
11422 char *note_name = "LINUX";
11423 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11424 note_name, NT_PPC_TM_CFPR, ppc_tm_cfpr, size);
cb2366c1
EBM
11425}
11426
11427char *
11428elfcore_write_ppc_tm_cvmx (bfd *abfd,
4b24dd1a
AM
11429 char *buf,
11430 int *bufsiz,
11431 const void *ppc_tm_cvmx,
11432 int size)
cb2366c1
EBM
11433{
11434 char *note_name = "LINUX";
11435 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11436 note_name, NT_PPC_TM_CVMX, ppc_tm_cvmx, size);
cb2366c1
EBM
11437}
11438
11439char *
11440elfcore_write_ppc_tm_cvsx (bfd *abfd,
4b24dd1a
AM
11441 char *buf,
11442 int *bufsiz,
11443 const void *ppc_tm_cvsx,
11444 int size)
cb2366c1
EBM
11445{
11446 char *note_name = "LINUX";
11447 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11448 note_name, NT_PPC_TM_CVSX, ppc_tm_cvsx, size);
cb2366c1
EBM
11449}
11450
11451char *
11452elfcore_write_ppc_tm_spr (bfd *abfd,
4b24dd1a
AM
11453 char *buf,
11454 int *bufsiz,
11455 const void *ppc_tm_spr,
11456 int size)
cb2366c1
EBM
11457{
11458 char *note_name = "LINUX";
11459 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11460 note_name, NT_PPC_TM_SPR, ppc_tm_spr, size);
cb2366c1
EBM
11461}
11462
11463char *
11464elfcore_write_ppc_tm_ctar (bfd *abfd,
4b24dd1a
AM
11465 char *buf,
11466 int *bufsiz,
11467 const void *ppc_tm_ctar,
11468 int size)
cb2366c1
EBM
11469{
11470 char *note_name = "LINUX";
11471 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11472 note_name, NT_PPC_TM_CTAR, ppc_tm_ctar, size);
cb2366c1
EBM
11473}
11474
11475char *
11476elfcore_write_ppc_tm_cppr (bfd *abfd,
4b24dd1a
AM
11477 char *buf,
11478 int *bufsiz,
11479 const void *ppc_tm_cppr,
11480 int size)
cb2366c1
EBM
11481{
11482 char *note_name = "LINUX";
11483 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11484 note_name, NT_PPC_TM_CPPR, ppc_tm_cppr, size);
cb2366c1
EBM
11485}
11486
11487char *
11488elfcore_write_ppc_tm_cdscr (bfd *abfd,
4b24dd1a
AM
11489 char *buf,
11490 int *bufsiz,
11491 const void *ppc_tm_cdscr,
11492 int size)
cb2366c1
EBM
11493{
11494 char *note_name = "LINUX";
11495 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11496 note_name, NT_PPC_TM_CDSCR, ppc_tm_cdscr, size);
cb2366c1
EBM
11497}
11498
0675e188
UW
11499static char *
11500elfcore_write_s390_high_gprs (bfd *abfd,
11501 char *buf,
11502 int *bufsiz,
11503 const void *s390_high_gprs,
11504 int size)
11505{
11506 char *note_name = "LINUX";
11507 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11508 note_name, NT_S390_HIGH_GPRS,
0675e188
UW
11509 s390_high_gprs, size);
11510}
11511
d7eeb400
MS
11512char *
11513elfcore_write_s390_timer (bfd *abfd,
07d6d2b8
AM
11514 char *buf,
11515 int *bufsiz,
11516 const void *s390_timer,
11517 int size)
d7eeb400
MS
11518{
11519 char *note_name = "LINUX";
11520 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11521 note_name, NT_S390_TIMER, s390_timer, size);
d7eeb400
MS
11522}
11523
11524char *
11525elfcore_write_s390_todcmp (bfd *abfd,
07d6d2b8
AM
11526 char *buf,
11527 int *bufsiz,
11528 const void *s390_todcmp,
11529 int size)
d7eeb400
MS
11530{
11531 char *note_name = "LINUX";
11532 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11533 note_name, NT_S390_TODCMP, s390_todcmp, size);
d7eeb400
MS
11534}
11535
11536char *
11537elfcore_write_s390_todpreg (bfd *abfd,
07d6d2b8
