]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
Display --interleave[=<number>]
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91 2
b90efa5b 3 Copyright (C) 1993-2015 Free Software Foundation, Inc.
252b5132 4
5e8d7549 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
5e8d7549
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
5e8d7549 10 (at your option) any later version.
252b5132 11
5e8d7549
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
5e8d7549 17 You should have received a copy of the GNU General Public License
b34976b6 18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132 22
1b74d094
BW
23/*
24SECTION
252b5132
RH
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
661a3fd4 33 haven't bothered yet. */
252b5132 34
7ee38065
MS
35/* For sparc64-cross-sparc32. */
36#define _SYSCALL32
252b5132 37#include "sysdep.h"
3db64b00 38#include "bfd.h"
252b5132
RH
39#include "bfdlink.h"
40#include "libbfd.h"
41#define ARCH_SIZE 0
42#include "elf-bfd.h"
e0e8c97f 43#include "libiberty.h"
ff59fc36 44#include "safe-ctype.h"
70a38d42 45#include "elf-linux-psinfo.h"
252b5132 46
8bc7f138
L
47#ifdef CORE_HEADER
48#include CORE_HEADER
49#endif
50
217aa764 51static int elf_sort_sections (const void *, const void *);
c84fca4d 52static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
53static bfd_boolean prep_headers (bfd *);
54static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
718175fa
JK
55static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
56static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
57 file_ptr offset);
50b2bdb7 58
252b5132
RH
59/* Swap version information in and out. The version information is
60 currently size independent. If that ever changes, this code will
61 need to move into elfcode.h. */
62
63/* Swap in a Verdef structure. */
64
65void
217aa764
AM
66_bfd_elf_swap_verdef_in (bfd *abfd,
67 const Elf_External_Verdef *src,
68 Elf_Internal_Verdef *dst)
252b5132 69{
dc810e39
AM
70 dst->vd_version = H_GET_16 (abfd, src->vd_version);
71 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
72 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
73 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
74 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
75 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
76 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
77}
78
79/* Swap out a Verdef structure. */
80
81void
217aa764
AM
82_bfd_elf_swap_verdef_out (bfd *abfd,
83 const Elf_Internal_Verdef *src,
84 Elf_External_Verdef *dst)
252b5132 85{
dc810e39
AM
86 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
87 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
88 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
89 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
90 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
91 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
92 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
93}
94
95/* Swap in a Verdaux structure. */
96
97void
217aa764
AM
98_bfd_elf_swap_verdaux_in (bfd *abfd,
99 const Elf_External_Verdaux *src,
100 Elf_Internal_Verdaux *dst)
252b5132 101{
dc810e39
AM
102 dst->vda_name = H_GET_32 (abfd, src->vda_name);
103 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
104}
105
106/* Swap out a Verdaux structure. */
107
108void
217aa764
AM
109_bfd_elf_swap_verdaux_out (bfd *abfd,
110 const Elf_Internal_Verdaux *src,
111 Elf_External_Verdaux *dst)
252b5132 112{
dc810e39
AM
113 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
114 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
115}
116
117/* Swap in a Verneed structure. */
118
119void
217aa764
AM
120_bfd_elf_swap_verneed_in (bfd *abfd,
121 const Elf_External_Verneed *src,
122 Elf_Internal_Verneed *dst)
252b5132 123{
dc810e39
AM
124 dst->vn_version = H_GET_16 (abfd, src->vn_version);
125 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
126 dst->vn_file = H_GET_32 (abfd, src->vn_file);
127 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
128 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
129}
130
131/* Swap out a Verneed structure. */
132
133void
217aa764
AM
134_bfd_elf_swap_verneed_out (bfd *abfd,
135 const Elf_Internal_Verneed *src,
136 Elf_External_Verneed *dst)
252b5132 137{
dc810e39
AM
138 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
139 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
140 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
141 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
142 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
143}
144
145/* Swap in a Vernaux structure. */
146
147void
217aa764
AM
148_bfd_elf_swap_vernaux_in (bfd *abfd,
149 const Elf_External_Vernaux *src,
150 Elf_Internal_Vernaux *dst)
252b5132 151{
dc810e39
AM
152 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
153 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
154 dst->vna_other = H_GET_16 (abfd, src->vna_other);
155 dst->vna_name = H_GET_32 (abfd, src->vna_name);
156 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
157}
158
159/* Swap out a Vernaux structure. */
160
161void
217aa764
AM
162_bfd_elf_swap_vernaux_out (bfd *abfd,
163 const Elf_Internal_Vernaux *src,
164 Elf_External_Vernaux *dst)
252b5132 165{
dc810e39
AM
166 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
167 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
168 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
169 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
170 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
171}
172
173/* Swap in a Versym structure. */
174
175void
217aa764
AM
176_bfd_elf_swap_versym_in (bfd *abfd,
177 const Elf_External_Versym *src,
178 Elf_Internal_Versym *dst)
252b5132 179{
dc810e39 180 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
181}
182
183/* Swap out a Versym structure. */
184
185void
217aa764
AM
186_bfd_elf_swap_versym_out (bfd *abfd,
187 const Elf_Internal_Versym *src,
188 Elf_External_Versym *dst)
252b5132 189{
dc810e39 190 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
191}
192
193/* Standard ELF hash function. Do not change this function; you will
194 cause invalid hash tables to be generated. */
3a99b017 195
252b5132 196unsigned long
217aa764 197bfd_elf_hash (const char *namearg)
252b5132 198{
3a99b017 199 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
200 unsigned long h = 0;
201 unsigned long g;
202 int ch;
203
204 while ((ch = *name++) != '\0')
205 {
206 h = (h << 4) + ch;
207 if ((g = (h & 0xf0000000)) != 0)
208 {
209 h ^= g >> 24;
210 /* The ELF ABI says `h &= ~g', but this is equivalent in
211 this case and on some machines one insn instead of two. */
212 h ^= g;
213 }
214 }
32dfa85d 215 return h & 0xffffffff;
252b5132
RH
216}
217
fdc90cb4
JJ
218/* DT_GNU_HASH hash function. Do not change this function; you will
219 cause invalid hash tables to be generated. */
220
221unsigned long
222bfd_elf_gnu_hash (const char *namearg)
223{
224 const unsigned char *name = (const unsigned char *) namearg;
225 unsigned long h = 5381;
226 unsigned char ch;
227
228 while ((ch = *name++) != '\0')
229 h = (h << 5) + h + ch;
230 return h & 0xffffffff;
231}
232
0c8d6e5c
AM
233/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
234 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 235bfd_boolean
0c8d6e5c 236bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 237 size_t object_size,
4dfe6ac6 238 enum elf_target_id object_id)
252b5132 239{
0ffa91dd
NC
240 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
241 abfd->tdata.any = bfd_zalloc (abfd, object_size);
242 if (abfd->tdata.any == NULL)
243 return FALSE;
252b5132 244
0ffa91dd 245 elf_object_id (abfd) = object_id;
c0355132
AM
246 if (abfd->direction != read_direction)
247 {
248 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
249 if (o == NULL)
250 return FALSE;
251 elf_tdata (abfd)->o = o;
252 elf_program_header_size (abfd) = (bfd_size_type) -1;
253 }
b34976b6 254 return TRUE;
252b5132
RH
255}
256
0ffa91dd
NC
257
258bfd_boolean
ae95ffa6 259bfd_elf_make_object (bfd *abfd)
0ffa91dd 260{
ae95ffa6 261 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 262 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 263 bed->target_id);
0ffa91dd
NC
264}
265
b34976b6 266bfd_boolean
217aa764 267bfd_elf_mkcorefile (bfd *abfd)
252b5132 268{
c044fabd 269 /* I think this can be done just like an object file. */
228e534f
AM
270 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
271 return FALSE;
272 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
273 return elf_tdata (abfd)->core != NULL;
252b5132
RH
274}
275
72a80a16 276static char *
217aa764 277bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
278{
279 Elf_Internal_Shdr **i_shdrp;
f075ee0c 280 bfd_byte *shstrtab = NULL;
dc810e39
AM
281 file_ptr offset;
282 bfd_size_type shstrtabsize;
252b5132
RH
283
284 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
285 if (i_shdrp == 0
286 || shindex >= elf_numsections (abfd)
287 || i_shdrp[shindex] == 0)
f075ee0c 288 return NULL;
252b5132 289
f075ee0c 290 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
291 if (shstrtab == NULL)
292 {
c044fabd 293 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
294 offset = i_shdrp[shindex]->sh_offset;
295 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
296
297 /* Allocate and clear an extra byte at the end, to prevent crashes
298 in case the string table is not terminated. */
3471d59d 299 if (shstrtabsize + 1 <= 1
06614111
NC
300 || bfd_seek (abfd, offset, SEEK_SET) != 0
301 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL)
c6c60d09
JJ
302 shstrtab = NULL;
303 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
304 {
305 if (bfd_get_error () != bfd_error_system_call)
306 bfd_set_error (bfd_error_file_truncated);
06614111 307 bfd_release (abfd, shstrtab);
c6c60d09 308 shstrtab = NULL;
3471d59d
CC
309 /* Once we've failed to read it, make sure we don't keep
310 trying. Otherwise, we'll keep allocating space for
311 the string table over and over. */
312 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
313 }
314 else
315 shstrtab[shstrtabsize] = '\0';
217aa764 316 i_shdrp[shindex]->contents = shstrtab;
252b5132 317 }
f075ee0c 318 return (char *) shstrtab;
252b5132
RH
319}
320
321char *
217aa764
AM
322bfd_elf_string_from_elf_section (bfd *abfd,
323 unsigned int shindex,
324 unsigned int strindex)
252b5132
RH
325{
326 Elf_Internal_Shdr *hdr;
327
328 if (strindex == 0)
329 return "";
330
74f2e02b
AM
331 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
332 return NULL;
333
252b5132
RH
334 hdr = elf_elfsections (abfd)[shindex];
335
06614111
NC
336 if (hdr->contents == NULL)
337 {
338 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
339 {
340 /* PR 17512: file: f057ec89. */
341 _bfd_error_handler (_("%B: attempt to load strings from a non-string section (number %d)"),
342 abfd, shindex);
343 return NULL;
344 }
345
346 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
347 return NULL;
348 }
252b5132
RH
349
350 if (strindex >= hdr->sh_size)
351 {
1b3a8575 352 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 353 (*_bfd_error_handler)
d003868e
AM
354 (_("%B: invalid string offset %u >= %lu for section `%s'"),
355 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 356 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 357 ? ".shstrtab"
1b3a8575 358 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 359 return NULL;
252b5132
RH
360 }
361
362 return ((char *) hdr->contents) + strindex;
363}
364
6cdc0ccc
AM
365/* Read and convert symbols to internal format.
366 SYMCOUNT specifies the number of symbols to read, starting from
367 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
368 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
369 symbols, and symbol section index extensions, respectively.
