]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
Automatic date update in version.in
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91 2
6f2750fe 3 Copyright (C) 1993-2016 Free Software Foundation, Inc.
252b5132 4
5e8d7549 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
5e8d7549
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
5e8d7549 10 (at your option) any later version.
252b5132 11
5e8d7549
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
5e8d7549 17 You should have received a copy of the GNU General Public License
b34976b6 18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132 22
1b74d094
BW
23/*
24SECTION
252b5132
RH
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
661a3fd4 33 haven't bothered yet. */
252b5132 34
7ee38065
MS
35/* For sparc64-cross-sparc32. */
36#define _SYSCALL32
252b5132 37#include "sysdep.h"
3db64b00 38#include "bfd.h"
252b5132
RH
39#include "bfdlink.h"
40#include "libbfd.h"
41#define ARCH_SIZE 0
42#include "elf-bfd.h"
e0e8c97f 43#include "libiberty.h"
ff59fc36 44#include "safe-ctype.h"
de64ce13 45#include "elf-linux-core.h"
252b5132 46
8bc7f138
L
47#ifdef CORE_HEADER
48#include CORE_HEADER
49#endif
50
217aa764 51static int elf_sort_sections (const void *, const void *);
c84fca4d 52static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764 53static bfd_boolean prep_headers (bfd *);
ef10c3ac 54static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int) ;
718175fa
JK
55static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
56static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
57 file_ptr offset);
50b2bdb7 58
252b5132
RH
59/* Swap version information in and out. The version information is
60 currently size independent. If that ever changes, this code will
61 need to move into elfcode.h. */
62
63/* Swap in a Verdef structure. */
64
65void
217aa764
AM
66_bfd_elf_swap_verdef_in (bfd *abfd,
67 const Elf_External_Verdef *src,
68 Elf_Internal_Verdef *dst)
252b5132 69{
dc810e39
AM
70 dst->vd_version = H_GET_16 (abfd, src->vd_version);
71 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
72 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
73 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
74 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
75 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
76 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
77}
78
79/* Swap out a Verdef structure. */
80
81void
217aa764
AM
82_bfd_elf_swap_verdef_out (bfd *abfd,
83 const Elf_Internal_Verdef *src,
84 Elf_External_Verdef *dst)
252b5132 85{
dc810e39
AM
86 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
87 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
88 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
89 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
90 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
91 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
92 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
93}
94
95/* Swap in a Verdaux structure. */
96
97void
217aa764
AM
98_bfd_elf_swap_verdaux_in (bfd *abfd,
99 const Elf_External_Verdaux *src,
100 Elf_Internal_Verdaux *dst)
252b5132 101{
dc810e39
AM
102 dst->vda_name = H_GET_32 (abfd, src->vda_name);
103 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
104}
105
106/* Swap out a Verdaux structure. */
107
108void
217aa764
AM
109_bfd_elf_swap_verdaux_out (bfd *abfd,
110 const Elf_Internal_Verdaux *src,
111 Elf_External_Verdaux *dst)
252b5132 112{
dc810e39
AM
113 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
114 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
115}
116
117/* Swap in a Verneed structure. */
118
119void
217aa764
AM
120_bfd_elf_swap_verneed_in (bfd *abfd,
121 const Elf_External_Verneed *src,
122 Elf_Internal_Verneed *dst)
252b5132 123{
dc810e39
AM
124 dst->vn_version = H_GET_16 (abfd, src->vn_version);
125 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
126 dst->vn_file = H_GET_32 (abfd, src->vn_file);
127 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
128 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
129}
130
131/* Swap out a Verneed structure. */
132
133void
217aa764
AM
134_bfd_elf_swap_verneed_out (bfd *abfd,
135 const Elf_Internal_Verneed *src,
136 Elf_External_Verneed *dst)
252b5132 137{
dc810e39
AM
138 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
139 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
140 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
141 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
142 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
143}
144
145/* Swap in a Vernaux structure. */
146
147void
217aa764
AM
148_bfd_elf_swap_vernaux_in (bfd *abfd,
149 const Elf_External_Vernaux *src,
150 Elf_Internal_Vernaux *dst)
252b5132 151{
dc810e39
AM
152 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
153 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
154 dst->vna_other = H_GET_16 (abfd, src->vna_other);
155 dst->vna_name = H_GET_32 (abfd, src->vna_name);
156 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
157}
158
159/* Swap out a Vernaux structure. */
160
161void
217aa764
AM
162_bfd_elf_swap_vernaux_out (bfd *abfd,
163 const Elf_Internal_Vernaux *src,
164 Elf_External_Vernaux *dst)
252b5132 165{
dc810e39
AM
166 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
167 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
168 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
169 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
170 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
171}
172
173/* Swap in a Versym structure. */
174
175void
217aa764
AM
176_bfd_elf_swap_versym_in (bfd *abfd,
177 const Elf_External_Versym *src,
178 Elf_Internal_Versym *dst)
252b5132 179{
dc810e39 180 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
181}
182
183/* Swap out a Versym structure. */
184
185void
217aa764
AM
186_bfd_elf_swap_versym_out (bfd *abfd,
187 const Elf_Internal_Versym *src,
188 Elf_External_Versym *dst)
252b5132 189{
dc810e39 190 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
191}
192
193/* Standard ELF hash function. Do not change this function; you will
194 cause invalid hash tables to be generated. */
3a99b017 195
252b5132 196unsigned long
217aa764 197bfd_elf_hash (const char *namearg)
252b5132 198{
3a99b017 199 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
200 unsigned long h = 0;
201 unsigned long g;
202 int ch;
203
204 while ((ch = *name++) != '\0')
205 {
206 h = (h << 4) + ch;
207 if ((g = (h & 0xf0000000)) != 0)
208 {
209 h ^= g >> 24;
210 /* The ELF ABI says `h &= ~g', but this is equivalent in
211 this case and on some machines one insn instead of two. */
212 h ^= g;
213 }
214 }
32dfa85d 215 return h & 0xffffffff;
252b5132
RH
216}
217
fdc90cb4
JJ
218/* DT_GNU_HASH hash function. Do not change this function; you will
219 cause invalid hash tables to be generated. */
220
221unsigned long
222bfd_elf_gnu_hash (const char *namearg)
223{
224 const unsigned char *name = (const unsigned char *) namearg;
225 unsigned long h = 5381;
226 unsigned char ch;
227
228 while ((ch = *name++) != '\0')
229 h = (h << 5) + h + ch;
230 return h & 0xffffffff;
231}
232
0c8d6e5c
AM
233/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
234 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 235bfd_boolean
0c8d6e5c 236bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 237 size_t object_size,
4dfe6ac6 238 enum elf_target_id object_id)
252b5132 239{
0ffa91dd
NC
240 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
241 abfd->tdata.any = bfd_zalloc (abfd, object_size);
242 if (abfd->tdata.any == NULL)
243 return FALSE;
252b5132 244
0ffa91dd 245 elf_object_id (abfd) = object_id;
c0355132
AM
246 if (abfd->direction != read_direction)
247 {
248 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
249 if (o == NULL)
250 return FALSE;
251 elf_tdata (abfd)->o = o;
252 elf_program_header_size (abfd) = (bfd_size_type) -1;
253 }
b34976b6 254 return TRUE;
252b5132
RH
255}
256
0ffa91dd
NC
257
258bfd_boolean
ae95ffa6 259bfd_elf_make_object (bfd *abfd)
0ffa91dd 260{
ae95ffa6 261 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 262 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 263 bed->target_id);
0ffa91dd
NC
264}
265
b34976b6 266bfd_boolean
217aa764 267bfd_elf_mkcorefile (bfd *abfd)
252b5132 268{
c044fabd 269 /* I think this can be done just like an object file. */
228e534f
AM
270 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
271 return FALSE;
272 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
273 return elf_tdata (abfd)->core != NULL;
252b5132
RH
274}
275
72a80a16 276static char *
217aa764 277bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
278{
279 Elf_Internal_Shdr **i_shdrp;
f075ee0c 280 bfd_byte *shstrtab = NULL;
dc810e39
AM
281 file_ptr offset;
282 bfd_size_type shstrtabsize;
252b5132
RH
283
284 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
285 if (i_shdrp == 0
286 || shindex >= elf_numsections (abfd)
287 || i_shdrp[shindex] == 0)
f075ee0c 288 return NULL;
252b5132 289
f075ee0c 290 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
291 if (shstrtab == NULL)
292 {
c044fabd 293 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
294 offset = i_shdrp[shindex]->sh_offset;
295 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
296
297 /* Allocate and clear an extra byte at the end, to prevent crashes
298 in case the string table is not terminated. */
3471d59d 299 if (shstrtabsize + 1 <= 1
06614111
NC
300 || bfd_seek (abfd, offset, SEEK_SET) != 0
301 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL)
c6c60d09
JJ
302 shstrtab = NULL;
303 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
304 {
305 if (bfd_get_error () != bfd_error_system_call)
306 bfd_set_error (bfd_error_file_truncated);
06614111 307 bfd_release (abfd, shstrtab);
c6c60d09 308 shstrtab = NULL;
3471d59d
CC
309 /* Once we've failed to read it, make sure we don't keep
310 trying. Otherwise, we'll keep allocating space for
311 the string table over and over. */
312 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
313 }
314 else
315 shstrtab[shstrtabsize] = '\0';
217aa764 316 i_shdrp[shindex]->contents = shstrtab;
252b5132 317 }
f075ee0c 318 return (char *) shstrtab;
252b5132
RH
319}
320
321char *
217aa764
AM
322bfd_elf_string_from_elf_section (bfd *abfd,
323 unsigned int shindex,
324 unsigned int strindex)
252b5132
RH
325{
326 Elf_Internal_Shdr *hdr;
327
328 if (strindex == 0)
329 return "";
330
74f2e02b
AM
331 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
332 return NULL;
333
252b5132
RH
334 hdr = elf_elfsections (abfd)[shindex];
335
06614111
NC
336 if (hdr->contents == NULL)
337 {
338 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
339 {
340 /* PR 17512: file: f057ec89. */
341 _bfd_error_handler (_("%B: attempt to load strings from a non-string section (number %d)"),
342 abfd, shindex);
343 return NULL;
344 }
b1fa9dd6 345
06614111
NC
346 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
347 return NULL;
348 }
252b5132
RH
349
350 if (strindex >= hdr->sh_size)
351 {
1b3a8575 352 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 353 (*_bfd_error_handler)
d003868e
AM
354 (_("%B: invalid string offset %u >= %lu for section `%s'"),
355 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 356 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 357 ? ".shstrtab"
1b3a8575 358 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 359 return NULL;
252b5132
RH
360 }
361
362 return ((char *) hdr->contents) + strindex;
363}
364
6cdc0ccc
AM
365/* Read and convert symbols to internal format.
366 SYMCOUNT specifies the number of symbols to read, starting from
367 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
368 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
369 symbols, and symbol section index extensions, respectively.
370 Returns a pointer to the internal symbol buffer (malloced if necessary)
371 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
372
373Elf_Internal_Sym *
217aa764
AM
374bfd_elf_get_elf_syms (bfd *ibfd,
375 Elf_Internal_Shdr *symtab_hdr,
376 size_t symcount,
377 size_t symoffset,
378 Elf_Internal_Sym *intsym_buf,
379 void *extsym_buf,
380 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
381{
382 Elf_Internal_Shdr *shndx_hdr;
217aa764 383 void *alloc_ext;
df622259 384 const bfd_byte *esym;
6cdc0ccc
AM
385 Elf_External_Sym_Shndx *alloc_extshndx;
386 Elf_External_Sym_Shndx *shndx;
4dd07732 387 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
388 Elf_Internal_Sym *isym;
389 Elf_Internal_Sym *isymend;
9c5bfbb7 390 const struct elf_backend_data *bed;
6cdc0ccc
AM
391 size_t extsym_size;
392 bfd_size_type amt;
393 file_ptr pos;
394
e44a2c9c
AM
395 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
396 abort ();
397
6cdc0ccc
AM
398 if (symcount == 0)
399 return intsym_buf;
400
401 /* Normal syms might have section extension entries. */
402 shndx_hdr = NULL;
6a40cf0c
NC
403 if (elf_symtab_shndx_list (ibfd) != NULL)
404 {
405 elf_section_list * entry;
406 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
407
408 /* Find an index section that is linked to this symtab section. */
409 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
410 if (sections[entry->hdr.sh_link] == symtab_hdr)
411 {
412 shndx_hdr = & entry->hdr;
413 break;
414 };
415
416 if (shndx_hdr == NULL)
417 {
418 if (symtab_hdr == & elf_symtab_hdr (ibfd))
419 /* Not really accurate, but this was how the old code used to work. */
420 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
421 /* Otherwise we do nothing. The assumption is that
422 the index table will not be needed. */
423 }
424 }
6cdc0ccc
AM
425
426 /* Read the symbols. */
427 alloc_ext = NULL;
428 alloc_extshndx = NULL;
4dd07732 429 alloc_intsym = NULL;
6cdc0ccc
AM
430 bed = get_elf_backend_data (ibfd);
431 extsym_size = bed->s->sizeof_sym;
432 amt = symcount * extsym_size;
433 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
434 if (extsym_buf == NULL)
435 {
d0fb9a8d 436 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
437 extsym_buf = alloc_ext;
438 }
439 if (extsym_buf == NULL
440 || bfd_seek (ibfd, pos, SEEK_SET) != 0
441 || bfd_bread (extsym_buf, amt, ibfd) != amt)
442 {
443 intsym_buf = NULL;
444 goto out;
445 }
446
447 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
448 extshndx_buf = NULL;
449 else
450 {
451 amt = symcount * sizeof (Elf_External_Sym_Shndx);
452 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
453 if (extshndx_buf == NULL)
454 {
a50b1753
NC
455 alloc_extshndx = (Elf_External_Sym_Shndx *)
456 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
457 extshndx_buf = alloc_extshndx;
458 }
459 if (extshndx_buf == NULL
460 || bfd_seek (ibfd, pos, SEEK_SET) != 0
461 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
462 {
463 intsym_buf = NULL;
464 goto out;
465 }
466 }
467
468 if (intsym_buf == NULL)
469 {
a50b1753
NC
470 alloc_intsym = (Elf_Internal_Sym *)
471 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 472 intsym_buf = alloc_intsym;
6cdc0ccc
AM
473 if (intsym_buf == NULL)
474 goto out;
475 }
476
477 /* Convert the symbols to internal form. */
478 isymend = intsym_buf + symcount;
a50b1753
NC
479 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
480 shndx = extshndx_buf;
6cdc0ccc
AM
481 isym < isymend;
482 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
483 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
484 {
485 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
486 (*_bfd_error_handler) (_("%B symbol number %lu references "
487 "nonexistent SHT_SYMTAB_SHNDX section"),
488 ibfd, (unsigned long) symoffset);
4dd07732
AM
489 if (alloc_intsym != NULL)
490 free (alloc_intsym);
8384fb8f
AM
491 intsym_buf = NULL;
492 goto out;
493 }
6cdc0ccc
AM
494
495 out:
496 if (alloc_ext != NULL)
497 free (alloc_ext);
498 if (alloc_extshndx != NULL)
499 free (alloc_extshndx);
500
501 return intsym_buf;
502}
503
5cab59f6
AM
504/* Look up a symbol name. */
505const char *
be8dd2ca
AM
506bfd_elf_sym_name (bfd *abfd,
507 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
508 Elf_Internal_Sym *isym,
509 asection *sym_sec)
5cab59f6 510{
26c61ae5 511 const char *name;
5cab59f6 512 unsigned int iname = isym->st_name;
be8dd2ca 513 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 514
138f35cc
JJ
515 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
516 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 517 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
518 {
519 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
520 shindex = elf_elfheader (abfd)->e_shstrndx;
521 }
522
26c61ae5
L
523 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
524 if (name == NULL)
525 name = "(null)";
526 else if (sym_sec && *name == '\0')
527 name = bfd_section_name (abfd, sym_sec);
528
529 return name;
5cab59f6
AM
530}
531
dbb410c3
AM
532/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
533 sections. The first element is the flags, the rest are section
534 pointers. */
535
536typedef union elf_internal_group {
537 Elf_Internal_Shdr *shdr;
538 unsigned int flags;
539} Elf_Internal_Group;
540
b885599b
AM
541/* Return the name of the group signature symbol. Why isn't the
542 signature just a string? */
543
544static const char *
217aa764 545group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 546{
9dce4196 547 Elf_Internal_Shdr *hdr;
9dce4196
AM
548 unsigned char esym[sizeof (Elf64_External_Sym)];
549 Elf_External_Sym_Shndx eshndx;
550 Elf_Internal_Sym isym;
b885599b 551
13792e9d
L
552 /* First we need to ensure the symbol table is available. Make sure
553 that it is a symbol table section. */
4fbb74a6
AM
554 if (ghdr->sh_link >= elf_numsections (abfd))
555 return NULL;
13792e9d
L
556 hdr = elf_elfsections (abfd) [ghdr->sh_link];
557 if (hdr->sh_type != SHT_SYMTAB
558 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
559 return NULL;
560
9dce4196
AM
561 /* Go read the symbol. */
562 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
563 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
564 &isym, esym, &eshndx) == NULL)
b885599b 565 return NULL;
9dce4196 566
26c61ae5 567 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
568}
569
dbb410c3
AM
570/* Set next_in_group list pointer, and group name for NEWSECT. */
571
b34976b6 572static bfd_boolean
217aa764 573setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
574{
575 unsigned int num_group = elf_tdata (abfd)->num_group;
576
577 /* If num_group is zero, read in all SHT_GROUP sections. The count
578 is set to -1 if there are no SHT_GROUP sections. */
579 if (num_group == 0)
580 {
581 unsigned int i, shnum;
582
583 /* First count the number of groups. If we have a SHT_GROUP
584 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 585 shnum = elf_numsections (abfd);
dbb410c3 586 num_group = 0;
08a40648 587
44534af3 588#define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
1783205a 589 ( (shdr)->sh_type == SHT_GROUP \
44534af3 590 && (shdr)->sh_size >= minsize \
1783205a
NC
591 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
592 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 593
dbb410c3
AM
594 for (i = 0; i < shnum; i++)
595 {
596 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 597
44534af3 598 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3
AM
599 num_group += 1;
600 }
601
602 if (num_group == 0)
20dbb49d
L
603 {
604 num_group = (unsigned) -1;
605 elf_tdata (abfd)->num_group = num_group;
606 }
607 else
dbb410c3
AM
608 {
609 /* We keep a list of elf section headers for group sections,
610 so we can find them quickly. */
20dbb49d 611 bfd_size_type amt;
d0fb9a8d 612
20dbb49d 613 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
614 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
615 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 616 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 617 return FALSE;
dbb410c3
AM
618
619 num_group = 0;
620 for (i = 0; i < shnum; i++)
621 {
622 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 623
44534af3 624 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3 625 {
973ffd63 626 unsigned char *src;
dbb410c3
AM
627 Elf_Internal_Group *dest;
628
629 /* Add to list of sections. */
630 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
631 num_group += 1;
632
633 /* Read the raw contents. */
634 BFD_ASSERT (sizeof (*dest) >= 4);
635 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
636 shdr->contents = (unsigned char *)
637 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
638 /* PR binutils/4110: Handle corrupt group headers. */
639 if (shdr->contents == NULL)
640 {
641 _bfd_error_handler
493a3386 642 (_("%B: corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
1783205a 643 bfd_set_error (bfd_error_bad_value);
493a3386
NC
644 -- num_group;
645 continue;
1783205a
NC
646 }
647
648 memset (shdr->contents, 0, amt);
649
650 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
651 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
652 != shdr->sh_size))
493a3386
NC
653 {
654 _bfd_error_handler
655 (_("%B: invalid size field in group section header: 0x%lx"), abfd, shdr->sh_size);
656 bfd_set_error (bfd_error_bad_value);
657 -- num_group;
658 /* PR 17510: If the group contents are even partially
659 corrupt, do not allow any of the contents to be used. */
660 memset (shdr->contents, 0, amt);
661 continue;
662 }
708d7d0d 663
dbb410c3
AM
664 /* Translate raw contents, a flag word followed by an
665 array of elf section indices all in target byte order,
666 to the flag word followed by an array of elf section
667 pointers. */
668 src = shdr->contents + shdr->sh_size;
669 dest = (Elf_Internal_Group *) (shdr->contents + amt);
06614111 670
dbb410c3
AM
671 while (1)
672 {
673 unsigned int idx;
674
675 src -= 4;
676 --dest;
677 idx = H_GET_32 (abfd, src);
678 if (src == shdr->contents)
679 {
680 dest->flags = idx;
b885599b
AM
681 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
682 shdr->bfd_section->flags
683 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
684 break;
685 }
686 if (idx >= shnum)
687 {
688 ((*_bfd_error_handler)
d003868e 689 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
690 idx = 0;
691 }
692 dest->shdr = elf_elfsections (abfd)[idx];
693 }
694 }
695 }
493a3386
NC
696
697 /* PR 17510: Corrupt binaries might contain invalid groups. */
698 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
699 {
700 elf_tdata (abfd)->num_group = num_group;
701
702 /* If all groups are invalid then fail. */
703 if (num_group == 0)
704 {
705 elf_tdata (abfd)->group_sect_ptr = NULL;
706 elf_tdata (abfd)->num_group = num_group = -1;
707 (*_bfd_error_handler) (_("%B: no valid group sections found"), abfd);
708 bfd_set_error (bfd_error_bad_value);
709 }
710 }
dbb410c3
AM
711 }
712 }
713
714 if (num_group != (unsigned) -1)
715 {
716 unsigned int i;
717
718 for (i = 0; i < num_group; i++)
719 {
720 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
721 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
722 unsigned int n_elt = shdr->sh_size / 4;
723
724 /* Look through this group's sections to see if current
725 section is a member. */
726 while (--n_elt != 0)
727 if ((++idx)->shdr == hdr)
728 {
e0e8c97f 729 asection *s = NULL;
dbb410c3
AM
730
731 /* We are a member of this group. Go looking through
732 other members to see if any others are linked via
733 next_in_group. */
734 idx = (Elf_Internal_Group *) shdr->contents;
735 n_elt = shdr->sh_size / 4;
736 while (--n_elt != 0)
737 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 738 && elf_next_in_group (s) != NULL)
dbb410c3
AM
739 break;
740 if (n_elt != 0)
741 {
dbb410c3
AM
742 /* Snarf the group name from other member, and
743 insert current section in circular list. */
945906ff
AM
744 elf_group_name (newsect) = elf_group_name (s);
745 elf_next_in_group (newsect) = elf_next_in_group (s);
746 elf_next_in_group (s) = newsect;
dbb410c3
AM
747 }
748 else
749 {
dbb410c3
AM
750 const char *gname;
751
b885599b
AM
752 gname = group_signature (abfd, shdr);
753 if (gname == NULL)
b34976b6 754 return FALSE;
945906ff 755 elf_group_name (newsect) = gname;
dbb410c3
AM
756
757 /* Start a circular list with one element. */
945906ff 758 elf_next_in_group (newsect) = newsect;
dbb410c3 759 }
b885599b 760
9dce4196
AM
761 /* If the group section has been created, point to the
762 new member. */
dbb410c3 763 if (shdr->bfd_section != NULL)
945906ff 764 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 765
dbb410c3
AM
766 i = num_group - 1;
767 break;
768 }
769 }
770 }
771
945906ff 772 if (elf_group_name (newsect) == NULL)
dbb410c3 773 {
d003868e
AM
774 (*_bfd_error_handler) (_("%B: no group info for section %A"),
775 abfd, newsect);
493a3386 776 return FALSE;
dbb410c3 777 }
b34976b6 778 return TRUE;
dbb410c3
AM
779}
780
3d7f7666 781bfd_boolean
dd863624 782_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
783{
784 unsigned int i;
785 unsigned int num_group = elf_tdata (abfd)->num_group;
786 bfd_boolean result = TRUE;
dd863624
L
787 asection *s;
788
789 /* Process SHF_LINK_ORDER. */
790 for (s = abfd->sections; s != NULL; s = s->next)
791 {
792 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
793 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
794 {
795 unsigned int elfsec = this_hdr->sh_link;
796 /* FIXME: The old Intel compiler and old strip/objcopy may
797 not set the sh_link or sh_info fields. Hence we could
798 get the situation where elfsec is 0. */
799 if (elfsec == 0)
800 {
4fbb74a6 801 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
802 if (bed->link_order_error_handler)
803 bed->link_order_error_handler
804 (_("%B: warning: sh_link not set for section `%A'"),
805 abfd, s);
806 }
807 else
808 {
91d6fa6a 809 asection *linksec = NULL;
25bbc984 810
4fbb74a6
AM
811 if (elfsec < elf_numsections (abfd))
812 {
813 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 814 linksec = this_hdr->bfd_section;
4fbb74a6 815 }
25bbc984
L
816
817 /* PR 1991, 2008:
818 Some strip/objcopy may leave an incorrect value in
819 sh_link. We don't want to proceed. */
91d6fa6a 820 if (linksec == NULL)
25bbc984
L
821 {
822 (*_bfd_error_handler)
823 (_("%B: sh_link [%d] in section `%A' is incorrect"),
824 s->owner, s, elfsec);
825 result = FALSE;
826 }
827
91d6fa6a 828 elf_linked_to_section (s) = linksec;
dd863624
L
829 }
830 }
831 }
3d7f7666 832
dd863624 833 /* Process section groups. */
3d7f7666
L
834 if (num_group == (unsigned) -1)
835 return result;
836
837 for (i = 0; i < num_group; i++)
838 {
839 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
4b0e8a5f
NC
840 Elf_Internal_Group *idx;
841 unsigned int n_elt;
3d7f7666 842
4b0e8a5f
NC
843 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
844 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
845 {
846 (*_bfd_error_handler)
847 (_("%B: section group entry number %u is corrupt"),
848 abfd, i);
849 result = FALSE;
850 continue;
851 }
852
853 idx = (Elf_Internal_Group *) shdr->contents;
854 n_elt = shdr->sh_size / 4;
1b786873 855
3d7f7666
L
856 while (--n_elt != 0)
857 if ((++idx)->shdr->bfd_section)
858 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
859 else if (idx->shdr->sh_type == SHT_RELA
860 || idx->shdr->sh_type == SHT_REL)
861 /* We won't include relocation sections in section groups in
862 output object files. We adjust the group section size here
863 so that relocatable link will work correctly when
864 relocation sections are in section group in input object
865 files. */
866 shdr->bfd_section->size -= 4;
867 else
868 {
869 /* There are some unknown sections in the group. */
870 (*_bfd_error_handler)
d003868e
AM
871 (_("%B: unknown [%d] section `%s' in group [%s]"),
872 abfd,
3d7f7666 873 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
874 bfd_elf_string_from_elf_section (abfd,
875 (elf_elfheader (abfd)
876 ->e_shstrndx),
877 idx->shdr->sh_name),
3d7f7666
L
878 shdr->bfd_section->name);
879 result = FALSE;
880 }
881 }
882 return result;
883}
884
72adc230
AM
885bfd_boolean
886bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
887{
888 return elf_next_in_group (sec) != NULL;
889}
890
f6fe1ccd
L
891static char *
892convert_debug_to_zdebug (bfd *abfd, const char *name)
893{
894 unsigned int len = strlen (name);
895 char *new_name = bfd_alloc (abfd, len + 2);
896 if (new_name == NULL)
897 return NULL;
898 new_name[0] = '.';
899 new_name[1] = 'z';
900 memcpy (new_name + 2, name + 1, len);
901 return new_name;
902}
903
904static char *
905convert_zdebug_to_debug (bfd *abfd, const char *name)
906{
907 unsigned int len = strlen (name);
908 char *new_name = bfd_alloc (abfd, len);
909 if (new_name == NULL)
910 return NULL;
911 new_name[0] = '.';
912 memcpy (new_name + 1, name + 2, len - 1);
913 return new_name;
914}
915
252b5132
RH
916/* Make a BFD section from an ELF section. We store a pointer to the
917 BFD section in the bfd_section field of the header. */
918
b34976b6 919bfd_boolean
217aa764
AM
920_bfd_elf_make_section_from_shdr (bfd *abfd,
921 Elf_Internal_Shdr *hdr,
6dc132d9
L
922 const char *name,
923 int shindex)
252b5132
RH
924{
925 asection *newsect;
926 flagword flags;
9c5bfbb7 927 const struct elf_backend_data *bed;
252b5132
RH
928
929 if (hdr->bfd_section != NULL)
4e011fb5 930 return TRUE;
252b5132
RH
931
932 newsect = bfd_make_section_anyway (abfd, name);
933 if (newsect == NULL)
b34976b6 934 return FALSE;
252b5132 935
1829f4b2
AM
936 hdr->bfd_section = newsect;
937 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 938 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 939
2f89ff8d
L
940 /* Always use the real type/flags. */
941 elf_section_type (newsect) = hdr->sh_type;
942 elf_section_flags (newsect) = hdr->sh_flags;
943
252b5132
RH
944 newsect->filepos = hdr->sh_offset;
945
946 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
947 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
948 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 949 bfd_log2 (hdr->sh_addralign)))
b34976b6 950 return FALSE;
252b5132
RH
951
952 flags = SEC_NO_FLAGS;
953 if (hdr->sh_type != SHT_NOBITS)
954 flags |= SEC_HAS_CONTENTS;
dbb410c3 955 if (hdr->sh_type == SHT_GROUP)
b3096250 956 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
957 if ((hdr->sh_flags & SHF_ALLOC) != 0)
958 {
959 flags |= SEC_ALLOC;
960 if (hdr->sh_type != SHT_NOBITS)
961 flags |= SEC_LOAD;
962 }
963 if ((hdr->sh_flags & SHF_WRITE) == 0)
964 flags |= SEC_READONLY;
965 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
966 flags |= SEC_CODE;
967 else if ((flags & SEC_LOAD) != 0)
968 flags |= SEC_DATA;
f5fa8ca2
JJ
969 if ((hdr->sh_flags & SHF_MERGE) != 0)
970 {
971 flags |= SEC_MERGE;
972 newsect->entsize = hdr->sh_entsize;
973 if ((hdr->sh_flags & SHF_STRINGS) != 0)
974 flags |= SEC_STRINGS;
975 }
dbb410c3
AM
976 if (hdr->sh_flags & SHF_GROUP)
977 if (!setup_group (abfd, hdr, newsect))
b34976b6 978 return FALSE;
13ae64f3
JJ
979 if ((hdr->sh_flags & SHF_TLS) != 0)
980 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
981 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
982 flags |= SEC_EXCLUDE;
252b5132 983
3d2b39cf 984 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 985 {
3d2b39cf
L
986 /* The debugging sections appear to be recognized only by name,
987 not any sort of flag. Their SEC_ALLOC bits are cleared. */
3d2b39cf
L
988 if (name [0] == '.')
989 {
f073ced3
AM
990 const char *p;
991 int n;
992 if (name[1] == 'd')
993 p = ".debug", n = 6;
994 else if (name[1] == 'g' && name[2] == 'n')
995 p = ".gnu.linkonce.wi.", n = 17;
996 else if (name[1] == 'g' && name[2] == 'd')
997 p = ".gdb_index", n = 11; /* yes we really do mean 11. */
998 else if (name[1] == 'l')
999 p = ".line", n = 5;
1000 else if (name[1] == 's')
1001 p = ".stab", n = 5;
1002 else if (name[1] == 'z')
1003 p = ".zdebug", n = 7;
1004 else
1005 p = NULL, n = 0;
1006 if (p != NULL && strncmp (name, p, n) == 0)
3d2b39cf
L
1007 flags |= SEC_DEBUGGING;
1008 }
1009 }
252b5132
RH
1010
1011 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1012 only link a single copy of the section. This is used to support
1013 g++. g++ will emit each template expansion in its own section.
1014 The symbols will be defined as weak, so that multiple definitions
1015 are permitted. The GNU linker extension is to actually discard
1016 all but one of the sections. */
0112cd26 1017 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 1018 && elf_next_in_group (newsect) == NULL)
252b5132
RH
1019 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1020
fa152c49
JW
1021 bed = get_elf_backend_data (abfd);
1022 if (bed->elf_backend_section_flags)
1023 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 1024 return FALSE;
fa152c49 1025
252b5132 1026 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 1027 return FALSE;
252b5132 1028
718175fa
JK
1029 /* We do not parse the PT_NOTE segments as we are interested even in the
1030 separate debug info files which may have the segments offsets corrupted.
1031 PT_NOTEs from the core files are currently not parsed using BFD. */
1032 if (hdr->sh_type == SHT_NOTE)
1033 {
baea7ef1 1034 bfd_byte *contents;
718175fa 1035
baea7ef1 1036 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
1037 return FALSE;
1038
baea7ef1 1039 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
1040 free (contents);
1041 }
1042
252b5132
RH
1043 if ((flags & SEC_ALLOC) != 0)
1044 {
1045 Elf_Internal_Phdr *phdr;
6ffd7900
AM
1046 unsigned int i, nload;
1047
1048 /* Some ELF linkers produce binaries with all the program header
1049 p_paddr fields zero. If we have such a binary with more than
1050 one PT_LOAD header, then leave the section lma equal to vma
1051 so that we don't create sections with overlapping lma. */
1052 phdr = elf_tdata (abfd)->phdr;
1053 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1054 if (phdr->p_paddr != 0)
1055 break;
1056 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1057 ++nload;
1058 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1059 return TRUE;
252b5132 1060
252b5132
RH
1061 phdr = elf_tdata (abfd)->phdr;
1062 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1063 {
86b2281f
AM
1064 if (((phdr->p_type == PT_LOAD
1065 && (hdr->sh_flags & SHF_TLS) == 0)
1066 || phdr->p_type == PT_TLS)
9a83a553 1067 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 1068 {
88967714
AM
1069 if ((flags & SEC_LOAD) == 0)
1070 newsect->lma = (phdr->p_paddr
1071 + hdr->sh_addr - phdr->p_vaddr);
1072 else
1073 /* We used to use the same adjustment for SEC_LOAD
1074 sections, but that doesn't work if the segment
1075 is packed with code from multiple VMAs.
1076 Instead we calculate the section LMA based on
1077 the segment LMA. It is assumed that the
1078 segment will contain sections with contiguous
1079 LMAs, even if the VMAs are not. */
1080 newsect->lma = (phdr->p_paddr
1081 + hdr->sh_offset - phdr->p_offset);
1082
1083 /* With contiguous segments, we can't tell from file
1084 offsets whether a section with zero size should
1085 be placed at the end of one segment or the
1086 beginning of the next. Decide based on vaddr. */
1087 if (hdr->sh_addr >= phdr->p_vaddr
1088 && (hdr->sh_addr + hdr->sh_size
1089 <= phdr->p_vaddr + phdr->p_memsz))
1090 break;
252b5132
RH
1091 }
1092 }
1093 }
1094
4a114e3e
L
1095 /* Compress/decompress DWARF debug sections with names: .debug_* and
1096 .zdebug_*, after the section flags is set. */
1097 if ((flags & SEC_DEBUGGING)
1098 && ((name[1] == 'd' && name[6] == '_')
1099 || (name[1] == 'z' && name[7] == '_')))
1100 {
1101 enum { nothing, compress, decompress } action = nothing;
151411f8 1102 int compression_header_size;
dab394de 1103 bfd_size_type uncompressed_size;
151411f8
L
1104 bfd_boolean compressed
1105 = bfd_is_section_compressed_with_header (abfd, newsect,
dab394de
L
1106 &compression_header_size,
1107 &uncompressed_size);
4a114e3e 1108
151411f8 1109 if (compressed)
4a114e3e
L
1110 {
1111 /* Compressed section. Check if we should decompress. */
1112 if ((abfd->flags & BFD_DECOMPRESS))
1113 action = decompress;
1114 }
151411f8
L
1115
1116 /* Compress the uncompressed section or convert from/to .zdebug*
1117 section. Check if we should compress. */
1118 if (action == nothing)
4a114e3e 1119 {
151411f8
L
1120 if (newsect->size != 0
1121 && (abfd->flags & BFD_COMPRESS)
1122 && compression_header_size >= 0
dab394de 1123 && uncompressed_size > 0
151411f8
L
1124 && (!compressed
1125 || ((compression_header_size > 0)
1126 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
4a114e3e 1127 action = compress;
151411f8
L
1128 else
1129 return TRUE;
4a114e3e
L
1130 }
1131
151411f8 1132 if (action == compress)
4a114e3e 1133 {
4a114e3e
L
1134 if (!bfd_init_section_compress_status (abfd, newsect))
1135 {
1136 (*_bfd_error_handler)
bc823199 1137 (_("%B: unable to initialize compress status for section %s"),
4a114e3e
L
1138 abfd, name);
1139 return FALSE;
1140 }
151411f8
L
1141 }
1142 else
1143 {
4a114e3e
L
1144 if (!bfd_init_section_decompress_status (abfd, newsect))
1145 {
1146 (*_bfd_error_handler)
bc823199 1147 (_("%B: unable to initialize decompress status for section %s"),
4a114e3e
L
1148 abfd, name);
1149 return FALSE;
1150 }
151411f8
L
1151 }
1152
f6fe1ccd 1153 if (abfd->is_linker_input)
151411f8 1154 {
f6fe1ccd
L
1155 if (name[1] == 'z'
1156 && (action == decompress
1157 || (action == compress
1158 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
4e011fb5 1159 {
f6fe1ccd
L
1160 /* Convert section name from .zdebug_* to .debug_* so
1161 that linker will consider this section as a debug
1162 section. */
1163 char *new_name = convert_zdebug_to_debug (abfd, name);
151411f8
L
1164 if (new_name == NULL)
1165 return FALSE;
f6fe1ccd 1166 bfd_rename_section (abfd, newsect, new_name);
151411f8 1167 }
4a114e3e 1168 }
f6fe1ccd
L
1169 else
1170 /* For objdump, don't rename the section. For objcopy, delay
1171 section rename to elf_fake_sections. */
1172 newsect->flags |= SEC_ELF_RENAME;
4a114e3e
L
1173 }
1174
b34976b6 1175 return TRUE;
252b5132
RH
1176}
1177
252b5132
RH
1178const char *const bfd_elf_section_type_names[] = {
1179 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1180 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1181 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1182};
1183
1049f94e 1184/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1185 output, and the reloc is against an external symbol, and nothing
1186 has given us any additional addend, the resulting reloc will also
1187 be against the same symbol. In such a case, we don't want to
1188 change anything about the way the reloc is handled, since it will
1189 all be done at final link time. Rather than put special case code
1190 into bfd_perform_relocation, all the reloc types use this howto
1191 function. It just short circuits the reloc if producing
1049f94e 1192 relocatable output against an external symbol. */
252b5132 1193
252b5132 1194bfd_reloc_status_type
217aa764
AM
1195bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1196 arelent *reloc_entry,
1197 asymbol *symbol,
1198 void *data ATTRIBUTE_UNUSED,
1199 asection *input_section,
1200 bfd *output_bfd,
1201 char **error_message ATTRIBUTE_UNUSED)
1202{
1203 if (output_bfd != NULL
252b5132
RH
1204 && (symbol->flags & BSF_SECTION_SYM) == 0
1205 && (! reloc_entry->howto->partial_inplace
1206 || reloc_entry->addend == 0))
1207 {
1208 reloc_entry->address += input_section->output_offset;
1209 return bfd_reloc_ok;
1210 }
1211
1212 return bfd_reloc_continue;
1213}
1214\f
0ac4564e
L
1215/* Copy the program header and other data from one object module to
1216 another. */
252b5132 1217
b34976b6 1218bfd_boolean
217aa764 1219_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1220{
1221 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1222 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1223 return TRUE;
2d502050 1224
57b828ef
L
1225 if (!elf_flags_init (obfd))
1226 {
1227 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1228 elf_flags_init (obfd) = TRUE;
1229 }
2d502050 1230
0ac4564e 1231 elf_gp (obfd) = elf_gp (ibfd);
57b828ef
L
1232
1233 /* Also copy the EI_OSABI field. */
1234 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1235 elf_elfheader (ibfd)->e_ident[EI_OSABI];
104d59d1
JM
1236
1237 /* Copy object attributes. */
1238 _bfd_elf_copy_obj_attributes (ibfd, obfd);
63b9bbb7
NC
1239
1240 /* This is an feature for objcopy --only-keep-debug: When a section's type
1241 is changed to NOBITS, we preserve the sh_link and sh_info fields so that
1242 they can be matched up with the original. */
1243 Elf_Internal_Shdr ** iheaders = elf_elfsections (ibfd);
1244 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1245
1246 if (iheaders != NULL && oheaders != NULL)
1247 {
1248 unsigned int i;
1249
1250 for (i = 0; i < elf_numsections (obfd); i++)
1251 {
1252 unsigned int j;
1253 Elf_Internal_Shdr * oheader = oheaders[i];
1254
1255 if (oheader == NULL
1256 || oheader->sh_type != SHT_NOBITS
1257 || oheader->sh_size == 0
1258 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1259 continue;
1260
1261 /* Scan for the matching section in the input bfd.
1262 FIXME: We could use something better than a linear scan here.
1263 Unfortunately we cannot compare names as the output string table
1264 is empty, so instead we check size, address and type. */
1265 for (j = 0; j < elf_numsections (ibfd); j++)
1266 {
1267 Elf_Internal_Shdr * iheader = iheaders[j];
1b786873 1268
d4ac1f87
L
1269 /* Since --only-keep-debug turns all non-debug sections
1270 into SHT_NOBITS sections, the output SHT_NOBITS type
1271 matches any input type. */
1272 if ((oheader->sh_type == SHT_NOBITS
64140f86 1273 || iheader->sh_type == oheader->sh_type)
d4ac1f87
L
1274 && iheader->sh_flags == oheader->sh_flags
1275 && iheader->sh_addralign == oheader->sh_addralign
1276 && iheader->sh_entsize == oheader->sh_entsize
63b9bbb7
NC
1277 && iheader->sh_size == oheader->sh_size
1278 && iheader->sh_addr == oheader->sh_addr
1279 && (iheader->sh_info != oheader->sh_info
1280 || iheader->sh_link != oheader->sh_link))
1281 {
1282 /* Note: Strictly speaking these assignments are wrong.