AM
11538 char *buf,
11539 int *bufsiz,
11540 const void *s390_todpreg,
11541 int size)
d7eeb400
MS
11542{
11543 char *note_name = "LINUX";
11544 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11545 note_name, NT_S390_TODPREG, s390_todpreg, size);
d7eeb400
MS
11546}
11547
11548char *
11549elfcore_write_s390_ctrs (bfd *abfd,
07d6d2b8
AM
11550 char *buf,
11551 int *bufsiz,
11552 const void *s390_ctrs,
11553 int size)
d7eeb400
MS
11554{
11555 char *note_name = "LINUX";
11556 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11557 note_name, NT_S390_CTRS, s390_ctrs, size);
d7eeb400
MS
11558}
11559
11560char *
11561elfcore_write_s390_prefix (bfd *abfd,
07d6d2b8
AM
11562 char *buf,
11563 int *bufsiz,
11564 const void *s390_prefix,
11565 int size)
d7eeb400
MS
11566{
11567 char *note_name = "LINUX";
11568 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11569 note_name, NT_S390_PREFIX, s390_prefix, size);
d7eeb400
MS
11570}
11571
355b81d9
UW
11572char *
11573elfcore_write_s390_last_break (bfd *abfd,
11574 char *buf,
11575 int *bufsiz,
11576 const void *s390_last_break,
11577 int size)
11578{
11579 char *note_name = "LINUX";
11580 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11581 note_name, NT_S390_LAST_BREAK,
355b81d9
UW
11582 s390_last_break, size);
11583}
11584
11585char *
11586elfcore_write_s390_system_call (bfd *abfd,
11587 char *buf,
11588 int *bufsiz,
11589 const void *s390_system_call,
11590 int size)
11591{
11592 char *note_name = "LINUX";
11593 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11594 note_name, NT_S390_SYSTEM_CALL,
355b81d9
UW
11595 s390_system_call, size);
11596}
11597
abb3f6cc
NC
11598char *
11599elfcore_write_s390_tdb (bfd *abfd,
11600 char *buf,
11601 int *bufsiz,
11602 const void *s390_tdb,
11603 int size)
11604{
11605 char *note_name = "LINUX";
11606 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11607 note_name, NT_S390_TDB, s390_tdb, size);
abb3f6cc
NC
11608}
11609
4ef9f41a
AA
11610char *
11611elfcore_write_s390_vxrs_low (bfd *abfd,
11612 char *buf,
11613 int *bufsiz,
11614 const void *s390_vxrs_low,
11615 int size)
11616{
11617 char *note_name = "LINUX";
11618 return elfcore_write_note (abfd, buf, bufsiz,
11619 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
11620}
11621
11622char *
11623elfcore_write_s390_vxrs_high (bfd *abfd,
11624 char *buf,
11625 int *bufsiz,
11626 const void *s390_vxrs_high,
11627 int size)
11628{
11629 char *note_name = "LINUX";
11630 return elfcore_write_note (abfd, buf, bufsiz,
11631 note_name, NT_S390_VXRS_HIGH,
11632 s390_vxrs_high, size);
11633}
11634
88ab90e8
AA
11635char *
11636elfcore_write_s390_gs_cb (bfd *abfd,
11637 char *buf,
11638 int *bufsiz,
11639 const void *s390_gs_cb,
11640 int size)
11641{
11642 char *note_name = "LINUX";
11643 return elfcore_write_note (abfd, buf, bufsiz,
11644 note_name, NT_S390_GS_CB,
11645 s390_gs_cb, size);
11646}
11647
11648char *
11649elfcore_write_s390_gs_bc (bfd *abfd,
11650 char *buf,
11651 int *bufsiz,
11652 const void *s390_gs_bc,
11653 int size)
11654{
11655 char *note_name = "LINUX";
11656 return elfcore_write_note (abfd, buf, bufsiz,
11657 note_name, NT_S390_GS_BC,
11658 s390_gs_bc, size);
11659}
11660
faa9a424
UW
11661char *
11662elfcore_write_arm_vfp (bfd *abfd,
11663 char *buf,
11664 int *bufsiz,
11665 const void *arm_vfp,