370 Returns a pointer to the internal symbol buffer (malloced if necessary)
371 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
372
373Elf_Internal_Sym *
217aa764
AM
374bfd_elf_get_elf_syms (bfd *ibfd,
375 Elf_Internal_Shdr *symtab_hdr,
376 size_t symcount,
377 size_t symoffset,
378 Elf_Internal_Sym *intsym_buf,
379 void *extsym_buf,
380 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
381{
382 Elf_Internal_Shdr *shndx_hdr;
217aa764 383 void *alloc_ext;
df622259 384 const bfd_byte *esym;
6cdc0ccc
AM
385 Elf_External_Sym_Shndx *alloc_extshndx;
386 Elf_External_Sym_Shndx *shndx;
4dd07732 387 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
388 Elf_Internal_Sym *isym;
389 Elf_Internal_Sym *isymend;
9c5bfbb7 390 const struct elf_backend_data *bed;
6cdc0ccc
AM
391 size_t extsym_size;
392 bfd_size_type amt;
393 file_ptr pos;
394
e44a2c9c
AM
395 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
396 abort ();
397
6cdc0ccc
AM
398 if (symcount == 0)
399 return intsym_buf;
400
401 /* Normal syms might have section extension entries. */
402 shndx_hdr = NULL;
403 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
404 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
405
406 /* Read the symbols. */
407 alloc_ext = NULL;
408 alloc_extshndx = NULL;
4dd07732 409 alloc_intsym = NULL;
6cdc0ccc
AM
410 bed = get_elf_backend_data (ibfd);
411 extsym_size = bed->s->sizeof_sym;
412 amt = symcount * extsym_size;
413 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
414 if (extsym_buf == NULL)
415 {
d0fb9a8d 416 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
417 extsym_buf = alloc_ext;
418 }
419 if (extsym_buf == NULL
420 || bfd_seek (ibfd, pos, SEEK_SET) != 0
421 || bfd_bread (extsym_buf, amt, ibfd) != amt)
422 {
423 intsym_buf = NULL;
424 goto out;
425 }
426
427 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
428 extshndx_buf = NULL;
429 else
430 {
431 amt = symcount * sizeof (Elf_External_Sym_Shndx);
432 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
433 if (extshndx_buf == NULL)
434 {
a50b1753
NC
435 alloc_extshndx = (Elf_External_Sym_Shndx *)
436 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
437 extshndx_buf = alloc_extshndx;
438 }
439 if (extshndx_buf == NULL
440 || bfd_seek (ibfd, pos, SEEK_SET) != 0
441 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
442 {
443 intsym_buf = NULL;
444 goto out;
445 }
446 }
447
448 if (intsym_buf == NULL)
449 {
a50b1753
NC
450 alloc_intsym = (Elf_Internal_Sym *)
451 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 452 intsym_buf = alloc_intsym;
6cdc0ccc
AM
453 if (intsym_buf == NULL)
454 goto out;
455 }
456
457 /* Convert the symbols to internal form. */
458 isymend = intsym_buf + symcount;
a50b1753
NC
459 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
460 shndx = extshndx_buf;
6cdc0ccc
AM
461 isym < isymend;
462 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
463 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
464 {
465 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
466 (*_bfd_error_handler) (_("%B symbol number %lu references "
467 "nonexistent SHT_SYMTAB_SHNDX section"),
468 ibfd, (unsigned long) symoffset);
4dd07732
AM
469 if (alloc_intsym != NULL)
470 free (alloc_intsym);
8384fb8f
AM
471 intsym_buf = NULL;
472 goto out;
473 }
6cdc0ccc
AM
474
475 out:
476 if (alloc_ext != NULL)
477 free (alloc_ext);
478 if (alloc_extshndx != NULL)
479 free (alloc_extshndx);
480
481 return intsym_buf;
482}
483
5cab59f6
AM
484/* Look up a symbol name. */
485const char *
be8dd2ca
AM
486bfd_elf_sym_name (bfd *abfd,
487 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
488 Elf_Internal_Sym *isym,
489 asection *sym_sec)
5cab59f6 490{
26c61ae5 491 const char *name;
5cab59f6 492 unsigned int iname = isym->st_name;
be8dd2ca 493 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 494
138f35cc
JJ
495 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
496 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 497 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
498 {
499 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
500 shindex = elf_elfheader (abfd)->e_shstrndx;
501 }
502
26c61ae5
L
503 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
504 if (name == NULL)
505 name = "(null)";
506 else if (sym_sec && *name == '\0')
507 name = bfd_section_name (abfd, sym_sec);
508
509 return name;
5cab59f6
AM
510}
511
dbb410c3
AM
512/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
513 sections. The first element is the flags, the rest are section
514 pointers. */
515
516typedef union elf_internal_group {
517 Elf_Internal_Shdr *shdr;
518 unsigned int flags;
519} Elf_Internal_Group;
520
b885599b
AM
521/* Return the name of the group signature symbol. Why isn't the
522 signature just a string? */
523
524static const char *
217aa764 525group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 526{
9dce4196 527 Elf_Internal_Shdr *hdr;
9dce4196
AM
528 unsigned char esym[sizeof (Elf64_External_Sym)];
529 Elf_External_Sym_Shndx eshndx;
530 Elf_Internal_Sym isym;
b885599b 531
13792e9d
L
532 /* First we need to ensure the symbol table is available. Make sure
533 that it is a symbol table section. */
4fbb74a6
AM
534 if (ghdr->sh_link >= elf_numsections (abfd))
535 return NULL;
13792e9d
L
536 hdr = elf_elfsections (abfd) [ghdr->sh_link];
537 if (hdr->sh_type != SHT_SYMTAB
538 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
539 return NULL;
540
9dce4196
AM
541 /* Go read the symbol. */
542 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
543 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
544 &isym, esym, &eshndx) == NULL)
b885599b 545 return NULL;
9dce4196 546
26c61ae5 547 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
548}
549
dbb410c3
AM
550/* Set next_in_group list pointer, and group name for NEWSECT. */
551
b34976b6 552static bfd_boolean
217aa764 553setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
554{
555 unsigned int num_group = elf_tdata (abfd)->num_group;
556
557 /* If num_group is zero, read in all SHT_GROUP sections. The count
558 is set to -1 if there are no SHT_GROUP sections. */
559 if (num_group == 0)
560 {
561 unsigned int i, shnum;
562
563 /* First count the number of groups. If we have a SHT_GROUP
564 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 565 shnum = elf_numsections (abfd);
dbb410c3 566 num_group = 0;
08a40648 567
44534af3 568#define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
1783205a 569 ( (shdr)->sh_type == SHT_GROUP \
44534af3 570 && (shdr)->sh_size >= minsize \
1783205a
NC
571 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
572 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 573
dbb410c3
AM
574 for (i = 0; i < shnum; i++)
575 {
576 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 577
44534af3 578 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3
AM
579 num_group += 1;
580 }
581
582 if (num_group == 0)
20dbb49d
L
583 {
584 num_group = (unsigned) -1;
585 elf_tdata (abfd)->num_group = num_group;
586 }
587 else
dbb410c3
AM
588 {
589 /* We keep a list of elf section headers for group sections,
590 so we can find them quickly. */
20dbb49d 591 bfd_size_type amt;
d0fb9a8d 592
20dbb49d 593 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
594 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
595 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 596 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 597 return FALSE;
dbb410c3
AM
598
599 num_group = 0;
600 for (i = 0; i < shnum; i++)
601 {
602 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 603
44534af3 604 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3 605 {
973ffd63 606 unsigned char *src;
dbb410c3
AM
607 Elf_Internal_Group *dest;
608
609 /* Add to list of sections. */
610 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
611 num_group += 1;
612
613 /* Read the raw contents. */
614 BFD_ASSERT (sizeof (*dest) >= 4);
615 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
616 shdr->contents = (unsigned char *)
617 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
618 /* PR binutils/4110: Handle corrupt group headers. */
619 if (shdr->contents == NULL)
620 {
621 _bfd_error_handler
493a3386 622 (_("%B: corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
1783205a 623 bfd_set_error (bfd_error_bad_value);
493a3386
NC
624 -- num_group;
625 continue;
1783205a
NC
626 }
627
628 memset (shdr->contents, 0, amt);
629
630 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
631 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
632 != shdr->sh_size))
493a3386
NC
633 {
634 _bfd_error_handler
635 (_("%B: invalid size field in group section header: 0x%lx"), abfd, shdr->sh_size);
636 bfd_set_error (bfd_error_bad_value);
637 -- num_group;
638 /* PR 17510: If the group contents are even partially
639 corrupt, do not allow any of the contents to be used. */
640 memset (shdr->contents, 0, amt);
641 continue;
642 }
708d7d0d 643
dbb410c3
AM
644 /* Translate raw contents, a flag word followed by an
645 array of elf section indices all in target byte order,
646 to the flag word followed by an array of elf section
647 pointers. */
648 src = shdr->contents + shdr->sh_size;
649 dest = (Elf_Internal_Group *) (shdr->contents + amt);
06614111 650
dbb410c3
AM
651 while (1)
652 {
653 unsigned int idx;
654
655 src -= 4;
656 --dest;
657 idx = H_GET_32 (abfd, src);
658 if (src == shdr->contents)
659 {
660 dest->flags = idx;
b885599b
AM
661 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
662 shdr->bfd_section->flags
663 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
664 break;
665 }
666 if (idx >= shnum)
667 {
668 ((*_bfd_error_handler)
d003868e 669 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
670 idx = 0;
671 }
672 dest->shdr = elf_elfsections (abfd)[idx];
673 }
674 }
675 }
493a3386
NC
676
677 /* PR 17510: Corrupt binaries might contain invalid groups. */
678 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
679 {
680 elf_tdata (abfd)->num_group = num_group;
681
682 /* If all groups are invalid then fail. */
683 if (num_group == 0)
684 {
685 elf_tdata (abfd)->group_sect_ptr = NULL;
686 elf_tdata (abfd)->num_group = num_group = -1;
687 (*_bfd_error_handler) (_("%B: no valid group sections found"), abfd);
688 bfd_set_error (bfd_error_bad_value);
689 }
690 }
dbb410c3
AM
691 }
692 }
693
694 if (num_group != (unsigned) -1)
695 {
696 unsigned int i;
697
698 for (i = 0; i < num_group; i++)
699 {
700 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
701 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
702 unsigned int n_elt = shdr->sh_size / 4;
703
704 /* Look through this group's sections to see if current
705 section is a member. */
706 while (--n_elt != 0)
707 if ((++idx)->shdr == hdr)
708 {
e0e8c97f 709 asection *s = NULL;
dbb410c3
AM
710
711 /* We are a member of this group. Go looking through
712 other members to see if any others are linked via
713 next_in_group. */
714 idx = (Elf_Internal_Group *) shdr->contents;
715 n_elt = shdr->sh_size / 4;
716 while (--n_elt != 0)
717 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 718 && elf_next_in_group (s) != NULL)
dbb410c3
AM
719 break;
720 if (n_elt != 0)
721 {
dbb410c3
AM
722 /* Snarf the group name from other member, and
723 insert current section in circular list. */
945906ff
AM
724 elf_group_name (newsect) = elf_group_name (s);
725 elf_next_in_group (newsect) = elf_next_in_group (s);
726 elf_next_in_group (s) = newsect;
dbb410c3
AM
727 }
728 else
729 {
dbb410c3
AM
730 const char *gname;
731
b885599b
AM
732 gname = group_signature (abfd, shdr);
733 if (gname == NULL)
b34976b6 734 return FALSE;
945906ff 735 elf_group_name (newsect) = gname;
dbb410c3
AM
736
737 /* Start a circular list with one element. */
945906ff 738 elf_next_in_group (newsect) = newsect;
dbb410c3 739 }
b885599b 740
9dce4196
AM
741 /* If the group section has been created, point to the
742 new member. */
dbb410c3 743 if (shdr->bfd_section != NULL)
945906ff 744 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 745
dbb410c3
AM
746 i = num_group - 1;
747 break;
748 }
749 }
750 }
751
945906ff 752 if (elf_group_name (newsect) == NULL)
dbb410c3 753 {
d003868e
AM
754 (*_bfd_error_handler) (_("%B: no group info for section %A"),
755 abfd, newsect);
493a3386 756 return FALSE;
dbb410c3 757 }
b34976b6 758 return TRUE;
dbb410c3
AM
759}
760
3d7f7666 761bfd_boolean
dd863624 762_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
763{
764 unsigned int i;
765 unsigned int num_group = elf_tdata (abfd)->num_group;
766 bfd_boolean result = TRUE;
dd863624
L
767 asection *s;
768
769 /* Process SHF_LINK_ORDER. */
770 for (s = abfd->sections; s != NULL; s = s->next)
771 {
772 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
773 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