1283 The sh_link and sh_info fields should point to the
1284 relevent sections in the output BFD, which may not be in
1285 the same location as they were in the input BFD. But the
1286 whole point of this action is to preserve the original
1287 values of the sh_link and sh_info fields, so that they
1288 can be matched up with the section headers in the
1289 original file. So strictly speaking we may be creating
1290 an invalid ELF file, but it is only for a file that just
1291 contains debug info and only for sections without any
1292 contents. */
1293 if (oheader->sh_link == 0)
1294 oheader->sh_link = iheader->sh_link;
1295 if (oheader->sh_info == 0)
1296 oheader->sh_info = iheader->sh_info;
1297 break;
1298 }
1299 }
1300 }
1301 }
1302
b34976b6 1303 return TRUE;
2d502050
L
1304}
1305
cedc298e
L
1306static const char *
1307get_segment_type (unsigned int p_type)
1308{
1309 const char *pt;
1310 switch (p_type)
1311 {
1312 case PT_NULL: pt = "NULL"; break;
1313 case PT_LOAD: pt = "LOAD"; break;
1314 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1315 case PT_INTERP: pt = "INTERP"; break;
1316 case PT_NOTE: pt = "NOTE"; break;
1317 case PT_SHLIB: pt = "SHLIB"; break;
1318 case PT_PHDR: pt = "PHDR"; break;
1319 case PT_TLS: pt = "TLS"; break;
1320 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1321 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1322 case PT_GNU_RELRO: pt = "RELRO"; break;
1323 default: pt = NULL; break;
1324 }
1325 return pt;
1326}
1327
f0b79d91
L
1328/* Print out the program headers. */
1329
b34976b6 1330bfd_boolean
217aa764 1331_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1332{
a50b1753 1333 FILE *f = (FILE *) farg;
252b5132
RH
1334 Elf_Internal_Phdr *p;
1335 asection *s;
1336 bfd_byte *dynbuf = NULL;
1337
1338 p = elf_tdata (abfd)->phdr;
1339 if (p != NULL)
1340 {
1341 unsigned int i, c;
1342
1343 fprintf (f, _("\nProgram Header:\n"));
1344 c = elf_elfheader (abfd)->e_phnum;
1345 for (i = 0; i < c; i++, p++)
1346 {
cedc298e 1347 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1348 char buf[20];
1349
cedc298e 1350 if (pt == NULL)
252b5132 1351 {
cedc298e
L
1352 sprintf (buf, "0x%lx", p->p_type);
1353 pt = buf;
252b5132 1354 }
dc810e39 1355 fprintf (f, "%8s off 0x", pt);
60b89a18 1356 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1357 fprintf (f, " vaddr 0x");
60b89a18 1358 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1359 fprintf (f, " paddr 0x");
60b89a18 1360 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1361 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1362 fprintf (f, " filesz 0x");
60b89a18 1363 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1364 fprintf (f, " memsz 0x");
60b89a18 1365 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1366 fprintf (f, " flags %c%c%c",
1367 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1368 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1369 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1370 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1371 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1372 fprintf (f, "\n");
1373 }
1374 }
1375
1376 s = bfd_get_section_by_name (abfd, ".dynamic");
1377 if (s != NULL)
1378 {
cb33740c 1379 unsigned int elfsec;
dc810e39 1380 unsigned long shlink;
252b5132
RH
1381 bfd_byte *extdyn, *extdynend;
1382 size_t extdynsize;
217aa764 1383 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1384
1385 fprintf (f, _("\nDynamic Section:\n"));
1386
eea6121a 1387 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1388 goto error_return;
1389
1390 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1391 if (elfsec == SHN_BAD)
252b5132 1392 goto error_return;
dc810e39 1393 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1394
1395 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1396 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1397
1398 extdyn = dynbuf;
06614111
NC
1399 /* PR 17512: file: 6f427532. */
1400 if (s->size < extdynsize)
1401 goto error_return;
eea6121a 1402 extdynend = extdyn + s->size;
1036838a
NC
1403 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1404 Fix range check. */
1405 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
252b5132
RH
1406 {
1407 Elf_Internal_Dyn dyn;
ad9563d6 1408 const char *name = "";
252b5132 1409 char ab[20];
b34976b6 1410 bfd_boolean stringp;
ad9563d6 1411 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1412
217aa764 1413 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1414
1415 if (dyn.d_tag == DT_NULL)
1416 break;
1417
b34976b6 1418 stringp = FALSE;
252b5132
RH
1419 switch (dyn.d_tag)
1420 {
1421 default:
ad9563d6
CM
1422 if (bed->elf_backend_get_target_dtag)
1423 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1424
1425 if (!strcmp (name, ""))
1426 {
1427 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1428 name = ab;
1429 }
252b5132
RH
1430 break;
1431
b34976b6 1432 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1433 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1434 case DT_PLTGOT: name = "PLTGOT"; break;
1435 case DT_HASH: name = "HASH"; break;
1436 case DT_STRTAB: name = "STRTAB"; break;
1437 case DT_SYMTAB: name = "SYMTAB"; break;
1438 case DT_RELA: name = "RELA"; break;
1439 case DT_RELASZ: name = "RELASZ"; break;
1440 case DT_RELAENT: name = "RELAENT"; break;
1441 case DT_STRSZ: name = "STRSZ"; break;
1442 case DT_SYMENT: name = "SYMENT"; break;
1443 case DT_INIT: name = "INIT"; break;
1444 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1445 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1446 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1447 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1448 case DT_REL: name = "REL"; break;
1449 case DT_RELSZ: name = "RELSZ"; break;
1450 case DT_RELENT: name = "RELENT"; break;
1451 case DT_PLTREL: name = "PLTREL"; break;
1452 case DT_DEBUG: name = "DEBUG"; break;
1453 case DT_TEXTREL: name = "TEXTREL"; break;
1454 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1455 case DT_BIND_NOW: name = "BIND_NOW"; break;
1456 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1457 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1458 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1459 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1460 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1461 case DT_FLAGS: name = "FLAGS"; break;
1462 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1463 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1464 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1465 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1466 case DT_MOVEENT: name = "MOVEENT"; break;
1467 case DT_MOVESZ: name = "MOVESZ"; break;
1468 case DT_FEATURE: name = "FEATURE"; break;
1469 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1470 case DT_SYMINSZ: name = "SYMINSZ"; break;
1471 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1472 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1473 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1474 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1475 case DT_PLTPAD: name = "PLTPAD"; break;
1476 case DT_MOVETAB: name = "MOVETAB"; break;
1477 case DT_SYMINFO: name = "SYMINFO"; break;
1478 case DT_RELACOUNT: name = "RELACOUNT"; break;
1479 case DT_RELCOUNT: name = "RELCOUNT"; break;
1480 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1481 case DT_VERSYM: name = "VERSYM"; break;
1482 case DT_VERDEF: name = "VERDEF"; break;
1483 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1484 case DT_VERNEED: name = "VERNEED"; break;
1485 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1486 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1487 case DT_USED: name = "USED"; break;
b34976b6 1488 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1489 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1490 }
1491
ad9563d6 1492 fprintf (f, " %-20s ", name);
252b5132 1493 if (! stringp)
a1f3c56e
AN
1494 {
1495 fprintf (f, "0x");
1496 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1497 }
252b5132
RH
1498 else
1499 {
1500 const char *string;
dc810e39 1501 unsigned int tagv = dyn.d_un.d_val;
252b5132 1502
dc810e39 1503 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1504 if (string == NULL)
1505 goto error_return;
1506 fprintf (f, "%s", string);
1507 }
1508 fprintf (f, "\n");
1509 }
1510
1511 free (dynbuf);
1512 dynbuf = NULL;
1513 }
1514
1515 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1516 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1517 {
fc0e6df6 1518 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1519 return FALSE;
252b5132
RH
1520 }
1521
1522 if (elf_dynverdef (abfd) != 0)
1523 {
1524 Elf_Internal_Verdef *t;
1525
1526 fprintf (f, _("\nVersion definitions:\n"));
1527 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1528 {
1529 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1530 t->vd_flags, t->vd_hash,
1531 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1532 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1533 {
1534 Elf_Internal_Verdaux *a;
1535
1536 fprintf (f, "\t");
1537 for (a = t->vd_auxptr->vda_nextptr;
1538 a != NULL;
1539 a = a->vda_nextptr)
d0fb9a8d
JJ
1540 fprintf (f, "%s ",
1541 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1542 fprintf (f, "\n");
1543 }
1544 }
1545 }
1546
1547 if (elf_dynverref (abfd) != 0)
1548 {
1549 Elf_Internal_Verneed *t;
1550
1551 fprintf (f, _("\nVersion References:\n"));
1552 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1553 {
1554 Elf_Internal_Vernaux *a;
1555
d0fb9a8d
JJ
1556 fprintf (f, _(" required from %s:\n"),
1557 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1558 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1559 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1560 a->vna_flags, a->vna_other,
1561 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1562 }
1563 }
1564
b34976b6 1565 return TRUE;
252b5132
RH
1566
1567 error_return:
1568 if (dynbuf != NULL)
1569 free (dynbuf);
b34976b6 1570 return FALSE;
252b5132
RH
1571}
1572
bb4d2ac2
L
1573/* Get version string. */
1574
1575const char *
60bb06bc
L
1576_bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1577 bfd_boolean *hidden)
bb4d2ac2
L
1578{
1579 const char *version_string = NULL;
1580 if (elf_dynversym (abfd) != 0
1581 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1582 {
1583 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1584
1585 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1586 vernum &= VERSYM_VERSION;
1587
1588 if (vernum == 0)
1589 version_string = "";
1590 else if (vernum == 1)
1591 version_string = "Base";
1592 else if (vernum <= elf_tdata (abfd)->cverdefs)
1593 version_string =
1594 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1595 else
1596 {
1597 Elf_Internal_Verneed *t;
1598
1599 version_string = "";
1600 for (t = elf_tdata (abfd)->verref;
1601 t != NULL;
1602 t = t->vn_nextref)
1603 {
1604 Elf_Internal_Vernaux *a;
1605
1606 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1607 {
1608 if (a->vna_other == vernum)
1609 {
1610 version_string = a->vna_nodename;
1611 break;
1612 }
1613 }
1614 }
1615 }
1616 }
1617 return version_string;
1618}
1619
252b5132
RH
1620/* Display ELF-specific fields of a symbol. */
1621
1622void
217aa764
AM
1623bfd_elf_print_symbol (bfd *abfd,
1624 void *filep,
1625 asymbol *symbol,
1626 bfd_print_symbol_type how)
252b5132 1627{
a50b1753 1628 FILE *file = (FILE *) filep;
252b5132
RH
1629 switch (how)
1630 {
1631 case bfd_print_symbol_name:
1632 fprintf (file, "%s", symbol->name);
1633 break;
1634 case bfd_print_symbol_more:
1635 fprintf (file, "elf ");
60b89a18 1636 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1637 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1638 break;
1639 case bfd_print_symbol_all:
1640 {
4e8a9624
AM
1641 const char *section_name;
1642 const char *name = NULL;
9c5bfbb7 1643 const struct elf_backend_data *bed;
7a13edea 1644 unsigned char st_other;
dbb410c3 1645 bfd_vma val;
bb4d2ac2
L
1646 const char *version_string;
1647 bfd_boolean hidden;
c044fabd 1648
252b5132 1649 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1650
1651 bed = get_elf_backend_data (abfd);
1652 if (bed->elf_backend_print_symbol_all)
c044fabd 1653 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1654
1655 if (name == NULL)
1656 {
7ee38065 1657 name = symbol->name;
217aa764 1658 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1659 }
1660
252b5132
RH
1661 fprintf (file, " %s\t", section_name);
1662 /* Print the "other" value for a symbol. For common symbols,
1663 we've already printed the size; now print the alignment.
1664 For other symbols, we have no specified alignment, and
1665 we've printed the address; now print the size. */
dcf6c779 1666 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1667 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1668 else
1669 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1670 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1671
1672 /* If we have version information, print it. */
60bb06bc
L
1673 version_string = _bfd_elf_get_symbol_version_string (abfd,
1674 symbol,
1675 &hidden);
bb4d2ac2 1676 if (version_string)
252b5132 1677 {
bb4d2ac2 1678 if (!hidden)
252b5132
RH
1679 fprintf (file, " %-11s", version_string);
1680 else
1681 {
1682 int i;
1683
1684 fprintf (file, " (%s)", version_string);
1685 for (i = 10 - strlen (version_string); i > 0; --i)
1686 putc (' ', file);
1687 }
1688 }
1689
1690 /* If the st_other field is not zero, print it. */
7a13edea 1691 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1692
7a13edea
NC
1693 switch (st_other)
1694 {
1695 case 0: break;
1696 case STV_INTERNAL: fprintf (file, " .internal"); break;
1697 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1698 case STV_PROTECTED: fprintf (file, " .protected"); break;
1699 default:
1700 /* Some other non-defined flags are also present, so print
1701 everything hex. */
1702 fprintf (file, " 0x%02x", (unsigned int) st_other);
1703 }
252b5132 1704
587ff49e 1705 fprintf (file, " %s", name);
252b5132
RH
1706 }
1707 break;
1708 }
1709}
252b5132
RH
1710\f
1711/* ELF .o/exec file reading */
1712
c044fabd 1713/* Create a new bfd section from an ELF section header. */
252b5132 1714
b34976b6 1715bfd_boolean
217aa764 1716bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1717{
4fbb74a6
AM
1718 Elf_Internal_Shdr *hdr;
1719 Elf_Internal_Ehdr *ehdr;
1720 const struct elf_backend_data *bed;
90937f86 1721 const char *name;
bf67003b
NC
1722 bfd_boolean ret = TRUE;
1723 static bfd_boolean * sections_being_created = NULL;
5a4b0ccc 1724 static bfd * sections_being_created_abfd = NULL;
bf67003b 1725 static unsigned int nesting = 0;
252b5132 1726
4fbb74a6
AM
1727 if (shindex >= elf_numsections (abfd))
1728 return FALSE;
1729
bf67003b
NC
1730 if (++ nesting > 3)
1731 {
1732 /* PR17512: A corrupt ELF binary might contain a recursive group of
06614111 1733 sections, with each the string indicies pointing to the next in the
bf67003b
NC
1734 loop. Detect this here, by refusing to load a section that we are
1735 already in the process of loading. We only trigger this test if
1736 we have nested at least three sections deep as normal ELF binaries
5a4b0ccc
NC
1737 can expect to recurse at least once.
1738
1739 FIXME: It would be better if this array was attached to the bfd,
1740 rather than being held in a static pointer. */
1741
1742 if (sections_being_created_abfd != abfd)
1743 sections_being_created = NULL;
bf67003b
NC
1744 if (sections_being_created == NULL)
1745 {
1746 /* FIXME: It would be more efficient to attach this array to the bfd somehow. */
1747 sections_being_created = (bfd_boolean *)
1748 bfd_zalloc (abfd, elf_numsections (abfd) * sizeof (bfd_boolean));
5a4b0ccc 1749 sections_being_created_abfd = abfd;
bf67003b
NC
1750 }
1751 if (sections_being_created [shindex])
1752 {
1753 (*_bfd_error_handler)
1754 (_("%B: warning: loop in section dependencies detected"), abfd);
1755 return FALSE;
1756 }
1757 sections_being_created [shindex] = TRUE;
1758 }
1759
4fbb74a6
AM
1760 hdr = elf_elfsections (abfd)[shindex];
1761 ehdr = elf_elfheader (abfd);
1762 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1763 hdr->sh_name);
933d961a 1764 if (name == NULL)
bf67003b 1765 goto fail;
252b5132 1766
4fbb74a6 1767 bed = get_elf_backend_data (abfd);
252b5132
RH
1768 switch (hdr->sh_type)
1769 {
1770 case SHT_NULL:
1771 /* Inactive section. Throw it away. */
bf67003b 1772 goto success;
252b5132 1773
bf67003b
NC
1774 case SHT_PROGBITS: /* Normal section with contents. */
1775 case SHT_NOBITS: /* .bss section. */
1776 case SHT_HASH: /* .hash section. */
1777 case SHT_NOTE: /* .note section. */
25e27870
L
1778 case SHT_INIT_ARRAY: /* .init_array section. */
1779 case SHT_FINI_ARRAY: /* .fini_array section. */
1780 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1781 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1782 case SHT_GNU_HASH: /* .gnu.hash section. */
bf67003b
NC
1783 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1784 goto success;
252b5132 1785
797fc050 1786 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1787 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
1788 goto fail;
1789
cfcac11d
NC
1790 if (hdr->sh_link > elf_numsections (abfd))
1791 {
caa83f8b 1792 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
1793 field set to SHN_BEFORE or SHN_AFTER. */
1794 switch (bfd_get_arch (abfd))
1795 {
caa83f8b 1796 case bfd_arch_i386:
cfcac11d
NC
1797 case bfd_arch_sparc:
1798 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
1799 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
1800 break;
1801 /* Otherwise fall through. */
1802 default:
bf67003b 1803 goto fail;
cfcac11d
NC
1804 }
1805 }
1806 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
bf67003b 1807 goto fail;
cfcac11d 1808 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
1809 {
1810 Elf_Internal_Shdr *dynsymhdr;
1811
1812 /* The shared libraries distributed with hpux11 have a bogus
1813 sh_link field for the ".dynamic" section. Find the
1814 string table for the ".dynsym" section instead. */
1815 if (elf_dynsymtab (abfd) != 0)
1816 {
1817 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1818 hdr->sh_link = dynsymhdr->sh_link;
1819 }
1820 else
1821 {
1822 unsigned int i, num_sec;
1823
1824 num_sec = elf_numsections (abfd);
1825 for (i = 1; i < num_sec; i++)
1826 {
1827 dynsymhdr = elf_elfsections (abfd)[i];
1828 if (dynsymhdr->sh_type == SHT_DYNSYM)
1829 {
1830 hdr->sh_link = dynsymhdr->sh_link;
1831 break;
1832 }
1833 }
1834 }
1835 }
bf67003b 1836 goto success;
797fc050 1837
bf67003b 1838 case SHT_SYMTAB: /* A symbol table. */
252b5132 1839 if (elf_onesymtab (abfd) == shindex)
bf67003b 1840 goto success;
252b5132 1841
a50b2160 1842 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
1843 goto fail;
1844
3337c1e5 1845 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
eee3b786
AM
1846 {
1847 if (hdr->sh_size != 0)
bf67003b 1848 goto fail;
eee3b786
AM
1849 /* Some assemblers erroneously set sh_info to one with a
1850 zero sh_size. ld sees this as a global symbol count
1851 of (unsigned) -1. Fix it here. */
1852 hdr->sh_info = 0;
bf67003b 1853 goto success;
eee3b786 1854 }
bf67003b 1855
16ad13ec
NC
1856 /* PR 18854: A binary might contain more than one symbol table.
1857 Unusual, but possible. Warn, but continue. */
1858 if (elf_onesymtab (abfd) != 0)
1859 {
1860 (*_bfd_error_handler)
1861 (_("%B: warning: multiple symbol tables detected - ignoring the table in section %u"),
1862 abfd, shindex);
1863 goto success;
1864 }
252b5132 1865 elf_onesymtab (abfd) = shindex;
6a40cf0c
NC
1866 elf_symtab_hdr (abfd) = *hdr;
1867 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
252b5132
RH
1868 abfd->flags |= HAS_SYMS;
1869
1870 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1871 SHF_ALLOC is set, and this is a shared object, then we also
1872 treat this section as a BFD section. We can not base the
1873 decision purely on SHF_ALLOC, because that flag is sometimes
1874 set in a relocatable object file, which would confuse the
1875 linker. */
252b5132
RH
1876 if ((hdr->sh_flags & SHF_ALLOC) != 0
1877 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1878 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1879 shindex))
bf67003b 1880 goto fail;
252b5132 1881
1b3a8575
AM
1882 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1883 can't read symbols without that section loaded as well. It
1884 is most likely specified by the next section header. */
6a40cf0c
NC
1885 {
1886 elf_section_list * entry;
1887 unsigned int i, num_sec;
1b3a8575 1888
6a40cf0c
NC
1889 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
1890 if (entry->hdr.sh_link == shindex)
1891 goto success;
1892
1893 num_sec = elf_numsections (abfd);
1894 for (i = shindex + 1; i < num_sec; i++)
1895 {
1896 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1897
1898 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1899 && hdr2->sh_link == shindex)
1900 break;
1901 }
1902
1903 if (i == num_sec)
1904 for (i = 1; i < shindex; i++)
1b3a8575
AM
1905 {
1906 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
6a40cf0c 1907
1b3a8575
AM
1908 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1909 && hdr2->sh_link == shindex)
1910 break;
1911 }
6a40cf0c
NC
1912
1913 if (i != shindex)
1914 ret = bfd_section_from_shdr (abfd, i);
1915 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
1916 goto success;
1917 }
252b5132 1918
bf67003b 1919 case SHT_DYNSYM: /* A dynamic symbol table. */
252b5132 1920 if (elf_dynsymtab (abfd) == shindex)
bf67003b 1921 goto success;
252b5132 1922
a50b2160 1923 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
1924 goto fail;
1925
eee3b786
AM
1926 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
1927 {
1928 if (hdr->sh_size != 0)
bf67003b
NC
1929 goto fail;
1930
eee3b786
AM
1931 /* Some linkers erroneously set sh_info to one with a
1932 zero sh_size. ld sees this as a global symbol count
1933 of (unsigned) -1. Fix it here. */
1934 hdr->sh_info = 0;
bf67003b 1935 goto success;
eee3b786 1936 }
bf67003b 1937
16ad13ec
NC
1938 /* PR 18854: A binary might contain more than one dynamic symbol table.
1939 Unusual, but possible. Warn, but continue. */
1940 if (elf_dynsymtab (abfd) != 0)
1941 {
1942 (*_bfd_error_handler)
1943 (_("%B: warning: multiple dynamic symbol tables detected - ignoring the table in section %u"),
1944 abfd, shindex);
1945 goto success;
1946 }
252b5132
RH
1947 elf_dynsymtab (abfd) = shindex;
1948 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1949 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1950 abfd->flags |= HAS_SYMS;
1951
1952 /* Besides being a symbol table, we also treat this as a regular
1953 section, so that objcopy can handle it. */
bf67003b
NC
1954 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1955 goto success;
252b5132 1956
bf67003b 1957 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
6a40cf0c
NC
1958 {
1959 elf_section_list * entry;
9ad5cbcf 1960
6a40cf0c
NC
1961 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
1962 if (entry->ndx == shindex)
1963 goto success;
1964
1965 entry = bfd_alloc (abfd, sizeof * entry);
1966 if (entry == NULL)
1967 goto fail;
1968 entry->ndx = shindex;
1969 entry->hdr = * hdr;
1970 entry->next = elf_symtab_shndx_list (abfd);
1971 elf_symtab_shndx_list (abfd) = entry;
1972 elf_elfsections (abfd)[shindex] = & entry->hdr;
1973 goto success;
1974 }
9ad5cbcf 1975
bf67003b 1976 case SHT_STRTAB: /* A string table. */
252b5132 1977 if (hdr->bfd_section != NULL)
bf67003b
NC
1978 goto success;
1979
252b5132
RH
1980 if (ehdr->e_shstrndx == shindex)
1981 {
1982 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1983 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
bf67003b 1984 goto success;
252b5132 1985 }
bf67003b 1986
1b3a8575
AM
1987 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1988 {
1989 symtab_strtab:
1990 elf_tdata (abfd)->strtab_hdr = *hdr;
1991 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
bf67003b 1992 goto success;
1b3a8575 1993 }
bf67003b 1994
1b3a8575
AM
1995 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1996 {
1997 dynsymtab_strtab:
1998 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1999 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2000 elf_elfsections (abfd)[shindex] = hdr;
2001 /* We also treat this as a regular section, so that objcopy
2002 can handle it. */
bf67003b
NC
2003 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2004 shindex);
2005 goto success;
1b3a8575 2006 }
252b5132 2007
1b3a8575
AM
2008 /* If the string table isn't one of the above, then treat it as a
2009 regular section. We need to scan all the headers to be sure,
2010 just in case this strtab section appeared before the above. */
2011 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2012 {
2013 unsigned int i, num_sec;
252b5132 2014
1b3a8575
AM
2015 num_sec = elf_numsections (abfd);
2016 for (i = 1; i < num_sec; i++)
2017 {
2018 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2019 if (hdr2->sh_link == shindex)
2020 {
933d961a
JJ
2021 /* Prevent endless recursion on broken objects. */
2022 if (i == shindex)
bf67003b 2023 goto fail;
1b3a8575 2024 if (! bfd_section_from_shdr (abfd, i))
bf67003b 2025 goto fail;
1b3a8575
AM
2026 if (elf_onesymtab (abfd) == i)
2027 goto symtab_strtab;
2028 if (elf_dynsymtab (abfd) == i)
2029 goto dynsymtab_strtab;
2030 }
2031 }
2032 }
bf67003b
NC
2033 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2034 goto success;
252b5132
RH
2035
2036 case SHT_REL:
2037 case SHT_RELA:
2038 /* *These* do a lot of work -- but build no sections! */
2039 {
2040 asection *target_sect;
d4730f92 2041 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 2042 unsigned int num_sec = elf_numsections (abfd);
d4730f92
BS
2043 struct bfd_elf_section_data *esdt;
2044 bfd_size_type amt;
252b5132 2045
aa2ca951
JJ
2046 if (hdr->sh_entsize
2047 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160 2048 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
bf67003b 2049 goto fail;
a50b2160 2050
03ae5f59 2051 /* Check for a bogus link to avoid crashing. */
4fbb74a6 2052 if (hdr->sh_link >= num_sec)
03ae5f59
ILT
2053 {
2054 ((*_bfd_error_handler)
d003868e
AM
2055 (_("%B: invalid link %lu for reloc section %s (index %u)"),
2056 abfd, hdr->sh_link, name, shindex));
bf67003b
NC
2057 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2058 shindex);
2059 goto success;
03ae5f59
ILT
2060 }
2061
252b5132
RH
2062 /* For some incomprehensible reason Oracle distributes
2063 libraries for Solaris in which some of the objects have
2064 bogus sh_link fields. It would be nice if we could just
2065 reject them, but, unfortunately, some people need to use
2066 them. We scan through the section headers; if we find only
2067 one suitable symbol table, we clobber the sh_link to point
83b89087
L
2068 to it. I hope this doesn't break anything.
2069
2070 Don't do it on executable nor shared library. */
2071 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2072 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
2073 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2074 {
9ad5cbcf 2075 unsigned int scan;
252b5132
RH
2076 int found;
2077
2078 found = 0;
9ad5cbcf 2079 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2080 {
2081 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2082 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2083 {
2084 if (found != 0)
2085 {
2086 found = 0;
2087 break;
2088 }
2089 found = scan;
2090 }
2091 }
2092 if (found != 0)
2093 hdr->sh_link = found;
2094 }
2095
2096 /* Get the symbol table. */
1b3a8575
AM
2097 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2098 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2099 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
bf67003b 2100 goto fail;
252b5132
RH
2101
2102 /* If this reloc section does not use the main symbol table we
2103 don't treat it as a reloc section. BFD can't adequately
2104 represent such a section, so at least for now, we don't
c044fabd 2105 try. We just present it as a normal section. We also
60bcf0fa 2106 can't use it as a reloc section if it points to the null
83b89087
L
2107 section, an invalid section, another reloc section, or its
2108 sh_link points to the null section. */
185ef66d 2109 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 2110 || hdr->sh_link == SHN_UNDEF
185ef66d 2111 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
2112 || hdr->sh_info >= num_sec
2113 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2114 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
bf67003b
NC
2115 {
2116 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2117 shindex);
2118 goto success;
2119 }
252b5132
RH
2120
2121 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
bf67003b
NC
2122 goto fail;
2123
252b5132
RH
2124 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2125 if (target_sect == NULL)
bf67003b 2126 goto fail;
252b5132 2127
d4730f92
BS
2128 esdt = elf_section_data (target_sect);
2129 if (hdr->sh_type == SHT_RELA)
2130 p_hdr = &esdt->rela.hdr;
252b5132 2131 else
d4730f92
BS
2132 p_hdr = &esdt->rel.hdr;
2133
06614111
NC
2134 /* PR 17512: file: 0b4f81b7. */
2135 if (*p_hdr != NULL)
2136 goto fail;
d4730f92
BS
2137 amt = sizeof (*hdr2);
2138 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, amt);
2139 if (hdr2 == NULL)
bf67003b 2140 goto fail;
252b5132 2141 *hdr2 = *hdr;
d4730f92 2142 *p_hdr = hdr2;
252b5132 2143 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2144 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2145 target_sect->flags |= SEC_RELOC;
2146 target_sect->relocation = NULL;
2147 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2148 /* In the section to which the relocations apply, mark whether
2149 its relocations are of the REL or RELA variety. */
72730e0c 2150 if (hdr->sh_size != 0)
d4730f92
BS
2151 {
2152 if (hdr->sh_type == SHT_RELA)
2153 target_sect->use_rela_p = 1;
2154 }
252b5132 2155 abfd->flags |= HAS_RELOC;
bf67003b 2156 goto success;
252b5132 2157 }
252b5132
RH
2158
2159 case SHT_GNU_verdef:
2160 elf_dynverdef (abfd) = shindex;
2161 elf_tdata (abfd)->dynverdef_hdr = *hdr;
bf67003b
NC
2162 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2163 goto success;
252b5132
RH
2164
2165 case SHT_GNU_versym:
a50b2160 2166 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
bf67003b
NC
2167 goto fail;
2168
252b5132
RH
2169 elf_dynversym (abfd) = shindex;
2170 elf_tdata (abfd)->dynversym_hdr = *hdr;
bf67003b
NC
2171 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2172 goto success;
252b5132
RH
2173
2174 case SHT_GNU_verneed:
2175 elf_dynverref (abfd) = shindex;
2176 elf_tdata (abfd)->dynverref_hdr = *hdr;
bf67003b
NC
2177 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2178 goto success;
252b5132
RH
2179
2180 case SHT_SHLIB:
bf67003b 2181 goto success;
252b5132 2182
dbb410c3 2183 case SHT_GROUP:
44534af3 2184 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
bf67003b
NC
2185 goto fail;
2186
6dc132d9 2187 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2188 goto fail;
2189
dbb410c3
AM
2190 if (hdr->contents != NULL)
2191 {
2192 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
06614111 2193 unsigned int n_elt = hdr->sh_size / sizeof (* idx);
dbb410c3
AM
2194 asection *s;
2195
06614111
NC
2196 if (n_elt == 0)
2197 goto fail;
b885599b
AM
2198 if (idx->flags & GRP_COMDAT)
2199 hdr->bfd_section->flags
2200 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2201
45c5e9ed
L
2202 /* We try to keep the same section order as it comes in. */
2203 idx += n_elt;
06614111 2204
dbb410c3 2205 while (--n_elt != 0)
1783205a
NC
2206 {
2207 --idx;
2208
2209 if (idx->shdr != NULL
2210 && (s = idx->shdr->bfd_section) != NULL
2211 && elf_next_in_group (s) != NULL)
2212 {
2213 elf_next_in_group (hdr->bfd_section) = s;
2214 break;
2215 }
2216 }
dbb410c3 2217 }
bf67003b 2218 goto success;
dbb410c3 2219
252b5132 2220 default:
104d59d1
JM
2221 /* Possibly an attributes section. */
2222 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2223 || hdr->sh_type == bed->obj_attrs_section_type)
2224 {
2225 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2226 goto fail;
104d59d1 2227 _bfd_elf_parse_attributes (abfd, hdr);
bf67003b 2228 goto success;
104d59d1
JM
2229 }
2230
252b5132 2231 /* Check for any processor-specific section types. */
3eb70a79 2232 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2233 goto success;
3eb70a79
L
2234
2235 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2236 {
2237 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2238 /* FIXME: How to properly handle allocated section reserved
2239 for applications? */
2240 (*_bfd_error_handler)
2241 (_("%B: don't know how to handle allocated, application "
2242 "specific section `%s' [0x%8x]"),
2243 abfd, name, hdr->sh_type);
2244 else
bf67003b
NC
2245 {
2246 /* Allow sections reserved for applications. */
2247 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2248 shindex);
2249 goto success;
2250 }
3eb70a79
L
2251 }
2252 else if (hdr->sh_type >= SHT_LOPROC
2253 && hdr->sh_type <= SHT_HIPROC)
2254 /* FIXME: We should handle this section. */
2255 (*_bfd_error_handler)
2256 (_("%B: don't know how to handle processor specific section "
2257 "`%s' [0x%8x]"),
2258 abfd, name, hdr->sh_type);
2259 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
2260 {
2261 /* Unrecognised OS-specific sections. */
2262 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2263 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 2264 required to correctly process the section and the file should
ff15b240
NC
2265 be rejected with an error message. */
2266 (*_bfd_error_handler)
2267 (_("%B: don't know how to handle OS specific section "
2268 "`%s' [0x%8x]"),
2269 abfd, name, hdr->sh_type);
2270 else
bf67003b
NC
2271 {
2272 /* Otherwise it should be processed. */
2273 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2274 goto success;
2275 }
ff15b240 2276 }
3eb70a79
L
2277 else
2278 /* FIXME: We should handle this section. */
2279 (*_bfd_error_handler)
2280 (_("%B: don't know how to handle section `%s' [0x%8x]"),
2281 abfd, name, hdr->sh_type);
2282
bf67003b 2283 goto fail;
252b5132
RH
2284 }
2285
bf67003b
NC
2286 fail:
2287 ret = FALSE;
2288 success:
e5b470e2 2289 if (sections_being_created && sections_being_created_abfd == abfd)
bf67003b
NC
2290 sections_being_created [shindex] = FALSE;
2291 if (-- nesting == 0)
5a4b0ccc
NC
2292 {
2293 sections_being_created = NULL;
2294 sections_being_created_abfd = abfd;
2295 }
bf67003b 2296 return ret;
252b5132
RH
2297}
2298
87d72d41 2299/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2300
87d72d41
AM
2301Elf_Internal_Sym *
2302bfd_sym_from_r_symndx (struct sym_cache *cache,
2303 bfd *abfd,
2304 unsigned long r_symndx)
ec338859 2305{
ec338859
AM
2306 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2307
a5d1b3b5
AM
2308 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2309 {
2310 Elf_Internal_Shdr *symtab_hdr;
2311 unsigned char esym[sizeof (Elf64_External_Sym)];
2312 Elf_External_Sym_Shndx eshndx;
ec338859 2313
a5d1b3b5
AM
2314 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2315 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2316 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2317 return NULL;
9ad5cbcf 2318
a5d1b3b5
AM
2319 if (cache->abfd != abfd)
2320 {
2321 memset (cache->indx, -1, sizeof (cache->indx));
2322 cache->abfd = abfd;
2323 }
2324 cache->indx[ent] = r_symndx;
ec338859 2325 }
a5d1b3b5 2326
87d72d41 2327 return &cache->sym[ent];
ec338859
AM
2328}
2329
252b5132
RH
2330/* Given an ELF section number, retrieve the corresponding BFD
2331 section. */
2332
2333asection *
91d6fa6a 2334bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2335{
91d6fa6a 2336 if (sec_index >= elf_numsections (abfd))
252b5132 2337 return NULL;
91d6fa6a 2338 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2339}
2340
b35d266b 2341static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2342{
0112cd26
NC
2343 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2344 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2345};
2346
b35d266b 2347static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2348{
0112cd26
NC
2349 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2350 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2351};
2352
b35d266b 2353static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2354{
0112cd26
NC
2355 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2356 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
a9a72a65
DE
2357 /* There are more DWARF sections than these, but they needn't be added here
2358 unless you have to cope with broken compilers that don't emit section
2359 attributes or you want to help the user writing assembler. */
0112cd26
NC
2360 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2361 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2362 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2363 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2364 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2365 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2366 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2367 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2368 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2369};
2370
b35d266b 2371static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2372{
0112cd26
NC
2373 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2374 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2375 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2376};
2377
b35d266b 2378static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2379{
0112cd26 2380 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
68efed41 2381 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
0112cd26
NC
2382 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2383 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2384 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2385 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2386 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2387 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2388 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2389 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2390};
2391
b35d266b 2392static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2393{
0112cd26
NC
2394 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2395 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2396};
2397
b35d266b 2398static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2399{
0112cd26
NC
2400 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2401 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2402 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2403 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2404};
2405
b35d266b 2406static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2407{
0112cd26
NC
2408 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2409 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2410};
2411
b35d266b 2412static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2413{
0112cd26
NC
2414 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2415 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2416 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2417};
2418
b35d266b 2419static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2420{
0112cd26
NC
2421 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2422 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2423 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2424};
2425
b35d266b 2426static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2427{
0112cd26
NC
2428 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2429 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2430 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2431 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2432 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2433};
2434
b35d266b 2435static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2436{
0112cd26
NC
2437 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2438 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2439 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2440 /* See struct bfd_elf_special_section declaration for the semantics of
2441 this special case where .prefix_length != strlen (.prefix). */
2442 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2443 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2444};
2445
b35d266b 2446static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2447{
0112cd26
NC
2448 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2449 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2450 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2451 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2452};
2453
1b315056
CS
2454static const struct bfd_elf_special_section special_sections_z[] =
2455{
2456 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2457 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2458 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2459 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2460 { NULL, 0, 0, 0, 0 }
2461};
2462
e4c93b56 2463static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2464{
7f4d3958 2465 special_sections_b, /* 'b' */
98ece1b3 2466 special_sections_c, /* 'c' */
7f4d3958
L
2467 special_sections_d, /* 'd' */
2468 NULL, /* 'e' */
2469 special_sections_f, /* 'f' */
2470 special_sections_g, /* 'g' */
2471 special_sections_h, /* 'h' */
2472 special_sections_i, /* 'i' */
2473 NULL, /* 'j' */
2474 NULL, /* 'k' */
2475 special_sections_l, /* 'l' */
2476 NULL, /* 'm' */
2477 special_sections_n, /* 'n' */
2478 NULL, /* 'o' */
2479 special_sections_p, /* 'p' */
2480 NULL, /* 'q' */
2481 special_sections_r, /* 'r' */
2482 special_sections_s, /* 's' */
2483 special_sections_t, /* 't' */
1b315056
CS
2484 NULL, /* 'u' */
2485 NULL, /* 'v' */
2486 NULL, /* 'w' */
2487 NULL, /* 'x' */
2488 NULL, /* 'y' */
2489 special_sections_z /* 'z' */
7f4d3958
L
2490};
2491
551b43fd
AM
2492const struct bfd_elf_special_section *
2493_bfd_elf_get_special_section (const char *name,
2494 const struct bfd_elf_special_section *spec,
2495 unsigned int rela)
2f89ff8d
L
2496{
2497 int i;
7f4d3958 2498 int len;
7f4d3958 2499
551b43fd 2500 len = strlen (name);
7f4d3958 2501
551b43fd 2502 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2503 {
2504 int suffix_len;
551b43fd 2505 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2506
2507 if (len < prefix_len)
2508 continue;
551b43fd 2509 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2510 continue;
2511
551b43fd 2512 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2513 if (suffix_len <= 0)
2514 {
2515 if (name[prefix_len] != 0)
2516 {
2517 if (suffix_len == 0)
2518 continue;
2519 if (name[prefix_len] != '.'
2520 && (suffix_len == -2
551b43fd 2521 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2522 continue;
2523 }
2524 }
2525 else
2526 {
2527 if (len < prefix_len + suffix_len)
2528 continue;
2529 if (memcmp (name + len - suffix_len,
551b43fd 2530 spec[i].prefix + prefix_len,
7dcb9820
AM
2531 suffix_len) != 0)
2532 continue;
2533 }
551b43fd 2534 return &spec[i];
7dcb9820 2535 }
2f89ff8d
L
2536
2537 return NULL;
2538}
2539
7dcb9820 2540const struct bfd_elf_special_section *
29ef7005 2541_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2542{
551b43fd
AM
2543 int i;
2544 const struct bfd_elf_special_section *spec;
29ef7005 2545 const struct elf_backend_data *bed;
2f89ff8d
L
2546
2547 /* See if this is one of the special sections. */
551b43fd
AM
2548 if (sec->name == NULL)
2549 return NULL;
2f89ff8d 2550
29ef7005
L
2551 bed = get_elf_backend_data (abfd);
2552 spec = bed->special_sections;
2553 if (spec)
2554 {
2555 spec = _bfd_elf_get_special_section (sec->name,
2556 bed->special_sections,
2557 sec->use_rela_p);
2558 if (spec != NULL)
2559 return spec;
2560 }
2561
551b43fd
AM
2562 if (sec->name[0] != '.')
2563 return NULL;
2f89ff8d 2564
551b43fd 2565 i = sec->name[1] - 'b';
1b315056 2566 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2567 return NULL;
2568
2569 spec = special_sections[i];
2f89ff8d 2570
551b43fd
AM
2571 if (spec == NULL)
2572 return NULL;
2573
2574 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2575}
2576
b34976b6 2577bfd_boolean
217aa764 2578_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2579{
2580 struct bfd_elf_section_data *sdata;
551b43fd 2581 const struct elf_backend_data *bed;
7dcb9820 2582 const struct bfd_elf_special_section *ssect;
252b5132 2583
f0abc2a1
AM
2584 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2585 if (sdata == NULL)
2586 {
a50b1753
NC
2587 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2588 sizeof (*sdata));
f0abc2a1
AM
2589 if (sdata == NULL)
2590 return FALSE;
217aa764 2591 sec->used_by_bfd = sdata;
f0abc2a1 2592 }
bf572ba0 2593
551b43fd
AM
2594 /* Indicate whether or not this section should use RELA relocations. */
2595 bed = get_elf_backend_data (abfd);
2596 sec->use_rela_p = bed->default_use_rela_p;
2597
e843e0f8
L
2598 /* When we read a file, we don't need to set ELF section type and
2599 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2600 anyway. We will set ELF section type and flags for all linker
2601 created sections. If user specifies BFD section flags, we will
2602 set ELF section type and flags based on BFD section flags in
02ecc8e9
L
2603 elf_fake_sections. Special handling for .init_array/.fini_array
2604 output sections since they may contain .ctors/.dtors input
2605 sections. We don't want _bfd_elf_init_private_section_data to
2606 copy ELF section type from .ctors/.dtors input sections. */
2607 if (abfd->direction != read_direction
3496cb2a 2608 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2609 {
551b43fd 2610 ssect = (*bed->get_sec_type_attr) (abfd, sec);
02ecc8e9
L
2611 if (ssect != NULL
2612 && (!sec->flags
2613 || (sec->flags & SEC_LINKER_CREATED) != 0
2614 || ssect->type == SHT_INIT_ARRAY
2615 || ssect->type == SHT_FINI_ARRAY))
a31501e9
L
2616 {
2617 elf_section_type (sec) = ssect->type;
2618 elf_section_flags (sec) = ssect->attr;
2619 }
2f89ff8d
L
2620 }
2621
f592407e 2622 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2623}
2624
2625/* Create a new bfd section from an ELF program header.
2626
2627 Since program segments have no names, we generate a synthetic name
2628 of the form segment<NUM>, where NUM is generally the index in the
2629 program header table. For segments that are split (see below) we
2630 generate the names segment<NUM>a and segment<NUM>b.
2631
2632 Note that some program segments may have a file size that is different than
2633 (less than) the memory size. All this means is that at execution the
2634 system must allocate the amount of memory specified by the memory size,
2635 but only initialize it with the first "file size" bytes read from the
2636 file. This would occur for example, with program segments consisting
2637 of combined data+bss.
2638
2639 To handle the above situation, this routine generates TWO bfd sections
2640 for the single program segment. The first has the length specified by
2641 the file size of the segment, and the second has the length specified
2642 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2643 into its initialized and uninitialized parts.