11666 int size)
11667{
11668 char *note_name = "LINUX";
11669 return elfcore_write_note (abfd, buf, bufsiz,
11670 note_name, NT_ARM_VFP, arm_vfp, size);
11671}
11672
652451f8
YZ
11673char *
11674elfcore_write_aarch_tls (bfd *abfd,
11675 char *buf,
11676 int *bufsiz,
11677 const void *aarch_tls,
11678 int size)
11679{
11680 char *note_name = "LINUX";
11681 return elfcore_write_note (abfd, buf, bufsiz,
11682 note_name, NT_ARM_TLS, aarch_tls, size);
11683}
11684
11685char *
11686elfcore_write_aarch_hw_break (bfd *abfd,
11687 char *buf,
11688 int *bufsiz,
11689 const void *aarch_hw_break,
11690 int size)
11691{
11692 char *note_name = "LINUX";
11693 return elfcore_write_note (abfd, buf, bufsiz,
11694 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
11695}
11696
11697char *
11698elfcore_write_aarch_hw_watch (bfd *abfd,
11699 char *buf,
11700 int *bufsiz,
11701 const void *aarch_hw_watch,
11702 int size)
11703{
11704 char *note_name = "LINUX";
11705 return elfcore_write_note (abfd, buf, bufsiz,
11706 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
11707}
11708
ad1cc4e4
AH
11709char *
11710elfcore_write_aarch_sve (bfd *abfd,
11711 char *buf,
11712 int *bufsiz,
11713 const void *aarch_sve,
11714 int size)
11715{
11716 char *note_name = "LINUX";
11717 return elfcore_write_note (abfd, buf, bufsiz,
11718 note_name, NT_ARM_SVE, aarch_sve, size);
11719}
11720
e6c3b5bf
AH
11721char *
11722elfcore_write_aarch_pauth (bfd *abfd,
11723 char *buf,
11724 int *bufsiz,
11725 const void *aarch_pauth,
11726 int size)
11727{
11728 char *note_name = "LINUX";
11729 return elfcore_write_note (abfd, buf, bufsiz,
11730 note_name, NT_ARM_PAC_MASK, aarch_pauth, size);
11731}
11732
bb864ac1
CES
11733char *
11734elfcore_write_register_note (bfd *abfd,
11735 char *buf,
11736 int *bufsiz,
11737 const char *section,
11738 const void *data,
11739 int size)
11740{
11741 if (strcmp (section, ".reg2") == 0)
11742 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
11743 if (strcmp (section, ".reg-xfp") == 0)
11744 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
11745 if (strcmp (section, ".reg-xstate") == 0)
11746 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
11747 if (strcmp (section, ".reg-ppc-vmx") == 0)
11748 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
11749 if (strcmp (section, ".reg-ppc-vsx") == 0)
11750 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
cb2366c1
EBM
11751 if (strcmp (section, ".reg-ppc-tar") == 0)
11752 return elfcore_write_ppc_tar (abfd, buf, bufsiz, data, size);
11753 if (strcmp (section, ".reg-ppc-ppr") == 0)
11754 return elfcore_write_ppc_ppr (abfd, buf, bufsiz, data, size);
11755 if (strcmp (section, ".reg-ppc-dscr") == 0)
11756 return elfcore_write_ppc_dscr (abfd, buf, bufsiz, data, size);
11757 if (strcmp (section, ".reg-ppc-ebb") == 0)
11758 return elfcore_write_ppc_ebb (abfd, buf, bufsiz, data, size);
11759 if (strcmp (section, ".reg-ppc-pmu") == 0)
11760 return elfcore_write_ppc_pmu (abfd, buf, bufsiz, data, size);
11761 if (strcmp (section, ".reg-ppc-tm-cgpr") == 0)
11762 return elfcore_write_ppc_tm_cgpr (abfd, buf, bufsiz, data, size);
11763 if (strcmp (section, ".reg-ppc-tm-cfpr") == 0)
11764 return elfcore_write_ppc_tm_cfpr (abfd, buf, bufsiz, data, size);
11765 if (strcmp (section, ".reg-ppc-tm-cvmx") == 0)