774 {
775 unsigned int elfsec = this_hdr->sh_link;
776 /* FIXME: The old Intel compiler and old strip/objcopy may
777 not set the sh_link or sh_info fields. Hence we could
778 get the situation where elfsec is 0. */
779 if (elfsec == 0)
780 {
4fbb74a6 781 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
782 if (bed->link_order_error_handler)
783 bed->link_order_error_handler
784 (_("%B: warning: sh_link not set for section `%A'"),
785 abfd, s);
786 }
787 else
788 {
91d6fa6a 789 asection *linksec = NULL;
25bbc984 790
4fbb74a6
AM
791 if (elfsec < elf_numsections (abfd))
792 {
793 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 794 linksec = this_hdr->bfd_section;
4fbb74a6 795 }
25bbc984
L
796
797 /* PR 1991, 2008:
798 Some strip/objcopy may leave an incorrect value in
799 sh_link. We don't want to proceed. */
91d6fa6a 800 if (linksec == NULL)
25bbc984
L
801 {
802 (*_bfd_error_handler)
803 (_("%B: sh_link [%d] in section `%A' is incorrect"),
804 s->owner, s, elfsec);
805 result = FALSE;
806 }
807
91d6fa6a 808 elf_linked_to_section (s) = linksec;
dd863624
L
809 }
810 }
811 }
3d7f7666 812
dd863624 813 /* Process section groups. */
3d7f7666
L
814 if (num_group == (unsigned) -1)
815 return result;
816
817 for (i = 0; i < num_group; i++)
818 {
819 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
820 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
821 unsigned int n_elt = shdr->sh_size / 4;
822
823 while (--n_elt != 0)
824 if ((++idx)->shdr->bfd_section)
825 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
826 else if (idx->shdr->sh_type == SHT_RELA
827 || idx->shdr->sh_type == SHT_REL)
828 /* We won't include relocation sections in section groups in
829 output object files. We adjust the group section size here
830 so that relocatable link will work correctly when
831 relocation sections are in section group in input object
832 files. */
833 shdr->bfd_section->size -= 4;
834 else
835 {
836 /* There are some unknown sections in the group. */
837 (*_bfd_error_handler)
d003868e
AM
838 (_("%B: unknown [%d] section `%s' in group [%s]"),
839 abfd,
3d7f7666 840 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
841 bfd_elf_string_from_elf_section (abfd,
842 (elf_elfheader (abfd)
843 ->e_shstrndx),
844 idx->shdr->sh_name),
3d7f7666
L
845 shdr->bfd_section->name);
846 result = FALSE;
847 }
848 }
849 return result;
850}
851
72adc230
AM
852bfd_boolean
853bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
854{
855 return elf_next_in_group (sec) != NULL;
856}
857
252b5132
RH
858/* Make a BFD section from an ELF section. We store a pointer to the
859 BFD section in the bfd_section field of the header. */
860
b34976b6 861bfd_boolean
217aa764
AM
862_bfd_elf_make_section_from_shdr (bfd *abfd,
863 Elf_Internal_Shdr *hdr,
6dc132d9
L
864 const char *name,
865 int shindex)
252b5132
RH
866{
867 asection *newsect;
868 flagword flags;
9c5bfbb7 869 const struct elf_backend_data *bed;
252b5132
RH
870
871 if (hdr->bfd_section != NULL)
4e011fb5 872 return TRUE;
252b5132
RH
873
874 newsect = bfd_make_section_anyway (abfd, name);
875 if (newsect == NULL)
b34976b6 876 return FALSE;
252b5132 877
1829f4b2
AM
878 hdr->bfd_section = newsect;
879 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 880 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 881
2f89ff8d
L
882 /* Always use the real type/flags. */
883 elf_section_type (newsect) = hdr->sh_type;
884 elf_section_flags (newsect) = hdr->sh_flags;
885
252b5132
RH
886 newsect->filepos = hdr->sh_offset;
887
888 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
889 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
890 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 891 bfd_log2 (hdr->sh_addralign)))
b34976b6 892 return FALSE;
252b5132
RH
893
894 flags = SEC_NO_FLAGS;
895 if (hdr->sh_type != SHT_NOBITS)
896 flags |= SEC_HAS_CONTENTS;
dbb410c3 897 if (hdr->sh_type == SHT_GROUP)
b3096250 898 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
899 if ((hdr->sh_flags & SHF_ALLOC) != 0)
900 {
901 flags |= SEC_ALLOC;
902 if (hdr->sh_type != SHT_NOBITS)
903 flags |= SEC_LOAD;
904 }
905 if ((hdr->sh_flags & SHF_WRITE) == 0)
906 flags |= SEC_READONLY;
907 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
908 flags |= SEC_CODE;
909 else if ((flags & SEC_LOAD) != 0)
910 flags |= SEC_DATA;
f5fa8ca2
JJ
911 if ((hdr->sh_flags & SHF_MERGE) != 0)
912 {
913 flags |= SEC_MERGE;
914 newsect->entsize = hdr->sh_entsize;
915 if ((hdr->sh_flags & SHF_STRINGS) != 0)
916 flags |= SEC_STRINGS;
917 }
dbb410c3
AM
918 if (hdr->sh_flags & SHF_GROUP)
919 if (!setup_group (abfd, hdr, newsect))
b34976b6 920 return FALSE;
13ae64f3
JJ
921 if ((hdr->sh_flags & SHF_TLS) != 0)
922 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
923 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
924 flags |= SEC_EXCLUDE;
252b5132 925
3d2b39cf 926 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 927 {
3d2b39cf
L
928 /* The debugging sections appear to be recognized only by name,
929 not any sort of flag. Their SEC_ALLOC bits are cleared. */
3d2b39cf
L
930 if (name [0] == '.')
931 {
f073ced3
AM
932 const char *p;
933 int n;
934 if (name[1] == 'd')
935 p = ".debug", n = 6;
936 else if (name[1] == 'g' && name[2] == 'n')
937 p = ".gnu.linkonce.wi.", n = 17;
938 else if (name[1] == 'g' && name[2] == 'd')
939 p = ".gdb_index", n = 11; /* yes we really do mean 11. */
940 else if (name[1] == 'l')
941 p = ".line", n = 5;
942 else if (name[1] == 's')
943 p = ".stab", n = 5;
944 else if (name[1] == 'z')
945 p = ".zdebug", n = 7;
946 else
947 p = NULL, n = 0;
948 if (p != NULL && strncmp (name, p, n) == 0)
3d2b39cf
L
949 flags |= SEC_DEBUGGING;
950 }
951 }
252b5132
RH
952
953 /* As a GNU extension, if the name begins with .gnu.linkonce, we
954 only link a single copy of the section. This is used to support
955 g++. g++ will emit each template expansion in its own section.
956 The symbols will be defined as weak, so that multiple definitions
957 are permitted. The GNU linker extension is to actually discard
958 all but one of the sections. */
0112cd26 959 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 960 && elf_next_in_group (newsect) == NULL)
252b5132
RH
961 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
962
fa152c49
JW
963 bed = get_elf_backend_data (abfd);
964 if (bed->elf_backend_section_flags)
965 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 966 return FALSE;
fa152c49 967
252b5132 968 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 969 return FALSE;
252b5132 970
718175fa
JK
971 /* We do not parse the PT_NOTE segments as we are interested even in the
972 separate debug info files which may have the segments offsets corrupted.
973 PT_NOTEs from the core files are currently not parsed using BFD. */
974 if (hdr->sh_type == SHT_NOTE)
975 {
baea7ef1 976 bfd_byte *contents;
718175fa 977
baea7ef1 978 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
979 return FALSE;
980
baea7ef1 981 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
982 free (contents);
983 }
984
252b5132
RH
985 if ((flags & SEC_ALLOC) != 0)
986 {
987 Elf_Internal_Phdr *phdr;
6ffd7900
AM
988 unsigned int i, nload;
989
990 /* Some ELF linkers produce binaries with all the program header
991 p_paddr fields zero. If we have such a binary with more than
992 one PT_LOAD header, then leave the section lma equal to vma
993 so that we don't create sections with overlapping lma. */
994 phdr = elf_tdata (abfd)->phdr;
995 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
996 if (phdr->p_paddr != 0)
997 break;
998 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
999 ++nload;
1000 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1001 return TRUE;
252b5132 1002
252b5132
RH
1003 phdr = elf_tdata (abfd)->phdr;
1004 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1005 {
86b2281f
AM
1006 if (((phdr->p_type == PT_LOAD
1007 && (hdr->sh_flags & SHF_TLS) == 0)
1008 || phdr->p_type == PT_TLS)
9a83a553 1009 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 1010 {
88967714
AM
1011 if ((flags & SEC_LOAD) == 0)
1012 newsect->lma = (phdr->p_paddr
1013 + hdr->sh_addr - phdr->p_vaddr);
1014 else
1015 /* We used to use the same adjustment for SEC_LOAD
1016 sections, but that doesn't work if the segment
1017 is packed with code from multiple VMAs.
1018 Instead we calculate the section LMA based on
1019 the segment LMA. It is assumed that the
1020 segment will contain sections with contiguous
1021 LMAs, even if the VMAs are not. */
1022 newsect->lma = (phdr->p_paddr
1023 + hdr->sh_offset - phdr->p_offset);
1024
1025 /* With contiguous segments, we can't tell from file
1026 offsets whether a section with zero size should
1027 be placed at the end of one segment or the
1028 beginning of the next. Decide based on vaddr. */
1029 if (hdr->sh_addr >= phdr->p_vaddr
1030 && (hdr->sh_addr + hdr->sh_size
1031 <= phdr->p_vaddr + phdr->p_memsz))
1032 break;
252b5132
RH
1033 }
1034 }
1035 }
1036
4a114e3e
L
1037 /* Compress/decompress DWARF debug sections with names: .debug_* and
1038 .zdebug_*, after the section flags is set. */
1039 if ((flags & SEC_DEBUGGING)
1040 && ((name[1] == 'd' && name[6] == '_')
1041 || (name[1] == 'z' && name[7] == '_')))
1042 {
1043 enum { nothing, compress, decompress } action = nothing;
4e011fb5 1044 char *new_name;
4a114e3e
L
1045
1046 if (bfd_is_section_compressed (abfd, newsect))
1047 {
1048 /* Compressed section. Check if we should decompress. */
1049 if ((abfd->flags & BFD_DECOMPRESS))
1050 action = decompress;
1051 }
1052 else
1053 {
1054 /* Normal section. Check if we should compress. */
5a5ed5b0 1055 if ((abfd->flags & BFD_COMPRESS) && newsect->size != 0)
4a114e3e
L
1056 action = compress;
1057 }
1058
4e011fb5 1059 new_name = NULL;
4a114e3e
L
1060 switch (action)
1061 {
1062 case nothing:
1063 break;
1064 case compress:
1065 if (!bfd_init_section_compress_status (abfd, newsect))
1066 {
1067 (*_bfd_error_handler)
bc823199 1068 (_("%B: unable to initialize compress status for section %s"),
4a114e3e
L
1069 abfd, name);
1070 return FALSE;
1071 }
273a4985
JT
1072 /* PR binutils/18087: Compression does not always make a section
1073 smaller. So only rename the section when compression has
1074 actually taken place. */
1075 if (newsect->compress_status == COMPRESS_SECTION_DONE)
4e011fb5 1076 {
273a4985
JT
1077 if (name[1] != 'z')
1078 {
1079 unsigned int len = strlen (name);
1080
1081 new_name = bfd_alloc (abfd, len + 2);
1082 if (new_name == NULL)
1083 return FALSE;
1084 new_name[0] = '.';
1085 new_name[1] = 'z';
1086 memcpy (new_name + 2, name + 1, len);
1087 }
4e011fb5 1088 }
4a114e3e
L
1089 break;
1090 case decompress:
1091 if (!bfd_init_section_decompress_status (abfd, newsect))
1092 {
1093 (*_bfd_error_handler)
bc823199 1094 (_("%B: unable to initialize decompress status for section %s"),
4a114e3e
L
1095 abfd, name);
1096 return FALSE;
1097 }
4e011fb5
AM
1098 if (name[1] == 'z')
1099 {
1100 unsigned int len = strlen (name);
1101
1102 new_name = bfd_alloc (abfd, len);
1103 if (new_name == NULL)
1104 return FALSE;
1105 new_name[0] = '.';
1106 memcpy (new_name + 1, name + 2, len - 1);
1107 }
4a114e3e
L
1108 break;
1109 }
4e011fb5
AM
1110 if (new_name != NULL)
1111 bfd_rename_section (abfd, newsect, new_name);
4a114e3e
L
1112 }
1113
b34976b6 1114 return TRUE;
252b5132
RH
1115}
1116
252b5132
RH
1117const char *const bfd_elf_section_type_names[] = {
1118 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1119 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1120 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1121};
1122
1049f94e 1123/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1124 output, and the reloc is against an external symbol, and nothing
1125 has given us any additional addend, the resulting reloc will also
1126 be against the same symbol. In such a case, we don't want to
1127 change anything about the way the reloc is handled, since it will
1128 all be done at final link time. Rather than put special case code
1129 into bfd_perform_relocation, all the reloc types use this howto
1130 function. It just short circuits the reloc if producing
1049f94e 1131 relocatable output against an external symbol. */
252b5132 1132
252b5132 1133bfd_reloc_status_type
217aa764
AM
1134bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1135 arelent *reloc_entry,
1136 asymbol *symbol,
1137 void *data ATTRIBUTE_UNUSED,
1138 asection *input_section,
1139 bfd *output_bfd,
1140 char **error_message ATTRIBUTE_UNUSED)
1141{
1142 if (output_bfd != NULL
252b5132
RH
1143 && (symbol->flags & BSF_SECTION_SYM) == 0
1144 && (! reloc_entry->howto->partial_inplace
1145 || reloc_entry->addend == 0))
1146 {
1147 reloc_entry->address += input_section->output_offset;
1148 return bfd_reloc_ok;
1149 }
1150