252b5132
RH
2644
2645 */
2646
b34976b6 2647bfd_boolean
217aa764
AM
2648_bfd_elf_make_section_from_phdr (bfd *abfd,
2649 Elf_Internal_Phdr *hdr,
91d6fa6a 2650 int hdr_index,
a50b1753 2651 const char *type_name)
252b5132
RH
2652{
2653 asection *newsect;
2654 char *name;
2655 char namebuf[64];
d4c88bbb 2656 size_t len;
252b5132
RH
2657 int split;
2658
2659 split = ((hdr->p_memsz > 0)
2660 && (hdr->p_filesz > 0)
2661 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2662
2663 if (hdr->p_filesz > 0)
252b5132 2664 {
91d6fa6a 2665 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2666 len = strlen (namebuf) + 1;
a50b1753 2667 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2668 if (!name)
2669 return FALSE;
2670 memcpy (name, namebuf, len);
2671 newsect = bfd_make_section (abfd, name);
2672 if (newsect == NULL)
2673 return FALSE;
2674 newsect->vma = hdr->p_vaddr;
2675 newsect->lma = hdr->p_paddr;
2676 newsect->size = hdr->p_filesz;
2677 newsect->filepos = hdr->p_offset;
2678 newsect->flags |= SEC_HAS_CONTENTS;
2679 newsect->alignment_power = bfd_log2 (hdr->p_align);
2680 if (hdr->p_type == PT_LOAD)
252b5132 2681 {
d5191d0c
AM
2682 newsect->flags |= SEC_ALLOC;
2683 newsect->flags |= SEC_LOAD;
2684 if (hdr->p_flags & PF_X)
2685 {
2686 /* FIXME: all we known is that it has execute PERMISSION,
2687 may be data. */
2688 newsect->flags |= SEC_CODE;
2689 }
2690 }
2691 if (!(hdr->p_flags & PF_W))
2692 {
2693 newsect->flags |= SEC_READONLY;
252b5132 2694 }
252b5132
RH
2695 }
2696
d5191d0c 2697 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2698 {
d5191d0c
AM
2699 bfd_vma align;
2700
91d6fa6a 2701 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2702 len = strlen (namebuf) + 1;
a50b1753 2703 name = (char *) bfd_alloc (abfd, len);
252b5132 2704 if (!name)
b34976b6 2705 return FALSE;
d4c88bbb 2706 memcpy (name, namebuf, len);
252b5132
RH
2707 newsect = bfd_make_section (abfd, name);
2708 if (newsect == NULL)
b34976b6 2709 return FALSE;
252b5132
RH
2710 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2711 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2712 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2713 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2714 align = newsect->vma & -newsect->vma;
2715 if (align == 0 || align > hdr->p_align)
2716 align = hdr->p_align;
2717 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2718 if (hdr->p_type == PT_LOAD)
2719 {
d5191d0c
AM
2720 /* Hack for gdb. Segments that have not been modified do
2721 not have their contents written to a core file, on the
2722 assumption that a debugger can find the contents in the
2723 executable. We flag this case by setting the fake
2724 section size to zero. Note that "real" bss sections will
2725 always have their contents dumped to the core file. */
2726 if (bfd_get_format (abfd) == bfd_core)
2727 newsect->size = 0;
252b5132
RH
2728 newsect->flags |= SEC_ALLOC;
2729 if (hdr->p_flags & PF_X)
2730 newsect->flags |= SEC_CODE;
2731 }
2732 if (!(hdr->p_flags & PF_W))
2733 newsect->flags |= SEC_READONLY;
2734 }
2735
b34976b6 2736 return TRUE;
252b5132
RH
2737}
2738
b34976b6 2739bfd_boolean
91d6fa6a 2740bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2741{
9c5bfbb7 2742 const struct elf_backend_data *bed;
20cfcaae
NC
2743
2744 switch (hdr->p_type)
2745 {
2746 case PT_NULL:
91d6fa6a 2747 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2748
2749 case PT_LOAD:
91d6fa6a 2750 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2751
2752 case PT_DYNAMIC:
91d6fa6a 2753 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2754
2755 case PT_INTERP:
91d6fa6a 2756 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2757
2758 case PT_NOTE:
91d6fa6a 2759 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2760 return FALSE;
718175fa 2761 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2762 return FALSE;
2763 return TRUE;
20cfcaae
NC
2764
2765 case PT_SHLIB:
91d6fa6a 2766 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
2767
2768 case PT_PHDR:
91d6fa6a 2769 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 2770
811072d8 2771 case PT_GNU_EH_FRAME:
91d6fa6a 2772 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
2773 "eh_frame_hdr");
2774
2b05f1b7 2775 case PT_GNU_STACK:
91d6fa6a 2776 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 2777
8c37241b 2778 case PT_GNU_RELRO:
91d6fa6a 2779 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 2780
20cfcaae 2781 default:
8c1acd09 2782 /* Check for any processor-specific program segment types. */
20cfcaae 2783 bed = get_elf_backend_data (abfd);
91d6fa6a 2784 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
2785 }
2786}
2787
d4730f92
BS
2788/* Return the REL_HDR for SEC, assuming there is only a single one, either
2789 REL or RELA. */
2790
2791Elf_Internal_Shdr *
2792_bfd_elf_single_rel_hdr (asection *sec)
2793{
2794 if (elf_section_data (sec)->rel.hdr)
2795 {
2796 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
2797 return elf_section_data (sec)->rel.hdr;
2798 }
2799 else
2800 return elf_section_data (sec)->rela.hdr;
2801}
2802
3e19fb8f
L
2803static bfd_boolean
2804_bfd_elf_set_reloc_sh_name (bfd *abfd,
2805 Elf_Internal_Shdr *rel_hdr,
2806 const char *sec_name,
2807 bfd_boolean use_rela_p)
2808{
2809 char *name = (char *) bfd_alloc (abfd,
2810 sizeof ".rela" + strlen (sec_name));
2811 if (name == NULL)
2812 return FALSE;
2813
2814 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
2815 rel_hdr->sh_name =
2816 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
2817 FALSE);
2818 if (rel_hdr->sh_name == (unsigned int) -1)
2819 return FALSE;
2820
2821 return TRUE;
2822}
2823
d4730f92
BS
2824/* Allocate and initialize a section-header for a new reloc section,
2825 containing relocations against ASECT. It is stored in RELDATA. If
2826 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
2827 relocations. */
23bc299b 2828
5d13b3b3 2829static bfd_boolean
217aa764 2830_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 2831 struct bfd_elf_section_reloc_data *reldata,
f6fe1ccd 2832 const char *sec_name,
3e19fb8f
L
2833 bfd_boolean use_rela_p,
2834 bfd_boolean delay_st_name_p)
23bc299b 2835{
d4730f92 2836 Elf_Internal_Shdr *rel_hdr;
9c5bfbb7 2837 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92
BS
2838 bfd_size_type amt;
2839
2840 amt = sizeof (Elf_Internal_Shdr);
2841 BFD_ASSERT (reldata->hdr == NULL);
2842 rel_hdr = bfd_zalloc (abfd, amt);
2843 reldata->hdr = rel_hdr;
23bc299b 2844
3e19fb8f
L
2845 if (delay_st_name_p)
2846 rel_hdr->sh_name = (unsigned int) -1;
2847 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
2848 use_rela_p))
b34976b6 2849 return FALSE;
23bc299b
MM
2850 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2851 rel_hdr->sh_entsize = (use_rela_p
2852 ? bed->s->sizeof_rela
2853 : bed->s->sizeof_rel);
72de5009 2854 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
2855 rel_hdr->sh_flags = 0;
2856 rel_hdr->sh_addr = 0;
2857 rel_hdr->sh_size = 0;
2858 rel_hdr->sh_offset = 0;
2859
b34976b6 2860 return TRUE;
23bc299b
MM
2861}
2862
94be91de
JB
2863/* Return the default section type based on the passed in section flags. */
2864
2865int
2866bfd_elf_get_default_section_type (flagword flags)
2867{
2868 if ((flags & SEC_ALLOC) != 0
2e76e85a 2869 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
2870 return SHT_NOBITS;
2871 return SHT_PROGBITS;
2872}
2873
d4730f92
BS
2874struct fake_section_arg
2875{
2876 struct bfd_link_info *link_info;
2877 bfd_boolean failed;
2878};
2879
252b5132
RH
2880/* Set up an ELF internal section header for a section. */
2881
252b5132 2882static void
d4730f92 2883elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 2884{
d4730f92 2885 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 2886 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 2887 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 2888 Elf_Internal_Shdr *this_hdr;
0414f35b 2889 unsigned int sh_type;
0ce398f1 2890 const char *name = asect->name;
3e19fb8f 2891 bfd_boolean delay_st_name_p = FALSE;
252b5132 2892
d4730f92 2893 if (arg->failed)
252b5132
RH
2894 {
2895 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2896 loop. */
252b5132
RH
2897 return;
2898 }
2899
d4730f92 2900 this_hdr = &esd->this_hdr;
252b5132 2901
f6fe1ccd 2902 if (arg->link_info)
0ce398f1 2903 {
f6fe1ccd
L
2904 /* ld: compress DWARF debug sections with names: .debug_*. */
2905 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
2906 && (asect->flags & SEC_DEBUGGING)
2907 && name[1] == 'd'
2908 && name[6] == '_')
2909 {
2910 /* Set SEC_ELF_COMPRESS to indicate this section should be
2911 compressed. */
2912 asect->flags |= SEC_ELF_COMPRESS;
0ce398f1 2913
3e19fb8f
L
2914 /* If this section will be compressed, delay adding setion
2915 name to section name section after it is compressed in
2916 _bfd_elf_assign_file_positions_for_non_load. */
2917 delay_st_name_p = TRUE;
f6fe1ccd
L
2918 }
2919 }
2920 else if ((asect->flags & SEC_ELF_RENAME))
2921 {
2922 /* objcopy: rename output DWARF debug section. */
2923 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
2924 {
2925 /* When we decompress or compress with SHF_COMPRESSED,
2926 convert section name from .zdebug_* to .debug_* if
2927 needed. */
2928 if (name[1] == 'z')
2929 {
2930 char *new_name = convert_zdebug_to_debug (abfd, name);
2931 if (new_name == NULL)
2932 {
2933 arg->failed = TRUE;
2934 return;
2935 }
2936 name = new_name;
2937 }
2938 }
2939 else if (asect->compress_status == COMPRESS_SECTION_DONE)
0ce398f1 2940 {
f6fe1ccd
L
2941 /* PR binutils/18087: Compression does not always make a
2942 section smaller. So only rename the section when
2943 compression has actually taken place. If input section
2944 name is .zdebug_*, we should never compress it again. */
2945 char *new_name = convert_debug_to_zdebug (abfd, name);
0ce398f1
L
2946 if (new_name == NULL)
2947 {
2948 arg->failed = TRUE;
2949 return;
2950 }
f6fe1ccd
L
2951 BFD_ASSERT (name[1] != 'z');
2952 name = new_name;
0ce398f1
L
2953 }
2954 }
2955
3e19fb8f
L
2956 if (delay_st_name_p)
2957 this_hdr->sh_name = (unsigned int) -1;
2958 else
252b5132 2959 {
3e19fb8f
L
2960 this_hdr->sh_name
2961 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2962 name, FALSE);
2963 if (this_hdr->sh_name == (unsigned int) -1)
2964 {
2965 arg->failed = TRUE;
2966 return;
2967 }
252b5132
RH
2968 }
2969
a4d8e49b 2970 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2971
2972 if ((asect->flags & SEC_ALLOC) != 0
2973 || asect->user_set_vma)
2974 this_hdr->sh_addr = asect->vma;
2975 else
2976 this_hdr->sh_addr = 0;
2977
2978 this_hdr->sh_offset = 0;
eea6121a 2979 this_hdr->sh_size = asect->size;
252b5132 2980 this_hdr->sh_link = 0;
c86934ce
NC
2981 /* PR 17512: file: 0eb809fe, 8b0535ee. */
2982 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
2983 {
2984 (*_bfd_error_handler)
2985 (_("%B: error: Alignment power %d of section `%A' is too big"),
2986 abfd, asect, asect->alignment_power);
2987 arg->failed = TRUE;
2988 return;
2989 }
72de5009 2990 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
2991 /* The sh_entsize and sh_info fields may have been set already by
2992 copy_private_section_data. */
2993
2994 this_hdr->bfd_section = asect;
2995 this_hdr->contents = NULL;
2996
3cddba1e
L
2997 /* If the section type is unspecified, we set it based on
2998 asect->flags. */
98ece1b3
AM
2999 if ((asect->flags & SEC_GROUP) != 0)
3000 sh_type = SHT_GROUP;
98ece1b3 3001 else
94be91de 3002 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 3003
3cddba1e 3004 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
3005 this_hdr->sh_type = sh_type;
3006 else if (this_hdr->sh_type == SHT_NOBITS
3007 && sh_type == SHT_PROGBITS
3008 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 3009 {
98ece1b3
AM
3010 /* Warn if we are changing a NOBITS section to PROGBITS, but
3011 allow the link to proceed. This can happen when users link
3012 non-bss input sections to bss output sections, or emit data
3013 to a bss output section via a linker script. */
3014 (*_bfd_error_handler)
58f0869b 3015 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 3016 this_hdr->sh_type = sh_type;
3cddba1e
L
3017 }
3018
2f89ff8d 3019 switch (this_hdr->sh_type)
252b5132 3020 {
2f89ff8d 3021 default:
2f89ff8d
L
3022 break;
3023
3024 case SHT_STRTAB:
3025 case SHT_INIT_ARRAY:
3026 case SHT_FINI_ARRAY:
3027 case SHT_PREINIT_ARRAY:
3028 case SHT_NOTE:
3029 case SHT_NOBITS:
3030 case SHT_PROGBITS:
3031 break;
3032
3033 case SHT_HASH:
c7ac6ff8 3034 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 3035 break;
5de3bf90 3036
2f89ff8d 3037 case SHT_DYNSYM:
252b5132 3038 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
3039 break;
3040
3041 case SHT_DYNAMIC:
252b5132 3042 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
3043 break;
3044
3045 case SHT_RELA:
3046 if (get_elf_backend_data (abfd)->may_use_rela_p)
3047 this_hdr->sh_entsize = bed->s->sizeof_rela;
3048 break;
3049
3050 case SHT_REL:
3051 if (get_elf_backend_data (abfd)->may_use_rel_p)
3052 this_hdr->sh_entsize = bed->s->sizeof_rel;
3053 break;
3054
3055 case SHT_GNU_versym:
252b5132 3056 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
3057 break;
3058
3059 case SHT_GNU_verdef:
252b5132
RH
3060 this_hdr->sh_entsize = 0;
3061 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3062 cverdefs. The linker will set cverdefs, but sh_info will be
3063 zero. */
252b5132
RH
3064 if (this_hdr->sh_info == 0)
3065 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3066 else
3067 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3068 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
3069 break;
3070
3071 case SHT_GNU_verneed:
252b5132
RH
3072 this_hdr->sh_entsize = 0;
3073 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3074 cverrefs. The linker will set cverrefs, but sh_info will be
3075 zero. */
252b5132
RH
3076 if (this_hdr->sh_info == 0)
3077 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3078 else
3079 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3080 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
3081 break;
3082
3083 case SHT_GROUP:
1783205a 3084 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 3085 break;
fdc90cb4
JJ
3086
3087 case SHT_GNU_HASH:
3088 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3089 break;
dbb410c3 3090 }
252b5132
RH
3091
3092 if ((asect->flags & SEC_ALLOC) != 0)
3093 this_hdr->sh_flags |= SHF_ALLOC;
3094 if ((asect->flags & SEC_READONLY) == 0)
3095 this_hdr->sh_flags |= SHF_WRITE;
3096 if ((asect->flags & SEC_CODE) != 0)
3097 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
3098 if ((asect->flags & SEC_MERGE) != 0)
3099 {
3100 this_hdr->sh_flags |= SHF_MERGE;
3101 this_hdr->sh_entsize = asect->entsize;
3102 if ((asect->flags & SEC_STRINGS) != 0)
3103 this_hdr->sh_flags |= SHF_STRINGS;
3104 }
1126897b 3105 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 3106 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 3107 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
3108 {
3109 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
3110 if (asect->size == 0
3111 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 3112 {
3a800eb9 3113 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 3114
704afa60 3115 this_hdr->sh_size = 0;
3a800eb9
AM
3116 if (o != NULL)
3117 {
704afa60 3118 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
3119 if (this_hdr->sh_size != 0)
3120 this_hdr->sh_type = SHT_NOBITS;
3121 }
704afa60
JJ
3122 }
3123 }
18ae9cc1
L
3124 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3125 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 3126
d4730f92
BS
3127 /* If the section has relocs, set up a section header for the
3128 SHT_REL[A] section. If two relocation sections are required for
3129 this section, it is up to the processor-specific back-end to
3130 create the other. */
3131 if ((asect->flags & SEC_RELOC) != 0)
3132 {
3133 /* When doing a relocatable link, create both REL and RELA sections if
3134 needed. */
3135 if (arg->link_info
3136 /* Do the normal setup if we wouldn't create any sections here. */
3137 && esd->rel.count + esd->rela.count > 0
0e1862bb
L
3138 && (bfd_link_relocatable (arg->link_info)
3139 || arg->link_info->emitrelocations))
d4730f92
BS
3140 {
3141 if (esd->rel.count && esd->rel.hdr == NULL
3e19fb8f
L
3142 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name, FALSE,
3143 delay_st_name_p))
d4730f92
BS
3144 {
3145 arg->failed = TRUE;
3146 return;
3147 }
3148 if (esd->rela.count && esd->rela.hdr == NULL
3e19fb8f
L
3149 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name, TRUE,
3150 delay_st_name_p))
d4730f92
BS
3151 {
3152 arg->failed = TRUE;
3153 return;
3154 }
3155 }
3156 else if (!_bfd_elf_init_reloc_shdr (abfd,
3157 (asect->use_rela_p
3158 ? &esd->rela : &esd->rel),
f6fe1ccd 3159 name,
3e19fb8f
L
3160 asect->use_rela_p,
3161 delay_st_name_p))
d4730f92
BS
3162 arg->failed = TRUE;
3163 }
3164
252b5132 3165 /* Check for processor-specific section types. */
0414f35b 3166 sh_type = this_hdr->sh_type;
e1fddb6b
AO
3167 if (bed->elf_backend_fake_sections
3168 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
d4730f92 3169 arg->failed = TRUE;
252b5132 3170
42bb2e33 3171 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
3172 {
3173 /* Don't change the header type from NOBITS if we are being
42bb2e33 3174 called for objcopy --only-keep-debug. */
0414f35b
AM
3175 this_hdr->sh_type = sh_type;
3176 }
252b5132
RH
3177}
3178
bcacc0f5
AM
3179/* Fill in the contents of a SHT_GROUP section. Called from
3180 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3181 when ELF targets use the generic linker, ld. Called for ld -r
3182 from bfd_elf_final_link. */
dbb410c3 3183
1126897b 3184void
217aa764 3185bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 3186{
a50b1753 3187 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 3188 asection *elt, *first;
dbb410c3 3189 unsigned char *loc;
b34976b6 3190 bfd_boolean gas;
dbb410c3 3191
7e4111ad
L
3192 /* Ignore linker created group section. See elfNN_ia64_object_p in
3193 elfxx-ia64.c. */
3194 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
3195 || *failedptr)
3196 return;
3197
bcacc0f5
AM
3198 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3199 {
3200 unsigned long symindx = 0;
3201
3202 /* elf_group_id will have been set up by objcopy and the
3203 generic linker. */
3204 if (elf_group_id (sec) != NULL)
3205 symindx = elf_group_id (sec)->udata.i;
1126897b 3206
bcacc0f5
AM
3207 if (symindx == 0)
3208 {
3209 /* If called from the assembler, swap_out_syms will have set up
3210 elf_section_syms. */
3211 BFD_ASSERT (elf_section_syms (abfd) != NULL);
3212 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3213 }
3214 elf_section_data (sec)->this_hdr.sh_info = symindx;
3215 }
3216 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 3217 {
bcacc0f5
AM
3218 /* The ELF backend linker sets sh_info to -2 when the group
3219 signature symbol is global, and thus the index can't be
3220 set until all local symbols are output. */
3221 asection *igroup = elf_sec_group (elf_next_in_group (sec));
3222 struct bfd_elf_section_data *sec_data = elf_section_data (igroup);
3223 unsigned long symndx = sec_data->this_hdr.sh_info;
3224 unsigned long extsymoff = 0;
3225 struct elf_link_hash_entry *h;
3226
3227 if (!elf_bad_symtab (igroup->owner))
3228 {
3229 Elf_Internal_Shdr *symtab_hdr;
3230
3231 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3232 extsymoff = symtab_hdr->sh_info;
3233 }
3234 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3235 while (h->root.type == bfd_link_hash_indirect
3236 || h->root.type == bfd_link_hash_warning)
3237 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3238
3239 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 3240 }
dbb410c3 3241
1126897b 3242 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 3243 gas = TRUE;
dbb410c3
AM
3244 if (sec->contents == NULL)
3245 {
b34976b6 3246 gas = FALSE;
a50b1753 3247 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
3248
3249 /* Arrange for the section to be written out. */
3250 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
3251 if (sec->contents == NULL)
3252 {
b34976b6 3253 *failedptr = TRUE;
dbb410c3
AM
3254 return;
3255 }
3256 }
3257
eea6121a 3258 loc = sec->contents + sec->size;
dbb410c3 3259
9dce4196
AM
3260 /* Get the pointer to the first section in the group that gas
3261 squirreled away here. objcopy arranges for this to be set to the
3262 start of the input section group. */
3263 first = elt = elf_next_in_group (sec);
dbb410c3
AM
3264
3265 /* First element is a flag word. Rest of section is elf section
3266 indices for all the sections of the group. Write them backwards
3267 just to keep the group in the same order as given in .section
3268 directives, not that it matters. */
3269 while (elt != NULL)
3270 {
9dce4196 3271 asection *s;
9dce4196 3272
9dce4196 3273 s = elt;
415f38a6
AM
3274 if (!gas)
3275 s = s->output_section;
3276 if (s != NULL
3277 && !bfd_is_abs_section (s))
01e1a5bc 3278 {
415f38a6
AM
3279 unsigned int idx = elf_section_data (s)->this_idx;
3280
01e1a5bc 3281 loc -= 4;
01e1a5bc
NC
3282 H_PUT_32 (abfd, idx, loc);
3283 }
945906ff 3284 elt = elf_next_in_group (elt);
9dce4196
AM
3285 if (elt == first)
3286 break;
dbb410c3
AM
3287 }
3288
3d7f7666 3289 if ((loc -= 4) != sec->contents)
9dce4196 3290 abort ();
dbb410c3 3291
9dce4196 3292 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
3293}
3294
bd53a53a
L
3295/* Return the section which RELOC_SEC applies to. */
3296
3297asection *
3298_bfd_elf_get_reloc_section (asection *reloc_sec)
3299{
3300 const char *name;
3301 unsigned int type;
3302 bfd *abfd;
3303
3304 if (reloc_sec == NULL)
3305 return NULL;
3306
3307 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3308 if (type != SHT_REL && type != SHT_RELA)
3309 return NULL;
3310
3311 /* We look up the section the relocs apply to by name. */
3312 name = reloc_sec->name;
3313 if (type == SHT_REL)
3314 name += 4;
3315 else
3316 name += 5;
3317
3318 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3319 section apply to .got.plt section. */
3320 abfd = reloc_sec->owner;
3321 if (get_elf_backend_data (abfd)->want_got_plt
3322 && strcmp (name, ".plt") == 0)
87070c08
AM
3323 {
3324 /* .got.plt is a linker created input section. It may be mapped
3325 to some other output section. Try two likely sections. */
3326 name = ".got.plt";
3327 reloc_sec = bfd_get_section_by_name (abfd, name);
3328 if (reloc_sec != NULL)
3329 return reloc_sec;
3330 name = ".got";
3331 }
bd53a53a
L
3332
3333 reloc_sec = bfd_get_section_by_name (abfd, name);
3334 return reloc_sec;
3335}
3336
252b5132
RH
3337/* Assign all ELF section numbers. The dummy first section is handled here
3338 too. The link/info pointers for the standard section types are filled
3339 in here too, while we're at it. */
3340
b34976b6 3341static bfd_boolean
da9f89d4 3342assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
3343{
3344 struct elf_obj_tdata *t = elf_tdata (abfd);
3345 asection *sec;
3e19fb8f 3346 unsigned int section_number;
252b5132 3347 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 3348 struct bfd_elf_section_data *d;
3516e984 3349 bfd_boolean need_symtab;
252b5132
RH
3350
3351 section_number = 1;
3352
2b0f7ef9
JJ
3353 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3354
da9f89d4 3355 /* SHT_GROUP sections are in relocatable files only. */
0e1862bb 3356 if (link_info == NULL || bfd_link_relocatable (link_info))
252b5132 3357 {
14f2c699
L
3358 bfd_size_type reloc_count = 0;
3359
da9f89d4 3360 /* Put SHT_GROUP sections first. */
04dd1667 3361 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 3362 {
5daa8fe7 3363 d = elf_section_data (sec);
da9f89d4
L
3364
3365 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 3366 {
5daa8fe7 3367 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
3368 {
3369 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 3370 bfd_section_list_remove (abfd, sec);
da9f89d4 3371 abfd->section_count--;
da9f89d4 3372 }
08a40648 3373 else
4fbb74a6 3374 d->this_idx = section_number++;
da9f89d4 3375 }
14f2c699
L
3376
3377 /* Count relocations. */
3378 reloc_count += sec->reloc_count;
47cc2cf5 3379 }
14f2c699
L
3380
3381 /* Clear HAS_RELOC if there are no relocations. */
3382 if (reloc_count == 0)
3383 abfd->flags &= ~HAS_RELOC;
47cc2cf5
PB
3384 }
3385
3386 for (sec = abfd->sections; sec; sec = sec->next)
3387 {
3388 d = elf_section_data (sec);
3389
3390 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 3391 d->this_idx = section_number++;
3e19fb8f
L
3392 if (d->this_hdr.sh_name != (unsigned int) -1)
3393 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 3394 if (d->rel.hdr)
2b0f7ef9 3395 {
d4730f92 3396 d->rel.idx = section_number++;
3e19fb8f
L
3397 if (d->rel.hdr->sh_name != (unsigned int) -1)
3398 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 3399 }
d4730f92
BS
3400 else
3401 d->rel.idx = 0;
23bc299b 3402
d4730f92 3403 if (d->rela.hdr)
2b0f7ef9 3404 {
d4730f92 3405 d->rela.idx = section_number++;
3e19fb8f
L
3406 if (d->rela.hdr->sh_name != (unsigned int) -1)
3407 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 3408 }
23bc299b 3409 else
d4730f92 3410 d->rela.idx = 0;
252b5132
RH
3411 }
3412
12bd6957 3413 elf_shstrtab_sec (abfd) = section_number++;
2b0f7ef9 3414 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
12bd6957 3415 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
252b5132 3416
3516e984
L
3417 need_symtab = (bfd_get_symcount (abfd) > 0
3418 || (link_info == NULL
3419 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3420 == HAS_RELOC)));
3421 if (need_symtab)
252b5132 3422 {
12bd6957 3423 elf_onesymtab (abfd) = section_number++;
2b0f7ef9 3424 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 3425 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 3426 {
6a40cf0c
NC
3427 elf_section_list * entry;
3428
3429 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3430
3431 entry = bfd_zalloc (abfd, sizeof * entry);
3432 entry->ndx = section_number++;
3433 elf_symtab_shndx_list (abfd) = entry;
3434 entry->hdr.sh_name
9ad5cbcf 3435 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3436 ".symtab_shndx", FALSE);
6a40cf0c 3437 if (entry->hdr.sh_name == (unsigned int) -1)
b34976b6 3438 return FALSE;
9ad5cbcf 3439 }
12bd6957 3440 elf_strtab_sec (abfd) = section_number++;
2b0f7ef9 3441 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3442 }
3443
1c52a645
L
3444 if (section_number >= SHN_LORESERVE)
3445 {
3446 _bfd_error_handler (_("%B: too many sections: %u"),
3447 abfd, section_number);
3448 return FALSE;
3449 }
3450
9ad5cbcf 3451 elf_numsections (abfd) = section_number;
252b5132
RH
3452 elf_elfheader (abfd)->e_shnum = section_number;
3453
3454 /* Set up the list of section header pointers, in agreement with the
3455 indices. */
a50b1753
NC
3456 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
3457 sizeof (Elf_Internal_Shdr *));
252b5132 3458 if (i_shdrp == NULL)
b34976b6 3459 return FALSE;
252b5132 3460
a50b1753
NC
3461 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3462 sizeof (Elf_Internal_Shdr));
252b5132
RH
3463 if (i_shdrp[0] == NULL)
3464 {
3465 bfd_release (abfd, i_shdrp);
b34976b6 3466 return FALSE;
252b5132 3467 }
252b5132
RH
3468
3469 elf_elfsections (abfd) = i_shdrp;
3470
12bd6957 3471 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3516e984 3472 if (need_symtab)
252b5132 3473 {
12bd6957 3474 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
4fbb74a6 3475 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf 3476 {
6a40cf0c
NC
3477 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3478 BFD_ASSERT (entry != NULL);
3479 i_shdrp[entry->ndx] = & entry->hdr;
3480 entry->hdr.sh_link = elf_onesymtab (abfd);
9ad5cbcf 3481 }
12bd6957
AM
3482 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3483 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
252b5132 3484 }
38ce5b11 3485
252b5132
RH
3486 for (sec = abfd->sections; sec; sec = sec->next)
3487 {
252b5132 3488 asection *s;
252b5132 3489
91d6fa6a
NC
3490 d = elf_section_data (sec);
3491
252b5132 3492 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3493 if (d->rel.idx != 0)
3494 i_shdrp[d->rel.idx] = d->rel.hdr;
3495 if (d->rela.idx != 0)
3496 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3497
3498 /* Fill in the sh_link and sh_info fields while we're at it. */
3499
3500 /* sh_link of a reloc section is the section index of the symbol
3501 table. sh_info is the section index of the section to which
3502 the relocation entries apply. */
d4730f92 3503 if (d->rel.idx != 0)
252b5132 3504 {
12bd6957 3505 d->rel.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3506 d->rel.hdr->sh_info = d->this_idx;
9ef5d938 3507 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
252b5132 3508 }
d4730f92 3509 if (d->rela.idx != 0)
23bc299b 3510 {
12bd6957 3511 d->rela.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3512 d->rela.hdr->sh_info = d->this_idx;
9ef5d938 3513 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
23bc299b 3514 }
252b5132 3515
38ce5b11
L
3516 /* We need to set up sh_link for SHF_LINK_ORDER. */
3517 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3518 {
3519 s = elf_linked_to_section (sec);
3520 if (s)
38ce5b11 3521 {
f2876037 3522 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3523 if (link_info != NULL)
38ce5b11 3524 {
f2876037 3525 /* Check discarded linkonce section. */
dbaa2011 3526 if (discarded_section (s))
38ce5b11 3527 {
ccd2ec6a
L
3528 asection *kept;
3529 (*_bfd_error_handler)
3530 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3531 abfd, d->this_hdr.bfd_section,
3532 s, s->owner);
3533 /* Point to the kept section if it has the same
3534 size as the discarded one. */
c0f00686 3535 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3536 if (kept == NULL)
185d09ad 3537 {
ccd2ec6a
L
3538 bfd_set_error (bfd_error_bad_value);
3539 return FALSE;
185d09ad 3540 }
ccd2ec6a 3541 s = kept;
38ce5b11 3542 }
e424ecc8 3543
ccd2ec6a
L
3544 s = s->output_section;
3545 BFD_ASSERT (s != NULL);
38ce5b11 3546 }
f2876037
L
3547 else
3548 {
3549 /* Handle objcopy. */
3550 if (s->output_section == NULL)
3551 {
3552 (*_bfd_error_handler)
3553 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
3554 abfd, d->this_hdr.bfd_section, s, s->owner);
3555 bfd_set_error (bfd_error_bad_value);
3556 return FALSE;
3557 }
3558 s = s->output_section;
3559 }
ccd2ec6a
L
3560 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3561 }
3562 else
3563 {
3564 /* PR 290:
3565 The Intel C compiler generates SHT_IA_64_UNWIND with
3566 SHF_LINK_ORDER. But it doesn't set the sh_link or
3567 sh_info fields. Hence we could get the situation
08a40648 3568 where s is NULL. */
ccd2ec6a
L
3569 const struct elf_backend_data *bed
3570 = get_elf_backend_data (abfd);
3571 if (bed->link_order_error_handler)
3572 bed->link_order_error_handler
3573 (_("%B: warning: sh_link not set for section `%A'"),
3574 abfd, sec);
38ce5b11
L
3575 }
3576 }
3577
252b5132
RH
3578 switch (d->this_hdr.sh_type)
3579 {
3580 case SHT_REL:
3581 case SHT_RELA:
3582 /* A reloc section which we are treating as a normal BFD
3583 section. sh_link is the section index of the symbol
3584 table. sh_info is the section index of the section to
3585 which the relocation entries apply. We assume that an
3586 allocated reloc section uses the dynamic symbol table.
3587 FIXME: How can we be sure? */
3588 s = bfd_get_section_by_name (abfd, ".dynsym");
3589 if (s != NULL)
3590 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3591
bd53a53a 3592 s = get_elf_backend_data (abfd)->get_reloc_section (sec);
252b5132 3593 if (s != NULL)
9ef5d938
L
3594 {
3595 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3596 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3597 }
252b5132
RH
3598 break;
3599
3600 case SHT_STRTAB:
3601 /* We assume that a section named .stab*str is a stabs
3602 string section. We look for a section with the same name
3603 but without the trailing ``str'', and set its sh_link
3604 field to point to this section. */
0112cd26 3605 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3606 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3607 {
3608 size_t len;
3609 char *alc;
3610
3611 len = strlen (sec->name);
a50b1753 3612 alc = (char *) bfd_malloc (len - 2);
252b5132 3613 if (alc == NULL)
b34976b6 3614 return FALSE;
d4c88bbb 3615 memcpy (alc, sec->name, len - 3);
252b5132
RH
3616 alc[len - 3] = '\0';
3617 s = bfd_get_section_by_name (abfd, alc);
3618 free (alc);
3619 if (s != NULL)
3620 {
3621 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3622
3623 /* This is a .stab section. */
0594c12d
AM
3624 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3625 elf_section_data (s)->this_hdr.sh_entsize
3626 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3627 }
3628 }
3629 break;
3630
3631 case SHT_DYNAMIC:
3632 case SHT_DYNSYM:
3633 case SHT_GNU_verneed:
3634 case SHT_GNU_verdef:
3635 /* sh_link is the section header index of the string table
3636 used for the dynamic entries, or the symbol table, or the
3637 version strings. */
3638 s = bfd_get_section_by_name (abfd, ".dynstr");
3639 if (s != NULL)
3640 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3641 break;
3642
7f1204bb
JJ
3643 case SHT_GNU_LIBLIST:
3644 /* sh_link is the section header index of the prelink library
08a40648
AM
3645 list used for the dynamic entries, or the symbol table, or
3646 the version strings. */
7f1204bb
JJ
3647 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3648 ? ".dynstr" : ".gnu.libstr");
3649 if (s != NULL)
3650 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3651 break;
3652
252b5132 3653 case SHT_HASH:
fdc90cb4 3654 case SHT_GNU_HASH:
252b5132
RH
3655 case SHT_GNU_versym:
3656 /* sh_link is the section header index of the symbol table
3657 this hash table or version table is for. */
3658 s = bfd_get_section_by_name (abfd, ".dynsym");
3659 if (s != NULL)
3660 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3661 break;
dbb410c3
AM
3662
3663 case SHT_GROUP:
12bd6957 3664 d->this_hdr.sh_link = elf_onesymtab (abfd);
252b5132
RH
3665 }
3666 }
3667
3e19fb8f
L
3668 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
3669 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
3670 debug section name from .debug_* to .zdebug_* if needed. */
3671
b34976b6 3672 return TRUE;
252b5132
RH
3673}
3674
5372391b 3675static bfd_boolean
217aa764 3676sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3677{
3678 /* If the backend has a special mapping, use it. */
9c5bfbb7 3679 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3680 if (bed->elf_backend_sym_is_global)
3681 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3682
e47bf690 3683 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3684 || bfd_is_und_section (bfd_get_section (sym))
3685 || bfd_is_com_section (bfd_get_section (sym)));
3686}
3687
5372391b 3688/* Don't output section symbols for sections that are not going to be
c6d8cab4 3689 output, that are duplicates or there is no BFD section. */
5372391b
AM
3690
3691static bfd_boolean
3692ignore_section_sym (bfd *abfd, asymbol *sym)
3693{
c6d8cab4
L
3694 elf_symbol_type *type_ptr;
3695
3696 if ((sym->flags & BSF_SECTION_SYM) == 0)
3697 return FALSE;
3698
3699 type_ptr = elf_symbol_from (abfd, sym);
3700 return ((type_ptr != NULL
3701 && type_ptr->internal_elf_sym.st_shndx != 0
3702 && bfd_is_abs_section (sym->section))
3703 || !(sym->section->owner == abfd
0f0a5e58 3704 || (sym->section->output_section->owner == abfd
2633a79c
AM
3705 && sym->section->output_offset == 0)
3706 || bfd_is_abs_section (sym->section)));
5372391b
AM
3707}
3708
2633a79c
AM
3709/* Map symbol from it's internal number to the external number, moving
3710 all local symbols to be at the head of the list. */
3711
b34976b6 3712static bfd_boolean
12bd6957 3713elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
252b5132 3714{
dc810e39 3715 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3716 asymbol **syms = bfd_get_outsymbols (abfd);
3717 asymbol **sect_syms;
dc810e39
AM
3718 unsigned int num_locals = 0;
3719 unsigned int num_globals = 0;
3720 unsigned int num_locals2 = 0;
3721 unsigned int num_globals2 = 0;
7292b3ac 3722 unsigned int max_index = 0;
dc810e39 3723 unsigned int idx;
252b5132
RH
3724 asection *asect;
3725 asymbol **new_syms;
252b5132
RH
3726
3727#ifdef DEBUG
3728 fprintf (stderr, "elf_map_symbols\n");
3729 fflush (stderr);
3730#endif
3731
252b5132
RH
3732 for (asect = abfd->sections; asect; asect = asect->next)
3733 {
3734 if (max_index < asect->index)
3735 max_index = asect->index;
3736 }
3737
3738 max_index++;
a50b1753 3739 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3740 if (sect_syms == NULL)
b34976b6 3741 return FALSE;
252b5132 3742 elf_section_syms (abfd) = sect_syms;
4e89ac30 3743 elf_num_section_syms (abfd) = max_index;
252b5132 3744
079e9a2f
AM
3745 /* Init sect_syms entries for any section symbols we have already
3746 decided to output. */
252b5132
RH
3747 for (idx = 0; idx < symcount; idx++)
3748 {
dc810e39 3749 asymbol *sym = syms[idx];
c044fabd 3750
252b5132 3751 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 3752 && sym->value == 0
2633a79c
AM
3753 && !ignore_section_sym (abfd, sym)
3754 && !bfd_is_abs_section (sym->section))
252b5132 3755 {
5372391b 3756 asection *sec = sym->section;
252b5132 3757
5372391b
AM
3758 if (sec->owner != abfd)
3759 sec = sec->output_section;
252b5132 3760
5372391b 3761 sect_syms[sec->index] = syms[idx];
252b5132
RH
3762 }
3763 }
3764
252b5132
RH
3765 /* Classify all of the symbols. */
3766 for (idx = 0; idx < symcount; idx++)
3767 {
2633a79c 3768 if (sym_is_global (abfd, syms[idx]))
252b5132 3769 num_globals++;
2633a79c
AM
3770 else if (!ignore_section_sym (abfd, syms[idx]))
3771 num_locals++;
252b5132 3772 }
079e9a2f 3773
5372391b 3774 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3775 sections will already have a section symbol in outsymbols, but
3776 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3777 at least in that case. */
252b5132
RH
3778 for (asect = abfd->sections; asect; asect = asect->next)
3779 {
079e9a2f 3780 if (sect_syms[asect->index] == NULL)
252b5132 3781 {
079e9a2f 3782 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3783 num_locals++;
3784 else
3785 num_globals++;
252b5132
RH
3786 }
3787 }
3788
3789 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
3790 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
3791 sizeof (asymbol *));
dc810e39 3792
252b5132 3793 if (new_syms == NULL)
b34976b6 3794 return FALSE;
252b5132
RH
3795
3796 for (idx = 0; idx < symcount; idx++)
3797 {
3798 asymbol *sym = syms[idx];
dc810e39 3799 unsigned int i;
252b5132 3800
2633a79c
AM
3801 if (sym_is_global (abfd, sym))
3802 i = num_locals + num_globals2++;
3803 else if (!ignore_section_sym (abfd, sym))
252b5132
RH
3804 i = num_locals2++;
3805 else
2633a79c 3806 continue;
252b5132
RH
3807 new_syms[i] = sym;
3808 sym->udata.i = i + 1;
3809 }
3810 for (asect = abfd->sections; asect; asect = asect->next)
3811 {
079e9a2f 3812 if (sect_syms[asect->index] == NULL)
252b5132 3813 {
079e9a2f 3814 asymbol *sym = asect->symbol;
dc810e39 3815 unsigned int i;
252b5132 3816
079e9a2f 3817 sect_syms[asect->index] = sym;
252b5132
RH
3818 if (!sym_is_global (abfd, sym))
3819 i = num_locals2++;
3820 else
3821 i = num_locals + num_globals2++;
3822 new_syms[i] = sym;
3823 sym->udata.i = i + 1;
3824 }
3825 }
3826
3827 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3828
12bd6957 3829 *pnum_locals = num_locals;
b34976b6 3830 return TRUE;
252b5132
RH
3831}
3832
3833/* Align to the maximum file alignment that could be required for any
3834 ELF data structure. */
3835
268b6b39 3836static inline file_ptr
217aa764 3837align_file_position (file_ptr off, int align)
252b5132
RH
3838{
3839 return (off + align - 1) & ~(align - 1);
3840}
3841
3842/* Assign a file position to a section, optionally aligning to the
3843 required section alignment. */
3844
217aa764
AM
3845file_ptr
3846_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3847 file_ptr offset,
3848 bfd_boolean align)
252b5132 3849{
72de5009
AM
3850 if (align && i_shdrp->sh_addralign > 1)
3851 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
3852 i_shdrp->sh_offset = offset;
3853 if (i_shdrp->bfd_section != NULL)
3854 i_shdrp->bfd_section->filepos = offset;
3855 if (i_shdrp->sh_type != SHT_NOBITS)
3856 offset += i_shdrp->sh_size;
3857 return offset;
3858}
3859
3860/* Compute the file positions we are going to put the sections at, and
3861 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3862 is not NULL, this is being called by the ELF backend linker. */
3863
b34976b6 3864bfd_boolean
217aa764
AM
3865_bfd_elf_compute_section_file_positions (bfd *abfd,
3866 struct bfd_link_info *link_info)
252b5132 3867{
9c5bfbb7 3868 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3869 struct fake_section_arg fsargs;
b34976b6 3870 bfd_boolean failed;
ef10c3ac 3871 struct elf_strtab_hash *strtab = NULL;
252b5132 3872 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 3873 bfd_boolean need_symtab;
252b5132
RH
3874
3875 if (abfd->output_has_begun)
b34976b6 3876 return TRUE;
252b5132
RH
3877
3878 /* Do any elf backend specific processing first. */
3879 if (bed->elf_backend_begin_write_processing)
3880 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3881
3882 if (! prep_headers (abfd))
b34976b6 3883 return FALSE;
252b5132 3884
e6c51ed4 3885 /* Post process the headers if necessary. */
78245035 3886 (*bed->elf_backend_post_process_headers) (abfd, link_info);
e6c51ed4 3887
d4730f92
BS
3888 fsargs.failed = FALSE;
3889 fsargs.link_info = link_info;
3890 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
3891 if (fsargs.failed)
b34976b6 3892 return FALSE;
252b5132 3893
da9f89d4 3894 if (!assign_section_numbers (abfd, link_info))
b34976b6 3895 return FALSE;
252b5132
RH
3896
3897 /* The backend linker builds symbol table information itself. */
3516e984
L
3898 need_symtab = (link_info == NULL
3899 && (bfd_get_symcount (abfd) > 0
3900 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3901 == HAS_RELOC)));
3902 if (need_symtab)
252b5132
RH
3903 {
3904 /* Non-zero if doing a relocatable link. */
3905 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3906
3907 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3908 return FALSE;
252b5132
RH
3909 }
3910
d4730f92 3911 failed = FALSE;
1126897b 3912 if (link_info == NULL)
dbb410c3 3913 {
1126897b 3914 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3915 if (failed)
b34976b6 3916 return FALSE;
dbb410c3
AM
3917 }
3918
252b5132
RH
3919 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3920 /* sh_name was set in prep_headers. */
3921 shstrtab_hdr->sh_type = SHT_STRTAB;
3922 shstrtab_hdr->sh_flags = 0;
3923 shstrtab_hdr->sh_addr = 0;
946748d5 3924 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
3925 shstrtab_hdr->sh_entsize = 0;
3926 shstrtab_hdr->sh_link = 0;
3927 shstrtab_hdr->sh_info = 0;
3e19fb8f 3928 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
3929 shstrtab_hdr->sh_addralign = 1;
3930
c84fca4d 3931 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3932 return FALSE;
252b5132 3933
3516e984 3934 if (need_symtab)
252b5132
RH
3935 {
3936 file_ptr off;
3937 Elf_Internal_Shdr *hdr;
3938
12bd6957 3939 off = elf_next_file_pos (abfd);
252b5132 3940
6a40cf0c 3941 hdr = & elf_symtab_hdr (abfd);
b34976b6 3942 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3943
6a40cf0c
NC
3944 if (elf_symtab_shndx_list (abfd) != NULL)
3945 {
3946 hdr = & elf_symtab_shndx_list (abfd)->hdr;
3947 if (hdr->sh_size != 0)
3948 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
3949 /* FIXME: What about other symtab_shndx sections in the list ? */
3950 }
9ad5cbcf 3951
252b5132 3952 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3953 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3954
12bd6957 3955 elf_next_file_pos (abfd) = off;
252b5132
RH
3956
3957 /* Now that we know where the .strtab section goes, write it
08a40648 3958 out. */
252b5132 3959 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
ef10c3ac 3960 || ! _bfd_elf_strtab_emit (abfd, strtab))
b34976b6 3961 return FALSE;
ef10c3ac 3962 _bfd_elf_strtab_free (strtab);
252b5132
RH
3963 }
3964
b34976b6 3965 abfd->output_has_begun = TRUE;
252b5132 3966
b34976b6 3967 return TRUE;
252b5132
RH
3968}
3969
8ded5a0f
AM
3970/* Make an initial estimate of the size of the program header. If we
3971 get the number wrong here, we'll redo section placement. */
3972
3973static bfd_size_type
3974get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3975{
3976 size_t segs;
3977 asection *s;
2b05f1b7 3978 const struct elf_backend_data *bed;
8ded5a0f
AM
3979
3980 /* Assume we will need exactly two PT_LOAD segments: one for text
3981 and one for data. */
3982 segs = 2;
3983
3984 s = bfd_get_section_by_name (abfd, ".interp");
3985 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3986 {
3987 /* If we have a loadable interpreter section, we need a
3988 PT_INTERP segment. In this case, assume we also need a
3989 PT_PHDR segment, although that may not be true for all
3990 targets. */
3991 segs += 2;
3992 }
3993
3994 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3995 {
3996 /* We need a PT_DYNAMIC segment. */
3997 ++segs;
f210dcff 3998 }
08a40648 3999
ceae84aa 4000 if (info != NULL && info->relro)
f210dcff
L
4001 {
4002 /* We need a PT_GNU_RELRO segment. */
4003 ++segs;
8ded5a0f
AM
4004 }
4005
12bd6957 4006 if (elf_eh_frame_hdr (abfd))
8ded5a0f
AM
4007 {
4008 /* We need a PT_GNU_EH_FRAME segment. */
4009 ++segs;
4010 }
4011
12bd6957 4012 if (elf_stack_flags (abfd))
8ded5a0f 4013 {
2b05f1b7
L
4014 /* We need a PT_GNU_STACK segment. */
4015 ++segs;
4016 }
94b11780 4017
2b05f1b7
L
4018 for (s = abfd->sections; s != NULL; s = s->next)
4019 {
8ded5a0f 4020 if ((s->flags & SEC_LOAD) != 0
0112cd26 4021 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
4022 {
4023 /* We need a PT_NOTE segment. */
4024 ++segs;
1c5265b5
JJ
4025 /* Try to create just one PT_NOTE segment
4026 for all adjacent loadable .note* sections.