11766 return elfcore_write_ppc_tm_cvmx (abfd, buf, bufsiz, data, size);
11767 if (strcmp (section, ".reg-ppc-tm-cvsx") == 0)
11768 return elfcore_write_ppc_tm_cvsx (abfd, buf, bufsiz, data, size);
11769 if (strcmp (section, ".reg-ppc-tm-spr") == 0)
11770 return elfcore_write_ppc_tm_spr (abfd, buf, bufsiz, data, size);
11771 if (strcmp (section, ".reg-ppc-tm-ctar") == 0)
11772 return elfcore_write_ppc_tm_ctar (abfd, buf, bufsiz, data, size);
11773 if (strcmp (section, ".reg-ppc-tm-cppr") == 0)
11774 return elfcore_write_ppc_tm_cppr (abfd, buf, bufsiz, data, size);
11775 if (strcmp (section, ".reg-ppc-tm-cdscr") == 0)
11776 return elfcore_write_ppc_tm_cdscr (abfd, buf, bufsiz, data, size);
0675e188
UW
11777 if (strcmp (section, ".reg-s390-high-gprs") == 0)
11778 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
11779 if (strcmp (section, ".reg-s390-timer") == 0)
11780 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
11781 if (strcmp (section, ".reg-s390-todcmp") == 0)
11782 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
11783 if (strcmp (section, ".reg-s390-todpreg") == 0)
11784 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
11785 if (strcmp (section, ".reg-s390-ctrs") == 0)
11786 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
11787 if (strcmp (section, ".reg-s390-prefix") == 0)
11788 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
355b81d9
UW
11789 if (strcmp (section, ".reg-s390-last-break") == 0)
11790 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
11791 if (strcmp (section, ".reg-s390-system-call") == 0)
11792 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
abb3f6cc
NC
11793 if (strcmp (section, ".reg-s390-tdb") == 0)
11794 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
4ef9f41a
AA
11795 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
11796 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
11797 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
11798 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
88ab90e8
AA
11799 if (strcmp (section, ".reg-s390-gs-cb") == 0)
11800 return elfcore_write_s390_gs_cb (abfd, buf, bufsiz, data, size);
11801 if (strcmp (section, ".reg-s390-gs-bc") == 0)
11802 return elfcore_write_s390_gs_bc (abfd, buf, bufsiz, data, size);
faa9a424
UW
11803 if (strcmp (section, ".reg-arm-vfp") == 0)
11804 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
652451f8
YZ
11805 if (strcmp (section, ".reg-aarch-tls") == 0)
11806 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
11807 if (strcmp (section, ".reg-aarch-hw-break") == 0)
11808 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
11809 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
11810 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
ad1cc4e4
AH
11811 if (strcmp (section, ".reg-aarch-sve") == 0)
11812 return elfcore_write_aarch_sve (abfd, buf, bufsiz, data, size);
e6c3b5bf
AH
11813 if (strcmp (section, ".reg-aarch-pauth") == 0)
11814 return elfcore_write_aarch_pauth (abfd, buf, bufsiz, data, size);
bb864ac1
CES
11815 return NULL;
11816}
11817
b34976b6 11818static bfd_boolean
276da9b3
L
11819elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset,
11820 size_t align)
252b5132 11821{
c044fabd 11822 char *p;
252b5132 11823
276da9b3
L
11824 /* NB: CORE PT_NOTE segments may have p_align values of 0 or 1.