1151 return bfd_reloc_continue;
1152}
1153\f
0ac4564e
L
1154/* Copy the program header and other data from one object module to
1155 another. */
252b5132 1156
b34976b6 1157bfd_boolean
217aa764 1158_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1159{
1160 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1161 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1162 return TRUE;
2d502050 1163
57b828ef
L
1164 if (!elf_flags_init (obfd))
1165 {
1166 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1167 elf_flags_init (obfd) = TRUE;
1168 }
2d502050 1169
0ac4564e 1170 elf_gp (obfd) = elf_gp (ibfd);
57b828ef
L
1171
1172 /* Also copy the EI_OSABI field. */
1173 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1174 elf_elfheader (ibfd)->e_ident[EI_OSABI];
104d59d1
JM
1175
1176 /* Copy object attributes. */
1177 _bfd_elf_copy_obj_attributes (ibfd, obfd);
b34976b6 1178 return TRUE;
2d502050
L
1179}
1180
cedc298e
L
1181static const char *
1182get_segment_type (unsigned int p_type)
1183{
1184 const char *pt;
1185 switch (p_type)
1186 {
1187 case PT_NULL: pt = "NULL"; break;
1188 case PT_LOAD: pt = "LOAD"; break;
1189 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1190 case PT_INTERP: pt = "INTERP"; break;
1191 case PT_NOTE: pt = "NOTE"; break;
1192 case PT_SHLIB: pt = "SHLIB"; break;
1193 case PT_PHDR: pt = "PHDR"; break;
1194 case PT_TLS: pt = "TLS"; break;
1195 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1196 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1197 case PT_GNU_RELRO: pt = "RELRO"; break;
1198 default: pt = NULL; break;
1199 }
1200 return pt;
1201}
1202
f0b79d91
L
1203/* Print out the program headers. */
1204
b34976b6 1205bfd_boolean
217aa764 1206_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1207{
a50b1753 1208 FILE *f = (FILE *) farg;
252b5132
RH
1209 Elf_Internal_Phdr *p;
1210 asection *s;
1211 bfd_byte *dynbuf = NULL;
1212
1213 p = elf_tdata (abfd)->phdr;
1214 if (p != NULL)
1215 {
1216 unsigned int i, c;
1217
1218 fprintf (f, _("\nProgram Header:\n"));
1219 c = elf_elfheader (abfd)->e_phnum;
1220 for (i = 0; i < c; i++, p++)
1221 {
cedc298e 1222 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1223 char buf[20];
1224
cedc298e 1225 if (pt == NULL)
252b5132 1226 {
cedc298e
L
1227 sprintf (buf, "0x%lx", p->p_type);
1228 pt = buf;
252b5132 1229 }
dc810e39 1230 fprintf (f, "%8s off 0x", pt);
60b89a18 1231 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1232 fprintf (f, " vaddr 0x");
60b89a18 1233 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1234 fprintf (f, " paddr 0x");
60b89a18 1235 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1236 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1237 fprintf (f, " filesz 0x");
60b89a18 1238 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1239 fprintf (f, " memsz 0x");
60b89a18 1240 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1241 fprintf (f, " flags %c%c%c",
1242 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1243 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1244 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1245 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1246 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1247 fprintf (f, "\n");
1248 }
1249 }
1250
1251 s = bfd_get_section_by_name (abfd, ".dynamic");
1252 if (s != NULL)
1253 {
cb33740c 1254 unsigned int elfsec;
dc810e39 1255 unsigned long shlink;
252b5132
RH
1256 bfd_byte *extdyn, *extdynend;
1257 size_t extdynsize;
217aa764 1258 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1259
1260 fprintf (f, _("\nDynamic Section:\n"));
1261
eea6121a 1262 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1263 goto error_return;
1264
1265 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1266 if (elfsec == SHN_BAD)
252b5132 1267 goto error_return;
dc810e39 1268 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1269
1270 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1271 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1272
1273 extdyn = dynbuf;
06614111
NC
1274 /* PR 17512: file: 6f427532. */
1275 if (s->size < extdynsize)
1276 goto error_return;
eea6121a 1277 extdynend = extdyn + s->size;
1036838a
NC
1278 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1279 Fix range check. */
1280 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
252b5132
RH
1281 {
1282 Elf_Internal_Dyn dyn;
ad9563d6 1283 const char *name = "";
252b5132 1284 char ab[20];
b34976b6 1285 bfd_boolean stringp;
ad9563d6 1286 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1287
217aa764 1288 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1289
1290 if (dyn.d_tag == DT_NULL)
1291 break;
1292
b34976b6 1293 stringp = FALSE;
252b5132
RH
1294 switch (dyn.d_tag)
1295 {
1296 default:
ad9563d6
CM
1297 if (bed->elf_backend_get_target_dtag)
1298 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1299
1300 if (!strcmp (name, ""))
1301 {
1302 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1303 name = ab;
1304 }
252b5132
RH
1305 break;
1306
b34976b6 1307 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1308 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1309 case DT_PLTGOT: name = "PLTGOT"; break;
1310 case DT_HASH: name = "HASH"; break;
1311 case DT_STRTAB: name = "STRTAB"; break;
1312 case DT_SYMTAB: name = "SYMTAB"; break;
1313 case DT_RELA: name = "RELA"; break;
1314 case DT_RELASZ: name = "RELASZ"; break;
1315 case DT_RELAENT: name = "RELAENT"; break;
1316 case DT_STRSZ: name = "STRSZ"; break;
1317 case DT_SYMENT: name = "SYMENT"; break;
1318 case DT_INIT: name = "INIT"; break;
1319 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1320 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1321 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1322 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1323 case DT_REL: name = "REL"; break;
1324 case DT_RELSZ: name = "RELSZ"; break;
1325 case DT_RELENT: name = "RELENT"; break;
1326 case DT_PLTREL: name = "PLTREL"; break;
1327 case DT_DEBUG: name = "DEBUG"; break;
1328 case DT_TEXTREL: name = "TEXTREL"; break;
1329 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1330 case DT_BIND_NOW: name = "BIND_NOW"; break;
1331 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1332 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1333 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1334 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1335 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1336 case DT_FLAGS: name = "FLAGS"; break;
1337 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1338 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1339 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1340 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1341 case DT_MOVEENT: name = "MOVEENT"; break;
1342 case DT_MOVESZ: name = "MOVESZ"; break;
1343 case DT_FEATURE: name = "FEATURE"; break;
1344 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1345 case DT_SYMINSZ: name = "SYMINSZ"; break;
1346 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1347 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1348 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1349 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1350 case DT_PLTPAD: name = "PLTPAD"; break;
1351 case DT_MOVETAB: name = "MOVETAB"; break;
1352 case DT_SYMINFO: name = "SYMINFO"; break;
1353 case DT_RELACOUNT: name = "RELACOUNT"; break;
1354 case DT_RELCOUNT: name = "RELCOUNT"; break;
1355 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1356 case DT_VERSYM: name = "VERSYM"; break;
1357 case DT_VERDEF: name = "VERDEF"; break;
1358 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1359 case DT_VERNEED: name = "VERNEED"; break;
1360 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1361 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1362 case DT_USED: name = "USED"; break;
b34976b6 1363 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1364 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1365 }
1366
ad9563d6 1367 fprintf (f, " %-20s ", name);
252b5132 1368 if (! stringp)
a1f3c56e
AN
1369 {
1370 fprintf (f, "0x");
1371 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1372 }
252b5132
RH
1373 else
1374 {
1375 const char *string;
dc810e39 1376 unsigned int tagv = dyn.d_un.d_val;
252b5132 1377
dc810e39 1378 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1379 if (string == NULL)
1380 goto error_return;
1381 fprintf (f, "%s", string);
1382 }
1383 fprintf (f, "\n");
1384 }
1385
1386 free (dynbuf);
1387 dynbuf = NULL;
1388 }
1389
1390 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1391 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1392 {
fc0e6df6 1393 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1394 return FALSE;
252b5132
RH
1395 }
1396
1397 if (elf_dynverdef (abfd) != 0)
1398 {
1399 Elf_Internal_Verdef *t;
1400
1401 fprintf (f, _("\nVersion definitions:\n"));
1402 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1403 {
1404 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1405 t->vd_flags, t->vd_hash,
1406 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1407 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1408 {
1409 Elf_Internal_Verdaux *a;
1410
1411 fprintf (f, "\t");
1412 for (a = t->vd_auxptr->vda_nextptr;
1413 a != NULL;
1414 a = a->vda_nextptr)
d0fb9a8d
JJ
1415 fprintf (f, "%s ",
1416 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1417 fprintf (f, "\n");
1418 }
1419 }
1420 }
1421
1422 if (elf_dynverref (abfd) != 0)
1423 {
1424 Elf_Internal_Verneed *t;
1425
1426 fprintf (f, _("\nVersion References:\n"));
1427 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1428 {
1429 Elf_Internal_Vernaux *a;
1430
d0fb9a8d
JJ
1431 fprintf (f, _(" required from %s:\n"),
1432 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1433 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1434 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1435 a->vna_flags, a->vna_other,
1436 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1437 }
1438 }
1439
b34976b6 1440 return TRUE;
252b5132
RH
1441
1442 error_return:
1443 if (dynbuf != NULL)
1444 free (dynbuf);
b34976b6 1445 return FALSE;
252b5132
RH
1446}
1447
bb4d2ac2
L
1448/* Get version string. */
1449
1450const char *
60bb06bc
L
1451_bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1452 bfd_boolean *hidden)
bb4d2ac2
L
1453{
1454 const char *version_string = NULL;
1455 if (elf_dynversym (abfd) != 0
1456 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1457 {
1458 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1459
1460 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1461 vernum &= VERSYM_VERSION;
1462
1463 if (vernum == 0)
1464 version_string = "";
1465 else if (vernum == 1)
1466 version_string = "Base";
1467 else if (vernum <= elf_tdata (abfd)->cverdefs)
1468 version_string =
1469 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1470 else
1471 {
1472 Elf_Internal_Verneed *t;
1473
1474 version_string = "";
1475 for (t = elf_tdata (abfd)->verref;
1476 t != NULL;
1477 t = t->vn_nextref)
1478 {
1479 Elf_Internal_Vernaux *a;
1480
1481 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1482 {
1483 if (a->vna_other == vernum)
1484 {
1485 version_string = a->vna_nodename;
1486 break;
1487 }
1488 }
1489 }
1490 }
1491 }
1492 return version_string;
1493}
1494
252b5132
RH
1495/* Display ELF-specific fields of a symbol. */
1496
1497void
217aa764
AM
1498bfd_elf_print_symbol (bfd *abfd,
1499 void *filep,
1500 asymbol *symbol,
1501 bfd_print_symbol_type how)
252b5132 1502{
a50b1753 1503 FILE *file = (FILE *) filep;
252b5132
RH
1504 switch (how)
1505 {
1506 case bfd_print_symbol_name:
1507 fprintf (file, "%s", symbol->name);
1508 break;
1509 case bfd_print_symbol_more:
1510 fprintf (file, "elf ");
60b89a18 1511 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1512 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1513 break;
1514 case bfd_print_symbol_all:
1515 {
4e8a9624
AM
1516 const char *section_name;
1517 const char *name = NULL;
9c5bfbb7 1518 const struct elf_backend_data *bed;
7a13edea 1519 unsigned char st_other;
dbb410c3 1520 bfd_vma val;
bb4d2ac2
L
1521 const char *version_string;
1522 bfd_boolean hidden;
c044fabd 1523
252b5132 1524 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1525
1526 bed = get_elf_backend_data (abfd);
1527 if (bed->elf_backend_print_symbol_all)
c044fabd 1528 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1529
1530 if (name == NULL)
1531 {
7ee38065 1532 name = symbol->name;
217aa764 1533 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1534 }
1535
252b5132
RH
1536 fprintf (file, " %s\t", section_name);
1537 /* Print the "other" value for a symbol. For common symbols,
1538 we've already printed the size; now print the alignment.