4027 gABI requires that within a PT_NOTE segment
4028 (and also inside of each SHT_NOTE section)
4029 each note is padded to a multiple of 4 size,
4030 so we check whether the sections are correctly
4031 aligned. */
4032 if (s->alignment_power == 2)
4033 while (s->next != NULL
4034 && s->next->alignment_power == 2
4035 && (s->next->flags & SEC_LOAD) != 0
4036 && CONST_STRNEQ (s->next->name, ".note"))
4037 s = s->next;
8ded5a0f
AM
4038 }
4039 }
4040
4041 for (s = abfd->sections; s != NULL; s = s->next)
4042 {
4043 if (s->flags & SEC_THREAD_LOCAL)
4044 {
4045 /* We need a PT_TLS segment. */
4046 ++segs;
4047 break;
4048 }
4049 }
4050
4051 /* Let the backend count up any program headers it might need. */
2b05f1b7 4052 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
4053 if (bed->elf_backend_additional_program_headers)
4054 {
4055 int a;
4056
4057 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4058 if (a == -1)
4059 abort ();
4060 segs += a;
4061 }
4062
4063 return segs * bed->s->sizeof_phdr;
4064}
4065
2ea37f1c
NC
4066/* Find the segment that contains the output_section of section. */
4067
4068Elf_Internal_Phdr *
4069_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4070{
4071 struct elf_segment_map *m;
4072 Elf_Internal_Phdr *p;
4073
12bd6957 4074 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
2ea37f1c
NC
4075 m != NULL;
4076 m = m->next, p++)
4077 {
4078 int i;
4079
4080 for (i = m->count - 1; i >= 0; i--)
4081 if (m->sections[i] == section)
4082 return p;
4083 }
4084
4085 return NULL;
4086}
4087
252b5132
RH
4088/* Create a mapping from a set of sections to a program segment. */
4089
217aa764
AM
4090static struct elf_segment_map *
4091make_mapping (bfd *abfd,
4092 asection **sections,
4093 unsigned int from,
4094 unsigned int to,
4095 bfd_boolean phdr)
252b5132
RH
4096{
4097 struct elf_segment_map *m;
4098 unsigned int i;
4099 asection **hdrpp;
dc810e39 4100 bfd_size_type amt;
252b5132 4101
dc810e39
AM
4102 amt = sizeof (struct elf_segment_map);
4103 amt += (to - from - 1) * sizeof (asection *);
a50b1753 4104 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4105 if (m == NULL)
4106 return NULL;
4107 m->next = NULL;
4108 m->p_type = PT_LOAD;
4109 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4110 m->sections[i - from] = *hdrpp;
4111 m->count = to - from;
4112
4113 if (from == 0 && phdr)
4114 {
4115 /* Include the headers in the first PT_LOAD segment. */
4116 m->includes_filehdr = 1;
4117 m->includes_phdrs = 1;
4118 }
4119
4120 return m;
4121}
4122
229fcec5
MM
4123/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4124 on failure. */
4125
4126struct elf_segment_map *
4127_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4128{
4129 struct elf_segment_map *m;
4130
a50b1753
NC
4131 m = (struct elf_segment_map *) bfd_zalloc (abfd,
4132 sizeof (struct elf_segment_map));
229fcec5
MM
4133 if (m == NULL)
4134 return NULL;
4135 m->next = NULL;
4136 m->p_type = PT_DYNAMIC;
4137 m->count = 1;
4138 m->sections[0] = dynsec;
08a40648 4139
229fcec5
MM
4140 return m;
4141}
4142
8ded5a0f 4143/* Possibly add or remove segments from the segment map. */
252b5132 4144
b34976b6 4145static bfd_boolean
3dea8fca
AM
4146elf_modify_segment_map (bfd *abfd,
4147 struct bfd_link_info *info,
4148 bfd_boolean remove_empty_load)
252b5132 4149{
252e386e 4150 struct elf_segment_map **m;
8ded5a0f 4151 const struct elf_backend_data *bed;
252b5132 4152
8ded5a0f
AM
4153 /* The placement algorithm assumes that non allocated sections are
4154 not in PT_LOAD segments. We ensure this here by removing such
4155 sections from the segment map. We also remove excluded
252e386e
AM
4156 sections. Finally, any PT_LOAD segment without sections is
4157 removed. */
12bd6957 4158 m = &elf_seg_map (abfd);
252e386e 4159 while (*m)
8ded5a0f
AM
4160 {
4161 unsigned int i, new_count;
252b5132 4162
252e386e 4163 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 4164 {
252e386e
AM
4165 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4166 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4167 || (*m)->p_type != PT_LOAD))
8ded5a0f 4168 {
252e386e
AM
4169 (*m)->sections[new_count] = (*m)->sections[i];
4170 new_count++;
8ded5a0f
AM
4171 }
4172 }
252e386e 4173 (*m)->count = new_count;
252b5132 4174
3dea8fca 4175 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
4176 *m = (*m)->next;
4177 else
4178 m = &(*m)->next;
8ded5a0f 4179 }
252b5132 4180
8ded5a0f
AM
4181 bed = get_elf_backend_data (abfd);
4182 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 4183 {
252e386e 4184 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 4185 return FALSE;
252b5132 4186 }
252b5132 4187
8ded5a0f
AM
4188 return TRUE;
4189}
252b5132 4190
8ded5a0f 4191/* Set up a mapping from BFD sections to program segments. */
252b5132 4192
8ded5a0f
AM
4193bfd_boolean
4194_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4195{
4196 unsigned int count;
4197 struct elf_segment_map *m;
4198 asection **sections = NULL;
4199 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 4200 bfd_boolean no_user_phdrs;
252b5132 4201
12bd6957 4202 no_user_phdrs = elf_seg_map (abfd) == NULL;
d324f6d6
RM
4203
4204 if (info != NULL)
4205 info->user_phdrs = !no_user_phdrs;
4206
3dea8fca 4207 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 4208 {
8ded5a0f
AM
4209 asection *s;
4210 unsigned int i;
4211 struct elf_segment_map *mfirst;
4212 struct elf_segment_map **pm;
4213 asection *last_hdr;
4214 bfd_vma last_size;
4215 unsigned int phdr_index;
4216 bfd_vma maxpagesize;
4217 asection **hdrpp;
4218 bfd_boolean phdr_in_segment = TRUE;
4219 bfd_boolean writable;
4220 int tls_count = 0;
4221 asection *first_tls = NULL;
4222 asection *dynsec, *eh_frame_hdr;
4223 bfd_size_type amt;
8d06853e 4224 bfd_vma addr_mask, wrap_to = 0;
252b5132 4225
8ded5a0f 4226 /* Select the allocated sections, and sort them. */
252b5132 4227
a50b1753
NC
4228 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
4229 sizeof (asection *));
8ded5a0f 4230 if (sections == NULL)
252b5132 4231 goto error_return;
252b5132 4232
8d06853e
AM
4233 /* Calculate top address, avoiding undefined behaviour of shift
4234 left operator when shift count is equal to size of type
4235 being shifted. */
4236 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4237 addr_mask = (addr_mask << 1) + 1;
4238
8ded5a0f
AM
4239 i = 0;
4240 for (s = abfd->sections; s != NULL; s = s->next)
4241 {
4242 if ((s->flags & SEC_ALLOC) != 0)
4243 {
4244 sections[i] = s;
4245 ++i;
8d06853e
AM
4246 /* A wrapping section potentially clashes with header. */
4247 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
4248 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
4249 }
4250 }
4251 BFD_ASSERT (i <= bfd_count_sections (abfd));
4252 count = i;
252b5132 4253
8ded5a0f 4254 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 4255
8ded5a0f 4256 /* Build the mapping. */
252b5132 4257
8ded5a0f
AM
4258 mfirst = NULL;
4259 pm = &mfirst;
252b5132 4260
8ded5a0f
AM
4261 /* If we have a .interp section, then create a PT_PHDR segment for
4262 the program headers and a PT_INTERP segment for the .interp
4263 section. */
4264 s = bfd_get_section_by_name (abfd, ".interp");
4265 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4266 {
4267 amt = sizeof (struct elf_segment_map);
a50b1753 4268 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4269 if (m == NULL)
4270 goto error_return;
4271 m->next = NULL;
4272 m->p_type = PT_PHDR;
4273 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
4274 m->p_flags = PF_R | PF_X;
4275 m->p_flags_valid = 1;
4276 m->includes_phdrs = 1;
252b5132 4277
8ded5a0f
AM
4278 *pm = m;
4279 pm = &m->next;
252b5132 4280
8ded5a0f 4281 amt = sizeof (struct elf_segment_map);
a50b1753 4282 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4283 if (m == NULL)
4284 goto error_return;
4285 m->next = NULL;
4286 m->p_type = PT_INTERP;
4287 m->count = 1;
4288 m->sections[0] = s;
4289
4290 *pm = m;
4291 pm = &m->next;
252b5132 4292 }
8ded5a0f
AM
4293
4294 /* Look through the sections. We put sections in the same program
4295 segment when the start of the second section can be placed within
4296 a few bytes of the end of the first section. */
4297 last_hdr = NULL;
4298 last_size = 0;
4299 phdr_index = 0;
4300 maxpagesize = bed->maxpagesize;
063bb025
NC
4301 /* PR 17512: file: c8455299.
4302 Avoid divide-by-zero errors later on.
4303 FIXME: Should we abort if the maxpagesize is zero ? */
4304 if (maxpagesize == 0)
4305 maxpagesize = 1;
8ded5a0f
AM
4306 writable = FALSE;
4307 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4308 if (dynsec != NULL
4309 && (dynsec->flags & SEC_LOAD) == 0)
4310 dynsec = NULL;
4311
4312 /* Deal with -Ttext or something similar such that the first section
4313 is not adjacent to the program headers. This is an
4314 approximation, since at this point we don't know exactly how many
4315 program headers we will need. */
4316 if (count > 0)
252b5132 4317 {
12bd6957 4318 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 4319
62d7a5f6 4320 if (phdr_size == (bfd_size_type) -1)
8ded5a0f 4321 phdr_size = get_program_header_size (abfd, info);
d2bcb0d1 4322 phdr_size += bed->s->sizeof_ehdr;
8ded5a0f 4323 if ((abfd->flags & D_PAGED) == 0
8d06853e
AM
4324 || (sections[0]->lma & addr_mask) < phdr_size
4325 || ((sections[0]->lma & addr_mask) % maxpagesize
4326 < phdr_size % maxpagesize)
4327 || (sections[0]->lma & addr_mask & -maxpagesize) < wrap_to)
8ded5a0f 4328 phdr_in_segment = FALSE;
252b5132
RH
4329 }
4330
8ded5a0f 4331 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 4332 {
8ded5a0f
AM
4333 asection *hdr;
4334 bfd_boolean new_segment;
4335
4336 hdr = *hdrpp;
4337
4338 /* See if this section and the last one will fit in the same
4339 segment. */
4340
4341 if (last_hdr == NULL)
4342 {
4343 /* If we don't have a segment yet, then we don't need a new
4344 one (we build the last one after this loop). */
4345 new_segment = FALSE;
4346 }
4347 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4348 {
4349 /* If this section has a different relation between the
4350 virtual address and the load address, then we need a new
4351 segment. */
4352 new_segment = TRUE;
4353 }
b5599592
AM
4354 else if (hdr->lma < last_hdr->lma + last_size
4355 || last_hdr->lma + last_size < last_hdr->lma)
4356 {
4357 /* If this section has a load address that makes it overlap
4358 the previous section, then we need a new segment. */
4359 new_segment = TRUE;
4360 }
39948a60
NC
4361 /* In the next test we have to be careful when last_hdr->lma is close
4362 to the end of the address space. If the aligned address wraps
4363 around to the start of the address space, then there are no more
4364 pages left in memory and it is OK to assume that the current
4365 section can be included in the current segment. */
4366 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4367 > last_hdr->lma)
4368 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 4369 <= hdr->lma))
8ded5a0f
AM
4370 {
4371 /* If putting this section in this segment would force us to
4372 skip a page in the segment, then we need a new segment. */
4373 new_segment = TRUE;
4374 }
4375 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
e5654c0f
AM
4376 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0
4377 && ((abfd->flags & D_PAGED) == 0
4378 || (((last_hdr->lma + last_size - 1) & -maxpagesize)
4379 != (hdr->lma & -maxpagesize))))
8ded5a0f 4380 {
e5654c0f
AM
4381 /* We don't want to put a loaded section after a
4382 nonloaded (ie. bss style) section in the same segment
4383 as that will force the non-loaded section to be loaded.
4384 Consider .tbss sections as loaded for this purpose.
4385 However, like the writable/non-writable case below,
4386 if they are on the same page then they must be put
4387 in the same segment. */
8ded5a0f
AM
4388 new_segment = TRUE;
4389 }
4390 else if ((abfd->flags & D_PAGED) == 0)
4391 {
4392 /* If the file is not demand paged, which means that we
4393 don't require the sections to be correctly aligned in the
4394 file, then there is no other reason for a new segment. */
4395 new_segment = FALSE;
4396 }
4397 else if (! writable
4398 && (hdr->flags & SEC_READONLY) == 0
8d06853e
AM
4399 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4400 != (hdr->lma & -maxpagesize)))
8ded5a0f
AM
4401 {
4402 /* We don't want to put a writable section in a read only
4403 segment, unless they are on the same page in memory
4404 anyhow. We already know that the last section does not
4405 bring us past the current section on the page, so the
4406 only case in which the new section is not on the same
4407 page as the previous section is when the previous section
4408 ends precisely on a page boundary. */
4409 new_segment = TRUE;
4410 }
4411 else
4412 {
4413 /* Otherwise, we can use the same segment. */
4414 new_segment = FALSE;
4415 }
4416
2889e75b 4417 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
4418 if (last_hdr != NULL
4419 && info != NULL
4420 && info->callbacks->override_segment_assignment != NULL)
4421 new_segment
4422 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4423 last_hdr,
4424 new_segment);
2889e75b 4425
8ded5a0f
AM
4426 if (! new_segment)
4427 {
4428 if ((hdr->flags & SEC_READONLY) == 0)
4429 writable = TRUE;
4430 last_hdr = hdr;
4431 /* .tbss sections effectively have zero size. */
4432 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4433 != SEC_THREAD_LOCAL)
4434 last_size = hdr->size;
4435 else
4436 last_size = 0;
4437 continue;
4438 }
4439
4440 /* We need a new program segment. We must create a new program
4441 header holding all the sections from phdr_index until hdr. */
4442
4443 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4444 if (m == NULL)
4445 goto error_return;
4446
4447 *pm = m;
4448 pm = &m->next;
4449
252b5132 4450 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 4451 writable = TRUE;
8ded5a0f
AM
4452 else
4453 writable = FALSE;
4454
baaff79e
JJ
4455 last_hdr = hdr;
4456 /* .tbss sections effectively have zero size. */
e5caec89 4457 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 4458 last_size = hdr->size;
baaff79e
JJ
4459 else
4460 last_size = 0;
8ded5a0f
AM
4461 phdr_index = i;
4462 phdr_in_segment = FALSE;
252b5132
RH
4463 }
4464
86b2281f
AM
4465 /* Create a final PT_LOAD program segment, but not if it's just
4466 for .tbss. */
4467 if (last_hdr != NULL
4468 && (i - phdr_index != 1
4469 || ((last_hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4470 != SEC_THREAD_LOCAL)))
8ded5a0f
AM
4471 {
4472 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4473 if (m == NULL)
4474 goto error_return;
252b5132 4475
8ded5a0f
AM
4476 *pm = m;
4477 pm = &m->next;
4478 }
252b5132 4479
8ded5a0f
AM
4480 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4481 if (dynsec != NULL)
4482 {
4483 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4484 if (m == NULL)
4485 goto error_return;
4486 *pm = m;
4487 pm = &m->next;
4488 }
252b5132 4489
1c5265b5
JJ
4490 /* For each batch of consecutive loadable .note sections,
4491 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4492 because if we link together nonloadable .note sections and
4493 loadable .note sections, we will generate two .note sections
4494 in the output file. FIXME: Using names for section types is
4495 bogus anyhow. */
8ded5a0f
AM
4496 for (s = abfd->sections; s != NULL; s = s->next)
4497 {
4498 if ((s->flags & SEC_LOAD) != 0
0112cd26 4499 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 4500 {
1c5265b5 4501 asection *s2;
91d6fa6a
NC
4502
4503 count = 1;
8ded5a0f 4504 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
4505 if (s->alignment_power == 2)
4506 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
4507 {
4508 if (s2->next->alignment_power == 2
4509 && (s2->next->flags & SEC_LOAD) != 0
4510 && CONST_STRNEQ (s2->next->name, ".note")
8d06853e
AM
4511 && align_power (s2->lma + s2->size, 2)
4512 == s2->next->lma)
55b581a6
JJ
4513 count++;
4514 else
4515 break;
4516 }
1c5265b5 4517 amt += (count - 1) * sizeof (asection *);
a50b1753 4518 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4519 if (m == NULL)
4520 goto error_return;
4521 m->next = NULL;
4522 m->p_type = PT_NOTE;
1c5265b5
JJ
4523 m->count = count;
4524 while (count > 1)
4525 {
4526 m->sections[m->count - count--] = s;
4527 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
4528 s = s->next;
4529 }
4530 m->sections[m->count - 1] = s;
4531 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
4532 *pm = m;
4533 pm = &m->next;
4534 }
4535 if (s->flags & SEC_THREAD_LOCAL)
4536 {
4537 if (! tls_count)
4538 first_tls = s;
4539 tls_count++;
4540 }
4541 }
252b5132 4542
8ded5a0f
AM
4543 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
4544 if (tls_count > 0)
4545 {
8ded5a0f
AM
4546 amt = sizeof (struct elf_segment_map);
4547 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 4548 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4549 if (m == NULL)
4550 goto error_return;
4551 m->next = NULL;
4552 m->p_type = PT_TLS;
4553 m->count = tls_count;
4554 /* Mandated PF_R. */
4555 m->p_flags = PF_R;
4556 m->p_flags_valid = 1;
d923cae0 4557 s = first_tls;
91d6fa6a 4558 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f 4559 {
d923cae0
L
4560 if ((s->flags & SEC_THREAD_LOCAL) == 0)
4561 {
4562 _bfd_error_handler
4563 (_("%B: TLS sections are not adjacent:"), abfd);
4564 s = first_tls;
4565 i = 0;
4566 while (i < (unsigned int) tls_count)
4567 {
4568 if ((s->flags & SEC_THREAD_LOCAL) != 0)
4569 {
4570 _bfd_error_handler (_(" TLS: %A"), s);
4571 i++;
4572 }
4573 else
4574 _bfd_error_handler (_(" non-TLS: %A"), s);
4575 s = s->next;
4576 }
4577 bfd_set_error (bfd_error_bad_value);
4578 goto error_return;
4579 }
4580 m->sections[i] = s;
4581 s = s->next;
8ded5a0f 4582 }
252b5132 4583
8ded5a0f
AM
4584 *pm = m;
4585 pm = &m->next;
4586 }
252b5132 4587
8ded5a0f
AM
4588 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4589 segment. */
12bd6957 4590 eh_frame_hdr = elf_eh_frame_hdr (abfd);
8ded5a0f
AM
4591 if (eh_frame_hdr != NULL
4592 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 4593 {
dc810e39 4594 amt = sizeof (struct elf_segment_map);
a50b1753 4595 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4596 if (m == NULL)
4597 goto error_return;
4598 m->next = NULL;
8ded5a0f 4599 m->p_type = PT_GNU_EH_FRAME;
252b5132 4600 m->count = 1;
8ded5a0f 4601 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
4602
4603 *pm = m;
4604 pm = &m->next;
4605 }
13ae64f3 4606
12bd6957 4607 if (elf_stack_flags (abfd))
13ae64f3 4608 {
8ded5a0f 4609 amt = sizeof (struct elf_segment_map);
a50b1753 4610 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4611 if (m == NULL)
4612 goto error_return;
4613 m->next = NULL;
2b05f1b7 4614 m->p_type = PT_GNU_STACK;
12bd6957 4615 m->p_flags = elf_stack_flags (abfd);
04c3a755 4616 m->p_align = bed->stack_align;
8ded5a0f 4617 m->p_flags_valid = 1;
04c3a755
NS
4618 m->p_align_valid = m->p_align != 0;
4619 if (info->stacksize > 0)
4620 {
4621 m->p_size = info->stacksize;
4622 m->p_size_valid = 1;
4623 }
252b5132 4624
8ded5a0f
AM
4625 *pm = m;
4626 pm = &m->next;
4627 }
65765700 4628
ceae84aa 4629 if (info != NULL && info->relro)
8ded5a0f 4630 {
f210dcff
L
4631 for (m = mfirst; m != NULL; m = m->next)
4632 {
3832a4d8
AM
4633 if (m->p_type == PT_LOAD
4634 && m->count != 0
4635 && m->sections[0]->vma >= info->relro_start
4636 && m->sections[0]->vma < info->relro_end)
f210dcff 4637 {
3832a4d8
AM
4638 i = m->count;
4639 while (--i != (unsigned) -1)
4640 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
4641 == (SEC_LOAD | SEC_HAS_CONTENTS))
4642 break;
4643
43a8475c 4644 if (i != (unsigned) -1)
f210dcff
L
4645 break;
4646 }
be01b344 4647 }
f210dcff
L
4648
4649 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
4650 if (m != NULL)
4651 {
4652 amt = sizeof (struct elf_segment_map);
a50b1753 4653 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
4654 if (m == NULL)
4655 goto error_return;
4656 m->next = NULL;
4657 m->p_type = PT_GNU_RELRO;
f210dcff
L
4658 *pm = m;
4659 pm = &m->next;
4660 }
8ded5a0f 4661 }
9ee5e499 4662
8ded5a0f 4663 free (sections);
12bd6957 4664 elf_seg_map (abfd) = mfirst;
9ee5e499
JJ
4665 }
4666
3dea8fca 4667 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 4668 return FALSE;
8c37241b 4669
12bd6957 4670 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
8ded5a0f 4671 ++count;
12bd6957 4672 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
252b5132 4673
b34976b6 4674 return TRUE;
252b5132
RH
4675
4676 error_return:
4677 if (sections != NULL)
4678 free (sections);
b34976b6 4679 return FALSE;
252b5132
RH
4680}
4681
4682/* Sort sections by address. */
4683
4684static int
217aa764 4685elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4686{
4687 const asection *sec1 = *(const asection **) arg1;
4688 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4689 bfd_size_type size1, size2;
252b5132
RH
4690
4691 /* Sort by LMA first, since this is the address used to
4692 place the section into a segment. */
4693 if (sec1->lma < sec2->lma)
4694 return -1;
4695 else if (sec1->lma > sec2->lma)
4696 return 1;
4697
4698 /* Then sort by VMA. Normally the LMA and the VMA will be
4699 the same, and this will do nothing. */
4700 if (sec1->vma < sec2->vma)
4701 return -1;
4702 else if (sec1->vma > sec2->vma)
4703 return 1;
4704
4705 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4706
07c6e936 4707#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4708
4709 if (TOEND (sec1))
4710 {
4711 if (TOEND (sec2))
00a7cdc5
NC
4712 {
4713 /* If the indicies are the same, do not return 0
4714 here, but continue to try the next comparison. */
4715 if (sec1->target_index - sec2->target_index != 0)
4716 return sec1->target_index - sec2->target_index;
4717 }
252b5132
RH
4718 else
4719 return 1;
4720 }
00a7cdc5 4721 else if (TOEND (sec2))
252b5132
RH
4722 return -1;
4723
4724#undef TOEND
4725
00a7cdc5
NC
4726 /* Sort by size, to put zero sized sections
4727 before others at the same address. */
252b5132 4728
eea6121a
AM
4729 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4730 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4731
4732 if (size1 < size2)
252b5132 4733 return -1;
eecdbe52 4734 if (size1 > size2)
252b5132
RH
4735 return 1;
4736
4737 return sec1->target_index - sec2->target_index;
4738}
4739
340b6d91
AC
4740/* Ian Lance Taylor writes:
4741
4742 We shouldn't be using % with a negative signed number. That's just
4743 not good. We have to make sure either that the number is not
4744 negative, or that the number has an unsigned type. When the types
4745 are all the same size they wind up as unsigned. When file_ptr is a
4746 larger signed type, the arithmetic winds up as signed long long,
4747 which is wrong.
4748
4749 What we're trying to say here is something like ``increase OFF by
4750 the least amount that will cause it to be equal to the VMA modulo
4751 the page size.'' */
4752/* In other words, something like:
4753
4754 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4755 off_offset = off % bed->maxpagesize;
4756 if (vma_offset < off_offset)
4757 adjustment = vma_offset + bed->maxpagesize - off_offset;
4758 else
4759 adjustment = vma_offset - off_offset;
08a40648 4760
340b6d91
AC
4761 which can can be collapsed into the expression below. */
4762
4763static file_ptr
4764vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4765{
dc9155b2
NC
4766 /* PR binutils/16199: Handle an alignment of zero. */
4767 if (maxpagesize == 0)
4768 maxpagesize = 1;
340b6d91
AC
4769 return ((vma - off) % maxpagesize);
4770}
4771
6d33f217
L
4772static void
4773print_segment_map (const struct elf_segment_map *m)
4774{
4775 unsigned int j;
4776 const char *pt = get_segment_type (m->p_type);
4777 char buf[32];
4778
4779 if (pt == NULL)
4780 {
4781 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4782 sprintf (buf, "LOPROC+%7.7x",
4783 (unsigned int) (m->p_type - PT_LOPROC));
4784 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4785 sprintf (buf, "LOOS+%7.7x",
4786 (unsigned int) (m->p_type - PT_LOOS));
4787 else
4788 snprintf (buf, sizeof (buf), "%8.8x",
4789 (unsigned int) m->p_type);
4790 pt = buf;
4791 }
4a97a0e5 4792 fflush (stdout);
6d33f217
L
4793 fprintf (stderr, "%s:", pt);
4794 for (j = 0; j < m->count; j++)
4795 fprintf (stderr, " %s", m->sections [j]->name);
4796 putc ('\n',stderr);
4a97a0e5 4797 fflush (stderr);
6d33f217
L
4798}
4799
32812159
AM
4800static bfd_boolean
4801write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
4802{
4803 void *buf;
4804 bfd_boolean ret;
4805
4806 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
4807 return FALSE;
4808 buf = bfd_zmalloc (len);
4809 if (buf == NULL)
4810 return FALSE;
4811 ret = bfd_bwrite (buf, len, abfd) == len;
4812 free (buf);
4813 return ret;
4814}
4815
252b5132
RH
4816/* Assign file positions to the sections based on the mapping from
4817 sections to segments. This function also sets up some fields in
f3520d2f 4818 the file header. */
252b5132 4819
b34976b6 4820static bfd_boolean
f3520d2f
AM
4821assign_file_positions_for_load_sections (bfd *abfd,
4822 struct bfd_link_info *link_info)
252b5132
RH
4823{
4824 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4825 struct elf_segment_map *m;
252b5132 4826 Elf_Internal_Phdr *phdrs;
252b5132 4827 Elf_Internal_Phdr *p;
02bf8d82 4828 file_ptr off;
3f570048 4829 bfd_size_type maxpagesize;
f3520d2f 4830 unsigned int alloc;
0920dee7 4831 unsigned int i, j;
2b0bc088 4832 bfd_vma header_pad = 0;
252b5132 4833
e36284ab 4834 if (link_info == NULL
ceae84aa 4835 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 4836 return FALSE;
252b5132 4837
8ded5a0f 4838 alloc = 0;
12bd6957 4839 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
2b0bc088
NC
4840 {
4841 ++alloc;
4842 if (m->header_size)
4843 header_pad = m->header_size;
4844 }
252b5132 4845
82f2dbf7
NC
4846 if (alloc)
4847 {
4848 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4849 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4850 }
4851 else
4852 {
4853 /* PR binutils/12467. */
4854 elf_elfheader (abfd)->e_phoff = 0;
4855 elf_elfheader (abfd)->e_phentsize = 0;
4856 }
d324f6d6 4857
8ded5a0f 4858 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4859
12bd6957
AM
4860 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
4861 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
8ded5a0f 4862 else
12bd6957 4863 BFD_ASSERT (elf_program_header_size (abfd)
59e0647f 4864 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4865
4866 if (alloc == 0)
f3520d2f 4867 {
12bd6957 4868 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
8ded5a0f 4869 return TRUE;
f3520d2f 4870 }
252b5132 4871
12bd6957 4872 /* We're writing the size in elf_program_header_size (abfd),
57268894
HPN
4873 see assign_file_positions_except_relocs, so make sure we have
4874 that amount allocated, with trailing space cleared.
12bd6957
AM
4875 The variable alloc contains the computed need, while
4876 elf_program_header_size (abfd) contains the size used for the
57268894
HPN
4877 layout.
4878 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
4879 where the layout is forced to according to a larger size in the
4880 last iterations for the testcase ld-elf/header. */
12bd6957 4881 BFD_ASSERT (elf_program_header_size (abfd) % bed->s->sizeof_phdr
57268894 4882 == 0);
a50b1753
NC
4883 phdrs = (Elf_Internal_Phdr *)
4884 bfd_zalloc2 (abfd,
12bd6957 4885 (elf_program_header_size (abfd) / bed->s->sizeof_phdr),
a50b1753 4886 sizeof (Elf_Internal_Phdr));
f3520d2f 4887 elf_tdata (abfd)->phdr = phdrs;
252b5132 4888 if (phdrs == NULL)
b34976b6 4889 return FALSE;
252b5132 4890
3f570048
AM
4891 maxpagesize = 1;
4892 if ((abfd->flags & D_PAGED) != 0)
4893 maxpagesize = bed->maxpagesize;
4894
252b5132
RH
4895 off = bed->s->sizeof_ehdr;
4896 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4897 if (header_pad < (bfd_vma) off)
4898 header_pad = 0;
4899 else
4900 header_pad -= off;
4901 off += header_pad;
252b5132 4902
12bd6957 4903 for (m = elf_seg_map (abfd), p = phdrs, j = 0;
252b5132 4904 m != NULL;
0920dee7 4905 m = m->next, p++, j++)
252b5132 4906 {
252b5132 4907 asection **secpp;
bf988460
AM
4908 bfd_vma off_adjust;
4909 bfd_boolean no_contents;
252b5132
RH
4910
4911 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4912 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4913 not be done to the PT_NOTE section of a corefile, which may
4914 contain several pseudo-sections artificially created by bfd.
4915 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4916 if (m->count > 1
4917 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4918 && m->p_type == PT_NOTE))
252b5132
RH
4919 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4920 elf_sort_sections);
4921
b301b248
AM
4922 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4923 number of sections with contents contributing to both p_filesz
4924 and p_memsz, followed by a number of sections with no contents
4925 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4926 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4927 p->p_type = m->p_type;
28a7f3e7 4928 p->p_flags = m->p_flags;
252b5132 4929
3f570048
AM
4930 if (m->count == 0)
4931 p->p_vaddr = 0;
4932 else
3271a814 4933 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4934
4935 if (m->p_paddr_valid)
4936 p->p_paddr = m->p_paddr;
4937 else if (m->count == 0)
4938 p->p_paddr = 0;
4939 else
08a40648 4940 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4941
4942 if (p->p_type == PT_LOAD
4943 && (abfd->flags & D_PAGED) != 0)
4944 {
4945 /* p_align in demand paged PT_LOAD segments effectively stores
4946 the maximum page size. When copying an executable with
4947 objcopy, we set m->p_align from the input file. Use this
4948 value for maxpagesize rather than bed->maxpagesize, which
4949 may be different. Note that we use maxpagesize for PT_TLS
4950 segment alignment later in this function, so we are relying
4951 on at least one PT_LOAD segment appearing before a PT_TLS
4952 segment. */
4953 if (m->p_align_valid)
4954 maxpagesize = m->p_align;
4955
4956 p->p_align = maxpagesize;
4957 }
3271a814
NS
4958 else if (m->p_align_valid)
4959 p->p_align = m->p_align;
e970b90a
DJ
4960 else if (m->count == 0)
4961 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4962 else
4963 p->p_align = 0;
4964
bf988460
AM
4965 no_contents = FALSE;
4966 off_adjust = 0;
252b5132 4967 if (p->p_type == PT_LOAD
b301b248 4968 && m->count > 0)
252b5132 4969 {
b301b248 4970 bfd_size_type align;
a49e53ed 4971 unsigned int align_power = 0;
b301b248 4972
3271a814
NS
4973 if (m->p_align_valid)
4974 align = p->p_align;
4975 else
252b5132 4976 {
3271a814
NS
4977 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4978 {
4979 unsigned int secalign;
08a40648 4980
3271a814
NS
4981 secalign = bfd_get_section_alignment (abfd, *secpp);
4982 if (secalign > align_power)
4983 align_power = secalign;
4984 }
4985 align = (bfd_size_type) 1 << align_power;
4986 if (align < maxpagesize)
4987 align = maxpagesize;
b301b248 4988 }
252b5132 4989
02bf8d82
AM
4990 for (i = 0; i < m->count; i++)
4991 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4992 /* If we aren't making room for this section, then
4993 it must be SHT_NOBITS regardless of what we've
4994 set via struct bfd_elf_special_section. */
4995 elf_section_type (m->sections[i]) = SHT_NOBITS;
4996
bf988460 4997 /* Find out whether this segment contains any loadable
aea274d3
AM
4998 sections. */
4999 no_contents = TRUE;
5000 for (i = 0; i < m->count; i++)
5001 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5002 {
5003 no_contents = FALSE;
5004 break;
5005 }
bf988460 5006
85cfcbfb 5007 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
bf988460
AM
5008 off += off_adjust;
5009 if (no_contents)
5010 {
5011 /* We shouldn't need to align the segment on disk since
5012 the segment doesn't need file space, but the gABI
5013 arguably requires the alignment and glibc ld.so
5014 checks it. So to comply with the alignment
5015 requirement but not waste file space, we adjust
5016 p_offset for just this segment. (OFF_ADJUST is
5017 subtracted from OFF later.) This may put p_offset
5018 past the end of file, but that shouldn't matter. */
5019 }
5020 else
5021 off_adjust = 0;
252b5132 5022 }
b1a6d0b1
NC
5023 /* Make sure the .dynamic section is the first section in the
5024 PT_DYNAMIC segment. */
5025 else if (p->p_type == PT_DYNAMIC
5026 && m->count > 1
5027 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5028 {
5029 _bfd_error_handler
b301b248
AM
5030 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
5031 abfd);
b1a6d0b1
NC
5032 bfd_set_error (bfd_error_bad_value);
5033 return FALSE;
5034 }
3f001e84
JK
5035 /* Set the note section type to SHT_NOTE. */
5036 else if (p->p_type == PT_NOTE)
5037 for (i = 0; i < m->count; i++)
5038 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 5039
252b5132
RH
5040 p->p_offset = 0;
5041 p->p_filesz = 0;
5042 p->p_memsz = 0;
5043
5044 if (m->includes_filehdr)
5045 {
bf988460 5046 if (!m->p_flags_valid)
252b5132 5047 p->p_flags |= PF_R;
252b5132
RH
5048 p->p_filesz = bed->s->sizeof_ehdr;
5049 p->p_memsz = bed->s->sizeof_ehdr;
5050 if (m->count > 0)
5051 {
252b5132
RH
5052 if (p->p_vaddr < (bfd_vma) off)
5053 {
caf47ea6 5054 (*_bfd_error_handler)
b301b248
AM
5055 (_("%B: Not enough room for program headers, try linking with -N"),
5056 abfd);
252b5132 5057 bfd_set_error (bfd_error_bad_value);
b34976b6 5058 return FALSE;
252b5132
RH
5059 }
5060
5061 p->p_vaddr -= off;
bf988460 5062 if (!m->p_paddr_valid)
252b5132
RH
5063 p->p_paddr -= off;
5064 }
252b5132
RH
5065 }
5066
5067 if (m->includes_phdrs)
5068 {
bf988460 5069 if (!m->p_flags_valid)
252b5132
RH
5070 p->p_flags |= PF_R;
5071
f3520d2f 5072 if (!m->includes_filehdr)
252b5132
RH
5073 {
5074 p->p_offset = bed->s->sizeof_ehdr;
5075
5076 if (m->count > 0)
5077 {
252b5132 5078 p->p_vaddr -= off - p->p_offset;
bf988460 5079 if (!m->p_paddr_valid)
252b5132
RH
5080 p->p_paddr -= off - p->p_offset;
5081 }
252b5132
RH
5082 }
5083
5084 p->p_filesz += alloc * bed->s->sizeof_phdr;
5085 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
5086 if (m->count)
5087 {
5088 p->p_filesz += header_pad;
5089 p->p_memsz += header_pad;
5090 }
252b5132
RH
5091 }
5092
5093 if (p->p_type == PT_LOAD
5094 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5095 {
bf988460 5096 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 5097 p->p_offset = off;
252b5132
RH
5098 else
5099 {
5100 file_ptr adjust;
5101
5102 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
5103 if (!no_contents)
5104 p->p_filesz += adjust;
252b5132
RH
5105 p->p_memsz += adjust;
5106 }
5107 }
5108
1ea63fd2
AM
5109 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5110 maps. Set filepos for sections in PT_LOAD segments, and in
5111 core files, for sections in PT_NOTE segments.
5112 assign_file_positions_for_non_load_sections will set filepos
5113 for other sections and update p_filesz for other segments. */
252b5132
RH
5114 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5115 {
5116 asection *sec;
252b5132 5117 bfd_size_type align;
627b32bc 5118 Elf_Internal_Shdr *this_hdr;
252b5132
RH
5119
5120 sec = *secpp;
02bf8d82 5121 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 5122 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 5123
88967714
AM
5124 if ((p->p_type == PT_LOAD
5125 || p->p_type == PT_TLS)
5126 && (this_hdr->sh_type != SHT_NOBITS
5127 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5128 && ((this_hdr->sh_flags & SHF_TLS) == 0
5129 || p->p_type == PT_TLS))))
252b5132 5130 {
b5599592
AM
5131 bfd_vma p_start = p->p_paddr;
5132 bfd_vma p_end = p_start + p->p_memsz;
5133 bfd_vma s_start = sec->lma;
5134 bfd_vma adjust = s_start - p_end;
252b5132 5135
a2d1e028
L
5136 if (adjust != 0
5137 && (s_start < p_end
5138 || p_end < p_start))
252b5132 5139 {
88967714 5140 (*_bfd_error_handler)
b5599592
AM
5141 (_("%B: section %A lma %#lx adjusted to %#lx"), abfd, sec,
5142 (unsigned long) s_start, (unsigned long) p_end);
88967714 5143 adjust = 0;
b5599592 5144 sec->lma = p_end;
1cfb7d1e 5145 }
3ac9b6c9 5146 p->p_memsz += adjust;
1cfb7d1e 5147
88967714
AM
5148 if (this_hdr->sh_type != SHT_NOBITS)
5149 {
32812159
AM
5150 if (p->p_filesz + adjust < p->p_memsz)
5151 {
5152 /* We have a PROGBITS section following NOBITS ones.
5153 Allocate file space for the NOBITS section(s) and
5154 zero it. */
5155 adjust = p->p_memsz - p->p_filesz;
5156 if (!write_zeros (abfd, off, adjust))
5157 return FALSE;
5158 }
88967714
AM
5159 off += adjust;
5160 p->p_filesz += adjust;
252b5132 5161 }
252b5132
RH
5162 }
5163
5164 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5165 {
b301b248
AM
5166 /* The section at i == 0 is the one that actually contains
5167 everything. */
4a938328
MS
5168 if (i == 0)
5169 {
627b32bc 5170 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
5171 off += this_hdr->sh_size;
5172 p->p_filesz = this_hdr->sh_size;
b301b248
AM
5173 p->p_memsz = 0;
5174 p->p_align = 1;
252b5132 5175 }
4a938328 5176 else
252b5132 5177 {
b301b248 5178 /* The rest are fake sections that shouldn't be written. */
252b5132 5179 sec->filepos = 0;
eea6121a 5180 sec->size = 0;
b301b248
AM
5181 sec->flags = 0;
5182 continue;
252b5132 5183 }
252b5132
RH
5184 }
5185 else
5186 {
1e951488 5187 if (p->p_type == PT_LOAD)
b301b248 5188 {
1e951488
AM
5189 this_hdr->sh_offset = sec->filepos = off;
5190 if (this_hdr->sh_type != SHT_NOBITS)
5191 off += this_hdr->sh_size;
5192 }
5193 else if (this_hdr->sh_type == SHT_NOBITS
5194 && (this_hdr->sh_flags & SHF_TLS) != 0
5195 && this_hdr->sh_offset == 0)
5196 {
5197 /* This is a .tbss section that didn't get a PT_LOAD.
5198 (See _bfd_elf_map_sections_to_segments "Create a
5199 final PT_LOAD".) Set sh_offset to the value it
5200 would have if we had created a zero p_filesz and
5201 p_memsz PT_LOAD header for the section. This
5202 also makes the PT_TLS header have the same
5203 p_offset value. */
5204 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5205 off, align);
5206 this_hdr->sh_offset = sec->filepos = off + adjust;
b301b248 5207 }
252b5132 5208
02bf8d82 5209 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 5210 {
6a3cd2b4 5211 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
5212 /* A load section without SHF_ALLOC is something like
5213 a note section in a PT_NOTE segment. These take
5214 file space but are not loaded into memory. */
5215 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 5216 p->p_memsz += this_hdr->sh_size;
b301b248 5217 }
6a3cd2b4 5218 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 5219 {
6a3cd2b4
AM
5220 if (p->p_type == PT_TLS)
5221 p->p_memsz += this_hdr->sh_size;
5222
5223 /* .tbss is special. It doesn't contribute to p_memsz of
5224 normal segments. */
5225 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5226 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
5227 }
5228
b10a8ae0
L
5229 if (align > p->p_align
5230 && !m->p_align_valid
5231 && (p->p_type != PT_LOAD
5232 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
5233 p->p_align = align;
5234 }
5235
bf988460 5236 if (!m->p_flags_valid)
252b5132
RH
5237 {
5238 p->p_flags |= PF_R;
02bf8d82 5239 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 5240 p->p_flags |= PF_X;
02bf8d82 5241 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
5242 p->p_flags |= PF_W;
5243 }
5244 }
43a8475c 5245
bf988460 5246 off -= off_adjust;
0920dee7 5247
7c928300
AM
5248 /* Check that all sections are in a PT_LOAD segment.
5249 Don't check funky gdb generated core files. */
5250 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
5251 {
5252 bfd_boolean check_vma = TRUE;
5253
5254 for (i = 1; i < m->count; i++)
5255 if (m->sections[i]->vma == m->sections[i - 1]->vma
5256 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5257 ->this_hdr), p) != 0
5258 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5259 ->this_hdr), p) != 0)
0920dee7 5260 {
9a83a553
AM
5261 /* Looks like we have overlays packed into the segment. */
5262 check_vma = FALSE;
5263 break;
0920dee7 5264 }
9a83a553
AM
5265
5266 for (i = 0; i < m->count; i++)
5267 {
5268 Elf_Internal_Shdr *this_hdr;
5269 asection *sec;
5270
5271 sec = m->sections[i];
5272 this_hdr = &(elf_section_data(sec)->this_hdr);
86b2281f
AM
5273 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5274 && !ELF_TBSS_SPECIAL (this_hdr, p))
9a83a553
AM
5275 {
5276 (*_bfd_error_handler)
5277 (_("%B: section `%A' can't be allocated in segment %d"),
5278 abfd, sec, j);
5279 print_segment_map (m);
5280 }
5281 }
5282 }
252b5132
RH
5283 }
5284
12bd6957 5285 elf_next_file_pos (abfd) = off;
f3520d2f
AM
5286 return TRUE;
5287}
5288
5289/* Assign file positions for the other sections. */
5290
5291static bfd_boolean
5292assign_file_positions_for_non_load_sections (bfd *abfd,
5293 struct bfd_link_info *link_info)
5294{
5295 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5296 Elf_Internal_Shdr **i_shdrpp;
e06efbf1 5297 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
f3520d2f
AM
5298 Elf_Internal_Phdr *phdrs;
5299 Elf_Internal_Phdr *p;
5300 struct elf_segment_map *m;
62655c7b 5301 struct elf_segment_map *hdrs_segment;
f3520d2f
AM
5302 bfd_vma filehdr_vaddr, filehdr_paddr;
5303 bfd_vma phdrs_vaddr, phdrs_paddr;
5304 file_ptr off;
f3520d2f
AM
5305 unsigned int count;
5306
5c182d5f 5307 i_shdrpp = elf_elfsections (abfd);
e06efbf1 5308 end_hdrpp = i_shdrpp + elf_numsections (abfd);
12bd6957 5309 off = elf_next_file_pos (abfd);
e06efbf1 5310 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
5c182d5f 5311 {
5c182d5f
AM
5312 Elf_Internal_Shdr *hdr;
5313
5314 hdr = *hdrpp;
5315 if (hdr->bfd_section != NULL
252e386e
AM
5316 && (hdr->bfd_section->filepos != 0
5317 || (hdr->sh_type == SHT_NOBITS
5318 && hdr->contents == NULL)))
627b32bc 5319 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
5320 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
5321 {
e8d2ba53
AM
5322 if (hdr->sh_size != 0)
5323 (*_bfd_error_handler)
5324 (_("%B: warning: allocated section `%s' not in segment"),
5325 abfd,
5326 (hdr->bfd_section == NULL
5327 ? "*unknown*"
5328 : hdr->bfd_section->name));
3ba71138
L
5329 /* We don't need to page align empty sections. */
5330 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
5331 off += vma_page_aligned_bias (hdr->sh_addr, off,
5332 bed->maxpagesize);
5333 else
5334 off += vma_page_aligned_bias (hdr->sh_addr, off,
5335 hdr->sh_addralign);
5336 off = _bfd_elf_assign_file_position_for_section (hdr, off,
5337 FALSE);
5338 }
5339 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5340 && hdr->bfd_section == NULL)
0ce398f1
L
5341 || (hdr->bfd_section != NULL
5342 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS))
5343 /* Compress DWARF debug sections. */
12bd6957 5344 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6a40cf0c
NC
5345 || (elf_symtab_shndx_list (abfd) != NULL
5346 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
5347 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
5348 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
5c182d5f
AM
5349 hdr->sh_offset = -1;
5350 else
5351 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
5352 }
5353
252b5132
RH
5354 /* Now that we have set the section file positions, we can set up
5355 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
5356 count = 0;
5357 filehdr_vaddr = 0;
5358 filehdr_paddr = 0;
5359 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
5360 phdrs_paddr = 0;
62655c7b 5361 hdrs_segment = NULL;
f3520d2f 5362 phdrs = elf_tdata (abfd)->phdr;
12bd6957 5363 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
f3520d2f
AM
5364 {
5365 ++count;
5366 if (p->p_type != PT_LOAD)
5367 continue;
5368
5369 if (m->includes_filehdr)
5370 {
5371 filehdr_vaddr = p->p_vaddr;
5372 filehdr_paddr = p->p_paddr;
5373 }
5374 if (m->includes_phdrs)
5375 {
5376 phdrs_vaddr = p->p_vaddr;
5377 phdrs_paddr = p->p_paddr;
5378 if (m->includes_filehdr)
5379 {
62655c7b 5380 hdrs_segment = m;
f3520d2f
AM
5381 phdrs_vaddr += bed->s->sizeof_ehdr;
5382 phdrs_paddr += bed->s->sizeof_ehdr;
5383 }
5384 }
5385 }
5386
62655c7b
RM
5387 if (hdrs_segment != NULL && link_info != NULL)
5388 {
5389 /* There is a segment that contains both the file headers and the
5390 program headers, so provide a symbol __ehdr_start pointing there.