11825 gABI specifies that PT_NOTE alignment should be aligned to 4
11826 bytes for 32-bit objects and to 8 bytes for 64-bit objects. If
11827 align is less than 4, we use 4 byte alignment. */
11828 if (align < 4)
11829 align = 4;
ef135d43
NC
11830 if (align != 4 && align != 8)
11831 return FALSE;
276da9b3 11832
252b5132
RH
11833 p = buf;
11834 while (p < buf + size)
11835 {
c044fabd 11836 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
11837 Elf_Internal_Note in;
11838
baea7ef1
AM
11839 if (offsetof (Elf_External_Note, name) > buf - p + size)
11840 return FALSE;
11841
dc810e39 11842 in.type = H_GET_32 (abfd, xnp->type);
252b5132 11843
dc810e39 11844 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 11845 in.namedata = xnp->name;
baea7ef1
AM
11846 if (in.namesz > buf - in.namedata + size)
11847 return FALSE;
252b5132 11848
dc810e39 11849 in.descsz = H_GET_32 (abfd, xnp->descsz);
276da9b3 11850 in.descdata = p + ELF_NOTE_DESC_OFFSET (in.namesz, align);
252b5132 11851 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
11852 if (in.descsz != 0
11853 && (in.descdata >= buf + size
11854 || in.descsz > buf - in.descdata + size))
11855 return FALSE;
252b5132 11856
718175fa 11857 switch (bfd_get_format (abfd))
07d6d2b8 11858 {
718175fa
JK
11859 default:
11860 return TRUE;
11861
11862 case bfd_core:
f64e188b 11863 {
8acbedd6 11864#define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
f64e188b 11865 struct
718175fa 11866 {
f64e188b 11867 const char * string;
8acbedd6 11868 size_t len;
f64e188b 11869 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
718175fa 11870 }
f64e188b 11871 grokers[] =
b15fa79e 11872 {
8acbedd6 11873 GROKER_ELEMENT ("", elfcore_grok_note),
aa1ed4a9 11874 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
8acbedd6
KS
11875 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
11876 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
11877 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
864619bb
KS
11878 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note),
11879 GROKER_ELEMENT ("GNU", elfobj_grok_gnu_note)
f64e188b 11880 };
8acbedd6 11881#undef GROKER_ELEMENT
f64e188b
NC
11882 int i;
11883
11884 for (i = ARRAY_SIZE (grokers); i--;)
8acbedd6
KS
11885 {
11886 if (in.namesz >= grokers[i].len
11887 && strncmp (in.namedata, grokers[i].string,
11888 grokers[i].len) == 0)
11889 {
11890 if (! grokers[i].func (abfd, & in))
11891 return FALSE;
11892 break;
11893 }
11894 }
f64e188b
NC
11895 break;
11896 }
718175fa
JK
11897
11898 case bfd_object:
11899 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
11900 {
11901 if (! elfobj_grok_gnu_note (abfd, &in))
11902 return FALSE;
11903 }
e21e5835
NC
11904 else if (in.namesz == sizeof "stapsdt"
11905 && strcmp (in.namedata, "stapsdt") == 0)
11906 {
11907 if (! elfobj_grok_stapsdt_note (abfd, &in))
11908 return FALSE;
11909 }
718175fa 11910 break;
08a40648 11911 }
252b5132 11912
276da9b3 11913 p += ELF_NOTE_NEXT_OFFSET (in.namesz, in.descsz, align);
252b5132
RH
11914 }
11915
718175fa
JK
11916 return TRUE;
11917}
11918
864619bb 11919bfd_boolean
276da9b3
L
11920elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size,
11921 size_t align)
718175fa
JK
11922{
11923 char *buf;
11924
957e1fc1 11925 if (size == 0 || (size + 1) == 0)
718175fa
JK
11926 return TRUE;
11927
11928 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
11929 return FALSE;
11930
2bb3687b 11931 buf = (char *) _bfd_malloc_and_read (abfd, size + 1, size);
718175fa
JK
11932 if (buf == NULL)
11933 return FALSE;
11934
f64e188b
NC
11935 /* PR 17512: file: ec08f814
11936 0-termintate the buffer so that string searches will not overflow. */
11937 buf[size] = 0;
11938
2bb3687b 11939 if (!elf_parse_notes (abfd, buf, size, offset, align))
718175fa
JK
11940 {
11941 free (buf);
11942 return FALSE;
11943 }
11944
252b5132 11945 free (buf);
b34976b6 11946 return TRUE;
252b5132 11947}
98d8431c
JB
11948\f
11949/* Providing external access to the ELF program header table. */
11950
11951/* Return an upper bound on the number of bytes required to store a
11952 copy of ABFD's program header table entries. Return -1 if an error
11953 occurs; bfd_get_error will return an appropriate code. */
c044fabd 11954
98d8431c 11955long
217aa764 11956bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
11957{
11958 if (abfd->xvec->flavour != bfd_target_elf_flavour)
11959 {
11960 bfd_set_error (bfd_error_wrong_format);
11961 return -1;
11962 }
11963
936e320b 11964 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
11965}
11966
98d8431c
JB
11967/* Copy ABFD's program header table entries to *PHDRS. The entries
11968 will be stored as an array of Elf_Internal_Phdr structures, as
11969 defined in include/elf/internal.h. To find out how large the
11970 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