1539 For other symbols, we have no specified alignment, and
1540 we've printed the address; now print the size. */
dcf6c779 1541 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1542 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1543 else
1544 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1545 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1546
1547 /* If we have version information, print it. */
60bb06bc
L
1548 version_string = _bfd_elf_get_symbol_version_string (abfd,
1549 symbol,
1550 &hidden);
bb4d2ac2 1551 if (version_string)
252b5132 1552 {
bb4d2ac2 1553 if (!hidden)
252b5132
RH
1554 fprintf (file, " %-11s", version_string);
1555 else
1556 {
1557 int i;
1558
1559 fprintf (file, " (%s)", version_string);
1560 for (i = 10 - strlen (version_string); i > 0; --i)
1561 putc (' ', file);
1562 }
1563 }
1564
1565 /* If the st_other field is not zero, print it. */
7a13edea 1566 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1567
7a13edea
NC
1568 switch (st_other)
1569 {
1570 case 0: break;
1571 case STV_INTERNAL: fprintf (file, " .internal"); break;
1572 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1573 case STV_PROTECTED: fprintf (file, " .protected"); break;
1574 default:
1575 /* Some other non-defined flags are also present, so print
1576 everything hex. */
1577 fprintf (file, " 0x%02x", (unsigned int) st_other);
1578 }
252b5132 1579
587ff49e 1580 fprintf (file, " %s", name);
252b5132
RH
1581 }
1582 break;
1583 }
1584}
252b5132 1585
252b5132
RH
1586/* Allocate an ELF string table--force the first byte to be zero. */
1587
1588struct bfd_strtab_hash *
217aa764 1589_bfd_elf_stringtab_init (void)
252b5132
RH
1590{
1591 struct bfd_strtab_hash *ret;
1592
1593 ret = _bfd_stringtab_init ();
1594 if (ret != NULL)
1595 {
1596 bfd_size_type loc;
1597
b34976b6 1598 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1599 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1600 if (loc == (bfd_size_type) -1)
1601 {
1602 _bfd_stringtab_free (ret);
1603 ret = NULL;
1604 }
1605 }
1606 return ret;
1607}
1608\f
1609/* ELF .o/exec file reading */
1610
c044fabd 1611/* Create a new bfd section from an ELF section header. */
252b5132 1612
b34976b6 1613bfd_boolean
217aa764 1614bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1615{
4fbb74a6
AM
1616 Elf_Internal_Shdr *hdr;
1617 Elf_Internal_Ehdr *ehdr;
1618 const struct elf_backend_data *bed;
90937f86 1619 const char *name;
bf67003b
NC
1620 bfd_boolean ret = TRUE;
1621 static bfd_boolean * sections_being_created = NULL;
5a4b0ccc 1622 static bfd * sections_being_created_abfd = NULL;
bf67003b 1623 static unsigned int nesting = 0;
252b5132 1624
4fbb74a6
AM
1625 if (shindex >= elf_numsections (abfd))
1626 return FALSE;
1627
bf67003b
NC
1628 if (++ nesting > 3)
1629 {
1630 /* PR17512: A corrupt ELF binary might contain a recursive group of
06614111 1631 sections, with each the string indicies pointing to the next in the
bf67003b
NC
1632 loop. Detect this here, by refusing to load a section that we are
1633 already in the process of loading. We only trigger this test if
1634 we have nested at least three sections deep as normal ELF binaries
5a4b0ccc
NC
1635 can expect to recurse at least once.
1636
1637 FIXME: It would be better if this array was attached to the bfd,
1638 rather than being held in a static pointer. */
1639
1640 if (sections_being_created_abfd != abfd)
1641 sections_being_created = NULL;
bf67003b
NC
1642 if (sections_being_created == NULL)
1643 {
1644 /* FIXME: It would be more efficient to attach this array to the bfd somehow. */
1645 sections_being_created = (bfd_boolean *)
1646 bfd_zalloc (abfd, elf_numsections (abfd) * sizeof (bfd_boolean));
5a4b0ccc 1647 sections_being_created_abfd = abfd;
bf67003b
NC
1648 }
1649 if (sections_being_created [shindex])
1650 {
1651 (*_bfd_error_handler)
1652 (_("%B: warning: loop in section dependencies detected"), abfd);
1653 return FALSE;
1654 }
1655 sections_being_created [shindex] = TRUE;
1656 }
1657
4fbb74a6
AM
1658 hdr = elf_elfsections (abfd)[shindex];
1659 ehdr = elf_elfheader (abfd);
1660 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1661 hdr->sh_name);
933d961a 1662 if (name == NULL)
bf67003b 1663 goto fail;
252b5132 1664
4fbb74a6 1665 bed = get_elf_backend_data (abfd);
252b5132
RH
1666 switch (hdr->sh_type)
1667 {
1668 case SHT_NULL:
1669 /* Inactive section. Throw it away. */
bf67003b 1670 goto success;
252b5132 1671
bf67003b
NC
1672 case SHT_PROGBITS: /* Normal section with contents. */
1673 case SHT_NOBITS: /* .bss section. */
1674 case SHT_HASH: /* .hash section. */
1675 case SHT_NOTE: /* .note section. */
25e27870
L
1676 case SHT_INIT_ARRAY: /* .init_array section. */
1677 case SHT_FINI_ARRAY: /* .fini_array section. */
1678 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1679 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1680 case SHT_GNU_HASH: /* .gnu.hash section. */
bf67003b
NC
1681 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1682 goto success;
252b5132 1683
797fc050 1684 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1685 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
1686 goto fail;
1687
cfcac11d
NC
1688 if (hdr->sh_link > elf_numsections (abfd))
1689 {
caa83f8b 1690 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
1691 field set to SHN_BEFORE or SHN_AFTER. */
1692 switch (bfd_get_arch (abfd))
1693 {
caa83f8b 1694 case bfd_arch_i386:
cfcac11d
NC
1695 case bfd_arch_sparc:
1696 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
1697 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
1698 break;
1699 /* Otherwise fall through. */
1700 default:
bf67003b 1701 goto fail;
cfcac11d
NC
1702 }
1703 }
1704 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
bf67003b 1705 goto fail;
cfcac11d 1706 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
1707 {
1708 Elf_Internal_Shdr *dynsymhdr;
1709
1710 /* The shared libraries distributed with hpux11 have a bogus
1711 sh_link field for the ".dynamic" section. Find the
1712 string table for the ".dynsym" section instead. */
1713 if (elf_dynsymtab (abfd) != 0)
1714 {
1715 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1716 hdr->sh_link = dynsymhdr->sh_link;
1717 }
1718 else
1719 {
1720 unsigned int i, num_sec;
1721
1722 num_sec = elf_numsections (abfd);
1723 for (i = 1; i < num_sec; i++)
1724 {
1725 dynsymhdr = elf_elfsections (abfd)[i];
1726 if (dynsymhdr->sh_type == SHT_DYNSYM)
1727 {
1728 hdr->sh_link = dynsymhdr->sh_link;
1729 break;
1730 }
1731 }
1732 }
1733 }
bf67003b 1734 goto success;
797fc050 1735
bf67003b 1736 case SHT_SYMTAB: /* A symbol table. */
252b5132 1737 if (elf_onesymtab (abfd) == shindex)
bf67003b 1738 goto success;
252b5132 1739
a50b2160 1740 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
1741 goto fail;
1742
3337c1e5 1743 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
eee3b786
AM
1744 {
1745 if (hdr->sh_size != 0)
bf67003b 1746 goto fail;
eee3b786
AM
1747 /* Some assemblers erroneously set sh_info to one with a
1748 zero sh_size. ld sees this as a global symbol count
1749 of (unsigned) -1. Fix it here. */
1750 hdr->sh_info = 0;
bf67003b 1751 goto success;
eee3b786 1752 }
bf67003b 1753
252b5132
RH
1754 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1755 elf_onesymtab (abfd) = shindex;
1756 elf_tdata (abfd)->symtab_hdr = *hdr;
1757 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1758 abfd->flags |= HAS_SYMS;
1759
1760 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1761 SHF_ALLOC is set, and this is a shared object, then we also
1762 treat this section as a BFD section. We can not base the
1763 decision purely on SHF_ALLOC, because that flag is sometimes
1764 set in a relocatable object file, which would confuse the
1765 linker. */
252b5132
RH
1766 if ((hdr->sh_flags & SHF_ALLOC) != 0
1767 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1768 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1769 shindex))
bf67003b 1770 goto fail;
252b5132 1771
1b3a8575
AM
1772 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1773 can't read symbols without that section loaded as well. It
1774 is most likely specified by the next section header. */
1775 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1776 {
1777 unsigned int i, num_sec;
1778
1779 num_sec = elf_numsections (abfd);
1780 for (i = shindex + 1; i < num_sec; i++)
1781 {
1782 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1783 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1784 && hdr2->sh_link == shindex)
1785 break;
1786 }
1787 if (i == num_sec)
1788 for (i = 1; i < shindex; i++)
1789 {
1790 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1791 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1792 && hdr2->sh_link == shindex)
1793 break;
1794 }
1795 if (i != shindex)
bf67003b 1796 ret = bfd_section_from_shdr (abfd, i);
1b3a8575 1797 }
bf67003b 1798 goto success;
252b5132 1799
bf67003b 1800 case SHT_DYNSYM: /* A dynamic symbol table. */
252b5132 1801 if (elf_dynsymtab (abfd) == shindex)
bf67003b 1802 goto success;
252b5132 1803
a50b2160 1804 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
1805 goto fail;
1806
eee3b786
AM
1807 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
1808 {
1809 if (hdr->sh_size != 0)
bf67003b
NC
1810 goto fail;
1811
eee3b786
AM
1812 /* Some linkers erroneously set sh_info to one with a
1813 zero sh_size. ld sees this as a global symbol count
1814 of (unsigned) -1. Fix it here. */
1815 hdr->sh_info = 0;
bf67003b 1816 goto success;
eee3b786 1817 }
bf67003b 1818
252b5132
RH
1819 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1820 elf_dynsymtab (abfd) = shindex;
1821 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1822 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1823 abfd->flags |= HAS_SYMS;
1824
1825 /* Besides being a symbol table, we also treat this as a regular
1826 section, so that objcopy can handle it. */
bf67003b
NC
1827 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1828 goto success;
252b5132 1829
bf67003b 1830 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
9ad5cbcf 1831 if (elf_symtab_shndx (abfd) == shindex)
bf67003b 1832 goto success;
9ad5cbcf 1833
1b3a8575 1834 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1835 elf_symtab_shndx (abfd) = shindex;
1836 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1837 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
bf67003b 1838 goto success;
9ad5cbcf 1839
bf67003b 1840 case SHT_STRTAB: /* A string table. */
252b5132 1841 if (hdr->bfd_section != NULL)
bf67003b
NC
1842 goto success;
1843
252b5132
RH
1844 if (ehdr->e_shstrndx == shindex)
1845 {
1846 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1847 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
bf67003b 1848 goto success;
252b5132 1849 }
bf67003b 1850
1b3a8575
AM
1851 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1852 {
1853 symtab_strtab:
1854 elf_tdata (abfd)->strtab_hdr = *hdr;
1855 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
bf67003b 1856 goto success;
1b3a8575 1857 }
bf67003b 1858
1b3a8575
AM
1859 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1860 {
1861 dynsymtab_strtab:
1862 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1863 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1864 elf_elfsections (abfd)[shindex] = hdr;
1865 /* We also treat this as a regular section, so that objcopy
1866 can handle it. */
bf67003b
NC
1867 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1868 shindex);
1869 goto success;
1b3a8575 1870 }
252b5132 1871
1b3a8575
AM
1872 /* If the string table isn't one of the above, then treat it as a
1873 regular section. We need to scan all the headers to be sure,
1874 just in case this strtab section appeared before the above. */
1875 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1876 {
1877 unsigned int i, num_sec;
252b5132 1878
1b3a8575
AM
1879 num_sec = elf_numsections (abfd);
1880 for (i = 1; i < num_sec; i++)
1881 {
1882 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1883 if (hdr2->sh_link == shindex)
1884 {
933d961a
JJ
1885 /* Prevent endless recursion on broken objects. */
1886 if (i == shindex)
bf67003b 1887 goto fail;
1b3a8575 1888 if (! bfd_section_from_shdr (abfd, i))
bf67003b 1889 goto fail;
1b3a8575
AM
1890 if (elf_onesymtab (abfd) == i)
1891 goto symtab_strtab;
1892 if (elf_dynsymtab (abfd) == i)
1893 goto dynsymtab_strtab;
1894 }
1895 }
1896 }
bf67003b
NC
1897 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1898 goto success;
252b5132
RH
1899
1900 case SHT_REL:
1901 case SHT_RELA:
1902 /* *These* do a lot of work -- but build no sections! */
1903 {
1904 asection *target_sect;
d4730f92 1905 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 1906 unsigned int num_sec = elf_numsections (abfd);
d4730f92
BS
1907 struct bfd_elf_section_data *esdt;
1908 bfd_size_type amt;
252b5132 1909
aa2ca951
JJ
1910 if (hdr->sh_entsize
1911 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160 1912 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
bf67003b 1913 goto fail;
a50b2160 1914
03ae5f59 1915 /* Check for a bogus link to avoid crashing. */
4fbb74a6 1916 if (hdr->sh_link >= num_sec)
03ae5f59
ILT
1917 {
1918 ((*_bfd_error_handler)
d003868e
AM
1919 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1920 abfd, hdr->sh_link, name, shindex));
bf67003b
NC
1921 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1922 shindex);
1923 goto success;
03ae5f59
ILT
1924 }
1925
252b5132
RH
1926 /* For some incomprehensible reason Oracle distributes
1927 libraries for Solaris in which some of the objects have
1928 bogus sh_link fields. It would be nice if we could just
1929 reject them, but, unfortunately, some people need to use
1930 them. We scan through the section headers; if we find only
1931 one suitable symbol table, we clobber the sh_link to point
83b89087
L
1932 to it. I hope this doesn't break anything.