5391 A program can use this to examine itself robustly. */
5392
5393 struct elf_link_hash_entry *hash
5394 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5395 FALSE, FALSE, TRUE);
5396 /* If the symbol was referenced and not defined, define it. */
5397 if (hash != NULL
5398 && (hash->root.type == bfd_link_hash_new
5399 || hash->root.type == bfd_link_hash_undefined
5400 || hash->root.type == bfd_link_hash_undefweak
5401 || hash->root.type == bfd_link_hash_common))
5402 {
5403 asection *s = NULL;
5404 if (hdrs_segment->count != 0)
5405 /* The segment contains sections, so use the first one. */
5406 s = hdrs_segment->sections[0];
5407 else
5408 /* Use the first (i.e. lowest-addressed) section in any segment. */
12bd6957 5409 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62655c7b
RM
5410 if (m->count != 0)
5411 {
5412 s = m->sections[0];
5413 break;
5414 }
5415
5416 if (s != NULL)
5417 {
5418 hash->root.u.def.value = filehdr_vaddr - s->vma;
5419 hash->root.u.def.section = s;
5420 }
5421 else
5422 {
5423 hash->root.u.def.value = filehdr_vaddr;
5424 hash->root.u.def.section = bfd_abs_section_ptr;
5425 }
5426
5427 hash->root.type = bfd_link_hash_defined;
5428 hash->def_regular = 1;
5429 hash->non_elf = 0;
5430 }
5431 }
5432
12bd6957 5433 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
252b5132 5434 {
129af99f 5435 if (p->p_type == PT_GNU_RELRO)
252b5132 5436 {
b84a33b5 5437 const Elf_Internal_Phdr *lp;
3146fac4 5438 struct elf_segment_map *lm;
1ea63fd2 5439
129af99f 5440 if (link_info != NULL)
8c37241b 5441 {
129af99f
AS
5442 /* During linking the range of the RELRO segment is passed
5443 in link_info. */
12bd6957 5444 for (lm = elf_seg_map (abfd), lp = phdrs;
3146fac4
AM
5445 lm != NULL;
5446 lm = lm->next, lp++)
8c37241b
JJ
5447 {
5448 if (lp->p_type == PT_LOAD
b84a33b5 5449 && lp->p_vaddr < link_info->relro_end
3146fac4
AM
5450 && lm->count != 0
5451 && lm->sections[0]->vma >= link_info->relro_start)
8c37241b
JJ
5452 break;
5453 }
8981c88a 5454
3146fac4 5455 BFD_ASSERT (lm != NULL);
8c37241b 5456 }
129af99f
AS
5457 else
5458 {
5459 /* Otherwise we are copying an executable or shared
b84a33b5 5460 library, but we need to use the same linker logic. */
129af99f
AS
5461 for (lp = phdrs; lp < phdrs + count; ++lp)
5462 {
5463 if (lp->p_type == PT_LOAD
5464 && lp->p_paddr == p->p_paddr)
5465 break;
5466 }
b84a33b5
AM
5467 }
5468
5469 if (lp < phdrs + count)
5470 {
5471 p->p_vaddr = lp->p_vaddr;
5472 p->p_paddr = lp->p_paddr;
5473 p->p_offset = lp->p_offset;
5474 if (link_info != NULL)
5475 p->p_filesz = link_info->relro_end - lp->p_vaddr;
5476 else if (m->p_size_valid)
5477 p->p_filesz = m->p_size;
129af99f
AS
5478 else
5479 abort ();
b84a33b5 5480 p->p_memsz = p->p_filesz;
f3944f72
L
5481 /* Preserve the alignment and flags if they are valid. The
5482 gold linker generates RW/4 for the PT_GNU_RELRO section.
5483 It is better for objcopy/strip to honor these attributes
5484 otherwise gdb will choke when using separate debug files.
5485 */
5486 if (!m->p_align_valid)
5487 p->p_align = 1;
5488 if (!m->p_flags_valid)
341b8ee7 5489 p->p_flags = PF_R;
129af99f 5490 }
9433b9b1 5491 else
b84a33b5
AM
5492 {
5493 memset (p, 0, sizeof *p);
5494 p->p_type = PT_NULL;
5495 }
129af99f 5496 }
04c3a755
NS
5497 else if (p->p_type == PT_GNU_STACK)
5498 {
5499 if (m->p_size_valid)
5500 p->p_memsz = m->p_size;
5501 }
129af99f
AS
5502 else if (m->count != 0)
5503 {
e06efbf1 5504 unsigned int i;
129af99f
AS
5505 if (p->p_type != PT_LOAD
5506 && (p->p_type != PT_NOTE
5507 || bfd_get_format (abfd) != bfd_core))
5508 {
c86934ce
NC
5509 if (m->includes_filehdr || m->includes_phdrs)
5510 {
b1fa9dd6 5511 /* PR 17512: file: 2195325e. */
c86934ce
NC
5512 (*_bfd_error_handler)
5513 (_("%B: warning: non-load segment includes file header and/or program header"),
5514 abfd);
5515 return FALSE;
5516 }
129af99f 5517
86b2281f 5518 p->p_filesz = 0;
129af99f 5519 p->p_offset = m->sections[0]->filepos;
86b2281f
AM
5520 for (i = m->count; i-- != 0;)
5521 {
5522 asection *sect = m->sections[i];
5523 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
5524 if (hdr->sh_type != SHT_NOBITS)
5525 {
5526 p->p_filesz = (sect->filepos - m->sections[0]->filepos
5527 + hdr->sh_size);
5528 break;
5529 }
5530 }
129af99f
AS
5531 }
5532 }
5533 else if (m->includes_filehdr)
5534 {
5535 p->p_vaddr = filehdr_vaddr;
5536 if (! m->p_paddr_valid)
5537 p->p_paddr = filehdr_paddr;
5538 }
5539 else if (m->includes_phdrs)
5540 {
5541 p->p_vaddr = phdrs_vaddr;
5542 if (! m->p_paddr_valid)
5543 p->p_paddr = phdrs_paddr;
252b5132
RH
5544 }
5545 }
5546
12bd6957 5547 elf_next_file_pos (abfd) = off;
252b5132 5548
b34976b6 5549 return TRUE;
252b5132
RH
5550}
5551
6a40cf0c
NC
5552static elf_section_list *
5553find_section_in_list (unsigned int i, elf_section_list * list)
5554{
5555 for (;list != NULL; list = list->next)
5556 if (list->ndx == i)
5557 break;
5558 return list;
5559}
5560
252b5132
RH
5561/* Work out the file positions of all the sections. This is called by
5562 _bfd_elf_compute_section_file_positions. All the section sizes and
5563 VMAs must be known before this is called.
5564
e0638f70
AM
5565 Reloc sections come in two flavours: Those processed specially as
5566 "side-channel" data attached to a section to which they apply, and
5567 those that bfd doesn't process as relocations. The latter sort are
5568 stored in a normal bfd section by bfd_section_from_shdr. We don't
5569 consider the former sort here, unless they form part of the loadable
5570 image. Reloc sections not assigned here will be handled later by
5571 assign_file_positions_for_relocs.
252b5132
RH
5572
5573 We also don't set the positions of the .symtab and .strtab here. */
5574
b34976b6 5575static bfd_boolean
c84fca4d
AO
5576assign_file_positions_except_relocs (bfd *abfd,
5577 struct bfd_link_info *link_info)
252b5132 5578{
5c182d5f
AM
5579 struct elf_obj_tdata *tdata = elf_tdata (abfd);
5580 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
9c5bfbb7 5581 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5582
5583 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
5584 && bfd_get_format (abfd) != bfd_core)
5585 {
5c182d5f
AM
5586 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
5587 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
5588 Elf_Internal_Shdr **hdrpp;
5589 unsigned int i;
a485e98e 5590 file_ptr off;
252b5132
RH
5591
5592 /* Start after the ELF header. */
5593 off = i_ehdrp->e_ehsize;
5594
5595 /* We are not creating an executable, which means that we are
5596 not creating a program header, and that the actual order of
5597 the sections in the file is unimportant. */
9ad5cbcf 5598 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
5599 {
5600 Elf_Internal_Shdr *hdr;
5601
5602 hdr = *hdrpp;
e0638f70
AM
5603 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5604 && hdr->bfd_section == NULL)
0ce398f1
L
5605 || (hdr->bfd_section != NULL
5606 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS))
5607 /* Compress DWARF debug sections. */
12bd6957 5608 || i == elf_onesymtab (abfd)
6a40cf0c
NC
5609 || (elf_symtab_shndx_list (abfd) != NULL
5610 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
5611 || i == elf_strtab_sec (abfd)
5612 || i == elf_shstrtab_sec (abfd))
252b5132
RH
5613 {
5614 hdr->sh_offset = -1;
252b5132 5615 }
9ad5cbcf 5616 else
b34976b6 5617 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 5618 }
a485e98e
AM
5619
5620 elf_next_file_pos (abfd) = off;
252b5132
RH
5621 }
5622 else
5623 {
f3520d2f
AM
5624 unsigned int alloc;
5625
252b5132 5626 /* Assign file positions for the loaded sections based on the
08a40648 5627 assignment of sections to segments. */
f3520d2f
AM
5628 if (!assign_file_positions_for_load_sections (abfd, link_info))
5629 return FALSE;
5630
5631 /* And for non-load sections. */
5632 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
5633 return FALSE;
5634
e36284ab
AM
5635 if (bed->elf_backend_modify_program_headers != NULL)
5636 {
5637 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
5638 return FALSE;
5639 }
5640
58e7ebac 5641 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=. */
0e1862bb 5642 if (link_info != NULL && bfd_link_pie (link_info))
58e7ebac
L
5643 {
5644 unsigned int num_segments = elf_elfheader (abfd)->e_phnum;
5645 Elf_Internal_Phdr *segment = elf_tdata (abfd)->phdr;
5646 Elf_Internal_Phdr *end_segment = &segment[num_segments];
5647
5648 /* Find the lowest p_vaddr in PT_LOAD segments. */
5649 bfd_vma p_vaddr = (bfd_vma) -1;
5650 for (; segment < end_segment; segment++)
5651 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
5652 p_vaddr = segment->p_vaddr;
5653
5654 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
5655 segments is non-zero. */
5656 if (p_vaddr)
5657 i_ehdrp->e_type = ET_EXEC;
5658 }
5659
f3520d2f 5660 /* Write out the program headers. */
12bd6957 5661 alloc = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
f3520d2f
AM
5662 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
5663 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 5664 return FALSE;
252b5132
RH
5665 }
5666
b34976b6 5667 return TRUE;
252b5132
RH
5668}
5669
b34976b6 5670static bfd_boolean
217aa764 5671prep_headers (bfd *abfd)
252b5132 5672{
3d540e93 5673 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 5674 struct elf_strtab_hash *shstrtab;
9c5bfbb7 5675 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5676
5677 i_ehdrp = elf_elfheader (abfd);
252b5132 5678
2b0f7ef9 5679 shstrtab = _bfd_elf_strtab_init ();
252b5132 5680 if (shstrtab == NULL)
b34976b6 5681 return FALSE;
252b5132
RH
5682
5683 elf_shstrtab (abfd) = shstrtab;
5684
5685 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
5686 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
5687 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
5688 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
5689
5690 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
5691 i_ehdrp->e_ident[EI_DATA] =
5692 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
5693 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
5694
252b5132
RH
5695 if ((abfd->flags & DYNAMIC) != 0)
5696 i_ehdrp->e_type = ET_DYN;
5697 else if ((abfd->flags & EXEC_P) != 0)
5698 i_ehdrp->e_type = ET_EXEC;
5699 else if (bfd_get_format (abfd) == bfd_core)
5700 i_ehdrp->e_type = ET_CORE;
5701 else
5702 i_ehdrp->e_type = ET_REL;
5703
5704 switch (bfd_get_arch (abfd))
5705 {
5706 case bfd_arch_unknown:
5707 i_ehdrp->e_machine = EM_NONE;
5708 break;
aa4f99bb
AO
5709
5710 /* There used to be a long list of cases here, each one setting
5711 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
5712 in the corresponding bfd definition. To avoid duplication,
5713 the switch was removed. Machines that need special handling
5714 can generally do it in elf_backend_final_write_processing(),
5715 unless they need the information earlier than the final write.
5716 Such need can generally be supplied by replacing the tests for
5717 e_machine with the conditions used to determine it. */
252b5132 5718 default:
9c5bfbb7
AM
5719 i_ehdrp->e_machine = bed->elf_machine_code;
5720 }
aa4f99bb 5721
252b5132
RH
5722 i_ehdrp->e_version = bed->s->ev_current;
5723 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
5724
c044fabd 5725 /* No program header, for now. */
252b5132
RH
5726 i_ehdrp->e_phoff = 0;
5727 i_ehdrp->e_phentsize = 0;
5728 i_ehdrp->e_phnum = 0;
5729
c044fabd 5730 /* Each bfd section is section header entry. */
252b5132
RH
5731 i_ehdrp->e_entry = bfd_get_start_address (abfd);
5732 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
5733
c044fabd 5734 /* If we're building an executable, we'll need a program header table. */
252b5132 5735 if (abfd->flags & EXEC_P)
0e71e495
BE
5736 /* It all happens later. */
5737 ;
252b5132
RH
5738 else
5739 {
5740 i_ehdrp->e_phentsize = 0;
252b5132
RH
5741 i_ehdrp->e_phoff = 0;
5742 }
5743
5744 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 5745 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 5746 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 5747 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 5748 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 5749 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132 5750 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
17ca87fc 5751 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
252b5132 5752 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 5753 return FALSE;
252b5132 5754
b34976b6 5755 return TRUE;
252b5132
RH
5756}
5757
5758/* Assign file positions for all the reloc sections which are not part
a485e98e 5759 of the loadable file image, and the file position of section headers. */
252b5132 5760
0ce398f1
L
5761static bfd_boolean
5762_bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
252b5132
RH
5763{
5764 file_ptr off;
e06efbf1 5765 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
3e19fb8f 5766 Elf_Internal_Shdr *shdrp;
a485e98e
AM
5767 Elf_Internal_Ehdr *i_ehdrp;
5768 const struct elf_backend_data *bed;
252b5132 5769
12bd6957 5770 off = elf_next_file_pos (abfd);
252b5132 5771
e06efbf1
L
5772 shdrpp = elf_elfsections (abfd);
5773 end_shdrpp = shdrpp + elf_numsections (abfd);
5774 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
252b5132 5775 {
252b5132 5776 shdrp = *shdrpp;
0ce398f1
L
5777 if (shdrp->sh_offset == -1)
5778 {
3e19fb8f 5779 asection *sec = shdrp->bfd_section;
0ce398f1
L
5780 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
5781 || shdrp->sh_type == SHT_RELA);
5782 if (is_rel
3e19fb8f 5783 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
0ce398f1
L
5784 {
5785 if (!is_rel)
5786 {
3e19fb8f
L
5787 const char *name = sec->name;
5788 struct bfd_elf_section_data *d;
5789
0ce398f1 5790 /* Compress DWARF debug sections. */
3e19fb8f 5791 if (!bfd_compress_section (abfd, sec,
0ce398f1
L
5792 shdrp->contents))
5793 return FALSE;
3e19fb8f
L
5794
5795 if (sec->compress_status == COMPRESS_SECTION_DONE
5796 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
5797 {
5798 /* If section is compressed with zlib-gnu, convert
5799 section name from .debug_* to .zdebug_*. */
5800 char *new_name
5801 = convert_debug_to_zdebug (abfd, name);
5802 if (new_name == NULL)
5803 return FALSE;
5804 name = new_name;
5805 }
5806 /* Add setion name to section name section. */
5807 if (shdrp->sh_name != (unsigned int) -1)
5808 abort ();
5809 shdrp->sh_name
5810 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
5811 name, FALSE);
5812 d = elf_section_data (sec);
5813
5814 /* Add reloc setion name to section name section. */
5815 if (d->rel.hdr
5816 && !_bfd_elf_set_reloc_sh_name (abfd,
5817 d->rel.hdr,
5818 name, FALSE))
5819 return FALSE;
5820 if (d->rela.hdr
5821 && !_bfd_elf_set_reloc_sh_name (abfd,
5822 d->rela.hdr,
91cb26da 5823 name, TRUE))
3e19fb8f
L
5824 return FALSE;
5825
0ce398f1 5826 /* Update section size and contents. */
3e19fb8f
L
5827 shdrp->sh_size = sec->size;
5828 shdrp->contents = sec->contents;
0ce398f1
L
5829 shdrp->bfd_section->contents = NULL;
5830 }
5831 off = _bfd_elf_assign_file_position_for_section (shdrp,
5832 off,
5833 TRUE);
5834 }
5835 }
252b5132
RH
5836 }
5837
3e19fb8f
L
5838 /* Place section name section after DWARF debug sections have been
5839 compressed. */
5840 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
5841 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
5842 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
5843 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
5844
5845 /* Place the section headers. */
a485e98e
AM
5846 i_ehdrp = elf_elfheader (abfd);
5847 bed = get_elf_backend_data (abfd);
5848 off = align_file_position (off, 1 << bed->s->log_file_align);
5849 i_ehdrp->e_shoff = off;
5850 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
12bd6957 5851 elf_next_file_pos (abfd) = off;
0ce398f1
L
5852
5853 return TRUE;
252b5132
RH
5854}
5855
b34976b6 5856bfd_boolean
217aa764 5857_bfd_elf_write_object_contents (bfd *abfd)
252b5132 5858{
9c5bfbb7 5859 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5860 Elf_Internal_Shdr **i_shdrp;
b34976b6 5861 bfd_boolean failed;
9ad5cbcf 5862 unsigned int count, num_sec;
30e8ee25 5863 struct elf_obj_tdata *t;
252b5132
RH
5864
5865 if (! abfd->output_has_begun
217aa764 5866 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 5867 return FALSE;
252b5132
RH
5868
5869 i_shdrp = elf_elfsections (abfd);
252b5132 5870
b34976b6 5871 failed = FALSE;
252b5132
RH
5872 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
5873 if (failed)
b34976b6 5874 return FALSE;
252b5132 5875
0ce398f1
L
5876 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
5877 return FALSE;
252b5132 5878
c044fabd 5879 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
5880 num_sec = elf_numsections (abfd);
5881 for (count = 1; count < num_sec; count++)
252b5132 5882 {
3e19fb8f
L
5883 i_shdrp[count]->sh_name
5884 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
5885 i_shdrp[count]->sh_name);
252b5132
RH
5886 if (bed->elf_backend_section_processing)
5887 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5888 if (i_shdrp[count]->contents)
5889 {
dc810e39
AM
5890 bfd_size_type amt = i_shdrp[count]->sh_size;
5891
252b5132 5892 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5893 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5894 return FALSE;
252b5132
RH
5895 }
5896 }
5897
5898 /* Write out the section header names. */
30e8ee25 5899 t = elf_tdata (abfd);
26ae6d5e 5900 if (elf_shstrtab (abfd) != NULL
30e8ee25 5901 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 5902 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5903 return FALSE;
252b5132
RH
5904
5905 if (bed->elf_backend_final_write_processing)
12bd6957 5906 (*bed->elf_backend_final_write_processing) (abfd, elf_linker (abfd));
252b5132 5907
ff59fc36
RM
5908 if (!bed->s->write_shdrs_and_ehdr (abfd))
5909 return FALSE;
5910
5911 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
c0355132
AM
5912 if (t->o->build_id.after_write_object_contents != NULL)
5913 return (*t->o->build_id.after_write_object_contents) (abfd);
ff59fc36
RM
5914
5915 return TRUE;
252b5132
RH
5916}
5917
b34976b6 5918bfd_boolean
217aa764 5919_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5920{
c044fabd 5921 /* Hopefully this can be done just like an object file. */
252b5132
RH
5922 return _bfd_elf_write_object_contents (abfd);
5923}
c044fabd
KH
5924
5925/* Given a section, search the header to find them. */
5926
cb33740c 5927unsigned int
198beae2 5928_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5929{
9c5bfbb7 5930 const struct elf_backend_data *bed;
91d6fa6a 5931 unsigned int sec_index;
252b5132 5932
9ad5cbcf
AM
5933 if (elf_section_data (asect) != NULL
5934 && elf_section_data (asect)->this_idx != 0)
5935 return elf_section_data (asect)->this_idx;
5936
5937 if (bfd_is_abs_section (asect))
91d6fa6a 5938 sec_index = SHN_ABS;
af746e92 5939 else if (bfd_is_com_section (asect))
91d6fa6a 5940 sec_index = SHN_COMMON;
af746e92 5941 else if (bfd_is_und_section (asect))
91d6fa6a 5942 sec_index = SHN_UNDEF;
af746e92 5943 else
91d6fa6a 5944 sec_index = SHN_BAD;
252b5132 5945
af746e92 5946 bed = get_elf_backend_data (abfd);
252b5132
RH
5947 if (bed->elf_backend_section_from_bfd_section)
5948 {
91d6fa6a 5949 int retval = sec_index;
9ad5cbcf 5950
af746e92
AM
5951 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5952 return retval;
252b5132
RH
5953 }
5954
91d6fa6a 5955 if (sec_index == SHN_BAD)
af746e92 5956 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5957
91d6fa6a 5958 return sec_index;
252b5132
RH
5959}
5960
5961/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5962 on error. */
5963
5964int
217aa764 5965_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5966{
5967 asymbol *asym_ptr = *asym_ptr_ptr;
5968 int idx;
5969 flagword flags = asym_ptr->flags;
5970
5971 /* When gas creates relocations against local labels, it creates its
5972 own symbol for the section, but does put the symbol into the
5973 symbol chain, so udata is 0. When the linker is generating
5974 relocatable output, this section symbol may be for one of the
5975 input sections rather than the output section. */
5976 if (asym_ptr->udata.i == 0
5977 && (flags & BSF_SECTION_SYM)
5978 && asym_ptr->section)
5979 {
5372391b 5980 asection *sec;
252b5132
RH
5981 int indx;
5982
5372391b
AM
5983 sec = asym_ptr->section;
5984 if (sec->owner != abfd && sec->output_section != NULL)
5985 sec = sec->output_section;
5986 if (sec->owner == abfd
5987 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5988 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5989 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5990 }
5991
5992 idx = asym_ptr->udata.i;
5993
5994 if (idx == 0)
5995 {
5996 /* This case can occur when using --strip-symbol on a symbol
08a40648 5997 which is used in a relocation entry. */
252b5132 5998 (*_bfd_error_handler)
d003868e
AM
5999 (_("%B: symbol `%s' required but not present"),
6000 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
6001 bfd_set_error (bfd_error_no_symbols);
6002 return -1;
6003 }
6004
6005#if DEBUG & 4
6006 {
6007 fprintf (stderr,
9ccb8af9
AM
6008 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx\n",
6009 (long) asym_ptr, asym_ptr->name, idx, (long) flags);
252b5132
RH
6010 fflush (stderr);
6011 }
6012#endif
6013
6014 return idx;
6015}
6016
84d1d650 6017/* Rewrite program header information. */
252b5132 6018
b34976b6 6019static bfd_boolean
84d1d650 6020rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 6021{
b34976b6
AM
6022 Elf_Internal_Ehdr *iehdr;
6023 struct elf_segment_map *map;
6024 struct elf_segment_map *map_first;
6025 struct elf_segment_map **pointer_to_map;
6026 Elf_Internal_Phdr *segment;
6027 asection *section;
6028 unsigned int i;
6029 unsigned int num_segments;
6030 bfd_boolean phdr_included = FALSE;
5c44b38e 6031 bfd_boolean p_paddr_valid;
b34976b6
AM
6032 bfd_vma maxpagesize;
6033 struct elf_segment_map *phdr_adjust_seg = NULL;
6034 unsigned int phdr_adjust_num = 0;
9c5bfbb7 6035 const struct elf_backend_data *bed;
bc67d8a6 6036
caf47ea6 6037 bed = get_elf_backend_data (ibfd);
252b5132
RH
6038 iehdr = elf_elfheader (ibfd);
6039
bc67d8a6 6040 map_first = NULL;
c044fabd 6041 pointer_to_map = &map_first;
252b5132
RH
6042
6043 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
6044 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6045
6046 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
6047#define SEGMENT_END(segment, start) \
6048 (start + (segment->p_memsz > segment->p_filesz \
6049 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 6050
eecdbe52
JJ
6051#define SECTION_SIZE(section, segment) \
6052 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6053 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 6054 ? section->size : 0)
eecdbe52 6055
b34976b6 6056 /* Returns TRUE if the given section is contained within
bc67d8a6 6057 the given segment. VMA addresses are compared. */
aecc8f8a
AM
6058#define IS_CONTAINED_BY_VMA(section, segment) \
6059 (section->vma >= segment->p_vaddr \
eecdbe52 6060 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 6061 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 6062
b34976b6 6063 /* Returns TRUE if the given section is contained within
bc67d8a6 6064 the given segment. LMA addresses are compared. */
aecc8f8a
AM
6065#define IS_CONTAINED_BY_LMA(section, segment, base) \
6066 (section->lma >= base \
eecdbe52 6067 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 6068 <= SEGMENT_END (segment, base)))
252b5132 6069
0efc80c8
L
6070 /* Handle PT_NOTE segment. */
6071#define IS_NOTE(p, s) \
aecc8f8a 6072 (p->p_type == PT_NOTE \
0efc80c8 6073 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 6074 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6075 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6076 <= p->p_offset + p->p_filesz))
252b5132 6077
0efc80c8
L
6078 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6079 etc. */
6080#define IS_COREFILE_NOTE(p, s) \
6081 (IS_NOTE (p, s) \
6082 && bfd_get_format (ibfd) == bfd_core \
6083 && s->vma == 0 \
6084 && s->lma == 0)
6085
252b5132
RH
6086 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6087 linker, which generates a PT_INTERP section with p_vaddr and
6088 p_memsz set to 0. */
aecc8f8a
AM
6089#define IS_SOLARIS_PT_INTERP(p, s) \
6090 (p->p_vaddr == 0 \
6091 && p->p_paddr == 0 \
6092 && p->p_memsz == 0 \
6093 && p->p_filesz > 0 \
6094 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 6095 && s->size > 0 \
aecc8f8a 6096 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6097 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6098 <= p->p_offset + p->p_filesz))
5c440b1e 6099
bc67d8a6
NC
6100 /* Decide if the given section should be included in the given segment.
6101 A section will be included if:
f5ffc919 6102 1. It is within the address space of the segment -- we use the LMA
08a40648 6103 if that is set for the segment and the VMA otherwise,
0efc80c8 6104 2. It is an allocated section or a NOTE section in a PT_NOTE
d324f6d6 6105 segment.
bc67d8a6 6106 3. There is an output section associated with it,
eecdbe52 6107 4. The section has not already been allocated to a previous segment.
2b05f1b7 6108 5. PT_GNU_STACK segments do not include any sections.
03394ac9 6109 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
6110 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6111 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 6112 (with the possible exception of .dynamic). */
9f17e2a6 6113#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
6114 ((((segment->p_paddr \
6115 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
6116 : IS_CONTAINED_BY_VMA (section, segment)) \
6117 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 6118 || IS_NOTE (segment, section)) \
2b05f1b7
L
6119 && segment->p_type != PT_GNU_STACK \
6120 && (segment->p_type != PT_TLS \
6121 || (section->flags & SEC_THREAD_LOCAL)) \
6122 && (segment->p_type == PT_LOAD \
6123 || segment->p_type == PT_TLS \
6124 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6125 && (segment->p_type != PT_DYNAMIC \
6126 || SECTION_SIZE (section, segment) > 0 \
6127 || (segment->p_paddr \
6128 ? segment->p_paddr != section->lma \
6129 : segment->p_vaddr != section->vma) \
6130 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
6131 == 0)) \
0067a569 6132 && !section->segment_mark)
bc67d8a6 6133
9f17e2a6
L
6134/* If the output section of a section in the input segment is NULL,
6135 it is removed from the corresponding output segment. */
6136#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
6137 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
6138 && section->output_section != NULL)
6139
b34976b6 6140 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
6141#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6142 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6143
6144 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6145 their VMA address ranges and their LMA address ranges overlap.
6146 It is possible to have overlapping VMA ranges without overlapping LMA
6147 ranges. RedBoot images for example can have both .data and .bss mapped
6148 to the same VMA range, but with the .data section mapped to a different
6149 LMA. */
aecc8f8a 6150#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 6151 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 6152 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 6153 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 6154 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
6155
6156 /* Initialise the segment mark field. */
6157 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 6158 section->segment_mark = FALSE;
bc67d8a6 6159
5c44b38e
AM
6160 /* The Solaris linker creates program headers in which all the
6161 p_paddr fields are zero. When we try to objcopy or strip such a
6162 file, we get confused. Check for this case, and if we find it
6163 don't set the p_paddr_valid fields. */
6164 p_paddr_valid = FALSE;
6165 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6166 i < num_segments;
6167 i++, segment++)
6168 if (segment->p_paddr != 0)
6169 {
6170 p_paddr_valid = TRUE;
6171 break;
6172 }
6173
252b5132 6174 /* Scan through the segments specified in the program header
bc67d8a6 6175 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 6176 in the loadable segments. These can be created by weird
aecc8f8a 6177 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
6178 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6179 i < num_segments;
c044fabd 6180 i++, segment++)
252b5132 6181 {
252b5132 6182 unsigned int j;
c044fabd 6183 Elf_Internal_Phdr *segment2;
252b5132 6184
aecc8f8a
AM
6185 if (segment->p_type == PT_INTERP)
6186 for (section = ibfd->sections; section; section = section->next)
6187 if (IS_SOLARIS_PT_INTERP (segment, section))
6188 {
6189 /* Mininal change so that the normal section to segment
4cc11e76 6190 assignment code will work. */
aecc8f8a
AM
6191 segment->p_vaddr = section->vma;
6192 break;
6193 }
6194
bc67d8a6 6195 if (segment->p_type != PT_LOAD)
b10a8ae0
L
6196 {
6197 /* Remove PT_GNU_RELRO segment. */
6198 if (segment->p_type == PT_GNU_RELRO)
6199 segment->p_type = PT_NULL;
6200 continue;
6201 }
c044fabd 6202
bc67d8a6 6203 /* Determine if this segment overlaps any previous segments. */
0067a569 6204 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
6205 {
6206 bfd_signed_vma extra_length;
c044fabd 6207
bc67d8a6 6208 if (segment2->p_type != PT_LOAD
0067a569 6209 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 6210 continue;
c044fabd 6211
bc67d8a6
NC
6212 /* Merge the two segments together. */
6213 if (segment2->p_vaddr < segment->p_vaddr)
6214 {
c044fabd 6215 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 6216 SEGMENT. */
0067a569
AM
6217 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
6218 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 6219
bc67d8a6
NC
6220 if (extra_length > 0)
6221 {
0067a569 6222 segment2->p_memsz += extra_length;
bc67d8a6
NC
6223 segment2->p_filesz += extra_length;
6224 }
c044fabd 6225
bc67d8a6 6226 segment->p_type = PT_NULL;
c044fabd 6227
bc67d8a6
NC
6228 /* Since we have deleted P we must restart the outer loop. */
6229 i = 0;
6230 segment = elf_tdata (ibfd)->phdr;
6231 break;
6232 }
6233 else
6234 {
c044fabd 6235 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 6236 SEGMENT2. */
0067a569
AM
6237 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
6238 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 6239
bc67d8a6
NC
6240 if (extra_length > 0)
6241 {
0067a569 6242 segment->p_memsz += extra_length;
bc67d8a6
NC
6243 segment->p_filesz += extra_length;
6244 }
c044fabd 6245
bc67d8a6
NC
6246 segment2->p_type = PT_NULL;
6247 }
6248 }
6249 }
c044fabd 6250
bc67d8a6
NC
6251 /* The second scan attempts to assign sections to segments. */
6252 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6253 i < num_segments;
0067a569 6254 i++, segment++)
bc67d8a6 6255 {
0067a569
AM
6256 unsigned int section_count;
6257 asection **sections;
6258 asection *output_section;
6259 unsigned int isec;
6260 bfd_vma matching_lma;
6261 bfd_vma suggested_lma;
6262 unsigned int j;
dc810e39 6263 bfd_size_type amt;
0067a569
AM
6264 asection *first_section;
6265 bfd_boolean first_matching_lma;
6266 bfd_boolean first_suggested_lma;
bc67d8a6
NC
6267
6268 if (segment->p_type == PT_NULL)
6269 continue;
c044fabd 6270
9f17e2a6 6271 first_section = NULL;
bc67d8a6 6272 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
6273 for (section = ibfd->sections, section_count = 0;
6274 section != NULL;
6275 section = section->next)
9f17e2a6
L
6276 {
6277 /* Find the first section in the input segment, which may be
6278 removed from the corresponding output segment. */
6279 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
6280 {
6281 if (first_section == NULL)
6282 first_section = section;
6283 if (section->output_section != NULL)
6284 ++section_count;
6285 }
6286 }
811072d8 6287
b5f852ea
NC
6288 /* Allocate a segment map big enough to contain
6289 all of the sections we have selected. */
dc810e39
AM
6290 amt = sizeof (struct elf_segment_map);
6291 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6292 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 6293 if (map == NULL)
b34976b6 6294 return FALSE;
252b5132
RH
6295
6296 /* Initialise the fields of the segment map. Default to
6297 using the physical address of the segment in the input BFD. */
0067a569
AM
6298 map->next = NULL;
6299 map->p_type = segment->p_type;
6300 map->p_flags = segment->p_flags;
bc67d8a6 6301 map->p_flags_valid = 1;
55d55ac7 6302
9f17e2a6
L
6303 /* If the first section in the input segment is removed, there is
6304 no need to preserve segment physical address in the corresponding
6305 output segment. */
945c025a 6306 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
6307 {
6308 map->p_paddr = segment->p_paddr;
5c44b38e 6309 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 6310 }
252b5132
RH
6311
6312 /* Determine if this segment contains the ELF file header
6313 and if it contains the program headers themselves. */
bc67d8a6
NC
6314 map->includes_filehdr = (segment->p_offset == 0
6315 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 6316 map->includes_phdrs = 0;
252b5132 6317
0067a569 6318 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 6319 {
bc67d8a6
NC
6320 map->includes_phdrs =
6321 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6322 && (segment->p_offset + segment->p_filesz
252b5132
RH
6323 >= ((bfd_vma) iehdr->e_phoff
6324 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 6325
bc67d8a6 6326 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 6327 phdr_included = TRUE;
252b5132
RH
6328 }
6329
bc67d8a6 6330 if (section_count == 0)
252b5132
RH
6331 {
6332 /* Special segments, such as the PT_PHDR segment, may contain
6333 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
6334 something. They are allowed by the ELF spec however, so only
6335 a warning is produced. */
bc67d8a6 6336 if (segment->p_type == PT_LOAD)
c86934ce
NC
6337 (*_bfd_error_handler) (_("\
6338%B: warning: Empty loadable segment detected, is this intentional ?"),
0067a569 6339 ibfd);
252b5132 6340
bc67d8a6 6341 map->count = 0;
c044fabd
KH
6342 *pointer_to_map = map;
6343 pointer_to_map = &map->next;
252b5132
RH
6344
6345 continue;
6346 }
6347
6348 /* Now scan the sections in the input BFD again and attempt
6349 to add their corresponding output sections to the segment map.
6350 The problem here is how to handle an output section which has
6351 been moved (ie had its LMA changed). There are four possibilities:
6352
6353 1. None of the sections have been moved.
6354 In this case we can continue to use the segment LMA from the
6355 input BFD.
6356
6357 2. All of the sections have been moved by the same amount.
6358 In this case we can change the segment's LMA to match the LMA
6359 of the first section.
6360
6361 3. Some of the sections have been moved, others have not.
6362 In this case those sections which have not been moved can be
6363 placed in the current segment which will have to have its size,
6364 and possibly its LMA changed, and a new segment or segments will
6365 have to be created to contain the other sections.
6366
b5f852ea 6367 4. The sections have been moved, but not by the same amount.
252b5132
RH
6368 In this case we can change the segment's LMA to match the LMA
6369 of the first section and we will have to create a new segment
6370 or segments to contain the other sections.
6371
6372 In order to save time, we allocate an array to hold the section
6373 pointers that we are interested in. As these sections get assigned
6374 to a segment, they are removed from this array. */
6375
a50b1753 6376 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 6377 if (sections == NULL)
b34976b6 6378 return FALSE;
252b5132
RH
6379
6380 /* Step One: Scan for segment vs section LMA conflicts.
6381 Also add the sections to the section array allocated above.
6382 Also add the sections to the current segment. In the common
6383 case, where the sections have not been moved, this means that
6384 we have completely filled the segment, and there is nothing
6385 more to do. */
252b5132 6386 isec = 0;
72730e0c 6387 matching_lma = 0;
252b5132 6388 suggested_lma = 0;
0067a569
AM
6389 first_matching_lma = TRUE;
6390 first_suggested_lma = TRUE;
252b5132 6391
461c4b2e 6392 for (section = first_section, j = 0;
bc67d8a6
NC
6393 section != NULL;
6394 section = section->next)
252b5132 6395 {
caf47ea6 6396 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 6397 {
bc67d8a6
NC
6398 output_section = section->output_section;
6399
0067a569 6400 sections[j++] = section;
252b5132
RH
6401
6402 /* The Solaris native linker always sets p_paddr to 0.
6403 We try to catch that case here, and set it to the
5e8d7549
NC
6404 correct value. Note - some backends require that
6405 p_paddr be left as zero. */
5c44b38e 6406 if (!p_paddr_valid
4455705d 6407 && segment->p_vaddr != 0
0067a569 6408 && !bed->want_p_paddr_set_to_zero
252b5132 6409 && isec == 0
bc67d8a6 6410 && output_section->lma != 0
0067a569
AM
6411 && output_section->vma == (segment->p_vaddr
6412 + (map->includes_filehdr
6413 ? iehdr->e_ehsize
6414 : 0)
6415 + (map->includes_phdrs
6416 ? (iehdr->e_phnum
6417 * iehdr->e_phentsize)
6418 : 0)))
bc67d8a6 6419 map->p_paddr = segment->p_vaddr;
252b5132
RH
6420
6421 /* Match up the physical address of the segment with the
6422 LMA address of the output section. */
bc67d8a6 6423 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 6424 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
6425 || (bed->want_p_paddr_set_to_zero
6426 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 6427 {
0067a569
AM
6428 if (first_matching_lma || output_section->lma < matching_lma)
6429 {
6430 matching_lma = output_section->lma;
6431 first_matching_lma = FALSE;
6432 }
252b5132
RH
6433
6434 /* We assume that if the section fits within the segment
bc67d8a6 6435 then it does not overlap any other section within that
252b5132 6436 segment. */
0067a569
AM
6437 map->sections[isec++] = output_section;
6438 }
6439 else if (first_suggested_lma)
6440 {
6441 suggested_lma = output_section->lma;
6442 first_suggested_lma = FALSE;
252b5132 6443 }
147d51c2
L
6444
6445 if (j == section_count)
6446 break;
252b5132
RH
6447 }
6448 }
6449
bc67d8a6 6450 BFD_ASSERT (j == section_count);
252b5132
RH
6451
6452 /* Step Two: Adjust the physical address of the current segment,
6453 if necessary. */
bc67d8a6 6454 if (isec == section_count)
252b5132
RH
6455 {
6456 /* All of the sections fitted within the segment as currently
6457 specified. This is the default case. Add the segment to
6458 the list of built segments and carry on to process the next
6459 program header in the input BFD. */
bc67d8a6 6460 map->count = section_count;
c044fabd
KH
6461 *pointer_to_map = map;
6462 pointer_to_map = &map->next;
08a40648 6463
5c44b38e
AM
6464 if (p_paddr_valid
6465 && !bed->want_p_paddr_set_to_zero
147d51c2 6466 && matching_lma != map->p_paddr
5c44b38e
AM
6467 && !map->includes_filehdr
6468 && !map->includes_phdrs)
3271a814
NS
6469 /* There is some padding before the first section in the
6470 segment. So, we must account for that in the output
6471 segment's vma. */
6472 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 6473
252b5132
RH
6474 free (sections);
6475 continue;
6476 }
252b5132
RH
6477 else
6478 {
0067a569 6479 if (!first_matching_lma)
72730e0c
AM
6480 {
6481 /* At least one section fits inside the current segment.
6482 Keep it, but modify its physical address to match the
6483 LMA of the first section that fitted. */
bc67d8a6 6484 map->p_paddr = matching_lma;
72730e0c
AM
6485 }
6486 else
6487 {
6488 /* None of the sections fitted inside the current segment.