11971
11972 Return the number of program header table entries read, or -1 if an
11973 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 11974
98d8431c 11975int
217aa764 11976bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
11977{
11978 int num_phdrs;
11979
11980 if (abfd->xvec->flavour != bfd_target_elf_flavour)
11981 {
11982 bfd_set_error (bfd_error_wrong_format);
11983 return -1;
11984 }
11985
11986 num_phdrs = elf_elfheader (abfd)->e_phnum;
01bcaf63
TT
11987 if (num_phdrs != 0)
11988 memcpy (phdrs, elf_tdata (abfd)->phdr,
11989 num_phdrs * sizeof (Elf_Internal_Phdr));
98d8431c
JB
11990
11991 return num_phdrs;
11992}
ae4221d7 11993
db6751f2 11994enum elf_reloc_type_class
7e612e98
AM
11995_bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
11996 const asection *rel_sec ATTRIBUTE_UNUSED,
11997 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
11998{
11999 return reloc_class_normal;
12000}
f8df10f4 12001
47d9a591 12002/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
12003 relocation against a local symbol. */
12004
12005bfd_vma
217aa764
AM
12006_bfd_elf_rela_local_sym (bfd *abfd,
12007 Elf_Internal_Sym *sym,
8517fae7 12008 asection **psec,
217aa764 12009 Elf_Internal_Rela *rel)
f8df10f4 12010{
8517fae7 12011 asection *sec = *psec;
f8df10f4
JJ
12012 bfd_vma relocation;
12013
6835821b
AM
12014 relocation = (sec->output_section->vma
12015 + sec->output_offset
12016 + sym->st_value);
f8df10f4 12017 if ((sec->flags & SEC_MERGE)
c629eae0 12018 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 12019 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
f8df10f4 12020 {
f8df10f4 12021 rel->r_addend =
8517fae7 12022 _bfd_merged_section_offset (abfd, psec,
65765700 12023 elf_section_data (sec)->sec_info,
753731ee
AM
12024 sym->st_value + rel->r_addend);
12025 if (sec != *psec)
12026 {
12027 /* If we have changed the section, and our original section is
12028 marked with SEC_EXCLUDE, it means that the original
12029 SEC_MERGE section has been completely subsumed in some
12030 other SEC_MERGE section. In this case, we need to leave
12031 some info around for --emit-relocs. */
12032 if ((sec->flags & SEC_EXCLUDE) != 0)
12033 sec->kept_section = *psec;
12034 sec = *psec;
12035 }
8517fae7
AM
12036 rel->r_addend -= relocation;
12037 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
12038 }
12039 return relocation;
12040}
c629eae0
JJ
12041
12042bfd_vma
217aa764
AM
12043_bfd_elf_rel_local_sym (bfd *abfd,
12044 Elf_Internal_Sym *sym,
12045 asection **psec,
12046 bfd_vma addend)
47d9a591 12047{
c629eae0
JJ
12048 asection *sec = *psec;
12049
6835821b 12050 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
c629eae0
JJ
12051 return sym->st_value + addend;
12052
12053 return _bfd_merged_section_offset (abfd, psec,
65765700 12054 elf_section_data (sec)->sec_info,
753731ee 12055 sym->st_value + addend);
c629eae0
JJ
12056}
12057
37b01f6a
DG
12058/* Adjust an address within a section. Given OFFSET within SEC, return
12059 the new offset within the section, based upon changes made to the
12060 section. Returns -1 if the offset is now invalid.
12061 The offset (in abnd out) is in target sized bytes, however big a
12062 byte may be. */
12063
c629eae0 12064bfd_vma
217aa764 12065_bfd_elf_section_offset (bfd *abfd,
92e4ec35 12066 struct bfd_link_info *info,
217aa764
AM
12067 asection *sec,
12068 bfd_vma offset)
c629eae0 12069{
68bfbfcc 12070 switch (sec->sec_info_type)
65765700 12071 {
dbaa2011 12072 case SEC_INFO_TYPE_STABS:
eea6121a
AM
12073 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
12074 offset);
dbaa2011 12075 case SEC_INFO_TYPE_EH_FRAME:
92e4ec35 12076 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
37b01f6a 12077
65765700 12078 default:
310fd250
L
12079 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
12080 {
37b01f6a 12081 /* Reverse the offset. */
310fd250
L
12082 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12083 bfd_size_type address_size = bed->s->arch_size / 8;
37b01f6a
DG
12084
12085 /* address_size and sec->size are in octets. Convert
12086 to bytes before subtracting the original offset. */
61826503 12087 offset = ((sec->size - address_size)
bb294208 12088 / bfd_octets_per_byte (abfd, sec) - offset);
310fd250 12089 }
65765700
JJ
12090 return offset;
12091 }
c629eae0 12092}
3333a7c3
RM
12093\f
12094/* Create a new BFD as if by bfd_openr. Rather than opening a file,
12095 reconstruct an ELF file by reading the segments out of remote memory
12096 based on the ELF file header at EHDR_VMA and the ELF program headers it
12097 points to. If not null, *LOADBASEP is filled in with the difference
12098 between the VMAs from which the segments were read, and the VMAs the
12099 file headers (and hence BFD's idea of each section's VMA) put them at.