1933
1934 Don't do it on executable nor shared library. */
1935 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
1936 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
1937 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1938 {
9ad5cbcf 1939 unsigned int scan;
252b5132
RH
1940 int found;
1941
1942 found = 0;
9ad5cbcf 1943 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1944 {
1945 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1946 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1947 {
1948 if (found != 0)
1949 {
1950 found = 0;
1951 break;
1952 }
1953 found = scan;
1954 }
1955 }
1956 if (found != 0)
1957 hdr->sh_link = found;
1958 }
1959
1960 /* Get the symbol table. */
1b3a8575
AM
1961 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1962 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1963 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
bf67003b 1964 goto fail;
252b5132
RH
1965
1966 /* If this reloc section does not use the main symbol table we
1967 don't treat it as a reloc section. BFD can't adequately
1968 represent such a section, so at least for now, we don't
c044fabd 1969 try. We just present it as a normal section. We also
60bcf0fa 1970 can't use it as a reloc section if it points to the null
83b89087
L
1971 section, an invalid section, another reloc section, or its
1972 sh_link points to the null section. */
185ef66d 1973 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 1974 || hdr->sh_link == SHN_UNDEF
185ef66d 1975 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
1976 || hdr->sh_info >= num_sec
1977 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
1978 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
bf67003b
NC
1979 {
1980 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1981 shindex);
1982 goto success;
1983 }
252b5132
RH
1984
1985 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
bf67003b
NC
1986 goto fail;
1987
252b5132
RH
1988 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
1989 if (target_sect == NULL)
bf67003b 1990 goto fail;
252b5132 1991
d4730f92
BS
1992 esdt = elf_section_data (target_sect);
1993 if (hdr->sh_type == SHT_RELA)
1994 p_hdr = &esdt->rela.hdr;
252b5132 1995 else
d4730f92
BS
1996 p_hdr = &esdt->rel.hdr;
1997
06614111
NC
1998 /* PR 17512: file: 0b4f81b7. */
1999 if (*p_hdr != NULL)
2000 goto fail;
d4730f92
BS
2001 amt = sizeof (*hdr2);
2002 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, amt);
2003 if (hdr2 == NULL)
bf67003b 2004 goto fail;
252b5132 2005 *hdr2 = *hdr;
d4730f92 2006 *p_hdr = hdr2;
252b5132 2007 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2008 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2009 target_sect->flags |= SEC_RELOC;
2010 target_sect->relocation = NULL;
2011 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2012 /* In the section to which the relocations apply, mark whether
2013 its relocations are of the REL or RELA variety. */
72730e0c 2014 if (hdr->sh_size != 0)
d4730f92
BS
2015 {
2016 if (hdr->sh_type == SHT_RELA)
2017 target_sect->use_rela_p = 1;
2018 }
252b5132 2019 abfd->flags |= HAS_RELOC;
bf67003b 2020 goto success;
252b5132 2021 }
252b5132
RH
2022
2023 case SHT_GNU_verdef:
2024 elf_dynverdef (abfd) = shindex;
2025 elf_tdata (abfd)->dynverdef_hdr = *hdr;
bf67003b
NC
2026 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2027 goto success;
252b5132
RH
2028
2029 case SHT_GNU_versym:
a50b2160 2030 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
bf67003b
NC
2031 goto fail;
2032
252b5132
RH
2033 elf_dynversym (abfd) = shindex;
2034 elf_tdata (abfd)->dynversym_hdr = *hdr;
bf67003b
NC
2035 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2036 goto success;
252b5132
RH
2037
2038 case SHT_GNU_verneed:
2039 elf_dynverref (abfd) = shindex;
2040 elf_tdata (abfd)->dynverref_hdr = *hdr;
bf67003b
NC
2041 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2042 goto success;
252b5132
RH
2043
2044 case SHT_SHLIB:
bf67003b 2045 goto success;
252b5132 2046
dbb410c3 2047 case SHT_GROUP:
44534af3 2048 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
bf67003b
NC
2049 goto fail;
2050
6dc132d9 2051 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2052 goto fail;
2053
dbb410c3
AM
2054 if (hdr->contents != NULL)
2055 {
2056 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
06614111 2057 unsigned int n_elt = hdr->sh_size / sizeof (* idx);
dbb410c3
AM
2058 asection *s;
2059
06614111
NC
2060 if (n_elt == 0)
2061 goto fail;
b885599b
AM
2062 if (idx->flags & GRP_COMDAT)
2063 hdr->bfd_section->flags
2064 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2065
45c5e9ed
L
2066 /* We try to keep the same section order as it comes in. */
2067 idx += n_elt;
06614111 2068
dbb410c3 2069 while (--n_elt != 0)
1783205a
NC
2070 {
2071 --idx;
2072
2073 if (idx->shdr != NULL
2074 && (s = idx->shdr->bfd_section) != NULL
2075 && elf_next_in_group (s) != NULL)
2076 {
2077 elf_next_in_group (hdr->bfd_section) = s;
2078 break;
2079 }
2080 }
dbb410c3 2081 }
bf67003b 2082 goto success;
dbb410c3 2083
252b5132 2084 default:
104d59d1
JM
2085 /* Possibly an attributes section. */
2086 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2087 || hdr->sh_type == bed->obj_attrs_section_type)
2088 {
2089 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2090 goto fail;
104d59d1 2091 _bfd_elf_parse_attributes (abfd, hdr);
bf67003b 2092 goto success;
104d59d1
JM
2093 }
2094
252b5132 2095 /* Check for any processor-specific section types. */
3eb70a79 2096 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2097 goto success;
3eb70a79
L
2098
2099 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2100 {
2101 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2102 /* FIXME: How to properly handle allocated section reserved
2103 for applications? */
2104 (*_bfd_error_handler)
2105 (_("%B: don't know how to handle allocated, application "
2106 "specific section `%s' [0x%8x]"),
2107 abfd, name, hdr->sh_type);
2108 else
bf67003b
NC
2109 {
2110 /* Allow sections reserved for applications. */
2111 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2112 shindex);
2113 goto success;
2114 }
3eb70a79
L
2115 }
2116 else if (hdr->sh_type >= SHT_LOPROC
2117 && hdr->sh_type <= SHT_HIPROC)
2118 /* FIXME: We should handle this section. */
2119 (*_bfd_error_handler)
2120 (_("%B: don't know how to handle processor specific section "
2121 "`%s' [0x%8x]"),
2122 abfd, name, hdr->sh_type);
2123 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
2124 {
2125 /* Unrecognised OS-specific sections. */
2126 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2127 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 2128 required to correctly process the section and the file should
ff15b240
NC
2129 be rejected with an error message. */
2130 (*_bfd_error_handler)
2131 (_("%B: don't know how to handle OS specific section "
2132 "`%s' [0x%8x]"),
2133 abfd, name, hdr->sh_type);
2134 else
bf67003b
NC
2135 {
2136 /* Otherwise it should be processed. */
2137 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2138 goto success;
2139 }
ff15b240 2140 }
3eb70a79
L
2141 else
2142 /* FIXME: We should handle this section. */
2143 (*_bfd_error_handler)
2144 (_("%B: don't know how to handle section `%s' [0x%8x]"),
2145 abfd, name, hdr->sh_type);
2146
bf67003b 2147 goto fail;
252b5132
RH
2148 }
2149
bf67003b
NC
2150 fail:
2151 ret = FALSE;
2152 success:
e5b470e2 2153 if (sections_being_created && sections_being_created_abfd == abfd)
bf67003b
NC
2154 sections_being_created [shindex] = FALSE;
2155 if (-- nesting == 0)
5a4b0ccc
NC
2156 {
2157 sections_being_created = NULL;
2158 sections_being_created_abfd = abfd;
2159 }
bf67003b 2160 return ret;
252b5132
RH
2161}
2162
87d72d41 2163/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2164
87d72d41
AM
2165Elf_Internal_Sym *
2166bfd_sym_from_r_symndx (struct sym_cache *cache,
2167 bfd *abfd,
2168 unsigned long r_symndx)
ec338859 2169{
ec338859
AM
2170 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2171
a5d1b3b5
AM
2172 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2173 {
2174 Elf_Internal_Shdr *symtab_hdr;
2175 unsigned char esym[sizeof (Elf64_External_Sym)];
2176 Elf_External_Sym_Shndx eshndx;
ec338859 2177
a5d1b3b5
AM
2178 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2179 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2180 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2181 return NULL;
9ad5cbcf 2182
a5d1b3b5
AM
2183 if (cache->abfd != abfd)
2184 {
2185 memset (cache->indx, -1, sizeof (cache->indx));
2186 cache->abfd = abfd;
2187 }
2188 cache->indx[ent] = r_symndx;
ec338859 2189 }
a5d1b3b5 2190
87d72d41 2191 return &cache->sym[ent];
ec338859
AM
2192}
2193
252b5132
RH
2194/* Given an ELF section number, retrieve the corresponding BFD
2195 section. */
2196
2197asection *
91d6fa6a 2198bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2199{
91d6fa6a 2200 if (sec_index >= elf_numsections (abfd))
252b5132 2201 return NULL;
91d6fa6a 2202 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2203}
2204
b35d266b 2205static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2206{
0112cd26
NC
2207 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2208 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2209};
2210
b35d266b 2211static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2212{
0112cd26
NC
2213 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2214 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2215};
2216
b35d266b 2217static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2218{
0112cd26
NC
2219 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2220 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
a9a72a65
DE
2221 /* There are more DWARF sections than these, but they needn't be added here
2222 unless you have to cope with broken compilers that don't emit section
2223 attributes or you want to help the user writing assembler. */
0112cd26
NC
2224 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2225 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2226 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2227 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2228 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2229 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2230 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2231 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2232 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2233};
2234
b35d266b 2235static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2236{
0112cd26
NC
2237 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2238 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2239 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2240};
2241
b35d266b 2242static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2243{
0112cd26 2244 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
68efed41 2245 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
0112cd26
NC
2246 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2247 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2248 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2249 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2250 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2251 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2252 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2253 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2254};
2255
b35d266b 2256static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2257{
0112cd26
NC
2258 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2259 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2260};
2261
b35d266b 2262static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2263{
0112cd26
NC
2264 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2265 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2266 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2267 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2268};
2269
b35d266b 2270static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2271{
0112cd26
NC
2272 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2273 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2274};
2275
b35d266b 2276static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2277{
0112cd26
NC
2278 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2279 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2280 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2281};
2282
b35d266b 2283static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2284{
0112cd26
NC
2285 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2286 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2287 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2288};
2289
b35d266b 2290static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2291{
0112cd26
NC
2292 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2293 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2294 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2295 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2296 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2297};
2298
b35d266b 2299static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2300{
0112cd26
NC
2301 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2302 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2303 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2304 /* See struct bfd_elf_special_section declaration for the semantics of
2305 this special case where .prefix_length != strlen (.prefix). */
2306 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2307 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2308};
2309
b35d266b 2310static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2311{
0112cd26
NC
2312 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2313 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2314 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2315 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2316};
2317
1b315056
CS
2318static const struct bfd_elf_special_section special_sections_z[] =
2319{
2320 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2321 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2322 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2323 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2324 { NULL, 0, 0, 0, 0 }
2325};
2326
e4c93b56 2327static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2328{
7f4d3958 2329 special_sections_b, /* 'b' */
98ece1b3 2330 special_sections_c, /* 'c' */
7f4d3958
L
2331 special_sections_d, /* 'd' */
2332 NULL, /* 'e' */
2333 special_sections_f, /* 'f' */
2334 special_sections_g, /* 'g' */
2335 special_sections_h, /* 'h' */
2336 special_sections_i, /* 'i' */
2337 NULL, /* 'j' */
2338 NULL, /* 'k' */
2339 special_sections_l, /* 'l' */
2340 NULL, /* 'm' */
2341 special_sections_n, /* 'n' */
2342 NULL, /* 'o' */
2343 special_sections_p, /* 'p' */
2344 NULL, /* 'q' */
2345 special_sections_r, /* 'r' */
2346 special_sections_s, /* 's' */
2347 special_sections_t, /* 't' */
1b315056
CS
2348 NULL, /* 'u' */
2349 NULL, /* 'v' */
2350 NULL, /* 'w' */
2351 NULL, /* 'x' */
2352 NULL, /* 'y' */
2353 special_sections_z /* 'z' */
7f4d3958
L
2354};
2355
551b43fd
AM
2356const struct bfd_elf_special_section *
2357_bfd_elf_get_special_section (const char *name,
2358 const struct bfd_elf_special_section *spec,
2359 unsigned int rela)
2f89ff8d
L
2360{
2361 int i;
7f4d3958 2362 int len;
7f4d3958 2363
551b43fd 2364 len = strlen (name);
7f4d3958 2365
551b43fd 2366 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2367 {
2368 int suffix_len;
551b43fd 2369 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2370
2371 if (len < prefix_len)
2372 continue;
551b43fd 2373 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2374 continue;
2375
551b43fd 2376 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2377 if (suffix_len <= 0)
2378 {
2379 if (name[prefix_len] != 0)
2380 {
2381 if (suffix_len == 0)
2382 continue;
2383 if (name[prefix_len] != '.'