6489 Change the current segment's physical address to match
6490 the LMA of the first section. */
bc67d8a6 6491 map->p_paddr = suggested_lma;
72730e0c
AM
6492 }
6493
bc67d8a6
NC
6494 /* Offset the segment physical address from the lma
6495 to allow for space taken up by elf headers. */
6496 if (map->includes_filehdr)
010c8431
AM
6497 {
6498 if (map->p_paddr >= iehdr->e_ehsize)
6499 map->p_paddr -= iehdr->e_ehsize;
6500 else
6501 {
6502 map->includes_filehdr = FALSE;
6503 map->includes_phdrs = FALSE;
6504 }
6505 }
252b5132 6506
bc67d8a6
NC
6507 if (map->includes_phdrs)
6508 {
010c8431
AM
6509 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
6510 {
6511 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
6512
6513 /* iehdr->e_phnum is just an estimate of the number
6514 of program headers that we will need. Make a note
6515 here of the number we used and the segment we chose
6516 to hold these headers, so that we can adjust the
6517 offset when we know the correct value. */
6518 phdr_adjust_num = iehdr->e_phnum;
6519 phdr_adjust_seg = map;
6520 }
6521 else
6522 map->includes_phdrs = FALSE;
bc67d8a6 6523 }
252b5132
RH
6524 }
6525
6526 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 6527 those that fit to the current segment and removing them from the
252b5132
RH
6528 sections array; but making sure not to leave large gaps. Once all
6529 possible sections have been assigned to the current segment it is
6530 added to the list of built segments and if sections still remain
6531 to be assigned, a new segment is constructed before repeating
6532 the loop. */
6533 isec = 0;
6534 do
6535 {
bc67d8a6 6536 map->count = 0;
252b5132 6537 suggested_lma = 0;
0067a569 6538 first_suggested_lma = TRUE;
252b5132
RH
6539
6540 /* Fill the current segment with sections that fit. */
bc67d8a6 6541 for (j = 0; j < section_count; j++)
252b5132 6542 {
bc67d8a6 6543 section = sections[j];
252b5132 6544
bc67d8a6 6545 if (section == NULL)
252b5132
RH
6546 continue;
6547
bc67d8a6 6548 output_section = section->output_section;
252b5132 6549
bc67d8a6 6550 BFD_ASSERT (output_section != NULL);
c044fabd 6551
bc67d8a6
NC
6552 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
6553 || IS_COREFILE_NOTE (segment, section))
252b5132 6554 {
bc67d8a6 6555 if (map->count == 0)
252b5132
RH
6556 {
6557 /* If the first section in a segment does not start at
bc67d8a6
NC
6558 the beginning of the segment, then something is
6559 wrong. */
0067a569
AM
6560 if (output_section->lma
6561 != (map->p_paddr
6562 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
6563 + (map->includes_phdrs
6564 ? iehdr->e_phnum * iehdr->e_phentsize
6565 : 0)))
252b5132
RH
6566 abort ();
6567 }
6568 else
6569 {
0067a569 6570 asection *prev_sec;
252b5132 6571
bc67d8a6 6572 prev_sec = map->sections[map->count - 1];
252b5132
RH
6573
6574 /* If the gap between the end of the previous section
bc67d8a6
NC
6575 and the start of this section is more than
6576 maxpagesize then we need to start a new segment. */
eea6121a 6577 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 6578 maxpagesize)
caf47ea6 6579 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 6580 || (prev_sec->lma + prev_sec->size
079e9a2f 6581 > output_section->lma))
252b5132 6582 {
0067a569
AM
6583 if (first_suggested_lma)
6584 {
6585 suggested_lma = output_section->lma;
6586 first_suggested_lma = FALSE;
6587 }
252b5132
RH
6588
6589 continue;
6590 }
6591 }
6592
bc67d8a6 6593 map->sections[map->count++] = output_section;
252b5132
RH
6594 ++isec;
6595 sections[j] = NULL;
b34976b6 6596 section->segment_mark = TRUE;
252b5132 6597 }
0067a569
AM
6598 else if (first_suggested_lma)
6599 {
6600 suggested_lma = output_section->lma;
6601 first_suggested_lma = FALSE;
6602 }
252b5132
RH
6603 }
6604
bc67d8a6 6605 BFD_ASSERT (map->count > 0);
252b5132
RH
6606
6607 /* Add the current segment to the list of built segments. */
c044fabd
KH
6608 *pointer_to_map = map;
6609 pointer_to_map = &map->next;
252b5132 6610
bc67d8a6 6611 if (isec < section_count)
252b5132
RH
6612 {
6613 /* We still have not allocated all of the sections to
6614 segments. Create a new segment here, initialise it
6615 and carry on looping. */
dc810e39
AM
6616 amt = sizeof (struct elf_segment_map);
6617 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
5964fc3a 6618 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 6619 if (map == NULL)
5ed6aba4
NC
6620 {
6621 free (sections);
6622 return FALSE;
6623 }
252b5132
RH
6624
6625 /* Initialise the fields of the segment map. Set the physical
6626 physical address to the LMA of the first section that has
6627 not yet been assigned. */
0067a569
AM
6628 map->next = NULL;
6629 map->p_type = segment->p_type;
6630 map->p_flags = segment->p_flags;
6631 map->p_flags_valid = 1;
6632 map->p_paddr = suggested_lma;
5c44b38e 6633 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 6634 map->includes_filehdr = 0;
0067a569 6635 map->includes_phdrs = 0;
252b5132
RH
6636 }
6637 }
bc67d8a6 6638 while (isec < section_count);
252b5132
RH
6639
6640 free (sections);
6641 }
6642
12bd6957 6643 elf_seg_map (obfd) = map_first;
bc67d8a6
NC
6644
6645 /* If we had to estimate the number of program headers that were
9ad5cbcf 6646 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
6647 the offset if necessary. */
6648 if (phdr_adjust_seg != NULL)
6649 {
6650 unsigned int count;
c044fabd 6651
bc67d8a6 6652 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 6653 count++;
252b5132 6654
bc67d8a6
NC
6655 if (count > phdr_adjust_num)
6656 phdr_adjust_seg->p_paddr
6657 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
6658 }
c044fabd 6659
bc67d8a6 6660#undef SEGMENT_END
eecdbe52 6661#undef SECTION_SIZE
bc67d8a6
NC
6662#undef IS_CONTAINED_BY_VMA
6663#undef IS_CONTAINED_BY_LMA
0efc80c8 6664#undef IS_NOTE
252b5132 6665#undef IS_COREFILE_NOTE
bc67d8a6 6666#undef IS_SOLARIS_PT_INTERP
9f17e2a6 6667#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
6668#undef INCLUDE_SECTION_IN_SEGMENT
6669#undef SEGMENT_AFTER_SEGMENT
6670#undef SEGMENT_OVERLAPS
b34976b6 6671 return TRUE;
252b5132
RH
6672}
6673
84d1d650
L
6674/* Copy ELF program header information. */
6675
6676static bfd_boolean
6677copy_elf_program_header (bfd *ibfd, bfd *obfd)
6678{
6679 Elf_Internal_Ehdr *iehdr;
6680 struct elf_segment_map *map;
6681 struct elf_segment_map *map_first;
6682 struct elf_segment_map **pointer_to_map;
6683 Elf_Internal_Phdr *segment;
6684 unsigned int i;
6685 unsigned int num_segments;
6686 bfd_boolean phdr_included = FALSE;
88967714 6687 bfd_boolean p_paddr_valid;
84d1d650
L
6688
6689 iehdr = elf_elfheader (ibfd);
6690
6691 map_first = NULL;
6692 pointer_to_map = &map_first;
6693
88967714
AM
6694 /* If all the segment p_paddr fields are zero, don't set
6695 map->p_paddr_valid. */
6696 p_paddr_valid = FALSE;
84d1d650 6697 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
6698 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6699 i < num_segments;
6700 i++, segment++)
6701 if (segment->p_paddr != 0)
6702 {
6703 p_paddr_valid = TRUE;
6704 break;
6705 }
6706
84d1d650
L
6707 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6708 i < num_segments;
6709 i++, segment++)
6710 {
6711 asection *section;
6712 unsigned int section_count;
6713 bfd_size_type amt;
6714 Elf_Internal_Shdr *this_hdr;
53020534 6715 asection *first_section = NULL;
a76e6f2f 6716 asection *lowest_section;
84d1d650 6717
84d1d650
L
6718 /* Compute how many sections are in this segment. */
6719 for (section = ibfd->sections, section_count = 0;
6720 section != NULL;
6721 section = section->next)
6722 {
6723 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6724 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 6725 {
a76e6f2f
AM
6726 if (first_section == NULL)
6727 first_section = section;
3271a814
NS
6728 section_count++;
6729 }
84d1d650
L
6730 }
6731
6732 /* Allocate a segment map big enough to contain
6733 all of the sections we have selected. */
6734 amt = sizeof (struct elf_segment_map);
6735 if (section_count != 0)
6736 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6737 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
6738 if (map == NULL)
6739 return FALSE;
6740
6741 /* Initialize the fields of the output segment map with the
6742 input segment. */
6743 map->next = NULL;
6744 map->p_type = segment->p_type;
6745 map->p_flags = segment->p_flags;
6746 map->p_flags_valid = 1;
6747 map->p_paddr = segment->p_paddr;
88967714 6748 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
6749 map->p_align = segment->p_align;
6750 map->p_align_valid = 1;
3271a814 6751 map->p_vaddr_offset = 0;
84d1d650 6752
04c3a755
NS
6753 if (map->p_type == PT_GNU_RELRO
6754 || map->p_type == PT_GNU_STACK)
b10a8ae0
L
6755 {
6756 /* The PT_GNU_RELRO segment may contain the first a few
6757 bytes in the .got.plt section even if the whole .got.plt
6758 section isn't in the PT_GNU_RELRO segment. We won't
04c3a755
NS
6759 change the size of the PT_GNU_RELRO segment.
6760 Similarly, PT_GNU_STACK size is significant on uclinux
6761 systems. */
9433b9b1 6762 map->p_size = segment->p_memsz;
b10a8ae0
L
6763 map->p_size_valid = 1;
6764 }
6765
84d1d650
L
6766 /* Determine if this segment contains the ELF file header
6767 and if it contains the program headers themselves. */
6768 map->includes_filehdr = (segment->p_offset == 0
6769 && segment->p_filesz >= iehdr->e_ehsize);
6770
6771 map->includes_phdrs = 0;
6772 if (! phdr_included || segment->p_type != PT_LOAD)
6773 {
6774 map->includes_phdrs =
6775 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6776 && (segment->p_offset + segment->p_filesz
6777 >= ((bfd_vma) iehdr->e_phoff
6778 + iehdr->e_phnum * iehdr->e_phentsize)));
6779
6780 if (segment->p_type == PT_LOAD && map->includes_phdrs)
6781 phdr_included = TRUE;
6782 }
6783
bbefd0a9 6784 lowest_section = NULL;
84d1d650
L
6785 if (section_count != 0)
6786 {
6787 unsigned int isec = 0;
6788
53020534 6789 for (section = first_section;
84d1d650
L
6790 section != NULL;
6791 section = section->next)
6792 {
6793 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6794 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
6795 {
6796 map->sections[isec++] = section->output_section;
a76e6f2f
AM
6797 if ((section->flags & SEC_ALLOC) != 0)
6798 {
6799 bfd_vma seg_off;
6800
bbefd0a9
AM
6801 if (lowest_section == NULL
6802 || section->lma < lowest_section->lma)
fb8a5684
AM
6803 lowest_section = section;
6804
a76e6f2f
AM
6805 /* Section lmas are set up from PT_LOAD header
6806 p_paddr in _bfd_elf_make_section_from_shdr.
6807 If this header has a p_paddr that disagrees
6808 with the section lma, flag the p_paddr as
6809 invalid. */
6810 if ((section->flags & SEC_LOAD) != 0)
6811 seg_off = this_hdr->sh_offset - segment->p_offset;
6812 else
6813 seg_off = this_hdr->sh_addr - segment->p_vaddr;
6814 if (section->lma - segment->p_paddr != seg_off)
6815 map->p_paddr_valid = FALSE;
6816 }
53020534
L
6817 if (isec == section_count)
6818 break;
6819 }
84d1d650
L
6820 }
6821 }
6822
a76e6f2f
AM
6823 if (map->includes_filehdr && lowest_section != NULL)
6824 /* We need to keep the space used by the headers fixed. */
6825 map->header_size = lowest_section->vma - segment->p_vaddr;
d324f6d6 6826
a76e6f2f
AM
6827 if (!map->includes_phdrs
6828 && !map->includes_filehdr
6829 && map->p_paddr_valid)
6830 /* There is some other padding before the first section. */
6831 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
6832 - segment->p_paddr);
6833
84d1d650
L
6834 map->count = section_count;
6835 *pointer_to_map = map;
6836 pointer_to_map = &map->next;
6837 }
6838
12bd6957 6839 elf_seg_map (obfd) = map_first;
84d1d650
L
6840 return TRUE;
6841}
6842
6843/* Copy private BFD data. This copies or rewrites ELF program header
6844 information. */
6845
6846static bfd_boolean
6847copy_private_bfd_data (bfd *ibfd, bfd *obfd)
6848{
84d1d650
L
6849 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6850 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6851 return TRUE;
6852
6853 if (elf_tdata (ibfd)->phdr == NULL)
6854 return TRUE;
6855
6856 if (ibfd->xvec == obfd->xvec)
6857 {
cb3ff1e5
NC
6858 /* Check to see if any sections in the input BFD
6859 covered by ELF program header have changed. */
d55ce4e2 6860 Elf_Internal_Phdr *segment;
84d1d650
L
6861 asection *section, *osec;
6862 unsigned int i, num_segments;
6863 Elf_Internal_Shdr *this_hdr;
147d51c2
L
6864 const struct elf_backend_data *bed;
6865
6866 bed = get_elf_backend_data (ibfd);
6867
6868 /* Regenerate the segment map if p_paddr is set to 0. */
6869 if (bed->want_p_paddr_set_to_zero)
6870 goto rewrite;
84d1d650
L
6871
6872 /* Initialize the segment mark field. */
6873 for (section = obfd->sections; section != NULL;
6874 section = section->next)
6875 section->segment_mark = FALSE;
6876
6877 num_segments = elf_elfheader (ibfd)->e_phnum;
6878 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6879 i < num_segments;
6880 i++, segment++)
6881 {
5f6999aa
NC
6882 /* PR binutils/3535. The Solaris linker always sets the p_paddr
6883 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
6884 which severly confuses things, so always regenerate the segment
6885 map in this case. */
6886 if (segment->p_paddr == 0
6887 && segment->p_memsz == 0
6888 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 6889 goto rewrite;
5f6999aa 6890
84d1d650
L
6891 for (section = ibfd->sections;
6892 section != NULL; section = section->next)
6893 {
6894 /* We mark the output section so that we know it comes
6895 from the input BFD. */
6896 osec = section->output_section;
6897 if (osec)
6898 osec->segment_mark = TRUE;
6899
6900 /* Check if this section is covered by the segment. */
6901 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6902 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
6903 {
6904 /* FIXME: Check if its output section is changed or
6905 removed. What else do we need to check? */
6906 if (osec == NULL
6907 || section->flags != osec->flags
6908 || section->lma != osec->lma
6909 || section->vma != osec->vma
6910 || section->size != osec->size
6911 || section->rawsize != osec->rawsize
6912 || section->alignment_power != osec->alignment_power)
6913 goto rewrite;
6914 }
6915 }
6916 }
6917
cb3ff1e5 6918 /* Check to see if any output section do not come from the
84d1d650
L
6919 input BFD. */
6920 for (section = obfd->sections; section != NULL;
6921 section = section->next)
6922 {
6923 if (section->segment_mark == FALSE)
6924 goto rewrite;
6925 else
6926 section->segment_mark = FALSE;
6927 }
6928
6929 return copy_elf_program_header (ibfd, obfd);
6930 }
6931
6932rewrite:
f1d85785
L
6933 if (ibfd->xvec == obfd->xvec)
6934 {
6935 /* When rewriting program header, set the output maxpagesize to
6936 the maximum alignment of input PT_LOAD segments. */
6937 Elf_Internal_Phdr *segment;
6938 unsigned int i;
6939 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
6940 bfd_vma maxpagesize = 0;
6941
6942 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6943 i < num_segments;
6944 i++, segment++)
6945 if (segment->p_type == PT_LOAD
6946 && maxpagesize < segment->p_align)
c86934ce
NC
6947 {
6948 /* PR 17512: file: f17299af. */
6949 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
6950 (*_bfd_error_handler) (_("\
6951%B: warning: segment alignment of 0x%llx is too large"),
6952 ibfd, (long long) segment->p_align);
6953 else
6954 maxpagesize = segment->p_align;
6955 }
f1d85785
L
6956
6957 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
6958 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
6959 }
6960
84d1d650
L
6961 return rewrite_elf_program_header (ibfd, obfd);
6962}
6963
ccd2ec6a
L
6964/* Initialize private output section information from input section. */
6965
6966bfd_boolean
6967_bfd_elf_init_private_section_data (bfd *ibfd,
6968 asection *isec,
6969 bfd *obfd,
6970 asection *osec,
6971 struct bfd_link_info *link_info)
6972
6973{
6974 Elf_Internal_Shdr *ihdr, *ohdr;
0e1862bb
L
6975 bfd_boolean final_link = (link_info != NULL
6976 && !bfd_link_relocatable (link_info));
ccd2ec6a
L
6977
6978 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6979 || obfd->xvec->flavour != bfd_target_elf_flavour)
6980 return TRUE;
6981
ba85c43e
NC
6982 BFD_ASSERT (elf_section_data (osec) != NULL);
6983
dfa7b0b8
AM
6984 /* For objcopy and relocatable link, don't copy the output ELF
6985 section type from input if the output BFD section flags have been
6986 set to something different. For a final link allow some flags
6987 that the linker clears to differ. */
42bb2e33 6988 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
6989 && (osec->flags == isec->flags
6990 || (final_link
6991 && ((osec->flags ^ isec->flags)
0814be7d 6992 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 6993 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
6994
6995 /* FIXME: Is this correct for all OS/PROC specific flags? */
6996 elf_section_flags (osec) |= (elf_section_flags (isec)
6997 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
6998
6999 /* Set things up for objcopy and relocatable link. The output
7000 SHT_GROUP section will have its elf_next_in_group pointing back
7001 to the input group members. Ignore linker created group section.
7002 See elfNN_ia64_object_p in elfxx-ia64.c. */
dfa7b0b8 7003 if (!final_link)
ccd2ec6a
L
7004 {
7005 if (elf_sec_group (isec) == NULL
7006 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
7007 {
7008 if (elf_section_flags (isec) & SHF_GROUP)
7009 elf_section_flags (osec) |= SHF_GROUP;
7010 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 7011 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a 7012 }
68f5ff89
L
7013
7014 /* If not decompress, preserve SHF_COMPRESSED. */
7015 if ((ibfd->flags & BFD_DECOMPRESS) == 0)
7016 elf_section_flags (osec) |= (elf_section_flags (isec)
7017 & SHF_COMPRESSED);
ccd2ec6a
L
7018 }
7019
7020 ihdr = &elf_section_data (isec)->this_hdr;
7021
7022 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7023 don't use the output section of the linked-to section since it
7024 may be NULL at this point. */
7025 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7026 {
7027 ohdr = &elf_section_data (osec)->this_hdr;
7028 ohdr->sh_flags |= SHF_LINK_ORDER;
7029 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7030 }
7031
7032 osec->use_rela_p = isec->use_rela_p;
7033
7034 return TRUE;
7035}
7036
252b5132
RH
7037/* Copy private section information. This copies over the entsize
7038 field, and sometimes the info field. */
7039
b34976b6 7040bfd_boolean
217aa764
AM
7041_bfd_elf_copy_private_section_data (bfd *ibfd,
7042 asection *isec,
7043 bfd *obfd,
7044 asection *osec)
252b5132
RH
7045{
7046 Elf_Internal_Shdr *ihdr, *ohdr;
7047
7048 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7049 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 7050 return TRUE;
252b5132 7051
252b5132
RH
7052 ihdr = &elf_section_data (isec)->this_hdr;
7053 ohdr = &elf_section_data (osec)->this_hdr;
7054
7055 ohdr->sh_entsize = ihdr->sh_entsize;
7056
7057 if (ihdr->sh_type == SHT_SYMTAB
7058 || ihdr->sh_type == SHT_DYNSYM
7059 || ihdr->sh_type == SHT_GNU_verneed
7060 || ihdr->sh_type == SHT_GNU_verdef)
7061 ohdr->sh_info = ihdr->sh_info;
7062
ccd2ec6a
L
7063 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7064 NULL);
252b5132
RH
7065}
7066
d0bf826b
AM
7067/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7068 necessary if we are removing either the SHT_GROUP section or any of
7069 the group member sections. DISCARDED is the value that a section's
7070 output_section has if the section will be discarded, NULL when this
7071 function is called from objcopy, bfd_abs_section_ptr when called
7072 from the linker. */
80fccad2
BW
7073
7074bfd_boolean
d0bf826b 7075_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 7076{
30288845
AM
7077 asection *isec;
7078
30288845 7079 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 7080 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
7081 {
7082 asection *first = elf_next_in_group (isec);
7083 asection *s = first;
d0bf826b
AM
7084 bfd_size_type removed = 0;
7085
30288845
AM
7086 while (s != NULL)
7087 {
415f38a6
AM
7088 /* If this member section is being output but the
7089 SHT_GROUP section is not, then clear the group info
7090 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
7091 if (s->output_section != discarded
7092 && isec->output_section == discarded)
30288845
AM
7093 {
7094 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7095 elf_group_name (s->output_section) = NULL;
7096 }
415f38a6
AM
7097 /* Conversely, if the member section is not being output
7098 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
7099 else if (s->output_section == discarded
7100 && isec->output_section != discarded)
7101 removed += 4;
30288845
AM
7102 s = elf_next_in_group (s);
7103 if (s == first)
7104 break;
7105 }
d0bf826b
AM
7106 if (removed != 0)
7107 {
7108 if (discarded != NULL)
7109 {
7110 /* If we've been called for ld -r, then we need to
7111 adjust the input section size. This function may
7112 be called multiple times, so save the original
7113 size. */
7114 if (isec->rawsize == 0)
7115 isec->rawsize = isec->size;
7116 isec->size = isec->rawsize - removed;
7117 }
7118 else
7119 {
7120 /* Adjust the output section size when called from
7121 objcopy. */
7122 isec->output_section->size -= removed;
7123 }
7124 }
30288845
AM
7125 }
7126
80fccad2
BW
7127 return TRUE;
7128}
7129
d0bf826b
AM
7130/* Copy private header information. */
7131
7132bfd_boolean
7133_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
7134{
7135 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7136 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7137 return TRUE;
7138
7139 /* Copy over private BFD data if it has not already been copied.
7140 This must be done here, rather than in the copy_private_bfd_data
7141 entry point, because the latter is called after the section
7142 contents have been set, which means that the program headers have
7143 already been worked out. */
12bd6957 7144 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
d0bf826b
AM
7145 {
7146 if (! copy_private_bfd_data (ibfd, obfd))
7147 return FALSE;
7148 }
7149
7150 return _bfd_elf_fixup_group_sections (ibfd, NULL);
7151}
7152
252b5132
RH
7153/* Copy private symbol information. If this symbol is in a section
7154 which we did not map into a BFD section, try to map the section
7155 index correctly. We use special macro definitions for the mapped
7156 section indices; these definitions are interpreted by the
7157 swap_out_syms function. */
7158
9ad5cbcf
AM
7159#define MAP_ONESYMTAB (SHN_HIOS + 1)
7160#define MAP_DYNSYMTAB (SHN_HIOS + 2)
7161#define MAP_STRTAB (SHN_HIOS + 3)
7162#define MAP_SHSTRTAB (SHN_HIOS + 4)
7163#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 7164
b34976b6 7165bfd_boolean
217aa764
AM
7166_bfd_elf_copy_private_symbol_data (bfd *ibfd,
7167 asymbol *isymarg,
7168 bfd *obfd,
7169 asymbol *osymarg)
252b5132
RH
7170{
7171 elf_symbol_type *isym, *osym;
7172
7173 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7174 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 7175 return TRUE;
252b5132
RH
7176
7177 isym = elf_symbol_from (ibfd, isymarg);
7178 osym = elf_symbol_from (obfd, osymarg);
7179
7180 if (isym != NULL
8424d8f5 7181 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
7182 && osym != NULL
7183 && bfd_is_abs_section (isym->symbol.section))
7184 {
7185 unsigned int shndx;
7186
7187 shndx = isym->internal_elf_sym.st_shndx;
7188 if (shndx == elf_onesymtab (ibfd))
7189 shndx = MAP_ONESYMTAB;
7190 else if (shndx == elf_dynsymtab (ibfd))
7191 shndx = MAP_DYNSYMTAB;
12bd6957 7192 else if (shndx == elf_strtab_sec (ibfd))
252b5132 7193 shndx = MAP_STRTAB;
12bd6957 7194 else if (shndx == elf_shstrtab_sec (ibfd))
252b5132 7195 shndx = MAP_SHSTRTAB;
6a40cf0c 7196 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
9ad5cbcf 7197 shndx = MAP_SYM_SHNDX;
252b5132
RH
7198 osym->internal_elf_sym.st_shndx = shndx;
7199 }
7200
b34976b6 7201 return TRUE;
252b5132
RH
7202}
7203
7204/* Swap out the symbols. */
7205
b34976b6 7206static bfd_boolean
217aa764 7207swap_out_syms (bfd *abfd,
ef10c3ac 7208 struct elf_strtab_hash **sttp,
217aa764 7209 int relocatable_p)
252b5132 7210{
9c5bfbb7 7211 const struct elf_backend_data *bed;
079e9a2f
AM
7212 int symcount;
7213 asymbol **syms;
ef10c3ac 7214 struct elf_strtab_hash *stt;
079e9a2f 7215 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 7216 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 7217 Elf_Internal_Shdr *symstrtab_hdr;
ef10c3ac 7218 struct elf_sym_strtab *symstrtab;
f075ee0c
AM
7219 bfd_byte *outbound_syms;
7220 bfd_byte *outbound_shndx;
ef10c3ac
L
7221 unsigned long outbound_syms_index;
7222 unsigned long outbound_shndx_index;
079e9a2f 7223 int idx;
12bd6957 7224 unsigned int num_locals;
079e9a2f 7225 bfd_size_type amt;
174fd7f9 7226 bfd_boolean name_local_sections;
252b5132 7227
12bd6957 7228 if (!elf_map_symbols (abfd, &num_locals))
b34976b6 7229 return FALSE;
252b5132 7230
c044fabd 7231 /* Dump out the symtabs. */
ef10c3ac 7232 stt = _bfd_elf_strtab_init ();
079e9a2f 7233 if (stt == NULL)
b34976b6 7234 return FALSE;
252b5132 7235
079e9a2f
AM
7236 bed = get_elf_backend_data (abfd);
7237 symcount = bfd_get_symcount (abfd);
7238 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
7239 symtab_hdr->sh_type = SHT_SYMTAB;
7240 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
7241 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
12bd6957 7242 symtab_hdr->sh_info = num_locals + 1;
72de5009 7243 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
7244
7245 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
7246 symstrtab_hdr->sh_type = SHT_STRTAB;
7247
ef10c3ac
L
7248 /* Allocate buffer to swap out the .strtab section. */
7249 symstrtab = (struct elf_sym_strtab *) bfd_malloc ((symcount + 1)
7250 * sizeof (*symstrtab));
7251 if (symstrtab == NULL)
7252 {
7253 _bfd_elf_strtab_free (stt);
7254 return FALSE;
7255 }
7256
a50b1753
NC
7257 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
7258 bed->s->sizeof_sym);
079e9a2f 7259 if (outbound_syms == NULL)
5ed6aba4 7260 {
ef10c3ac
L
7261error_return:
7262 _bfd_elf_strtab_free (stt);
7263 free (symstrtab);
5ed6aba4
NC
7264 return FALSE;
7265 }
217aa764 7266 symtab_hdr->contents = outbound_syms;
ef10c3ac 7267 outbound_syms_index = 0;
252b5132 7268
9ad5cbcf 7269 outbound_shndx = NULL;
ef10c3ac 7270 outbound_shndx_index = 0;
6a40cf0c
NC
7271
7272 if (elf_symtab_shndx_list (abfd))
9ad5cbcf 7273 {
6a40cf0c
NC
7274 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
7275 if (symtab_shndx_hdr->sh_name != 0)
7276 {
7277 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
7278 outbound_shndx = (bfd_byte *)
7279 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
7280 if (outbound_shndx == NULL)
7281 goto error_return;
5ed6aba4 7282
6a40cf0c
NC
7283 symtab_shndx_hdr->contents = outbound_shndx;
7284 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
7285 symtab_shndx_hdr->sh_size = amt;
7286 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
7287 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
7288 }
7289 /* FIXME: What about any other headers in the list ? */
9ad5cbcf
AM
7290 }
7291
589e6347 7292 /* Now generate the data (for "contents"). */
079e9a2f
AM
7293 {
7294 /* Fill in zeroth symbol and swap it out. */
7295 Elf_Internal_Sym sym;
7296 sym.st_name = 0;
7297 sym.st_value = 0;
7298 sym.st_size = 0;
7299 sym.st_info = 0;
7300 sym.st_other = 0;
7301 sym.st_shndx = SHN_UNDEF;
35fc36a8 7302 sym.st_target_internal = 0;
ef10c3ac
L
7303 symstrtab[0].sym = sym;
7304 symstrtab[0].dest_index = outbound_syms_index;
7305 symstrtab[0].destshndx_index = outbound_shndx_index;
7306 outbound_syms_index++;
9ad5cbcf 7307 if (outbound_shndx != NULL)
ef10c3ac 7308 outbound_shndx_index++;
079e9a2f 7309 }
252b5132 7310
174fd7f9
RS
7311 name_local_sections
7312 = (bed->elf_backend_name_local_section_symbols
7313 && bed->elf_backend_name_local_section_symbols (abfd));
7314
079e9a2f 7315 syms = bfd_get_outsymbols (abfd);
ef10c3ac 7316 for (idx = 0; idx < symcount;)
252b5132 7317 {
252b5132 7318 Elf_Internal_Sym sym;
079e9a2f
AM
7319 bfd_vma value = syms[idx]->value;
7320 elf_symbol_type *type_ptr;
7321 flagword flags = syms[idx]->flags;
7322 int type;
252b5132 7323
174fd7f9
RS
7324 if (!name_local_sections
7325 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
7326 {
7327 /* Local section symbols have no name. */
ef10c3ac 7328 sym.st_name = (unsigned long) -1;
079e9a2f
AM
7329 }
7330 else
7331 {
ef10c3ac
L
7332 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
7333 to get the final offset for st_name. */
7334 sym.st_name
7335 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
7336 FALSE);
079e9a2f 7337 if (sym.st_name == (unsigned long) -1)
ef10c3ac 7338 goto error_return;
079e9a2f 7339 }
252b5132 7340
079e9a2f 7341 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 7342
079e9a2f
AM
7343 if ((flags & BSF_SECTION_SYM) == 0
7344 && bfd_is_com_section (syms[idx]->section))
7345 {
7346 /* ELF common symbols put the alignment into the `value' field,
7347 and the size into the `size' field. This is backwards from
7348 how BFD handles it, so reverse it here. */
7349 sym.st_size = value;
7350 if (type_ptr == NULL
7351 || type_ptr->internal_elf_sym.st_value == 0)
7352 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
7353 else
7354 sym.st_value = type_ptr->internal_elf_sym.st_value;
7355 sym.st_shndx = _bfd_elf_section_from_bfd_section
7356 (abfd, syms[idx]->section);
7357 }
7358 else
7359 {
7360 asection *sec = syms[idx]->section;
cb33740c 7361 unsigned int shndx;
252b5132 7362
079e9a2f
AM
7363 if (sec->output_section)
7364 {
7365 value += sec->output_offset;
7366 sec = sec->output_section;
7367 }
589e6347 7368
079e9a2f
AM
7369 /* Don't add in the section vma for relocatable output. */
7370 if (! relocatable_p)
7371 value += sec->vma;
7372 sym.st_value = value;
7373 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
7374
7375 if (bfd_is_abs_section (sec)
7376 && type_ptr != NULL
7377 && type_ptr->internal_elf_sym.st_shndx != 0)
7378 {
7379 /* This symbol is in a real ELF section which we did
7380 not create as a BFD section. Undo the mapping done
7381 by copy_private_symbol_data. */
7382 shndx = type_ptr->internal_elf_sym.st_shndx;
7383 switch (shndx)
7384 {
7385 case MAP_ONESYMTAB:
7386 shndx = elf_onesymtab (abfd);
7387 break;
7388 case MAP_DYNSYMTAB:
7389 shndx = elf_dynsymtab (abfd);
7390 break;
7391 case MAP_STRTAB:
12bd6957 7392 shndx = elf_strtab_sec (abfd);
079e9a2f
AM
7393 break;
7394 case MAP_SHSTRTAB:
12bd6957 7395 shndx = elf_shstrtab_sec (abfd);
079e9a2f 7396 break;
9ad5cbcf 7397 case MAP_SYM_SHNDX:
6a40cf0c
NC
7398 if (elf_symtab_shndx_list (abfd))
7399 shndx = elf_symtab_shndx_list (abfd)->ndx;
9ad5cbcf 7400 break;
079e9a2f 7401 default:
15bc576a 7402 shndx = SHN_ABS;
079e9a2f
AM
7403 break;
7404 }
7405 }
7406 else
7407 {
7408 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 7409
cb33740c 7410 if (shndx == SHN_BAD)
079e9a2f
AM
7411 {
7412 asection *sec2;
7413
7414 /* Writing this would be a hell of a lot easier if
7415 we had some decent documentation on bfd, and
7416 knew what to expect of the library, and what to
7417 demand of applications. For example, it
7418 appears that `objcopy' might not set the
7419 section of a symbol to be a section that is
7420 actually in the output file. */
7421 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
7422 if (sec2 == NULL)
7423 {
7424 _bfd_error_handler (_("\
7425Unable to find equivalent output section for symbol '%s' from section '%s'"),
7426 syms[idx]->name ? syms[idx]->name : "<Local sym>",
7427 sec->name);
811072d8 7428 bfd_set_error (bfd_error_invalid_operation);
ef10c3ac 7429 goto error_return;
589e6347 7430 }
811072d8 7431
079e9a2f 7432 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
cb33740c 7433 BFD_ASSERT (shndx != SHN_BAD);
079e9a2f
AM
7434 }
7435 }
252b5132 7436
079e9a2f
AM
7437 sym.st_shndx = shndx;
7438 }
252b5132 7439
13ae64f3
JJ
7440 if ((flags & BSF_THREAD_LOCAL) != 0)
7441 type = STT_TLS;
d8045f23
NC
7442 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
7443 type = STT_GNU_IFUNC;
13ae64f3 7444 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
7445 type = STT_FUNC;
7446 else if ((flags & BSF_OBJECT) != 0)
7447 type = STT_OBJECT;
d9352518
DB
7448 else if ((flags & BSF_RELC) != 0)
7449 type = STT_RELC;
7450 else if ((flags & BSF_SRELC) != 0)
7451 type = STT_SRELC;
079e9a2f
AM
7452 else
7453 type = STT_NOTYPE;
252b5132 7454
13ae64f3
JJ
7455 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
7456 type = STT_TLS;
7457
589e6347 7458 /* Processor-specific types. */
079e9a2f
AM
7459 if (type_ptr != NULL
7460 && bed->elf_backend_get_symbol_type)
7461 type = ((*bed->elf_backend_get_symbol_type)
7462 (&type_ptr->internal_elf_sym, type));
252b5132 7463
079e9a2f
AM
7464 if (flags & BSF_SECTION_SYM)
7465 {
7466 if (flags & BSF_GLOBAL)
7467 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
7468 else
7469 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
7470 }
7471 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 7472 {
b8871f35
L
7473 if (type != STT_TLS)
7474 {
7475 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
7476 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
7477 ? STT_COMMON : STT_OBJECT);
7478 else
7479 type = ((flags & BSF_ELF_COMMON) != 0
7480 ? STT_COMMON : STT_OBJECT);
7481 }
7482 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 7483 }
079e9a2f
AM
7484 else if (bfd_is_und_section (syms[idx]->section))
7485 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
7486 ? STB_WEAK
7487 : STB_GLOBAL),
7488 type);
7489 else if (flags & BSF_FILE)
7490 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
7491 else
7492 {
7493 int bind = STB_LOCAL;
252b5132 7494
079e9a2f
AM
7495 if (flags & BSF_LOCAL)
7496 bind = STB_LOCAL;
3e7a7d11
NC
7497 else if (flags & BSF_GNU_UNIQUE)
7498 bind = STB_GNU_UNIQUE;
079e9a2f
AM
7499 else if (flags & BSF_WEAK)
7500 bind = STB_WEAK;
7501 else if (flags & BSF_GLOBAL)
7502 bind = STB_GLOBAL;
252b5132 7503
079e9a2f
AM
7504 sym.st_info = ELF_ST_INFO (bind, type);
7505 }
252b5132 7506
079e9a2f 7507 if (type_ptr != NULL)
35fc36a8
RS
7508 {
7509 sym.st_other = type_ptr->internal_elf_sym.st_other;
7510 sym.st_target_internal
7511 = type_ptr->internal_elf_sym.st_target_internal;
7512 }
079e9a2f 7513 else
35fc36a8
RS
7514 {
7515 sym.st_other = 0;
7516 sym.st_target_internal = 0;
7517 }
252b5132 7518
ef10c3ac
L
7519 idx++;
7520 symstrtab[idx].sym = sym;
7521 symstrtab[idx].dest_index = outbound_syms_index;
7522 symstrtab[idx].destshndx_index = outbound_shndx_index;
7523
7524 outbound_syms_index++;
9ad5cbcf 7525 if (outbound_shndx != NULL)
ef10c3ac
L
7526 outbound_shndx_index++;
7527 }
7528
7529 /* Finalize the .strtab section. */
7530 _bfd_elf_strtab_finalize (stt);
7531
7532 /* Swap out the .strtab section. */
7533 for (idx = 0; idx <= symcount; idx++)
7534 {
7535 struct elf_sym_strtab *elfsym = &symstrtab[idx];
7536 if (elfsym->sym.st_name == (unsigned long) -1)
7537 elfsym->sym.st_name = 0;
7538 else
7539 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
7540 elfsym->sym.st_name);
7541 bed->s->swap_symbol_out (abfd, &elfsym->sym,
7542 (outbound_syms
7543 + (elfsym->dest_index
7544 * bed->s->sizeof_sym)),
7545 (outbound_shndx
7546 + (elfsym->destshndx_index
7547 * sizeof (Elf_External_Sym_Shndx))));
079e9a2f 7548 }
ef10c3ac 7549 free (symstrtab);
252b5132 7550
079e9a2f 7551 *sttp = stt;
ef10c3ac 7552 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
079e9a2f 7553 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 7554
079e9a2f
AM
7555 symstrtab_hdr->sh_flags = 0;
7556 symstrtab_hdr->sh_addr = 0;
7557 symstrtab_hdr->sh_entsize = 0;
7558 symstrtab_hdr->sh_link = 0;
7559 symstrtab_hdr->sh_info = 0;
7560 symstrtab_hdr->sh_addralign = 1;
252b5132 7561
b34976b6 7562 return TRUE;
252b5132
RH
7563}
7564
7565/* Return the number of bytes required to hold the symtab vector.
7566
7567 Note that we base it on the count plus 1, since we will null terminate
7568 the vector allocated based on this size. However, the ELF symbol table
7569 always has a dummy entry as symbol #0, so it ends up even. */
7570
7571long
217aa764 7572_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
7573{
7574 long symcount;
7575 long symtab_size;
7576 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
7577
7578 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
7579 symtab_size = (symcount + 1) * (sizeof (asymbol *));
7580 if (symcount > 0)
7581 symtab_size -= sizeof (asymbol *);
252b5132
RH
7582
7583 return symtab_size;
7584}
7585
7586long
217aa764 7587_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
7588{
7589 long symcount;
7590 long symtab_size;
7591 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
7592
7593 if (elf_dynsymtab (abfd) == 0)
7594 {
7595 bfd_set_error (bfd_error_invalid_operation);
7596 return -1;
7597 }
7598
7599 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
7600 symtab_size = (symcount + 1) * (sizeof (asymbol *));
7601 if (symcount > 0)
7602 symtab_size -= sizeof (asymbol *);
252b5132
RH
7603
7604 return symtab_size;
7605}
7606
7607long
217aa764
AM
7608_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
7609 sec_ptr asect)
252b5132
RH
7610{
7611 return (asect->reloc_count + 1) * sizeof (arelent *);
7612}
7613
7614/* Canonicalize the relocs. */
7615
7616long
217aa764
AM
7617_bfd_elf_canonicalize_reloc (bfd *abfd,
7618 sec_ptr section,
7619 arelent **relptr,
7620 asymbol **symbols)
252b5132
RH
7621{
7622 arelent *tblptr;
7623 unsigned int i;
9c5bfbb7 7624 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 7625
b34976b6 7626 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
7627 return -1;
7628
7629 tblptr = section->relocation;
7630 for (i = 0; i < section->reloc_count; i++)
7631 *relptr++ = tblptr++;
7632
7633 *relptr = NULL;
7634
7635 return section->reloc_count;
7636}
7637
7638long
6cee3f79 7639_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 7640{
9c5bfbb7 7641 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 7642 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
7643
7644 if (symcount >= 0)
7645 bfd_get_symcount (abfd) = symcount;
7646 return symcount;
7647}
7648
7649long
217aa764
AM
7650_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
7651 asymbol **allocation)
252b5132 7652{
9c5bfbb7 7653 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 7654 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
7655
7656 if (symcount >= 0)
7657 bfd_get_dynamic_symcount (abfd) = symcount;
7658 return symcount;
252b5132
RH
7659}
7660
8615f3f2
AM
7661/* Return the size required for the dynamic reloc entries. Any loadable
7662 section that was actually installed in the BFD, and has type SHT_REL
7663 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
7664 dynamic reloc section. */
252b5132
RH
7665
7666long
217aa764 7667_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
7668{
7669 long ret;
7670 asection *s;
7671
7672 if (elf_dynsymtab (abfd) == 0)
7673 {
7674 bfd_set_error (bfd_error_invalid_operation);
7675 return -1;
7676 }
7677
7678 ret = sizeof (arelent *);
7679 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 7680 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
7681 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
7682 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 7683 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
7684 * sizeof (arelent *));
7685
7686 return ret;
7687}
7688
8615f3f2
AM
7689/* Canonicalize the dynamic relocation entries. Note that we return the
7690 dynamic relocations as a single block, although they are actually
7691 associated with particular sections; the interface, which was
7692 designed for SunOS style shared libraries, expects that there is only
7693 one set of dynamic relocs. Any loadable section that was actually
7694 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
7695 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
7696
7697long
217aa764
AM
7698_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
7699 arelent **storage,
7700 asymbol **syms)
252b5132 7701{
217aa764 7702 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
7703 asection *s;
7704 long ret;
7705
7706 if (elf_dynsymtab (abfd) == 0)
7707 {
7708 bfd_set_error (bfd_error_invalid_operation);
7709 return -1;
7710 }
7711
7712 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
7713 ret = 0;
7714 for (s = abfd->sections; s != NULL; s = s->next)
7715 {
266b05cf 7716 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
7717 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
7718 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
7719 {
7720 arelent *p;
7721 long count, i;
7722
b34976b6 7723 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 7724 return -1;
eea6121a 7725 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
7726 p = s->relocation;
7727 for (i = 0; i < count; i++)
7728 *storage++ = p++;
7729 ret += count;
7730 }
7731 }
7732
7733 *storage = NULL;
7734
7735 return ret;
7736}
7737\f
7738/* Read in the version information. */
7739
b34976b6 7740bfd_boolean
fc0e6df6 7741_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
7742{
7743 bfd_byte *contents = NULL;
fc0e6df6
PB
7744 unsigned int freeidx = 0;
7745
7746 if (elf_dynverref (abfd) != 0)
7747 {
7748 Elf_Internal_Shdr *hdr;
7749 Elf_External_Verneed *everneed;
7750 Elf_Internal_Verneed *iverneed;
7751 unsigned int i;
d0fb9a8d 7752 bfd_byte *contents_end;
fc0e6df6
PB
7753
7754 hdr = &elf_tdata (abfd)->dynverref_hdr;
7755
601a03ba 7756 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verneed))
d0fb9a8d 7757 {
601a03ba
AM
7758error_return_bad_verref:
7759 (*_bfd_error_handler)
7760 (_("%B: .gnu.version_r invalid entry"), abfd);
7761 bfd_set_error (bfd_error_bad_value);
d0fb9a8d
JJ
7762error_return_verref:
7763 elf_tdata (abfd)->verref = NULL;
7764 elf_tdata (abfd)->cverrefs = 0;
7765 goto error_return;
7766 }
601a03ba
AM
7767
7768 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
7769 if (contents == NULL)
7770 goto error_return_verref;
7771
fc0e6df6
PB
7772 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
7773 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 7774 goto error_return_verref;
fc0e6df6 7775
601a03ba
AM
7776 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
7777 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
7778
7779 if (elf_tdata (abfd)->verref == NULL)
d0fb9a8d
JJ
7780 goto error_return_verref;
7781
7782 BFD_ASSERT (sizeof (Elf_External_Verneed)
7783 == sizeof (Elf_External_Vernaux));
7784 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
7785 everneed = (Elf_External_Verneed *) contents;
7786 iverneed = elf_tdata (abfd)->verref;
7787 for (i = 0; i < hdr->sh_info; i++, iverneed++)
7788 {
7789 Elf_External_Vernaux *evernaux;
7790 Elf_Internal_Vernaux *ivernaux;
7791 unsigned int j;
7792
7793 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
7794
7795 iverneed->vn_bfd = abfd;
7796
7797 iverneed->vn_filename =
7798 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7799 iverneed->vn_file);
7800 if (iverneed->vn_filename == NULL)
601a03ba 7801 goto error_return_bad_verref;
fc0e6df6 7802
d0fb9a8d
JJ
7803 if (iverneed->vn_cnt == 0)
7804 iverneed->vn_auxptr = NULL;
7805 else
7806 {
a50b1753
NC
7807 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
7808 bfd_alloc2 (abfd, iverneed->vn_cnt,
7809 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
7810 if (iverneed->vn_auxptr == NULL)
7811 goto error_return_verref;
7812 }
7813
7814 if (iverneed->vn_aux
7815 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 7816 goto error_return_bad_verref;
fc0e6df6
PB
7817
7818 evernaux = ((Elf_External_Vernaux *)
7819 ((bfd_byte *) everneed + iverneed->vn_aux));
7820 ivernaux = iverneed->vn_auxptr;
7821 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
7822 {
7823 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
7824
7825 ivernaux->vna_nodename =
7826 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7827 ivernaux->vna_name);
7828 if (ivernaux->vna_nodename == NULL)
601a03ba 7829 goto error_return_bad_verref;
fc0e6df6 7830
25ff461f
AM
7831 if (ivernaux->vna_other > freeidx)
7832 freeidx = ivernaux->vna_other;
7833
7834 ivernaux->vna_nextptr = NULL;
7835 if (ivernaux->vna_next == 0)
7836 {
7837 iverneed->vn_cnt = j + 1;
7838 break;
7839 }
fc0e6df6
PB
7840 if (j + 1 < iverneed->vn_cnt)
7841 ivernaux->vna_nextptr = ivernaux + 1;
fc0e6df6 7842
d0fb9a8d
JJ
7843 if (ivernaux->vna_next
7844 > (size_t) (contents_end - (bfd_byte *) evernaux))
601a03ba 7845 goto error_return_bad_verref;
d0fb9a8d 7846
fc0e6df6
PB
7847 evernaux = ((Elf_External_Vernaux *)
7848 ((bfd_byte *) evernaux + ivernaux->vna_next));
fc0e6df6
PB
7849 }
7850
25ff461f
AM
7851 iverneed->vn_nextref = NULL;
7852 if (iverneed->vn_next == 0)
7853 break;
fc0e6df6
PB
7854 if (i + 1 < hdr->sh_info)
7855 iverneed->vn_nextref = iverneed + 1;
fc0e6df6 7856
d0fb9a8d
JJ
7857 if (iverneed->vn_next
7858 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 7859 goto error_return_bad_verref;
d0fb9a8d 7860
fc0e6df6
PB
7861 everneed = ((Elf_External_Verneed *)
7862 ((bfd_byte *) everneed + iverneed->vn_next));
7863 }
25ff461f 7864 elf_tdata (abfd)->cverrefs = i;
fc0e6df6
PB
7865
7866 free (contents);
7867 contents = NULL;
7868 }
252b5132
RH
7869
7870 if (elf_dynverdef (abfd) != 0)
7871 {
7872 Elf_Internal_Shdr *hdr;
7873 Elf_External_Verdef *everdef;
7874 Elf_Internal_Verdef *iverdef;
f631889e
UD
7875 Elf_Internal_Verdef *iverdefarr;
7876 Elf_Internal_Verdef iverdefmem;
252b5132 7877 unsigned int i;
062e2358 7878 unsigned int maxidx;
d0fb9a8d 7879 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
7880
7881 hdr = &elf_tdata (abfd)->dynverdef_hdr;
7882
601a03ba
AM
7883 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
7884 {
7885 error_return_bad_verdef:
7886 (*_bfd_error_handler)
7887 (_("%B: .gnu.version_d invalid entry"), abfd);
7888 bfd_set_error (bfd_error_bad_value);
7889 error_return_verdef:
7890 elf_tdata (abfd)->verdef = NULL;
7891 elf_tdata (abfd)->cverdefs = 0;
7892 goto error_return;
7893 }
7894
a50b1753 7895 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132 7896 if (contents == NULL)
601a03ba 7897 goto error_return_verdef;
252b5132 7898 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 7899 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
601a03ba 7900 goto error_return_verdef;
d0fb9a8d
JJ
7901
7902 BFD_ASSERT (sizeof (Elf_External_Verdef)
7903 >= sizeof (Elf_External_Verdaux));
7904 contents_end_def = contents + hdr->sh_size
7905 - sizeof (Elf_External_Verdef);
7906 contents_end_aux = contents + hdr->sh_size
7907 - sizeof (Elf_External_Verdaux);
7908
f631889e
UD
7909 /* We know the number of entries in the section but not the maximum
7910 index. Therefore we have to run through all entries and find
7911 the maximum. */
252b5132 7912 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
7913 maxidx = 0;
7914 for (i = 0; i < hdr->sh_info; ++i)
7915 {
7916 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7917
601a03ba
AM
7918 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
7919 goto error_return_bad_verdef;
062e2358
AM
7920 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
7921 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 7922
25ff461f
AM
7923 if (iverdefmem.vd_next == 0)
7924 break;
7925
d0fb9a8d
JJ
7926 if (iverdefmem.vd_next
7927 > (size_t) (contents_end_def - (bfd_byte *) everdef))
601a03ba 7928 goto error_return_bad_verdef;
d0fb9a8d 7929
f631889e
UD
7930 everdef = ((Elf_External_Verdef *)
7931 ((bfd_byte *) everdef + iverdefmem.vd_next));
7932 }
7933
fc0e6df6
PB
7934 if (default_imported_symver)
7935 {
7936 if (freeidx > maxidx)
7937 maxidx = ++freeidx;
7938 else
7939 freeidx = ++maxidx;
7940 }
201159ec 7941
601a03ba
AM
7942 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7943 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e 7944 if (elf_tdata (abfd)->verdef == NULL)
601a03ba 7945 goto error_return_verdef;
f631889e
UD
7946
7947 elf_tdata (abfd)->cverdefs = maxidx;
7948
7949 everdef = (Elf_External_Verdef *) contents;
7950 iverdefarr = elf_tdata (abfd)->verdef;
7951 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
7952 {
7953 Elf_External_Verdaux *everdaux;
7954 Elf_Internal_Verdaux *iverdaux;
7955 unsigned int j;
7956
f631889e
UD
7957 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7958
d0fb9a8d 7959 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
601a03ba 7960 goto error_return_bad_verdef;
d0fb9a8d 7961
f631889e 7962 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
595bce75 7963 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
252b5132
RH
7964
7965 iverdef->vd_bfd = abfd;
7966
d0fb9a8d
JJ
7967 if (iverdef->vd_cnt == 0)
7968 iverdef->vd_auxptr = NULL;
7969 else
7970 {
a50b1753
NC
7971 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7972 bfd_alloc2 (abfd, iverdef->vd_cnt,
7973 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7974 if (iverdef->vd_auxptr == NULL)
7975 goto error_return_verdef;
7976 }
7977
7978 if (iverdef->vd_aux
7979 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
601a03ba 7980 goto error_return_bad_verdef;
252b5132
RH
7981
7982 everdaux = ((Elf_External_Verdaux *)
7983 ((bfd_byte *) everdef + iverdef->vd_aux));
7984 iverdaux = iverdef->vd_auxptr;
7985 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
7986 {
7987 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
7988
7989 iverdaux->vda_nodename =
7990 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7991 iverdaux->vda_name);
7992 if (iverdaux->vda_nodename == NULL)
601a03ba 7993 goto error_return_bad_verdef;
252b5132 7994
25ff461f
AM
7995 iverdaux->vda_nextptr = NULL;
7996 if (iverdaux->vda_next == 0)
7997 {
7998 iverdef->vd_cnt = j + 1;
7999 break;
8000 }
252b5132
RH
8001 if (j + 1 < iverdef->vd_cnt)
8002 iverdaux->vda_nextptr = iverdaux + 1;
252b5132 8003
d0fb9a8d
JJ
8004 if (iverdaux->vda_next
8005 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
601a03ba 8006 goto error_return_bad_verdef;
d0fb9a8d 8007
252b5132
RH
8008 everdaux = ((Elf_External_Verdaux *)
8009 ((bfd_byte *) everdaux + iverdaux->vda_next));
8010 }
8011
595bce75 8012 iverdef->vd_nodename = NULL;
d0fb9a8d
JJ
8013 if (iverdef->vd_cnt)
8014 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 8015
25ff461f
AM
8016 iverdef->vd_nextdef = NULL;
8017 if (iverdef->vd_next == 0)
8018 break;
d0fb9a8d 8019 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132 8020 iverdef->vd_nextdef = iverdef + 1;
252b5132
RH
8021
8022 everdef = ((Elf_External_Verdef *)
8023 ((bfd_byte *) everdef + iverdef->vd_next));
8024 }
8025
8026 free (contents);
8027 contents = NULL;
8028 }
fc0e6df6 8029 else if (default_imported_symver)
252b5132 8030 {
fc0e6df6
PB
8031 if (freeidx < 3)
8032 freeidx = 3;
8033 else
8034 freeidx++;
252b5132 8035
a50b1753
NC
8036 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
8037 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 8038 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
8039 goto error_return;
8040
fc0e6df6
PB
8041 elf_tdata (abfd)->cverdefs = freeidx;
8042 }
252b5132 8043
fc0e6df6
PB
8044 /* Create a default version based on the soname. */
8045 if (default_imported_symver)
8046 {
8047 Elf_Internal_Verdef *iverdef;
8048 Elf_Internal_Verdaux *iverdaux;
252b5132 8049
5bb3703f 8050 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
252b5132 8051
fc0e6df6
PB
8052 iverdef->vd_version = VER_DEF_CURRENT;
8053 iverdef->vd_flags = 0;
8054 iverdef->vd_ndx = freeidx;
8055 iverdef->vd_cnt = 1;
252b5132 8056
fc0e6df6 8057 iverdef->vd_bfd = abfd;
252b5132 8058
fc0e6df6
PB
8059 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
8060 if (iverdef->vd_nodename == NULL)
d0fb9a8d 8061 goto error_return_verdef;
fc0e6df6 8062 iverdef->vd_nextdef = NULL;
601a03ba
AM
8063 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
8064 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
d0fb9a8d
JJ
8065 if (iverdef->vd_auxptr == NULL)
8066 goto error_return_verdef;
252b5132 8067
fc0e6df6
PB
8068 iverdaux = iverdef->vd_auxptr;
8069 iverdaux->vda_nodename = iverdef->vd_nodename;
252b5132
RH
8070 }
8071
b34976b6 8072 return TRUE;
252b5132
RH
8073
8074 error_return:
5ed6aba4 8075 if (contents != NULL)
252b5132 8076 free (contents);
b34976b6 8077 return FALSE;
252b5132
RH
8078}
8079\f
8080asymbol *
217aa764 8081_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
8082{
8083 elf_symbol_type *newsym;
8084
201159ec 8085 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof * newsym);
252b5132
RH
8086 if (!newsym)
8087 return NULL;
201159ec
NC
8088 newsym->symbol.the_bfd = abfd;
8089 return &newsym->symbol;
252b5132
RH
8090}
8091
8092void
217aa764
AM
8093_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
8094 asymbol *symbol,
8095 symbol_info *ret)
252b5132
RH
8096{
8097 bfd_symbol_info (symbol, ret);
8098}
8099
8100/* Return whether a symbol name implies a local symbol. Most targets
8101 use this function for the is_local_label_name entry point, but some
8102 override it. */
8103
b34976b6 8104bfd_boolean
217aa764
AM
8105_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
8106 const char *name)
252b5132
RH
8107{
8108 /* Normal local symbols start with ``.L''. */
8109 if (name[0] == '.' && name[1] == 'L')
b34976b6 8110 return TRUE;
252b5132
RH
8111
8112 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
8113 DWARF debugging symbols starting with ``..''. */
8114 if (name[0] == '.' && name[1] == '.')