12100
12101 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
12102 remote memory at target address VMA into the local buffer at MYADDR; it
12103 should return zero on success or an `errno' code on failure. TEMPL must
12104 be a BFD for an ELF target with the word size and byte order found in
12105 the remote memory. */
12106
12107bfd *
217aa764
AM
12108bfd_elf_bfd_from_remote_memory
12109 (bfd *templ,
12110 bfd_vma ehdr_vma,
f0a5d95a 12111 bfd_size_type size,
217aa764 12112 bfd_vma *loadbasep,
fe78531d 12113 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
3333a7c3
RM
12114{
12115 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
5979d6b6 12116 (templ, ehdr_vma, size, loadbasep, target_read_memory);
3333a7c3 12117}
4c45e5c9
JJ
12118\f
12119long
c9727e01
AM
12120_bfd_elf_get_synthetic_symtab (bfd *abfd,
12121 long symcount ATTRIBUTE_UNUSED,
12122 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 12123 long dynsymcount,
c9727e01
AM
12124 asymbol **dynsyms,
12125 asymbol **ret)
4c45e5c9
JJ
12126{
12127 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12128 asection *relplt;
12129 asymbol *s;
12130 const char *relplt_name;
12131 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
12132 arelent *p;
12133 long count, i, n;
12134 size_t size;
12135 Elf_Internal_Shdr *hdr;
12136 char *names;
12137 asection *plt;
12138
8615f3f2
AM
12139 *ret = NULL;
12140
90e3cdf2
JJ
12141 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
12142 return 0;
12143
8615f3f2
AM
12144 if (dynsymcount <= 0)
12145 return 0;
12146
4c45e5c9
JJ
12147 if (!bed->plt_sym_val)
12148 return 0;
12149
12150 relplt_name = bed->relplt_name;
12151 if (relplt_name == NULL)
d35fd659 12152 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
12153 relplt = bfd_get_section_by_name (abfd, relplt_name);
12154 if (relplt == NULL)
12155 return 0;
12156
12157 hdr = &elf_section_data (relplt)->this_hdr;
12158 if (hdr->sh_link != elf_dynsymtab (abfd)
12159 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
12160 return 0;
12161
12162 plt = bfd_get_section_by_name (abfd, ".plt");
12163 if (plt == NULL)
12164 return 0;
12165
12166 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 12167 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
12168 return -1;
12169
eea6121a 12170 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
12171 size = count * sizeof (asymbol);
12172 p = relplt->relocation;
cb53bf42 12173 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
12174 {
12175 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
12176 if (p->addend != 0)
12177 {
12178#ifdef BFD64
12179 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
12180#else
12181 size += sizeof ("+0x") - 1 + 8;
12182#endif
12183 }
12184 }
4c45e5c9 12185
a50b1753 12186 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
12187 if (s == NULL)
12188 return -1;
12189
12190 names = (char *) (s + count);
12191 p = relplt->relocation;
12192 n = 0;
cb53bf42 12193 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
12194 {
12195 size_t len;
12196 bfd_vma addr;
12197
12198 addr = bed->plt_sym_val (i, plt, p);
12199 if (addr == (bfd_vma) -1)
12200 continue;
12201
12202 *s = **p->sym_ptr_ptr;
65a7a66f
AM
12203 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
12204 we are defining a symbol, ensure one of them is set. */
12205 if ((s->flags & BSF_LOCAL) == 0)
12206 s->flags |= BSF_GLOBAL;
6ba2a415 12207 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
12208 s->section = plt;
12209 s->value = addr - plt->vma;
12210 s->name = names;
8f39ba8e 12211 s->udata.p = NULL;
4c45e5c9
JJ
12212 len = strlen ((*p->sym_ptr_ptr)->name);
12213 memcpy (names, (*p->sym_ptr_ptr)->name, len);
12214 names += len;
041de40d
AM
12215 if (p->addend != 0)
12216 {
1d770845 12217 char buf[30], *a;
d324f6d6 12218
041de40d
AM
12219 memcpy (names, "+0x", sizeof ("+0x") - 1);
12220 names += sizeof ("+0x") - 1;
1d770845
L
12221 bfd_sprintf_vma (abfd, buf, p->addend);
12222 for (a = buf; *a == '0'; ++a)
12223 ;
12224 len = strlen (a);
12225 memcpy (names, a, len);
12226 names += len;
041de40d 12227 }
4c45e5c9
JJ
12228 memcpy (names, "@plt", sizeof ("@plt"));
12229 names += sizeof ("@plt");
8f39ba8e 12230 ++s, ++n;
4c45e5c9
JJ
12231 }
12232
12233 return n;
12234}
3d7f7666 12235
821e6ff6
AM
12236/* It is only used by x86-64 so far.