2384 && (suffix_len == -2
551b43fd 2385 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2386 continue;
2387 }
2388 }
2389 else
2390 {
2391 if (len < prefix_len + suffix_len)
2392 continue;
2393 if (memcmp (name + len - suffix_len,
551b43fd 2394 spec[i].prefix + prefix_len,
7dcb9820
AM
2395 suffix_len) != 0)
2396 continue;
2397 }
551b43fd 2398 return &spec[i];
7dcb9820 2399 }
2f89ff8d
L
2400
2401 return NULL;
2402}
2403
7dcb9820 2404const struct bfd_elf_special_section *
29ef7005 2405_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2406{
551b43fd
AM
2407 int i;
2408 const struct bfd_elf_special_section *spec;
29ef7005 2409 const struct elf_backend_data *bed;
2f89ff8d
L
2410
2411 /* See if this is one of the special sections. */
551b43fd
AM
2412 if (sec->name == NULL)
2413 return NULL;
2f89ff8d 2414
29ef7005
L
2415 bed = get_elf_backend_data (abfd);
2416 spec = bed->special_sections;
2417 if (spec)
2418 {
2419 spec = _bfd_elf_get_special_section (sec->name,
2420 bed->special_sections,
2421 sec->use_rela_p);
2422 if (spec != NULL)
2423 return spec;
2424 }
2425
551b43fd
AM
2426 if (sec->name[0] != '.')
2427 return NULL;
2f89ff8d 2428
551b43fd 2429 i = sec->name[1] - 'b';
1b315056 2430 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2431 return NULL;
2432
2433 spec = special_sections[i];
2f89ff8d 2434
551b43fd
AM
2435 if (spec == NULL)
2436 return NULL;
2437
2438 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2439}
2440
b34976b6 2441bfd_boolean
217aa764 2442_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2443{
2444 struct bfd_elf_section_data *sdata;
551b43fd 2445 const struct elf_backend_data *bed;
7dcb9820 2446 const struct bfd_elf_special_section *ssect;
252b5132 2447
f0abc2a1
AM
2448 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2449 if (sdata == NULL)
2450 {
a50b1753
NC
2451 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2452 sizeof (*sdata));
f0abc2a1
AM
2453 if (sdata == NULL)
2454 return FALSE;
217aa764 2455 sec->used_by_bfd = sdata;
f0abc2a1 2456 }
bf572ba0 2457
551b43fd
AM
2458 /* Indicate whether or not this section should use RELA relocations. */
2459 bed = get_elf_backend_data (abfd);
2460 sec->use_rela_p = bed->default_use_rela_p;
2461
e843e0f8
L
2462 /* When we read a file, we don't need to set ELF section type and
2463 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2464 anyway. We will set ELF section type and flags for all linker
2465 created sections. If user specifies BFD section flags, we will
2466 set ELF section type and flags based on BFD section flags in
02ecc8e9
L
2467 elf_fake_sections. Special handling for .init_array/.fini_array
2468 output sections since they may contain .ctors/.dtors input
2469 sections. We don't want _bfd_elf_init_private_section_data to
2470 copy ELF section type from .ctors/.dtors input sections. */
2471 if (abfd->direction != read_direction
3496cb2a 2472 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2473 {
551b43fd 2474 ssect = (*bed->get_sec_type_attr) (abfd, sec);
02ecc8e9
L
2475 if (ssect != NULL
2476 && (!sec->flags
2477 || (sec->flags & SEC_LINKER_CREATED) != 0
2478 || ssect->type == SHT_INIT_ARRAY
2479 || ssect->type == SHT_FINI_ARRAY))
a31501e9
L
2480 {
2481 elf_section_type (sec) = ssect->type;
2482 elf_section_flags (sec) = ssect->attr;
2483 }
2f89ff8d
L
2484 }
2485
f592407e 2486 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2487}
2488
2489/* Create a new bfd section from an ELF program header.
2490
2491 Since program segments have no names, we generate a synthetic name
2492 of the form segment<NUM>, where NUM is generally the index in the
2493 program header table. For segments that are split (see below) we
2494 generate the names segment<NUM>a and segment<NUM>b.
2495
2496 Note that some program segments may have a file size that is different than
2497 (less than) the memory size. All this means is that at execution the
2498 system must allocate the amount of memory specified by the memory size,
2499 but only initialize it with the first "file size" bytes read from the
2500 file. This would occur for example, with program segments consisting
2501 of combined data+bss.
2502
2503 To handle the above situation, this routine generates TWO bfd sections
2504 for the single program segment. The first has the length specified by
2505 the file size of the segment, and the second has the length specified
2506 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2507 into its initialized and uninitialized parts.
252b5132
RH
2508
2509 */
2510
b34976b6 2511bfd_boolean
217aa764
AM
2512_bfd_elf_make_section_from_phdr (bfd *abfd,
2513 Elf_Internal_Phdr *hdr,
91d6fa6a 2514 int hdr_index,
a50b1753 2515 const char *type_name)
252b5132
RH
2516{
2517 asection *newsect;
2518 char *name;
2519 char namebuf[64];
d4c88bbb 2520 size_t len;
252b5132
RH
2521 int split;
2522
2523 split = ((hdr->p_memsz > 0)
2524 && (hdr->p_filesz > 0)
2525 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2526
2527 if (hdr->p_filesz > 0)
252b5132 2528 {
91d6fa6a 2529 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2530 len = strlen (namebuf) + 1;
a50b1753 2531 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2532 if (!name)
2533 return FALSE;
2534 memcpy (name, namebuf, len);
2535 newsect = bfd_make_section (abfd, name);
2536 if (newsect == NULL)
2537 return FALSE;
2538 newsect->vma = hdr->p_vaddr;
2539 newsect->lma = hdr->p_paddr;
2540 newsect->size = hdr->p_filesz;
2541 newsect->filepos = hdr->p_offset;
2542 newsect->flags |= SEC_HAS_CONTENTS;
2543 newsect->alignment_power = bfd_log2 (hdr->p_align);
2544 if (hdr->p_type == PT_LOAD)
252b5132 2545 {
d5191d0c
AM
2546 newsect->flags |= SEC_ALLOC;
2547 newsect->flags |= SEC_LOAD;
2548 if (hdr->p_flags & PF_X)
2549 {
2550 /* FIXME: all we known is that it has execute PERMISSION,
2551 may be data. */
2552 newsect->flags |= SEC_CODE;
2553 }
2554 }
2555 if (!(hdr->p_flags & PF_W))
2556 {
2557 newsect->flags |= SEC_READONLY;
252b5132 2558 }
252b5132
RH
2559 }
2560
d5191d0c 2561 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2562 {
d5191d0c
AM
2563 bfd_vma align;
2564
91d6fa6a 2565 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2566 len = strlen (namebuf) + 1;
a50b1753 2567 name = (char *) bfd_alloc (abfd, len);
252b5132 2568 if (!name)
b34976b6 2569 return FALSE;
d4c88bbb 2570 memcpy (name, namebuf, len);
252b5132
RH
2571 newsect = bfd_make_section (abfd, name);
2572 if (newsect == NULL)
b34976b6 2573 return FALSE;
252b5132
RH
2574 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2575 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2576 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2577 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2578 align = newsect->vma & -newsect->vma;
2579 if (align == 0 || align > hdr->p_align)
2580 align = hdr->p_align;
2581 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2582 if (hdr->p_type == PT_LOAD)
2583 {
d5191d0c
AM
2584 /* Hack for gdb. Segments that have not been modified do
2585 not have their contents written to a core file, on the
2586 assumption that a debugger can find the contents in the
2587 executable. We flag this case by setting the fake
2588 section size to zero. Note that "real" bss sections will
2589 always have their contents dumped to the core file. */
2590 if (bfd_get_format (abfd) == bfd_core)
2591 newsect->size = 0;
252b5132
RH
2592 newsect->flags |= SEC_ALLOC;
2593 if (hdr->p_flags & PF_X)
2594 newsect->flags |= SEC_CODE;
2595 }
2596 if (!(hdr->p_flags & PF_W))
2597 newsect->flags |= SEC_READONLY;
2598 }
2599
b34976b6 2600 return TRUE;
252b5132
RH
2601}
2602
b34976b6 2603bfd_boolean
91d6fa6a 2604bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2605{
9c5bfbb7 2606 const struct elf_backend_data *bed;
20cfcaae
NC
2607
2608 switch (hdr->p_type)
2609 {
2610 case PT_NULL:
91d6fa6a 2611 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2612
2613 case PT_LOAD:
91d6fa6a 2614 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2615
2616 case PT_DYNAMIC:
91d6fa6a 2617 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2618
2619 case PT_INTERP:
91d6fa6a 2620 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2621
2622 case PT_NOTE:
91d6fa6a 2623 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2624 return FALSE;
718175fa 2625 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2626 return FALSE;
2627 return TRUE;
20cfcaae
NC
2628
2629 case PT_SHLIB:
91d6fa6a 2630 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
2631
2632 case PT_PHDR:
91d6fa6a 2633 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 2634
811072d8 2635 case PT_GNU_EH_FRAME:
91d6fa6a 2636 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
2637 "eh_frame_hdr");
2638
2b05f1b7 2639 case PT_GNU_STACK:
91d6fa6a 2640 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 2641
8c37241b 2642 case PT_GNU_RELRO:
91d6fa6a 2643 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 2644
20cfcaae 2645 default:
8c1acd09 2646 /* Check for any processor-specific program segment types. */
20cfcaae 2647 bed = get_elf_backend_data (abfd);
91d6fa6a 2648 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
2649 }
2650}
2651
d4730f92
BS
2652/* Return the REL_HDR for SEC, assuming there is only a single one, either
2653 REL or RELA. */
2654
2655Elf_Internal_Shdr *
2656_bfd_elf_single_rel_hdr (asection *sec)
2657{
2658 if (elf_section_data (sec)->rel.hdr)
2659 {
2660 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
2661 return elf_section_data (sec)->rel.hdr;
2662 }
2663 else
2664 return elf_section_data (sec)->rela.hdr;
2665}
2666
2667/* Allocate and initialize a section-header for a new reloc section,
2668 containing relocations against ASECT. It is stored in RELDATA. If
2669 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
2670 relocations. */
23bc299b 2671
5d13b3b3 2672static bfd_boolean
217aa764 2673_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 2674 struct bfd_elf_section_reloc_data *reldata,
217aa764
AM
2675 asection *asect,
2676 bfd_boolean use_rela_p)
23bc299b 2677{
d4730f92 2678 Elf_Internal_Shdr *rel_hdr;
23bc299b 2679 char *name;
9c5bfbb7 2680 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92
BS
2681 bfd_size_type amt;
2682
2683 amt = sizeof (Elf_Internal_Shdr);
2684 BFD_ASSERT (reldata->hdr == NULL);
2685 rel_hdr = bfd_zalloc (abfd, amt);