b34976b6 8115 return TRUE;
252b5132
RH
8116
8117 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
8118 emitting DWARF debugging output. I suspect this is actually a
8119 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
8120 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
8121 underscore to be emitted on some ELF targets). For ease of use,
8122 we treat such symbols as local. */
8123 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 8124 return TRUE;
252b5132 8125
b1fa9dd6
NC
8126 /* Treat assembler generated fake symbols, dollar local labels and
8127 forward-backward labels (aka local labels) as locals.
8128 These labels have the form:
8129
8130 L0^A.* (fake symbols)
8131
8132 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
8133
8134 Versions which start with .L will have already been matched above,
8135 so we only need to match the rest. */
8136 if (name[0] == 'L' && ISDIGIT (name[1]))
8137 {
8138 bfd_boolean ret = FALSE;
8139 const char * p;
8140 char c;
8141
8142 for (p = name + 2; (c = *p); p++)
8143 {
8144 if (c == 1 || c == 2)
8145 {
8146 if (c == 1 && p == name + 2)
8147 /* A fake symbol. */
8148 return TRUE;
8149
8150 /* FIXME: We are being paranoid here and treating symbols like
8151 L0^Bfoo as if there were non-local, on the grounds that the
8152 assembler will never generate them. But can any symbol
8153 containing an ASCII value in the range 1-31 ever be anything
8154 other than some kind of local ? */
8155 ret = TRUE;
8156 }
8157
8158 if (! ISDIGIT (c))
8159 {
8160 ret = FALSE;
8161 break;
8162 }
8163 }
8164 return ret;
8165 }
ffa54770 8166
b34976b6 8167 return FALSE;
252b5132
RH
8168}
8169
8170alent *
217aa764
AM
8171_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
8172 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
8173{
8174 abort ();
8175 return NULL;
8176}
8177
b34976b6 8178bfd_boolean
217aa764
AM
8179_bfd_elf_set_arch_mach (bfd *abfd,
8180 enum bfd_architecture arch,
8181 unsigned long machine)
252b5132
RH
8182{
8183 /* If this isn't the right architecture for this backend, and this
8184 isn't the generic backend, fail. */
8185 if (arch != get_elf_backend_data (abfd)->arch
8186 && arch != bfd_arch_unknown
8187 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 8188 return FALSE;
252b5132
RH
8189
8190 return bfd_default_set_arch_mach (abfd, arch, machine);
8191}
8192
d1fad7c6
NC
8193/* Find the nearest line to a particular section and offset,
8194 for error reporting. */
8195
b34976b6 8196bfd_boolean
217aa764 8197_bfd_elf_find_nearest_line (bfd *abfd,
217aa764 8198 asymbol **symbols,
fb167eb2 8199 asection *section,
217aa764
AM
8200 bfd_vma offset,
8201 const char **filename_ptr,
8202 const char **functionname_ptr,
fb167eb2
AM
8203 unsigned int *line_ptr,
8204 unsigned int *discriminator_ptr)
d1fad7c6 8205{
b34976b6 8206 bfd_boolean found;
d1fad7c6 8207
fb167eb2 8208 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
4e8a9624 8209 filename_ptr, functionname_ptr,
fb167eb2
AM
8210 line_ptr, discriminator_ptr,
8211 dwarf_debug_sections, 0,
e00e8198
AM
8212 &elf_tdata (abfd)->dwarf2_find_line_info)
8213 || _bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
8214 filename_ptr, functionname_ptr,
8215 line_ptr))
d1fad7c6
NC
8216 {
8217 if (!*functionname_ptr)
e00e8198
AM
8218 _bfd_elf_find_function (abfd, symbols, section, offset,
8219 *filename_ptr ? NULL : filename_ptr,
8220 functionname_ptr);
b34976b6 8221 return TRUE;
d1fad7c6
NC
8222 }
8223
8224 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
8225 &found, filename_ptr,
8226 functionname_ptr, line_ptr,
8227 &elf_tdata (abfd)->line_info))
b34976b6 8228 return FALSE;
dc43ada5 8229 if (found && (*functionname_ptr || *line_ptr))
b34976b6 8230 return TRUE;
d1fad7c6
NC
8231
8232 if (symbols == NULL)
b34976b6 8233 return FALSE;
d1fad7c6 8234
e00e8198
AM
8235 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
8236 filename_ptr, functionname_ptr))
b34976b6 8237 return FALSE;
d1fad7c6 8238
252b5132 8239 *line_ptr = 0;
b34976b6 8240 return TRUE;
252b5132
RH
8241}
8242
5420f73d
L
8243/* Find the line for a symbol. */
8244
8245bfd_boolean
8246_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
8247 const char **filename_ptr, unsigned int *line_ptr)
9b8d1a36 8248{
fb167eb2
AM
8249 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
8250 filename_ptr, NULL, line_ptr, NULL,
8251 dwarf_debug_sections, 0,
8252 &elf_tdata (abfd)->dwarf2_find_line_info);
5420f73d
L
8253}
8254
4ab527b0
FF
8255/* After a call to bfd_find_nearest_line, successive calls to
8256 bfd_find_inliner_info can be used to get source information about
8257 each level of function inlining that terminated at the address
8258 passed to bfd_find_nearest_line. Currently this is only supported
8259 for DWARF2 with appropriate DWARF3 extensions. */
8260
8261bfd_boolean
8262_bfd_elf_find_inliner_info (bfd *abfd,
8263 const char **filename_ptr,
8264 const char **functionname_ptr,
8265 unsigned int *line_ptr)
8266{
8267 bfd_boolean found;
8268 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
8269 functionname_ptr, line_ptr,
8270 & elf_tdata (abfd)->dwarf2_find_line_info);
8271 return found;
8272}
8273
252b5132 8274int
a6b96beb 8275_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 8276{
8ded5a0f
AM
8277 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8278 int ret = bed->s->sizeof_ehdr;
252b5132 8279
0e1862bb 8280 if (!bfd_link_relocatable (info))
8ded5a0f 8281 {
12bd6957 8282 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 8283
62d7a5f6
AM
8284 if (phdr_size == (bfd_size_type) -1)
8285 {
8286 struct elf_segment_map *m;
8287
8288 phdr_size = 0;
12bd6957 8289 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62d7a5f6 8290 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 8291
62d7a5f6
AM
8292 if (phdr_size == 0)
8293 phdr_size = get_program_header_size (abfd, info);
8294 }
8ded5a0f 8295
12bd6957 8296 elf_program_header_size (abfd) = phdr_size;
8ded5a0f
AM
8297 ret += phdr_size;
8298 }
8299
252b5132
RH
8300 return ret;
8301}
8302
b34976b6 8303bfd_boolean
217aa764
AM
8304_bfd_elf_set_section_contents (bfd *abfd,
8305 sec_ptr section,
0f867abe 8306 const void *location,
217aa764
AM
8307 file_ptr offset,
8308 bfd_size_type count)
252b5132
RH
8309{
8310 Elf_Internal_Shdr *hdr;
1b6aeedb 8311 file_ptr pos;
252b5132
RH
8312
8313 if (! abfd->output_has_begun
217aa764 8314 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 8315 return FALSE;
252b5132 8316
0ce398f1
L
8317 if (!count)
8318 return TRUE;
8319
252b5132 8320 hdr = &elf_section_data (section)->this_hdr;
0ce398f1
L
8321 if (hdr->sh_offset == (file_ptr) -1)
8322 {
8323 /* We must compress this section. Write output to the buffer. */
8324 unsigned char *contents = hdr->contents;
8325 if ((offset + count) > hdr->sh_size
8326 || (section->flags & SEC_ELF_COMPRESS) == 0
8327 || contents == NULL)
8328 abort ();
8329 memcpy (contents + offset, location, count);
8330 return TRUE;
8331 }
dc810e39
AM
8332 pos = hdr->sh_offset + offset;
8333 if (bfd_seek (abfd, pos, SEEK_SET) != 0
8334 || bfd_bwrite (location, count, abfd) != count)
b34976b6 8335 return FALSE;
252b5132 8336
b34976b6 8337 return TRUE;
252b5132
RH
8338}
8339
8340void
217aa764
AM
8341_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
8342 arelent *cache_ptr ATTRIBUTE_UNUSED,
8343 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
8344{
8345 abort ();
8346}
8347
252b5132
RH
8348/* Try to convert a non-ELF reloc into an ELF one. */
8349
b34976b6 8350bfd_boolean
217aa764 8351_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 8352{
c044fabd 8353 /* Check whether we really have an ELF howto. */
252b5132
RH
8354
8355 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
8356 {
8357 bfd_reloc_code_real_type code;
8358 reloc_howto_type *howto;
8359
8360 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 8361 equivalent ELF reloc. */
252b5132
RH
8362
8363 if (areloc->howto->pc_relative)
8364 {
8365 switch (areloc->howto->bitsize)
8366 {
8367 case 8:
8368 code = BFD_RELOC_8_PCREL;
8369 break;
8370 case 12:
8371 code = BFD_RELOC_12_PCREL;
8372 break;
8373 case 16:
8374 code = BFD_RELOC_16_PCREL;
8375 break;
8376 case 24:
8377 code = BFD_RELOC_24_PCREL;
8378 break;
8379 case 32:
8380 code = BFD_RELOC_32_PCREL;
8381 break;
8382 case 64:
8383 code = BFD_RELOC_64_PCREL;
8384 break;
8385 default:
8386 goto fail;
8387 }
8388
8389 howto = bfd_reloc_type_lookup (abfd, code);
8390
8391 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
8392 {
8393 if (howto->pcrel_offset)
8394 areloc->addend += areloc->address;
8395 else
8396 areloc->addend -= areloc->address; /* addend is unsigned!! */
8397 }
8398 }
8399 else
8400 {
8401 switch (areloc->howto->bitsize)
8402 {
8403 case 8:
8404 code = BFD_RELOC_8;
8405 break;
8406 case 14:
8407 code = BFD_RELOC_14;
8408 break;
8409 case 16:
8410 code = BFD_RELOC_16;
8411 break;
8412 case 26:
8413 code = BFD_RELOC_26;
8414 break;
8415 case 32:
8416 code = BFD_RELOC_32;
8417 break;
8418 case 64:
8419 code = BFD_RELOC_64;
8420 break;
8421 default:
8422 goto fail;
8423 }
8424
8425 howto = bfd_reloc_type_lookup (abfd, code);
8426 }
8427
8428 if (howto)
8429 areloc->howto = howto;
8430 else
8431 goto fail;
8432 }
8433
b34976b6 8434 return TRUE;
252b5132
RH
8435
8436 fail:
8437 (*_bfd_error_handler)
d003868e
AM
8438 (_("%B: unsupported relocation type %s"),
8439 abfd, areloc->howto->name);
252b5132 8440 bfd_set_error (bfd_error_bad_value);
b34976b6 8441 return FALSE;
252b5132
RH
8442}
8443
b34976b6 8444bfd_boolean
217aa764 8445_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132 8446{
d9071b0c
TG
8447 struct elf_obj_tdata *tdata = elf_tdata (abfd);
8448 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
252b5132 8449 {
c0355132 8450 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 8451 _bfd_elf_strtab_free (elf_shstrtab (abfd));
d9071b0c 8452 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
252b5132
RH
8453 }
8454
8455 return _bfd_generic_close_and_cleanup (abfd);
8456}
8457
8458/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
8459 in the relocation's offset. Thus we cannot allow any sort of sanity
8460 range-checking to interfere. There is nothing else to do in processing
8461 this reloc. */
8462
8463bfd_reloc_status_type
217aa764
AM
8464_bfd_elf_rel_vtable_reloc_fn
8465 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 8466 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
8467 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
8468 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
8469{
8470 return bfd_reloc_ok;
8471}
252b5132
RH
8472\f
8473/* Elf core file support. Much of this only works on native
8474 toolchains, since we rely on knowing the
8475 machine-dependent procfs structure in order to pick
c044fabd 8476 out details about the corefile. */
252b5132
RH
8477
8478#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
8479/* Needed for new procfs interface on sparc-solaris. */
8480# define _STRUCTURED_PROC 1
252b5132
RH
8481# include <sys/procfs.h>
8482#endif
8483
261b8d08
PA
8484/* Return a PID that identifies a "thread" for threaded cores, or the
8485 PID of the main process for non-threaded cores. */
252b5132
RH
8486
8487static int
217aa764 8488elfcore_make_pid (bfd *abfd)
252b5132 8489{
261b8d08
PA
8490 int pid;
8491
228e534f 8492 pid = elf_tdata (abfd)->core->lwpid;
261b8d08 8493 if (pid == 0)
228e534f 8494 pid = elf_tdata (abfd)->core->pid;
261b8d08
PA
8495
8496 return pid;
252b5132
RH
8497}
8498
252b5132
RH
8499/* If there isn't a section called NAME, make one, using
8500 data from SECT. Note, this function will generate a
8501 reference to NAME, so you shouldn't deallocate or
c044fabd 8502 overwrite it. */
252b5132 8503
b34976b6 8504static bfd_boolean
217aa764 8505elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 8506{
c044fabd 8507 asection *sect2;
252b5132
RH
8508
8509 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 8510 return TRUE;
252b5132 8511
117ed4f8 8512 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 8513 if (sect2 == NULL)
b34976b6 8514 return FALSE;
252b5132 8515
eea6121a 8516 sect2->size = sect->size;
252b5132 8517 sect2->filepos = sect->filepos;
252b5132 8518 sect2->alignment_power = sect->alignment_power;
b34976b6 8519 return TRUE;
252b5132
RH
8520}
8521
bb0082d6
AM
8522/* Create a pseudosection containing SIZE bytes at FILEPOS. This
8523 actually creates up to two pseudosections:
8524 - For the single-threaded case, a section named NAME, unless
8525 such a section already exists.
8526 - For the multi-threaded case, a section named "NAME/PID", where
8527 PID is elfcore_make_pid (abfd).
8528 Both pseudosections have identical contents. */
b34976b6 8529bfd_boolean
217aa764
AM
8530_bfd_elfcore_make_pseudosection (bfd *abfd,
8531 char *name,
8532 size_t size,
8533 ufile_ptr filepos)
bb0082d6
AM
8534{
8535 char buf[100];
8536 char *threaded_name;
d4c88bbb 8537 size_t len;
bb0082d6
AM
8538 asection *sect;
8539
8540 /* Build the section name. */
8541
8542 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 8543 len = strlen (buf) + 1;
a50b1753 8544 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 8545 if (threaded_name == NULL)
b34976b6 8546 return FALSE;
d4c88bbb 8547 memcpy (threaded_name, buf, len);
bb0082d6 8548
117ed4f8
AM
8549 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
8550 SEC_HAS_CONTENTS);
bb0082d6 8551 if (sect == NULL)
b34976b6 8552 return FALSE;
eea6121a 8553 sect->size = size;
bb0082d6 8554 sect->filepos = filepos;
bb0082d6
AM
8555 sect->alignment_power = 2;
8556
936e320b 8557 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
8558}
8559
252b5132 8560/* prstatus_t exists on:
4a938328 8561 solaris 2.5+
252b5132
RH
8562 linux 2.[01] + glibc
8563 unixware 4.2
8564*/
8565
8566#if defined (HAVE_PRSTATUS_T)
a7b97311 8567
b34976b6 8568static bfd_boolean
217aa764 8569elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 8570{
eea6121a 8571 size_t size;
7ee38065 8572 int offset;
252b5132 8573
4a938328
MS
8574 if (note->descsz == sizeof (prstatus_t))
8575 {
8576 prstatus_t prstat;
252b5132 8577
eea6121a 8578 size = sizeof (prstat.pr_reg);
7ee38065 8579 offset = offsetof (prstatus_t, pr_reg);
4a938328 8580 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 8581
fa49d224
NC
8582 /* Do not overwrite the core signal if it
8583 has already been set by another thread. */
228e534f
AM
8584 if (elf_tdata (abfd)->core->signal == 0)
8585 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
8586 if (elf_tdata (abfd)->core->pid == 0)
8587 elf_tdata (abfd)->core->pid = prstat.pr_pid;
252b5132 8588
4a938328
MS
8589 /* pr_who exists on:
8590 solaris 2.5+
8591 unixware 4.2
8592 pr_who doesn't exist on:
8593 linux 2.[01]
8594 */
252b5132 8595#if defined (HAVE_PRSTATUS_T_PR_WHO)
228e534f 8596 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 8597#else
228e534f 8598 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
252b5132 8599#endif
4a938328 8600 }
7ee38065 8601#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
8602 else if (note->descsz == sizeof (prstatus32_t))
8603 {
8604 /* 64-bit host, 32-bit corefile */
8605 prstatus32_t prstat;
8606
eea6121a 8607 size = sizeof (prstat.pr_reg);
7ee38065 8608 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
8609 memcpy (&prstat, note->descdata, sizeof (prstat));
8610
fa49d224
NC
8611 /* Do not overwrite the core signal if it
8612 has already been set by another thread. */
228e534f
AM
8613 if (elf_tdata (abfd)->core->signal == 0)
8614 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
8615 if (elf_tdata (abfd)->core->pid == 0)
8616 elf_tdata (abfd)->core->pid = prstat.pr_pid;
4a938328
MS
8617
8618 /* pr_who exists on:
8619 solaris 2.5+
8620 unixware 4.2
8621 pr_who doesn't exist on:
8622 linux 2.[01]
8623 */
7ee38065 8624#if defined (HAVE_PRSTATUS32_T_PR_WHO)
228e534f 8625 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 8626#else
228e534f 8627 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
4a938328
MS
8628#endif
8629 }
7ee38065 8630#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
8631 else
8632 {
8633 /* Fail - we don't know how to handle any other
8634 note size (ie. data object type). */
b34976b6 8635 return TRUE;
4a938328 8636 }
252b5132 8637
bb0082d6 8638 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 8639 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 8640 size, note->descpos + offset);
252b5132
RH
8641}
8642#endif /* defined (HAVE_PRSTATUS_T) */
8643
bb0082d6 8644/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 8645static bfd_boolean
217aa764
AM
8646elfcore_make_note_pseudosection (bfd *abfd,
8647 char *name,
8648 Elf_Internal_Note *note)
252b5132 8649{
936e320b
AM
8650 return _bfd_elfcore_make_pseudosection (abfd, name,
8651 note->descsz, note->descpos);
252b5132
RH
8652}
8653
ff08c6bb
JB
8654/* There isn't a consistent prfpregset_t across platforms,
8655 but it doesn't matter, because we don't have to pick this
c044fabd
KH
8656 data structure apart. */
8657
b34976b6 8658static bfd_boolean
217aa764 8659elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8660{
8661 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8662}
8663
ff08c6bb 8664/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 8665 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 8666 literally. */
c044fabd 8667
b34976b6 8668static bfd_boolean
217aa764 8669elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8670{
8671 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8672}
8673
4339cae0
L
8674/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
8675 with a note type of NT_X86_XSTATE. Just include the whole note's
8676 contents literally. */
8677
8678static bfd_boolean
8679elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
8680{
8681 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
8682}
8683
97753bd5
AM
8684static bfd_boolean
8685elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
8686{
8687 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
8688}
8689
89eeb0bc
LM
8690static bfd_boolean
8691elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
8692{
8693 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
8694}
97753bd5 8695
0675e188
UW
8696static bfd_boolean
8697elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
8698{
8699 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
8700}
8701
d7eeb400
MS
8702static bfd_boolean
8703elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
8704{
8705 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
8706}
8707
8708static bfd_boolean
8709elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
8710{
8711 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
8712}
8713
8714static bfd_boolean
8715elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
8716{
8717 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
8718}
8719
8720static bfd_boolean
8721elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
8722{
8723 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
8724}
8725
8726static bfd_boolean
8727elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
8728{
8729 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
8730}
8731
355b81d9
UW
8732static bfd_boolean
8733elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
8734{
8735 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
8736}
8737
8738static bfd_boolean
8739elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
8740{
8741 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
8742}
8743
abb3f6cc
NC
8744static bfd_boolean
8745elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
8746{
8747 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
8748}
8749
4ef9f41a
AA
8750static bfd_boolean
8751elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
8752{
8753 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
8754}
8755
8756static bfd_boolean
8757elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
8758{
8759 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
8760}
8761
faa9a424
UW
8762static bfd_boolean
8763elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
8764{
8765 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
8766}
8767
652451f8
YZ
8768static bfd_boolean
8769elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
8770{
8771 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
8772}
8773
8774static bfd_boolean
8775elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
8776{
8777 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
8778}
8779
8780static bfd_boolean
8781elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
8782{
8783 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
8784}
8785
252b5132 8786#if defined (HAVE_PRPSINFO_T)
4a938328 8787typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 8788#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
8789typedef prpsinfo32_t elfcore_psinfo32_t;
8790#endif
252b5132
RH
8791#endif
8792
8793#if defined (HAVE_PSINFO_T)
4a938328 8794typedef psinfo_t elfcore_psinfo_t;
7ee38065 8795#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
8796typedef psinfo32_t elfcore_psinfo32_t;
8797#endif
252b5132
RH
8798#endif
8799
252b5132
RH
8800/* return a malloc'ed copy of a string at START which is at
8801 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 8802 the copy will always have a terminating '\0'. */
252b5132 8803
936e320b 8804char *
217aa764 8805_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 8806{
dc810e39 8807 char *dups;
a50b1753 8808 char *end = (char *) memchr (start, '\0', max);
dc810e39 8809 size_t len;
252b5132
RH
8810
8811 if (end == NULL)
8812 len = max;
8813 else
8814 len = end - start;
8815
a50b1753 8816 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 8817 if (dups == NULL)
252b5132
RH
8818 return NULL;
8819
dc810e39
AM
8820 memcpy (dups, start, len);
8821 dups[len] = '\0';
252b5132 8822
dc810e39 8823 return dups;
252b5132
RH
8824}
8825
bb0082d6 8826#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 8827static bfd_boolean
217aa764 8828elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 8829{
4a938328
MS
8830 if (note->descsz == sizeof (elfcore_psinfo_t))
8831 {
8832 elfcore_psinfo_t psinfo;
252b5132 8833
7ee38065 8834 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 8835
335e41d4 8836#if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
228e534f 8837 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 8838#endif
228e534f 8839 elf_tdata (abfd)->core->program
936e320b
AM
8840 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
8841 sizeof (psinfo.pr_fname));
252b5132 8842
228e534f 8843 elf_tdata (abfd)->core->command
936e320b
AM
8844 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
8845 sizeof (psinfo.pr_psargs));
4a938328 8846 }
7ee38065 8847#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
8848 else if (note->descsz == sizeof (elfcore_psinfo32_t))
8849 {
8850 /* 64-bit host, 32-bit corefile */
8851 elfcore_psinfo32_t psinfo;
8852
7ee38065 8853 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 8854
335e41d4 8855#if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
228e534f 8856 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 8857#endif
228e534f 8858 elf_tdata (abfd)->core->program
936e320b
AM
8859 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
8860 sizeof (psinfo.pr_fname));
4a938328 8861
228e534f 8862 elf_tdata (abfd)->core->command
936e320b
AM
8863 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
8864 sizeof (psinfo.pr_psargs));
4a938328
MS
8865 }
8866#endif
8867
8868 else
8869 {
8870 /* Fail - we don't know how to handle any other
8871 note size (ie. data object type). */
b34976b6 8872 return TRUE;
4a938328 8873 }
252b5132
RH
8874
8875 /* Note that for some reason, a spurious space is tacked
8876 onto the end of the args in some (at least one anyway)
c044fabd 8877 implementations, so strip it off if it exists. */
252b5132
RH
8878
8879 {
228e534f 8880 char *command = elf_tdata (abfd)->core->command;
252b5132
RH
8881 int n = strlen (command);
8882
8883 if (0 < n && command[n - 1] == ' ')
8884 command[n - 1] = '\0';
8885 }
8886
b34976b6 8887 return TRUE;
252b5132
RH
8888}
8889#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
8890
252b5132 8891#if defined (HAVE_PSTATUS_T)
b34976b6 8892static bfd_boolean
217aa764 8893elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 8894{
f572a39d
AM
8895 if (note->descsz == sizeof (pstatus_t)
8896#if defined (HAVE_PXSTATUS_T)
8897 || note->descsz == sizeof (pxstatus_t)
8898#endif
8899 )
4a938328
MS
8900 {
8901 pstatus_t pstat;
252b5132 8902
4a938328 8903 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 8904
228e534f 8905 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328 8906 }
7ee38065 8907#if defined (HAVE_PSTATUS32_T)
4a938328
MS
8908 else if (note->descsz == sizeof (pstatus32_t))
8909 {
8910 /* 64-bit host, 32-bit corefile */
8911 pstatus32_t pstat;
252b5132 8912
4a938328 8913 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 8914
228e534f 8915 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328
MS
8916 }
8917#endif
252b5132
RH
8918 /* Could grab some more details from the "representative"
8919 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 8920 NT_LWPSTATUS note, presumably. */
252b5132 8921
b34976b6 8922 return TRUE;
252b5132
RH
8923}
8924#endif /* defined (HAVE_PSTATUS_T) */
8925
252b5132 8926#if defined (HAVE_LWPSTATUS_T)
b34976b6 8927static bfd_boolean
217aa764 8928elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
8929{
8930 lwpstatus_t lwpstat;
8931 char buf[100];
c044fabd 8932 char *name;
d4c88bbb 8933 size_t len;
c044fabd 8934 asection *sect;
252b5132 8935
f572a39d
AM
8936 if (note->descsz != sizeof (lwpstat)
8937#if defined (HAVE_LWPXSTATUS_T)
8938 && note->descsz != sizeof (lwpxstatus_t)
8939#endif
8940 )
b34976b6 8941 return TRUE;
252b5132
RH
8942
8943 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
8944
228e534f 8945 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
a1504221
JB
8946 /* Do not overwrite the core signal if it has already been set by
8947 another thread. */
228e534f
AM
8948 if (elf_tdata (abfd)->core->signal == 0)
8949 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
252b5132 8950
c044fabd 8951 /* Make a ".reg/999" section. */
252b5132
RH
8952
8953 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 8954 len = strlen (buf) + 1;
217aa764 8955 name = bfd_alloc (abfd, len);
252b5132 8956 if (name == NULL)
b34976b6 8957 return FALSE;
d4c88bbb 8958 memcpy (name, buf, len);
252b5132 8959
117ed4f8 8960 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8961 if (sect == NULL)
b34976b6 8962 return FALSE;
252b5132
RH
8963
8964#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8965 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
8966 sect->filepos = note->descpos
8967 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
8968#endif
8969
8970#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 8971 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
8972 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
8973#endif
8974
252b5132
RH
8975 sect->alignment_power = 2;
8976
8977 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8978 return FALSE;
252b5132
RH
8979
8980 /* Make a ".reg2/999" section */
8981
8982 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 8983 len = strlen (buf) + 1;
217aa764 8984 name = bfd_alloc (abfd, len);
252b5132 8985 if (name == NULL)
b34976b6 8986 return FALSE;
d4c88bbb 8987 memcpy (name, buf, len);
252b5132 8988
117ed4f8 8989 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8990 if (sect == NULL)
b34976b6 8991 return FALSE;
252b5132
RH
8992
8993#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8994 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
8995 sect->filepos = note->descpos
8996 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
8997#endif
8998
8999#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 9000 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
9001 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
9002#endif
9003
252b5132
RH
9004 sect->alignment_power = 2;
9005
936e320b 9006 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
9007}
9008#endif /* defined (HAVE_LWPSTATUS_T) */
9009
b34976b6 9010static bfd_boolean
217aa764 9011elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
9012{
9013 char buf[30];
c044fabd 9014 char *name;
d4c88bbb 9015 size_t len;
c044fabd 9016 asection *sect;
4a6636fb
PA
9017 int type;
9018 int is_active_thread;
9019 bfd_vma base_addr;
16e9c715 9020
4a6636fb 9021 if (note->descsz < 728)
b34976b6 9022 return TRUE;
16e9c715 9023
4a6636fb
PA
9024 if (! CONST_STRNEQ (note->namedata, "win32"))
9025 return TRUE;
9026
9027 type = bfd_get_32 (abfd, note->descdata);
c044fabd 9028
4a6636fb 9029 switch (type)
16e9c715 9030 {
4a6636fb 9031 case 1 /* NOTE_INFO_PROCESS */:
228e534f 9032 /* FIXME: need to add ->core->command. */
4a6636fb 9033 /* process_info.pid */
228e534f 9034 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
4a6636fb 9035 /* process_info.signal */
228e534f 9036 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 9037 break;
16e9c715 9038
4a6636fb 9039 case 2 /* NOTE_INFO_THREAD */:
16e9c715 9040 /* Make a ".reg/999" section. */
4a6636fb
PA
9041 /* thread_info.tid */
9042 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 9043
d4c88bbb 9044 len = strlen (buf) + 1;
a50b1753 9045 name = (char *) bfd_alloc (abfd, len);
16e9c715 9046 if (name == NULL)
b34976b6 9047 return FALSE;
c044fabd 9048
d4c88bbb 9049 memcpy (name, buf, len);
16e9c715 9050
117ed4f8 9051 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 9052 if (sect == NULL)
b34976b6 9053 return FALSE;
c044fabd 9054
4a6636fb
PA
9055 /* sizeof (thread_info.thread_context) */
9056 sect->size = 716;
9057 /* offsetof (thread_info.thread_context) */
9058 sect->filepos = note->descpos + 12;
16e9c715
NC
9059 sect->alignment_power = 2;
9060
4a6636fb
PA
9061 /* thread_info.is_active_thread */
9062 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
9063
9064 if (is_active_thread)
16e9c715 9065 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9066 return FALSE;
16e9c715
NC
9067 break;
9068
4a6636fb 9069 case 3 /* NOTE_INFO_MODULE */:
16e9c715 9070 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
9071 /* module_info.base_address */
9072 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 9073 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 9074
d4c88bbb 9075 len = strlen (buf) + 1;
a50b1753 9076 name = (char *) bfd_alloc (abfd, len);
16e9c715 9077 if (name == NULL)
b34976b6 9078 return FALSE;
c044fabd 9079
d4c88bbb 9080 memcpy (name, buf, len);
252b5132 9081
117ed4f8 9082 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 9083
16e9c715 9084 if (sect == NULL)
b34976b6 9085 return FALSE;
c044fabd 9086
eea6121a 9087 sect->size = note->descsz;
16e9c715 9088 sect->filepos = note->descpos;
16e9c715
NC
9089 sect->alignment_power = 2;
9090 break;
9091
9092 default:
b34976b6 9093 return TRUE;
16e9c715
NC
9094 }
9095
b34976b6 9096 return TRUE;
16e9c715 9097}
252b5132 9098
b34976b6 9099static bfd_boolean
217aa764 9100elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 9101{
9c5bfbb7 9102 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 9103
252b5132
RH
9104 switch (note->type)
9105 {
9106 default:
b34976b6 9107 return TRUE;
252b5132 9108
252b5132 9109 case NT_PRSTATUS:
bb0082d6
AM
9110 if (bed->elf_backend_grok_prstatus)
9111 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 9112 return TRUE;
bb0082d6 9113#if defined (HAVE_PRSTATUS_T)
252b5132 9114 return elfcore_grok_prstatus (abfd, note);
bb0082d6 9115#else
b34976b6 9116 return TRUE;
252b5132
RH
9117#endif
9118
9119#if defined (HAVE_PSTATUS_T)
9120 case NT_PSTATUS:
9121 return elfcore_grok_pstatus (abfd, note);
9122#endif
9123
9124#if defined (HAVE_LWPSTATUS_T)
9125 case NT_LWPSTATUS:
9126 return elfcore_grok_lwpstatus (abfd, note);
9127#endif
9128
9129 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
9130 return elfcore_grok_prfpreg (abfd, note);
9131
c044fabd 9132 case NT_WIN32PSTATUS:
16e9c715 9133 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 9134
c044fabd 9135 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
9136 if (note->namesz == 6
9137 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
9138 return elfcore_grok_prxfpreg (abfd, note);
9139 else
b34976b6 9140 return TRUE;
ff08c6bb 9141
4339cae0
L
9142 case NT_X86_XSTATE: /* Linux XSAVE extension */
9143 if (note->namesz == 6
9144 && strcmp (note->namedata, "LINUX") == 0)
9145 return elfcore_grok_xstatereg (abfd, note);
97de3545
JB
9146 else if (note->namesz == 8
9147 && strcmp (note->namedata, "FreeBSD") == 0)
9148 return elfcore_grok_xstatereg (abfd, note);
4339cae0
L
9149 else
9150 return TRUE;
9151
97753bd5
AM
9152 case NT_PPC_VMX:
9153 if (note->namesz == 6
9154 && strcmp (note->namedata, "LINUX") == 0)
9155 return elfcore_grok_ppc_vmx (abfd, note);
9156 else
9157 return TRUE;
9158
89eeb0bc
LM
9159 case NT_PPC_VSX:
9160 if (note->namesz == 6
9161 && strcmp (note->namedata, "LINUX") == 0)
9162 return elfcore_grok_ppc_vsx (abfd, note);
9163 else
9164 return TRUE;
9165
0675e188
UW
9166 case NT_S390_HIGH_GPRS:
9167 if (note->namesz == 6
9168 && strcmp (note->namedata, "LINUX") == 0)
9169 return elfcore_grok_s390_high_gprs (abfd, note);
9170 else
9171 return TRUE;
9172
d7eeb400
MS
9173 case NT_S390_TIMER:
9174 if (note->namesz == 6
9175 && strcmp (note->namedata, "LINUX") == 0)
9176 return elfcore_grok_s390_timer (abfd, note);
9177 else
9178 return TRUE;
9179
9180 case NT_S390_TODCMP:
9181 if (note->namesz == 6
9182 && strcmp (note->namedata, "LINUX") == 0)
9183 return elfcore_grok_s390_todcmp (abfd, note);
9184 else
9185 return TRUE;
9186
9187 case NT_S390_TODPREG:
9188 if (note->namesz == 6
9189 && strcmp (note->namedata, "LINUX") == 0)
9190 return elfcore_grok_s390_todpreg (abfd, note);
9191 else
9192 return TRUE;
9193
9194 case NT_S390_CTRS:
9195 if (note->namesz == 6
9196 && strcmp (note->namedata, "LINUX") == 0)
9197 return elfcore_grok_s390_ctrs (abfd, note);
9198 else
9199 return TRUE;
9200
9201 case NT_S390_PREFIX:
9202 if (note->namesz == 6
9203 && strcmp (note->namedata, "LINUX") == 0)
9204 return elfcore_grok_s390_prefix (abfd, note);
9205 else
9206 return TRUE;
9207
355b81d9
UW
9208 case NT_S390_LAST_BREAK:
9209 if (note->namesz == 6
9210 && strcmp (note->namedata, "LINUX") == 0)
9211 return elfcore_grok_s390_last_break (abfd, note);
9212 else
9213 return TRUE;
9214
9215 case NT_S390_SYSTEM_CALL:
9216 if (note->namesz == 6
9217 && strcmp (note->namedata, "LINUX") == 0)
9218 return elfcore_grok_s390_system_call (abfd, note);
9219 else
9220 return TRUE;
9221
abb3f6cc
NC
9222 case NT_S390_TDB:
9223 if (note->namesz == 6
9224 && strcmp (note->namedata, "LINUX") == 0)
9225 return elfcore_grok_s390_tdb (abfd, note);
9226 else
9227 return TRUE;
9228
4ef9f41a
AA
9229 case NT_S390_VXRS_LOW:
9230 if (note->namesz == 6
9231 && strcmp (note->namedata, "LINUX") == 0)
9232 return elfcore_grok_s390_vxrs_low (abfd, note);
9233 else
9234 return TRUE;
9235
9236 case NT_S390_VXRS_HIGH:
9237 if (note->namesz == 6
9238 && strcmp (note->namedata, "LINUX") == 0)
9239 return elfcore_grok_s390_vxrs_high (abfd, note);
9240 else
9241 return TRUE;
9242
faa9a424
UW
9243 case NT_ARM_VFP:
9244 if (note->namesz == 6
9245 && strcmp (note->namedata, "LINUX") == 0)
9246 return elfcore_grok_arm_vfp (abfd, note);
9247 else
9248 return TRUE;
9249
652451f8
YZ
9250 case NT_ARM_TLS:
9251 if (note->namesz == 6
9252 && strcmp (note->namedata, "LINUX") == 0)
9253 return elfcore_grok_aarch_tls (abfd, note);
9254 else
9255 return TRUE;
9256
9257 case NT_ARM_HW_BREAK:
9258 if (note->namesz == 6
9259 && strcmp (note->namedata, "LINUX") == 0)
9260 return elfcore_grok_aarch_hw_break (abfd, note);
9261 else
9262 return TRUE;
9263
9264 case NT_ARM_HW_WATCH:
9265 if (note->namesz == 6
9266 && strcmp (note->namedata, "LINUX") == 0)
9267 return elfcore_grok_aarch_hw_watch (abfd, note);
9268 else
9269 return TRUE;
9270
252b5132
RH
9271 case NT_PRPSINFO:
9272 case NT_PSINFO:
bb0082d6
AM
9273 if (bed->elf_backend_grok_psinfo)
9274 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 9275 return TRUE;
bb0082d6 9276#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 9277 return elfcore_grok_psinfo (abfd, note);
bb0082d6 9278#else
b34976b6 9279 return TRUE;
252b5132 9280#endif
3333a7c3
RM
9281
9282 case NT_AUXV:
9283 {
117ed4f8
AM
9284 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9285 SEC_HAS_CONTENTS);
3333a7c3
RM
9286
9287 if (sect == NULL)
9288 return FALSE;
eea6121a 9289 sect->size = note->descsz;
3333a7c3 9290 sect->filepos = note->descpos;
3333a7c3
RM
9291 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9292
9293 return TRUE;
9294 }
9015683b 9295
451b7c33
TT
9296 case NT_FILE:
9297 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
9298 note);
9299
9015683b
TT
9300 case NT_SIGINFO:
9301 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
9302 note);
5b2c414d
JB
9303
9304 case NT_FREEBSD_THRMISC:
9305 if (note->namesz == 8
9306 && strcmp (note->namedata, "FreeBSD") == 0)
9307 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
9308 else
9309 return TRUE;
252b5132
RH
9310 }
9311}
9312
718175fa
JK
9313static bfd_boolean
9314elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
9315{
c74f7d1c 9316 struct bfd_build_id* build_id;
30e8ee25
AM
9317
9318 if (note->descsz == 0)
9319 return FALSE;
9320
c74f7d1c
JT
9321 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
9322 if (build_id == NULL)
718175fa
JK
9323 return FALSE;
9324
c74f7d1c
JT
9325 build_id->size = note->descsz;
9326 memcpy (build_id->data, note->descdata, note->descsz);
9327 abfd->build_id = build_id;
718175fa
JK
9328
9329 return TRUE;
9330}
9331
9332static bfd_boolean
9333elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
9334{
9335 switch (note->type)
9336 {
9337 default:
9338 return TRUE;
9339
9340 case NT_GNU_BUILD_ID:
9341 return elfobj_grok_gnu_build_id (abfd, note);
9342 }
9343}
9344
e21e5835
NC
9345static bfd_boolean
9346elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
9347{
9348 struct sdt_note *cur =
9349 (struct sdt_note *) bfd_alloc (abfd, sizeof (struct sdt_note)
9350 + note->descsz);
9351
9352 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
9353 cur->size = (bfd_size_type) note->descsz;
9354 memcpy (cur->data, note->descdata, note->descsz);
9355
9356 elf_tdata (abfd)->sdt_note_head = cur;
9357
9358 return TRUE;
9359}
9360
9361static bfd_boolean
9362elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
9363{
9364 switch (note->type)
9365 {
9366 case NT_STAPSDT:
9367 return elfobj_grok_stapsdt_note_1 (abfd, note);
9368
9369 default:
9370 return TRUE;
9371 }
9372}
9373
b34976b6 9374static bfd_boolean
217aa764 9375elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
9376{
9377 char *cp;
9378
9379 cp = strchr (note->namedata, '@');
9380 if (cp != NULL)
9381 {
d2b64500 9382 *lwpidp = atoi(cp + 1);
b34976b6 9383 return TRUE;
50b2bdb7 9384 }
b34976b6 9385 return FALSE;
50b2bdb7
AM
9386}
9387
b34976b6 9388static bfd_boolean
217aa764 9389elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 9390{
50b2bdb7 9391 /* Signal number at offset 0x08. */
228e534f 9392 elf_tdata (abfd)->core->signal
50b2bdb7
AM
9393 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
9394
9395 /* Process ID at offset 0x50. */
228e534f 9396 elf_tdata (abfd)->core->pid
50b2bdb7
AM
9397 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
9398
9399 /* Command name at 0x7c (max 32 bytes, including nul). */
228e534f 9400 elf_tdata (abfd)->core->command
50b2bdb7
AM
9401 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
9402
7720ba9f
MK
9403 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
9404 note);
50b2bdb7
AM
9405}
9406
b34976b6 9407static bfd_boolean
217aa764 9408elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
9409{
9410 int lwp;
9411
9412 if (elfcore_netbsd_get_lwpid (note, &lwp))
228e534f 9413 elf_tdata (abfd)->core->lwpid = lwp;
50b2bdb7 9414
b4db1224 9415 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
9416 {
9417 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
9418 find this note before any of the others, which is fine,
9419 since the kernel writes this note out first when it
9420 creates a core file. */
47d9a591 9421
50b2bdb7
AM
9422 return elfcore_grok_netbsd_procinfo (abfd, note);
9423 }
9424
b4db1224
JT
9425 /* As of Jan 2002 there are no other machine-independent notes
9426 defined for NetBSD core files. If the note type is less
9427 than the start of the machine-dependent note types, we don't
9428 understand it. */
47d9a591 9429
b4db1224 9430 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 9431 return TRUE;
50b2bdb7
AM
9432
9433
9434 switch (bfd_get_arch (abfd))
9435 {
08a40648
AM
9436 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
9437 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
9438
9439 case bfd_arch_alpha:
9440 case bfd_arch_sparc:
9441 switch (note->type)
08a40648
AM
9442 {
9443 case NT_NETBSDCORE_FIRSTMACH+0:
9444 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 9445
08a40648
AM
9446 case NT_NETBSDCORE_FIRSTMACH+2:
9447 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 9448
08a40648
AM
9449 default:
9450 return TRUE;
9451 }
50b2bdb7 9452
08a40648
AM
9453 /* On all other arch's, PT_GETREGS == mach+1 and
9454 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
9455
9456 default:
9457 switch (note->type)
08a40648
AM
9458 {
9459 case NT_NETBSDCORE_FIRSTMACH+1:
9460 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 9461
08a40648
AM
9462 case NT_NETBSDCORE_FIRSTMACH+3:
9463 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 9464
08a40648
AM
9465 default:
9466 return TRUE;
9467 }
50b2bdb7
AM
9468 }
9469 /* NOTREACHED */
9470}
9471
67cc5033
MK
9472static bfd_boolean
9473elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
9474{
9475 /* Signal number at offset 0x08. */
228e534f 9476 elf_tdata (abfd)->core->signal
67cc5033
MK
9477 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
9478
9479 /* Process ID at offset 0x20. */
228e534f 9480 elf_tdata (abfd)->core->pid
67cc5033
MK
9481 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
9482
9483 /* Command name at 0x48 (max 32 bytes, including nul). */
228e534f 9484 elf_tdata (abfd)->core->command
67cc5033
MK
9485 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
9486
9487 return TRUE;
9488}
9489
9490static bfd_boolean
9491elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
9492{
9493 if (note->type == NT_OPENBSD_PROCINFO)
9494 return elfcore_grok_openbsd_procinfo (abfd, note);
9495
9496 if (note->type == NT_OPENBSD_REGS)
9497 return elfcore_make_note_pseudosection (abfd, ".reg", note);
9498
9499 if (note->type == NT_OPENBSD_FPREGS)
9500 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9501
9502 if (note->type == NT_OPENBSD_XFPREGS)
9503 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9504
9505 if (note->type == NT_OPENBSD_AUXV)
9506 {
9507 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9508 SEC_HAS_CONTENTS);
9509
9510 if (sect == NULL)
9511 return FALSE;
9512 sect->size = note->descsz;
9513 sect->filepos = note->descpos;
9514 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9515
9516 return TRUE;
9517 }
9518
9519 if (note->type == NT_OPENBSD_WCOOKIE)
9520 {
9521 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
9522 SEC_HAS_CONTENTS);
9523
9524 if (sect == NULL)
9525 return FALSE;
9526 sect->size = note->descsz;
9527 sect->filepos = note->descpos;
9528 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9529
9530 return TRUE;
9531 }
9532
9533 return TRUE;
9534}
9535
07c6e936 9536static bfd_boolean
d3fd4074 9537elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
9538{
9539 void *ddata = note->descdata;
9540 char buf[100];
9541 char *name;
9542 asection *sect;
f8843e87
AM
9543 short sig;
9544 unsigned flags;
07c6e936
NC
9545
9546 /* nto_procfs_status 'pid' field is at offset 0. */
228e534f 9547 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
07c6e936 9548
f8843e87
AM
9549 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
9550 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
9551
9552 /* nto_procfs_status 'flags' field is at offset 8. */
9553 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
9554
9555 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
9556 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
9557 {
228e534f
AM
9558 elf_tdata (abfd)->core->signal = sig;
9559 elf_tdata (abfd)->core->lwpid = *tid;
f8843e87 9560 }
07c6e936 9561
f8843e87
AM
9562 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
9563 do not come from signals so we make sure we set the current
9564 thread just in case. */
9565 if (flags & 0x00000080)
228e534f 9566 elf_tdata (abfd)->core->lwpid = *tid;
07c6e936
NC
9567
9568 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 9569 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 9570
a50b1753 9571 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
9572 if (name == NULL)
9573 return FALSE;
9574 strcpy (name, buf);
9575
117ed4f8 9576 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
9577 if (sect == NULL)
9578 return FALSE;
9579
eea6121a 9580 sect->size = note->descsz;
07c6e936 9581 sect->filepos = note->descpos;
07c6e936
NC
9582 sect->alignment_power = 2;
9583
9584 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
9585}
9586
9587static bfd_boolean
d69f560c
KW
9588elfcore_grok_nto_regs (bfd *abfd,
9589 Elf_Internal_Note *note,
d3fd4074 9590 long tid,
d69f560c 9591 char *base)
07c6e936
NC
9592{
9593 char buf[100];
9594 char *name;
9595 asection *sect;
9596
d69f560c 9597 /* Make a "(base)/%d" section. */
d3fd4074 9598 sprintf (buf, "%s/%ld", base, tid);
07c6e936 9599
a50b1753 9600 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
9601 if (name == NULL)
9602 return FALSE;
9603 strcpy (name, buf);
9604
117ed4f8 9605 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
9606 if (sect == NULL)
9607 return FALSE;
9608
eea6121a 9609 sect->size = note->descsz;
07c6e936 9610 sect->filepos = note->descpos;
07c6e936
NC
9611 sect->alignment_power = 2;
9612
f8843e87 9613 /* This is the current thread. */
228e534f 9614 if (elf_tdata (abfd)->core->lwpid == tid)
d69f560c 9615 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
9616
9617 return TRUE;
07c6e936
NC
9618}
9619
9620#define BFD_QNT_CORE_INFO 7
9621#define BFD_QNT_CORE_STATUS 8
9622#define BFD_QNT_CORE_GREG 9
9623#define BFD_QNT_CORE_FPREG 10
9624
9625static bfd_boolean
217aa764 9626elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
9627{
9628 /* Every GREG section has a STATUS section before it. Store the
811072d8 9629 tid from the previous call to pass down to the next gregs
07c6e936 9630 function. */
d3fd4074 9631 static long tid = 1;
07c6e936
NC
9632
9633 switch (note->type)
9634 {
d69f560c
KW
9635 case BFD_QNT_CORE_INFO:
9636 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
9637 case BFD_QNT_CORE_STATUS:
9638 return elfcore_grok_nto_status (abfd, note, &tid);
9639 case BFD_QNT_CORE_GREG:
9640 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
9641 case BFD_QNT_CORE_FPREG:
9642 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
9643 default:
9644 return TRUE;
07c6e936
NC
9645 }
9646}
9647
b15fa79e
AM
9648static bfd_boolean
9649elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
9650{
9651 char *name;
9652 asection *sect;
9653 size_t len;
9654
9655 /* Use note name as section name. */
9656 len = note->namesz;
a50b1753 9657 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
9658 if (name == NULL)
9659 return FALSE;
9660 memcpy (name, note->namedata, len);
9661 name[len - 1] = '\0';
9662
9663 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
9664 if (sect == NULL)
9665 return FALSE;
9666
9667 sect->size = note->descsz;
9668 sect->filepos = note->descpos;
9669 sect->alignment_power = 1;
9670
9671 return TRUE;
9672}
9673
7c76fa91
MS
9674/* Function: elfcore_write_note
9675
47d9a591 9676 Inputs:
a39f3346 9677 buffer to hold note, and current size of buffer
7c76fa91
MS
9678 name of note
9679 type of note
9680 data for note
9681 size of data for note
9682
a39f3346
AM
9683 Writes note to end of buffer. ELF64 notes are written exactly as
9684 for ELF32, despite the current (as of 2006) ELF gabi specifying
9685 that they ought to have 8-byte namesz and descsz field, and have
9686 8-byte alignment. Other writers, eg. Linux kernel, do the same.