12237 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
7eacd66b
AM
12238 but current usage would allow all of _bfd_std_section to be zero. */
12239static const asymbol lcomm_sym
12240 = GLOBAL_SYM_INIT ("LARGE_COMMON", &_bfd_elf_large_com_section);
3b22753a 12241asection _bfd_elf_large_com_section
7eacd66b 12242 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, &lcomm_sym,
821e6ff6 12243 "LARGE_COMMON", 0, SEC_IS_COMMON);
ecca9871 12244
cc364be6
AM
12245bfd_boolean
12246_bfd_elf_final_write_processing (bfd *abfd)
06f44071
AM
12247{
12248 Elf_Internal_Ehdr *i_ehdrp; /* ELF file header, internal form. */
d1036acb
L
12249
12250 i_ehdrp = elf_elfheader (abfd);
12251
06f44071
AM
12252 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12253 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23 12254
df3a023b
AM
12255 /* Set the osabi field to ELFOSABI_GNU if the binary contains
12256 SHF_GNU_MBIND sections or symbols of STT_GNU_IFUNC type or
12257 STB_GNU_UNIQUE binding. */
cc364be6
AM
12258 if (elf_tdata (abfd)->has_gnu_osabi != 0)
12259 {
12260 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12261 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
12262 else if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU
12263 && i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_FREEBSD)
12264 {
12265 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind)
12266 _bfd_error_handler (_("GNU_MBIND section is unsupported"));
12267 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_ifunc)
12268 _bfd_error_handler (_("symbol type STT_GNU_IFUNC is unsupported"));
12269 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_unique)
12270 _bfd_error_handler (_("symbol binding STB_GNU_UNIQUE is unsupported"));
9aea1e31 12271 bfd_set_error (bfd_error_sorry);
cc364be6
AM
12272 return FALSE;
12273 }
12274 }
12275 return TRUE;
d1036acb 12276}
fcb93ecf
PB
12277
12278
12279/* Return TRUE for ELF symbol types that represent functions.
12280 This is the default version of this function, which is sufficient for
d8045f23 12281 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
12282
12283bfd_boolean
12284_bfd_elf_is_function_type (unsigned int type)
12285{
d8045f23
NC
12286 return (type == STT_FUNC
12287 || type == STT_GNU_IFUNC);
fcb93ecf 12288}
9f296da3 12289
aef36ac1
AM
12290/* If the ELF symbol SYM might be a function in SEC, return the
12291 function size and set *CODE_OFF to the function's entry point,
12292 otherwise return zero. */
9f296da3 12293
aef36ac1
AM
12294bfd_size_type
12295_bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
12296 bfd_vma *code_off)
9f296da3 12297{
aef36ac1
AM
12298 bfd_size_type size;
12299
ff9e0f5b 12300 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
aef36ac1
AM
12301 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
12302 || sym->section != sec)
12303 return 0;
ff9e0f5b 12304
ff9e0f5b 12305 *code_off = sym->value;
aef36ac1
AM
12306 size = 0;
12307 if (!(sym->flags & BSF_SYNTHETIC))
12308 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
12309 if (size == 0)
12310 size = 1;
12311 return size;
9f296da3 12312}