9687
7c76fa91 9688 Return:
a39f3346 9689 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
9690
9691char *
a39f3346 9692elfcore_write_note (bfd *abfd,
217aa764 9693 char *buf,
a39f3346 9694 int *bufsiz,
217aa764 9695 const char *name,
a39f3346 9696 int type,
217aa764 9697 const void *input,
a39f3346 9698 int size)
7c76fa91
MS
9699{
9700 Elf_External_Note *xnp;
d4c88bbb 9701 size_t namesz;
d4c88bbb 9702 size_t newspace;
a39f3346 9703 char *dest;
7c76fa91 9704
d4c88bbb 9705 namesz = 0;
d4c88bbb 9706 if (name != NULL)
a39f3346 9707 namesz = strlen (name) + 1;
d4c88bbb 9708
a39f3346 9709 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 9710
a50b1753 9711 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
9712 if (buf == NULL)
9713 return buf;
a39f3346 9714 dest = buf + *bufsiz;
7c76fa91
MS
9715 *bufsiz += newspace;
9716 xnp = (Elf_External_Note *) dest;
9717 H_PUT_32 (abfd, namesz, xnp->namesz);
9718 H_PUT_32 (abfd, size, xnp->descsz);
9719 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
9720 dest = xnp->name;
9721 if (name != NULL)
9722 {
9723 memcpy (dest, name, namesz);
9724 dest += namesz;
a39f3346 9725 while (namesz & 3)
d4c88bbb
AM
9726 {
9727 *dest++ = '\0';
a39f3346 9728 ++namesz;
d4c88bbb
AM
9729 }
9730 }
9731 memcpy (dest, input, size);
a39f3346
AM
9732 dest += size;
9733 while (size & 3)
9734 {
9735 *dest++ = '\0';
9736 ++size;
9737 }
9738 return buf;
7c76fa91
MS
9739}
9740
7c76fa91 9741char *
217aa764
AM
9742elfcore_write_prpsinfo (bfd *abfd,
9743 char *buf,
9744 int *bufsiz,
9745 const char *fname,
9746 const char *psargs)
7c76fa91 9747{
183e98be
AM
9748 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9749
9750 if (bed->elf_backend_write_core_note != NULL)
9751 {
9752 char *ret;
9753 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
9754 NT_PRPSINFO, fname, psargs);
9755 if (ret != NULL)
9756 return ret;
9757 }
7c76fa91 9758
1f20dca5 9759#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
183e98be
AM
9760#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
9761 if (bed->s->elfclass == ELFCLASS32)
9762 {
9763#if defined (HAVE_PSINFO32_T)
9764 psinfo32_t data;
9765 int note_type = NT_PSINFO;
9766#else
9767 prpsinfo32_t data;
9768 int note_type = NT_PRPSINFO;
9769#endif
9770
9771 memset (&data, 0, sizeof (data));
9772 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
9773 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
9774 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 9775 "CORE", note_type, &data, sizeof (data));
183e98be
AM
9776 }
9777 else
9778#endif
9779 {
7c76fa91 9780#if defined (HAVE_PSINFO_T)
183e98be
AM
9781 psinfo_t data;
9782 int note_type = NT_PSINFO;
7c76fa91 9783#else
183e98be
AM
9784 prpsinfo_t data;
9785 int note_type = NT_PRPSINFO;
7c76fa91
MS
9786#endif
9787
183e98be
AM
9788 memset (&data, 0, sizeof (data));
9789 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
9790 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
9791 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 9792 "CORE", note_type, &data, sizeof (data));
183e98be 9793 }
7c76fa91
MS
9794#endif /* PSINFO_T or PRPSINFO_T */
9795
1f20dca5
UW
9796 free (buf);
9797 return NULL;
9798}
9799
70a38d42
SDJ
9800char *
9801elfcore_write_linux_prpsinfo32
9802 (bfd *abfd, char *buf, int *bufsiz,
9803 const struct elf_internal_linux_prpsinfo *prpsinfo)
9804{
9805 struct elf_external_linux_prpsinfo32 data;
9806
aeb70569 9807 swap_linux_prpsinfo32_out (abfd, prpsinfo, &data);
70a38d42
SDJ
9808 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
9809 &data, sizeof (data));
9810}
9811
9812char *
9813elfcore_write_linux_prpsinfo64
9814 (bfd *abfd, char *buf, int *bufsiz,
9815 const struct elf_internal_linux_prpsinfo *prpsinfo)
9816{
9817 struct elf_external_linux_prpsinfo64 data;
9818
aeb70569 9819 swap_linux_prpsinfo64_out (abfd, prpsinfo, &data);
70a38d42
SDJ
9820 return elfcore_write_note (abfd, buf, bufsiz,
9821 "CORE", NT_PRPSINFO, &data, sizeof (data));
9822}
9823
7c76fa91 9824char *
217aa764
AM
9825elfcore_write_prstatus (bfd *abfd,
9826 char *buf,
9827 int *bufsiz,
9828 long pid,
9829 int cursig,
9830 const void *gregs)
7c76fa91 9831{
183e98be 9832 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 9833
183e98be
AM
9834 if (bed->elf_backend_write_core_note != NULL)
9835 {
9836 char *ret;
9837 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
9838 NT_PRSTATUS,
9839 pid, cursig, gregs);
9840 if (ret != NULL)
9841 return ret;
9842 }
9843
1f20dca5 9844#if defined (HAVE_PRSTATUS_T)
183e98be
AM
9845#if defined (HAVE_PRSTATUS32_T)
9846 if (bed->s->elfclass == ELFCLASS32)
9847 {
9848 prstatus32_t prstat;
9849
9850 memset (&prstat, 0, sizeof (prstat));
9851 prstat.pr_pid = pid;
9852 prstat.pr_cursig = cursig;
9853 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 9854 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
9855 NT_PRSTATUS, &prstat, sizeof (prstat));
9856 }
9857 else
9858#endif
9859 {
9860 prstatus_t prstat;
9861
9862 memset (&prstat, 0, sizeof (prstat));
9863 prstat.pr_pid = pid;
9864 prstat.pr_cursig = cursig;
9865 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 9866 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
9867 NT_PRSTATUS, &prstat, sizeof (prstat));
9868 }
7c76fa91
MS
9869#endif /* HAVE_PRSTATUS_T */
9870
1f20dca5
UW
9871 free (buf);
9872 return NULL;
9873}
9874
51316059
MS
9875#if defined (HAVE_LWPSTATUS_T)
9876char *
217aa764
AM
9877elfcore_write_lwpstatus (bfd *abfd,
9878 char *buf,
9879 int *bufsiz,
9880 long pid,
9881 int cursig,
9882 const void *gregs)
51316059
MS
9883{
9884 lwpstatus_t lwpstat;
183e98be 9885 const char *note_name = "CORE";
51316059
MS
9886
9887 memset (&lwpstat, 0, sizeof (lwpstat));
9888 lwpstat.pr_lwpid = pid >> 16;
9889 lwpstat.pr_cursig = cursig;
9890#if defined (HAVE_LWPSTATUS_T_PR_REG)
d1e8523e 9891 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
51316059
MS
9892#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
9893#if !defined(gregs)
9894 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
9895 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
9896#else
9897 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
9898 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
9899#endif
9900#endif
47d9a591 9901 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
9902 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
9903}
9904#endif /* HAVE_LWPSTATUS_T */
9905
7c76fa91
MS
9906#if defined (HAVE_PSTATUS_T)
9907char *
217aa764
AM
9908elfcore_write_pstatus (bfd *abfd,
9909 char *buf,
9910 int *bufsiz,
9911 long pid,
6c10990d
NC
9912 int cursig ATTRIBUTE_UNUSED,
9913 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 9914{
183e98be
AM
9915 const char *note_name = "CORE";
9916#if defined (HAVE_PSTATUS32_T)
9917 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 9918
183e98be
AM
9919 if (bed->s->elfclass == ELFCLASS32)
9920 {
9921 pstatus32_t pstat;
9922
9923 memset (&pstat, 0, sizeof (pstat));
9924 pstat.pr_pid = pid & 0xffff;
9925 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
9926 NT_PSTATUS, &pstat, sizeof (pstat));
9927 return buf;
9928 }
9929 else
9930#endif
9931 {
9932 pstatus_t pstat;
9933
9934 memset (&pstat, 0, sizeof (pstat));
9935 pstat.pr_pid = pid & 0xffff;
9936 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
9937 NT_PSTATUS, &pstat, sizeof (pstat));
9938 return buf;
9939 }
7c76fa91
MS
9940}
9941#endif /* HAVE_PSTATUS_T */
9942
9943char *
217aa764
AM
9944elfcore_write_prfpreg (bfd *abfd,
9945 char *buf,
9946 int *bufsiz,
9947 const void *fpregs,
9948 int size)
7c76fa91 9949{
183e98be 9950 const char *note_name = "CORE";
47d9a591 9951 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
9952 note_name, NT_FPREGSET, fpregs, size);
9953}
9954
9955char *
217aa764
AM
9956elfcore_write_prxfpreg (bfd *abfd,
9957 char *buf,
9958 int *bufsiz,
9959 const void *xfpregs,
9960 int size)
7c76fa91
MS
9961{
9962 char *note_name = "LINUX";
47d9a591 9963 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
9964 note_name, NT_PRXFPREG, xfpregs, size);
9965}
9966
4339cae0
L
9967char *
9968elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
9969 const void *xfpregs, int size)
9970{
97de3545
JB
9971 char *note_name;
9972 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
9973 note_name = "FreeBSD";
9974 else
9975 note_name = "LINUX";
4339cae0
L
9976 return elfcore_write_note (abfd, buf, bufsiz,
9977 note_name, NT_X86_XSTATE, xfpregs, size);
9978}
9979
97753bd5
AM
9980char *
9981elfcore_write_ppc_vmx (bfd *abfd,
9982 char *buf,
9983 int *bufsiz,
9984 const void *ppc_vmx,
9985 int size)
9986{
9987 char *note_name = "LINUX";
9988 return elfcore_write_note (abfd, buf, bufsiz,
9989 note_name, NT_PPC_VMX, ppc_vmx, size);
9990}
9991
89eeb0bc
LM
9992char *
9993elfcore_write_ppc_vsx (bfd *abfd,
9994 char *buf,
9995 int *bufsiz,
9996 const void *ppc_vsx,
9997 int size)
9998{
9999 char *note_name = "LINUX";
10000 return elfcore_write_note (abfd, buf, bufsiz,
10001 note_name, NT_PPC_VSX, ppc_vsx, size);
10002}
10003
0675e188
UW
10004static char *
10005elfcore_write_s390_high_gprs (bfd *abfd,
10006 char *buf,
10007 int *bufsiz,
10008 const void *s390_high_gprs,
10009 int size)
10010{
10011 char *note_name = "LINUX";
10012 return elfcore_write_note (abfd, buf, bufsiz,
10013 note_name, NT_S390_HIGH_GPRS,
10014 s390_high_gprs, size);
10015}
10016
d7eeb400
MS
10017char *
10018elfcore_write_s390_timer (bfd *abfd,
10019 char *buf,
10020 int *bufsiz,
10021 const void *s390_timer,
10022 int size)
10023{
10024 char *note_name = "LINUX";
10025 return elfcore_write_note (abfd, buf, bufsiz,
10026 note_name, NT_S390_TIMER, s390_timer, size);
10027}
10028
10029char *
10030elfcore_write_s390_todcmp (bfd *abfd,
10031 char *buf,
10032 int *bufsiz,
10033 const void *s390_todcmp,
10034 int size)
10035{
10036 char *note_name = "LINUX";
10037 return elfcore_write_note (abfd, buf, bufsiz,
10038 note_name, NT_S390_TODCMP, s390_todcmp, size);
10039}
10040
10041char *
10042elfcore_write_s390_todpreg (bfd *abfd,
10043 char *buf,
10044 int *bufsiz,
10045 const void *s390_todpreg,
10046 int size)
10047{
10048 char *note_name = "LINUX";
10049 return elfcore_write_note (abfd, buf, bufsiz,
10050 note_name, NT_S390_TODPREG, s390_todpreg, size);
10051}
10052
10053char *
10054elfcore_write_s390_ctrs (bfd *abfd,
10055 char *buf,
10056 int *bufsiz,
10057 const void *s390_ctrs,
10058 int size)
10059{
10060 char *note_name = "LINUX";
10061 return elfcore_write_note (abfd, buf, bufsiz,
10062 note_name, NT_S390_CTRS, s390_ctrs, size);
10063}
10064
10065char *
10066elfcore_write_s390_prefix (bfd *abfd,
10067 char *buf,
10068 int *bufsiz,
10069 const void *s390_prefix,
10070 int size)
10071{
10072 char *note_name = "LINUX";
10073 return elfcore_write_note (abfd, buf, bufsiz,
10074 note_name, NT_S390_PREFIX, s390_prefix, size);
10075}
10076
355b81d9
UW
10077char *
10078elfcore_write_s390_last_break (bfd *abfd,
10079 char *buf,
10080 int *bufsiz,
10081 const void *s390_last_break,
10082 int size)
10083{
10084 char *note_name = "LINUX";
10085 return elfcore_write_note (abfd, buf, bufsiz,
10086 note_name, NT_S390_LAST_BREAK,
10087 s390_last_break, size);
10088}
10089
10090char *
10091elfcore_write_s390_system_call (bfd *abfd,
10092 char *buf,
10093 int *bufsiz,
10094 const void *s390_system_call,
10095 int size)
10096{
10097 char *note_name = "LINUX";
10098 return elfcore_write_note (abfd, buf, bufsiz,
10099 note_name, NT_S390_SYSTEM_CALL,
10100 s390_system_call, size);
10101}
10102
abb3f6cc
NC
10103char *
10104elfcore_write_s390_tdb (bfd *abfd,
10105 char *buf,
10106 int *bufsiz,
10107 const void *s390_tdb,
10108 int size)
10109{
10110 char *note_name = "LINUX";
10111 return elfcore_write_note (abfd, buf, bufsiz,
10112 note_name, NT_S390_TDB, s390_tdb, size);
10113}
10114
4ef9f41a
AA
10115char *
10116elfcore_write_s390_vxrs_low (bfd *abfd,
10117 char *buf,
10118 int *bufsiz,
10119 const void *s390_vxrs_low,
10120 int size)
10121{
10122 char *note_name = "LINUX";
10123 return elfcore_write_note (abfd, buf, bufsiz,
10124 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
10125}
10126
10127char *
10128elfcore_write_s390_vxrs_high (bfd *abfd,
10129 char *buf,
10130 int *bufsiz,
10131 const void *s390_vxrs_high,
10132 int size)
10133{
10134 char *note_name = "LINUX";
10135 return elfcore_write_note (abfd, buf, bufsiz,
10136 note_name, NT_S390_VXRS_HIGH,
10137 s390_vxrs_high, size);
10138}
10139
faa9a424
UW
10140char *
10141elfcore_write_arm_vfp (bfd *abfd,
10142 char *buf,
10143 int *bufsiz,
10144 const void *arm_vfp,
10145 int size)
10146{
10147 char *note_name = "LINUX";
10148 return elfcore_write_note (abfd, buf, bufsiz,
10149 note_name, NT_ARM_VFP, arm_vfp, size);
10150}
10151
652451f8
YZ
10152char *
10153elfcore_write_aarch_tls (bfd *abfd,
10154 char *buf,
10155 int *bufsiz,
10156 const void *aarch_tls,
10157 int size)
10158{
10159 char *note_name = "LINUX";
10160 return elfcore_write_note (abfd, buf, bufsiz,
10161 note_name, NT_ARM_TLS, aarch_tls, size);
10162}
10163
10164char *
10165elfcore_write_aarch_hw_break (bfd *abfd,
10166 char *buf,
10167 int *bufsiz,
10168 const void *aarch_hw_break,
10169 int size)
10170{
10171 char *note_name = "LINUX";
10172 return elfcore_write_note (abfd, buf, bufsiz,
10173 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
10174}
10175
10176char *
10177elfcore_write_aarch_hw_watch (bfd *abfd,
10178 char *buf,
10179 int *bufsiz,
10180 const void *aarch_hw_watch,
10181 int size)
10182{
10183 char *note_name = "LINUX";
10184 return elfcore_write_note (abfd, buf, bufsiz,
10185 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
10186}
10187
bb864ac1
CES
10188char *
10189elfcore_write_register_note (bfd *abfd,
10190 char *buf,
10191 int *bufsiz,
10192 const char *section,
10193 const void *data,
10194 int size)
10195{
10196 if (strcmp (section, ".reg2") == 0)
10197 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
10198 if (strcmp (section, ".reg-xfp") == 0)
10199 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
10200 if (strcmp (section, ".reg-xstate") == 0)
10201 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
10202 if (strcmp (section, ".reg-ppc-vmx") == 0)
10203 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
10204 if (strcmp (section, ".reg-ppc-vsx") == 0)
10205 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
10206 if (strcmp (section, ".reg-s390-high-gprs") == 0)
10207 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
10208 if (strcmp (section, ".reg-s390-timer") == 0)
10209 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
10210 if (strcmp (section, ".reg-s390-todcmp") == 0)
10211 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
10212 if (strcmp (section, ".reg-s390-todpreg") == 0)
10213 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
10214 if (strcmp (section, ".reg-s390-ctrs") == 0)
10215 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
10216 if (strcmp (section, ".reg-s390-prefix") == 0)
10217 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
355b81d9
UW
10218 if (strcmp (section, ".reg-s390-last-break") == 0)
10219 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
10220 if (strcmp (section, ".reg-s390-system-call") == 0)
10221 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
abb3f6cc
NC
10222 if (strcmp (section, ".reg-s390-tdb") == 0)
10223 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
4ef9f41a
AA
10224 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
10225 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
10226 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
10227 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
faa9a424
UW
10228 if (strcmp (section, ".reg-arm-vfp") == 0)
10229 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
652451f8
YZ
10230 if (strcmp (section, ".reg-aarch-tls") == 0)
10231 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
10232 if (strcmp (section, ".reg-aarch-hw-break") == 0)
10233 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
10234 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
10235 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
bb864ac1
CES
10236 return NULL;
10237}
10238
b34976b6 10239static bfd_boolean
718175fa 10240elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 10241{
c044fabd 10242 char *p;
252b5132 10243
252b5132
RH
10244 p = buf;
10245 while (p < buf + size)
10246 {
c044fabd
KH
10247 /* FIXME: bad alignment assumption. */
10248 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
10249 Elf_Internal_Note in;
10250
baea7ef1
AM
10251 if (offsetof (Elf_External_Note, name) > buf - p + size)
10252 return FALSE;
10253
dc810e39 10254 in.type = H_GET_32 (abfd, xnp->type);
252b5132 10255
dc810e39 10256 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 10257 in.namedata = xnp->name;
baea7ef1
AM
10258 if (in.namesz > buf - in.namedata + size)
10259 return FALSE;
252b5132 10260
dc810e39 10261 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
10262 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
10263 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
10264 if (in.descsz != 0
10265 && (in.descdata >= buf + size
10266 || in.descsz > buf - in.descdata + size))
10267 return FALSE;
252b5132 10268
718175fa
JK
10269 switch (bfd_get_format (abfd))
10270 {
10271 default:
10272 return TRUE;
10273
10274 case bfd_core:
f64e188b 10275 {
8acbedd6 10276#define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
f64e188b 10277 struct
718175fa 10278 {
f64e188b 10279 const char * string;
8acbedd6 10280 size_t len;
f64e188b 10281 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
718175fa 10282 }
f64e188b 10283 grokers[] =
b15fa79e 10284 {
8acbedd6
KS
10285 GROKER_ELEMENT ("", elfcore_grok_note),
10286 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
10287 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
10288 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
10289 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note)
f64e188b 10290 };
8acbedd6 10291#undef GROKER_ELEMENT
f64e188b
NC
10292 int i;
10293
10294 for (i = ARRAY_SIZE (grokers); i--;)
8acbedd6
KS
10295 {
10296 if (in.namesz >= grokers[i].len
10297 && strncmp (in.namedata, grokers[i].string,
10298 grokers[i].len) == 0)
10299 {
10300 if (! grokers[i].func (abfd, & in))
10301 return FALSE;
10302 break;
10303 }
10304 }
f64e188b
NC
10305 break;
10306 }
718175fa
JK
10307
10308 case bfd_object:
10309 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
10310 {
10311 if (! elfobj_grok_gnu_note (abfd, &in))
10312 return FALSE;
10313 }
e21e5835
NC
10314 else if (in.namesz == sizeof "stapsdt"
10315 && strcmp (in.namedata, "stapsdt") == 0)
10316 {
10317 if (! elfobj_grok_stapsdt_note (abfd, &in))
10318 return FALSE;
10319 }
718175fa 10320 break;
08a40648 10321 }
252b5132
RH
10322
10323 p = in.descdata + BFD_ALIGN (in.descsz, 4);
10324 }
10325
718175fa
JK
10326 return TRUE;
10327}
10328
10329static bfd_boolean
10330elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
10331{
10332 char *buf;
10333
10334 if (size <= 0)
10335 return TRUE;
10336
10337 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
10338 return FALSE;
10339
f64e188b 10340 buf = (char *) bfd_malloc (size + 1);
718175fa
JK
10341 if (buf == NULL)
10342 return FALSE;
10343
f64e188b
NC
10344 /* PR 17512: file: ec08f814
10345 0-termintate the buffer so that string searches will not overflow. */
10346 buf[size] = 0;
10347
718175fa
JK
10348 if (bfd_bread (buf, size, abfd) != size
10349 || !elf_parse_notes (abfd, buf, size, offset))
10350 {
10351 free (buf);
10352 return FALSE;
10353 }
10354
252b5132 10355 free (buf);
b34976b6 10356 return TRUE;
252b5132 10357}
98d8431c
JB
10358\f
10359/* Providing external access to the ELF program header table. */
10360
10361/* Return an upper bound on the number of bytes required to store a
10362 copy of ABFD's program header table entries. Return -1 if an error
10363 occurs; bfd_get_error will return an appropriate code. */
c044fabd 10364
98d8431c 10365long
217aa764 10366bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
10367{
10368 if (abfd->xvec->flavour != bfd_target_elf_flavour)
10369 {
10370 bfd_set_error (bfd_error_wrong_format);
10371 return -1;
10372 }
10373
936e320b 10374 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
10375}
10376
98d8431c
JB
10377/* Copy ABFD's program header table entries to *PHDRS. The entries
10378 will be stored as an array of Elf_Internal_Phdr structures, as
10379 defined in include/elf/internal.h. To find out how large the
10380 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
10381
10382 Return the number of program header table entries read, or -1 if an
10383 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 10384
98d8431c 10385int
217aa764 10386bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
10387{
10388 int num_phdrs;
10389
10390 if (abfd->xvec->flavour != bfd_target_elf_flavour)
10391 {
10392 bfd_set_error (bfd_error_wrong_format);
10393 return -1;
10394 }
10395
10396 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 10397 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
10398 num_phdrs * sizeof (Elf_Internal_Phdr));
10399
10400 return num_phdrs;
10401}
ae4221d7 10402
db6751f2 10403enum elf_reloc_type_class
7e612e98
AM
10404_bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
10405 const asection *rel_sec ATTRIBUTE_UNUSED,
10406 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
10407{
10408 return reloc_class_normal;
10409}
f8df10f4 10410
47d9a591 10411/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
10412 relocation against a local symbol. */
10413
10414bfd_vma
217aa764
AM
10415_bfd_elf_rela_local_sym (bfd *abfd,
10416 Elf_Internal_Sym *sym,
8517fae7 10417 asection **psec,
217aa764 10418 Elf_Internal_Rela *rel)
f8df10f4 10419{
8517fae7 10420 asection *sec = *psec;
f8df10f4
JJ
10421 bfd_vma relocation;
10422
10423 relocation = (sec->output_section->vma
10424 + sec->output_offset
10425 + sym->st_value);
10426 if ((sec->flags & SEC_MERGE)
c629eae0 10427 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 10428 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
f8df10f4 10429 {
f8df10f4 10430 rel->r_addend =
8517fae7 10431 _bfd_merged_section_offset (abfd, psec,
65765700 10432 elf_section_data (sec)->sec_info,
753731ee
AM
10433 sym->st_value + rel->r_addend);
10434 if (sec != *psec)
10435 {
10436 /* If we have changed the section, and our original section is
10437 marked with SEC_EXCLUDE, it means that the original
10438 SEC_MERGE section has been completely subsumed in some
10439 other SEC_MERGE section. In this case, we need to leave
10440 some info around for --emit-relocs. */
10441 if ((sec->flags & SEC_EXCLUDE) != 0)
10442 sec->kept_section = *psec;
10443 sec = *psec;
10444 }
8517fae7
AM
10445 rel->r_addend -= relocation;
10446 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
10447 }
10448 return relocation;
10449}
c629eae0
JJ
10450
10451bfd_vma
217aa764
AM
10452_bfd_elf_rel_local_sym (bfd *abfd,
10453 Elf_Internal_Sym *sym,
10454 asection **psec,
10455 bfd_vma addend)
47d9a591 10456{
c629eae0
JJ
10457 asection *sec = *psec;
10458
dbaa2011 10459 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
c629eae0
JJ
10460 return sym->st_value + addend;
10461
10462 return _bfd_merged_section_offset (abfd, psec,
65765700 10463 elf_section_data (sec)->sec_info,
753731ee 10464 sym->st_value + addend);
c629eae0
JJ
10465}
10466
10467bfd_vma
217aa764 10468_bfd_elf_section_offset (bfd *abfd,
92e4ec35 10469 struct bfd_link_info *info,
217aa764
AM
10470 asection *sec,
10471 bfd_vma offset)
c629eae0 10472{
68bfbfcc 10473 switch (sec->sec_info_type)
65765700 10474 {
dbaa2011 10475 case SEC_INFO_TYPE_STABS:
eea6121a
AM
10476 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
10477 offset);
dbaa2011 10478 case SEC_INFO_TYPE_EH_FRAME:
92e4ec35 10479 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700 10480 default:
310fd250
L
10481 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
10482 {
10483 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10484 bfd_size_type address_size = bed->s->arch_size / 8;
10485 offset = sec->size - offset - address_size;
10486 }
65765700
JJ
10487 return offset;
10488 }
c629eae0 10489}
3333a7c3
RM
10490\f
10491/* Create a new BFD as if by bfd_openr. Rather than opening a file,
10492 reconstruct an ELF file by reading the segments out of remote memory
10493 based on the ELF file header at EHDR_VMA and the ELF program headers it
10494 points to. If not null, *LOADBASEP is filled in with the difference
10495 between the VMAs from which the segments were read, and the VMAs the
10496 file headers (and hence BFD's idea of each section's VMA) put them at.
10497
10498 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
10499 remote memory at target address VMA into the local buffer at MYADDR; it
10500 should return zero on success or an `errno' code on failure. TEMPL must
10501 be a BFD for an ELF target with the word size and byte order found in
10502 the remote memory. */
10503
10504bfd *
217aa764
AM
10505bfd_elf_bfd_from_remote_memory
10506 (bfd *templ,
10507 bfd_vma ehdr_vma,
f0a5d95a 10508 bfd_size_type size,
217aa764 10509 bfd_vma *loadbasep,
fe78531d 10510 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
3333a7c3
RM
10511{
10512 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
5979d6b6 10513 (templ, ehdr_vma, size, loadbasep, target_read_memory);
3333a7c3 10514}
4c45e5c9
JJ
10515\f
10516long
c9727e01
AM
10517_bfd_elf_get_synthetic_symtab (bfd *abfd,
10518 long symcount ATTRIBUTE_UNUSED,
10519 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 10520 long dynsymcount,
c9727e01
AM
10521 asymbol **dynsyms,
10522 asymbol **ret)
4c45e5c9
JJ
10523{
10524 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10525 asection *relplt;
10526 asymbol *s;
10527 const char *relplt_name;
10528 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
10529 arelent *p;
10530 long count, i, n;
10531 size_t size;
10532 Elf_Internal_Shdr *hdr;
10533 char *names;
10534 asection *plt;
10535
8615f3f2
AM
10536 *ret = NULL;
10537
90e3cdf2
JJ
10538 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
10539 return 0;
10540
8615f3f2
AM
10541 if (dynsymcount <= 0)
10542 return 0;
10543
4c45e5c9
JJ
10544 if (!bed->plt_sym_val)
10545 return 0;
10546
10547 relplt_name = bed->relplt_name;
10548 if (relplt_name == NULL)
d35fd659 10549 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
10550 relplt = bfd_get_section_by_name (abfd, relplt_name);
10551 if (relplt == NULL)
10552 return 0;
10553
10554 hdr = &elf_section_data (relplt)->this_hdr;
10555 if (hdr->sh_link != elf_dynsymtab (abfd)
10556 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
10557 return 0;
10558
10559 plt = bfd_get_section_by_name (abfd, ".plt");
10560 if (plt == NULL)
10561 return 0;
10562
10563 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 10564 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
10565 return -1;
10566
eea6121a 10567 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
10568 size = count * sizeof (asymbol);
10569 p = relplt->relocation;
cb53bf42 10570 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
10571 {
10572 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
10573 if (p->addend != 0)
10574 {
10575#ifdef BFD64
10576 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
10577#else
10578 size += sizeof ("+0x") - 1 + 8;
10579#endif
10580 }
10581 }
4c45e5c9 10582
a50b1753 10583 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
10584 if (s == NULL)
10585 return -1;
10586
10587 names = (char *) (s + count);
10588 p = relplt->relocation;
10589 n = 0;
cb53bf42 10590 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
10591 {
10592 size_t len;
10593 bfd_vma addr;
10594
10595 addr = bed->plt_sym_val (i, plt, p);
10596 if (addr == (bfd_vma) -1)
10597 continue;
10598
10599 *s = **p->sym_ptr_ptr;
65a7a66f
AM
10600 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
10601 we are defining a symbol, ensure one of them is set. */
10602 if ((s->flags & BSF_LOCAL) == 0)
10603 s->flags |= BSF_GLOBAL;
6ba2a415 10604 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
10605 s->section = plt;
10606 s->value = addr - plt->vma;
10607 s->name = names;
8f39ba8e 10608 s->udata.p = NULL;
4c45e5c9
JJ
10609 len = strlen ((*p->sym_ptr_ptr)->name);
10610 memcpy (names, (*p->sym_ptr_ptr)->name, len);
10611 names += len;
041de40d
AM
10612 if (p->addend != 0)
10613 {
1d770845 10614 char buf[30], *a;
d324f6d6 10615
041de40d
AM
10616 memcpy (names, "+0x", sizeof ("+0x") - 1);
10617 names += sizeof ("+0x") - 1;
1d770845
L
10618 bfd_sprintf_vma (abfd, buf, p->addend);
10619 for (a = buf; *a == '0'; ++a)
10620 ;
10621 len = strlen (a);
10622 memcpy (names, a, len);
10623 names += len;
041de40d 10624 }
4c45e5c9
JJ
10625 memcpy (names, "@plt", sizeof ("@plt"));
10626 names += sizeof ("@plt");
8f39ba8e 10627 ++s, ++n;
4c45e5c9
JJ
10628 }
10629
10630 return n;
10631}
3d7f7666 10632
3b22753a
L
10633/* It is only used by x86-64 so far. */
10634asection _bfd_elf_large_com_section
10635 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 10636 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 10637
d1036acb 10638void
78245035
L
10639_bfd_elf_post_process_headers (bfd * abfd,
10640 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
d1036acb
L
10641{
10642 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
10643
10644 i_ehdrp = elf_elfheader (abfd);
10645
10646 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
10647
10648 /* To make things simpler for the loader on Linux systems we set the
9c55345c 10649 osabi field to ELFOSABI_GNU if the binary contains symbols of
f64b2e8d 10650 the STT_GNU_IFUNC type or STB_GNU_UNIQUE binding. */
d8045f23 10651 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
f64b2e8d 10652 && elf_tdata (abfd)->has_gnu_symbols)
9c55345c 10653 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
d1036acb 10654}
fcb93ecf
PB
10655
10656
10657/* Return TRUE for ELF symbol types that represent functions.
10658 This is the default version of this function, which is sufficient for
d8045f23 10659 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
10660
10661bfd_boolean
10662_bfd_elf_is_function_type (unsigned int type)
10663{
d8045f23
NC
10664 return (type == STT_FUNC
10665 || type == STT_GNU_IFUNC);
fcb93ecf 10666}
9f296da3 10667
aef36ac1
AM
10668/* If the ELF symbol SYM might be a function in SEC, return the
10669 function size and set *CODE_OFF to the function's entry point,
10670 otherwise return zero. */
9f296da3 10671
aef36ac1
AM
10672bfd_size_type
10673_bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
10674 bfd_vma *code_off)
9f296da3 10675{
aef36ac1
AM
10676 bfd_size_type size;
10677
ff9e0f5b 10678 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
aef36ac1
AM
10679 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
10680 || sym->section != sec)
10681 return 0;
ff9e0f5b 10682
ff9e0f5b 10683 *code_off = sym->value;
aef36ac1
AM
10684 size = 0;
10685 if (!(sym->flags & BSF_SYNTHETIC))
10686 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
10687 if (size == 0)
10688 size = 1;
10689 return size;
9f296da3 10690}