2686 reldata->hdr = rel_hdr;
23bc299b 2687
d324f6d6 2688 amt = sizeof ".rela" + strlen (asect->name);
a50b1753 2689 name = (char *) bfd_alloc (abfd, amt);
23bc299b 2690 if (name == NULL)
b34976b6 2691 return FALSE;
23bc299b
MM
2692 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2693 rel_hdr->sh_name =
2b0f7ef9 2694 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2695 FALSE);
23bc299b 2696 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2697 return FALSE;
23bc299b
MM
2698 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2699 rel_hdr->sh_entsize = (use_rela_p
2700 ? bed->s->sizeof_rela
2701 : bed->s->sizeof_rel);
72de5009 2702 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
2703 rel_hdr->sh_flags = 0;
2704 rel_hdr->sh_addr = 0;
2705 rel_hdr->sh_size = 0;
2706 rel_hdr->sh_offset = 0;
2707
b34976b6 2708 return TRUE;
23bc299b
MM
2709}
2710
94be91de
JB
2711/* Return the default section type based on the passed in section flags. */
2712
2713int
2714bfd_elf_get_default_section_type (flagword flags)
2715{
2716 if ((flags & SEC_ALLOC) != 0
2e76e85a 2717 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
2718 return SHT_NOBITS;
2719 return SHT_PROGBITS;
2720}
2721
d4730f92
BS
2722struct fake_section_arg
2723{
2724 struct bfd_link_info *link_info;
2725 bfd_boolean failed;
2726};
2727
252b5132
RH
2728/* Set up an ELF internal section header for a section. */
2729
252b5132 2730static void
d4730f92 2731elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 2732{
d4730f92 2733 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 2734 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 2735 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 2736 Elf_Internal_Shdr *this_hdr;
0414f35b 2737 unsigned int sh_type;
252b5132 2738
d4730f92 2739 if (arg->failed)
252b5132
RH
2740 {
2741 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2742 loop. */
252b5132
RH
2743 return;
2744 }
2745
d4730f92 2746 this_hdr = &esd->this_hdr;
252b5132 2747
e57b5356
AM
2748 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2749 asect->name, FALSE);
2750 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2751 {
d4730f92 2752 arg->failed = TRUE;
252b5132
RH
2753 return;
2754 }
2755
a4d8e49b 2756 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2757
2758 if ((asect->flags & SEC_ALLOC) != 0
2759 || asect->user_set_vma)
2760 this_hdr->sh_addr = asect->vma;
2761 else
2762 this_hdr->sh_addr = 0;
2763
2764 this_hdr->sh_offset = 0;
eea6121a 2765 this_hdr->sh_size = asect->size;
252b5132 2766 this_hdr->sh_link = 0;
c86934ce
NC
2767 /* PR 17512: file: 0eb809fe, 8b0535ee. */
2768 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
2769 {
2770 (*_bfd_error_handler)
2771 (_("%B: error: Alignment power %d of section `%A' is too big"),
2772 abfd, asect, asect->alignment_power);
2773 arg->failed = TRUE;
2774 return;
2775 }
72de5009 2776 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
2777 /* The sh_entsize and sh_info fields may have been set already by
2778 copy_private_section_data. */
2779
2780 this_hdr->bfd_section = asect;
2781 this_hdr->contents = NULL;
2782
3cddba1e
L
2783 /* If the section type is unspecified, we set it based on
2784 asect->flags. */
98ece1b3
AM
2785 if ((asect->flags & SEC_GROUP) != 0)
2786 sh_type = SHT_GROUP;
98ece1b3 2787 else
94be91de 2788 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 2789
3cddba1e 2790 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
2791 this_hdr->sh_type = sh_type;
2792 else if (this_hdr->sh_type == SHT_NOBITS
2793 && sh_type == SHT_PROGBITS
2794 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 2795 {
98ece1b3
AM
2796 /* Warn if we are changing a NOBITS section to PROGBITS, but
2797 allow the link to proceed. This can happen when users link
2798 non-bss input sections to bss output sections, or emit data
2799 to a bss output section via a linker script. */
2800 (*_bfd_error_handler)
58f0869b 2801 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 2802 this_hdr->sh_type = sh_type;
3cddba1e
L
2803 }
2804
2f89ff8d 2805 switch (this_hdr->sh_type)
252b5132 2806 {
2f89ff8d 2807 default:
2f89ff8d
L
2808 break;
2809
2810 case SHT_STRTAB:
2811 case SHT_INIT_ARRAY:
2812 case SHT_FINI_ARRAY:
2813 case SHT_PREINIT_ARRAY:
2814 case SHT_NOTE:
2815 case SHT_NOBITS:
2816 case SHT_PROGBITS:
2817 break;
2818
2819 case SHT_HASH:
c7ac6ff8 2820 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2821 break;
5de3bf90 2822
2f89ff8d 2823 case SHT_DYNSYM:
252b5132 2824 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2825 break;
2826
2827 case SHT_DYNAMIC:
252b5132 2828 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2829 break;
2830
2831 case SHT_RELA:
2832 if (get_elf_backend_data (abfd)->may_use_rela_p)
2833 this_hdr->sh_entsize = bed->s->sizeof_rela;
2834 break;
2835
2836 case SHT_REL:
2837 if (get_elf_backend_data (abfd)->may_use_rel_p)
2838 this_hdr->sh_entsize = bed->s->sizeof_rel;
2839 break;
2840
2841 case SHT_GNU_versym:
252b5132 2842 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2843 break;
2844
2845 case SHT_GNU_verdef:
252b5132
RH
2846 this_hdr->sh_entsize = 0;
2847 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2848 cverdefs. The linker will set cverdefs, but sh_info will be
2849 zero. */
252b5132
RH
2850 if (this_hdr->sh_info == 0)
2851 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2852 else
2853 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2854 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2855 break;
2856
2857 case SHT_GNU_verneed:
252b5132
RH
2858 this_hdr->sh_entsize = 0;
2859 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2860 cverrefs. The linker will set cverrefs, but sh_info will be
2861 zero. */
252b5132
RH
2862 if (this_hdr->sh_info == 0)
2863 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2864 else
2865 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2866 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2867 break;
2868
2869 case SHT_GROUP:
1783205a 2870 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 2871 break;
fdc90cb4
JJ
2872
2873 case SHT_GNU_HASH:
2874 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2875 break;
dbb410c3 2876 }
252b5132
RH
2877
2878 if ((asect->flags & SEC_ALLOC) != 0)
2879 this_hdr->sh_flags |= SHF_ALLOC;
2880 if ((asect->flags & SEC_READONLY) == 0)
2881 this_hdr->sh_flags |= SHF_WRITE;
2882 if ((asect->flags & SEC_CODE) != 0)
2883 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2884 if ((asect->flags & SEC_MERGE) != 0)
2885 {
2886 this_hdr->sh_flags |= SHF_MERGE;
2887 this_hdr->sh_entsize = asect->entsize;
2888 if ((asect->flags & SEC_STRINGS) != 0)
2889 this_hdr->sh_flags |= SHF_STRINGS;
2890 }
1126897b 2891 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2892 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2893 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2894 {
2895 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2896 if (asect->size == 0
2897 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2898 {
3a800eb9 2899 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2900
704afa60 2901 this_hdr->sh_size = 0;
3a800eb9
AM
2902 if (o != NULL)
2903 {
704afa60 2904 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2905 if (this_hdr->sh_size != 0)
2906 this_hdr->sh_type = SHT_NOBITS;
2907 }
704afa60
JJ
2908 }
2909 }
18ae9cc1
L
2910 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
2911 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 2912
d4730f92
BS
2913 /* If the section has relocs, set up a section header for the
2914 SHT_REL[A] section. If two relocation sections are required for
2915 this section, it is up to the processor-specific back-end to
2916 create the other. */
2917 if ((asect->flags & SEC_RELOC) != 0)
2918 {
2919 /* When doing a relocatable link, create both REL and RELA sections if
2920 needed. */
2921 if (arg->link_info
2922 /* Do the normal setup if we wouldn't create any sections here. */
2923 && esd->rel.count + esd->rela.count > 0
2924 && (arg->link_info->relocatable || arg->link_info->emitrelocations))
2925 {
2926 if (esd->rel.count && esd->rel.hdr == NULL
2927 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, asect, FALSE))
2928 {
2929 arg->failed = TRUE;
2930 return;
2931 }
2932 if (esd->rela.count && esd->rela.hdr == NULL
2933 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, asect, TRUE))
2934 {
2935 arg->failed = TRUE;
2936 return;
2937 }
2938 }
2939 else if (!_bfd_elf_init_reloc_shdr (abfd,
2940 (asect->use_rela_p
2941 ? &esd->rela : &esd->rel),
2942 asect,
2943 asect->use_rela_p))
2944 arg->failed = TRUE;
2945 }
2946
252b5132 2947 /* Check for processor-specific section types. */
0414f35b 2948 sh_type = this_hdr->sh_type;
e1fddb6b
AO
2949 if (bed->elf_backend_fake_sections
2950 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
d4730f92 2951 arg->failed = TRUE;
252b5132 2952
42bb2e33 2953 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
2954 {
2955 /* Don't change the header type from NOBITS if we are being
42bb2e33 2956 called for objcopy --only-keep-debug. */
0414f35b
AM
2957 this_hdr->sh_type = sh_type;
2958 }
252b5132
RH
2959}
2960
bcacc0f5
AM
2961/* Fill in the contents of a SHT_GROUP section. Called from
2962 _bfd_elf_compute_section_file_positions for gas, objcopy, and
2963 when ELF targets use the generic linker, ld. Called for ld -r
2964 from bfd_elf_final_link. */
dbb410c3 2965
1126897b 2966void
217aa764 2967bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2968{
a50b1753 2969 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 2970 asection *elt, *first;
dbb410c3 2971 unsigned char *loc;
b34976b6 2972 bfd_boolean gas;
dbb410c3 2973
7e4111ad
L
2974 /* Ignore linker created group section. See elfNN_ia64_object_p in
2975 elfxx-ia64.c. */
2976 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2977 || *failedptr)
2978 return;
2979
bcacc0f5
AM
2980 if (elf_section_data (sec)->this_hdr.sh_info == 0)
2981 {
2982 unsigned long symindx = 0;
2983
2984 /* elf_group_id will have been set up by objcopy and the
2985 generic linker. */
2986 if (elf_group_id (sec) != NULL)
2987 symindx = elf_group_id (sec)->udata.i;
1126897b 2988
bcacc0f5
AM
2989 if (symindx == 0)
2990 {
2991 /* If called from the assembler, swap_out_syms will have set up
2992 elf_section_syms. */
2993 BFD_ASSERT (elf_section_syms (abfd) != NULL);
2994 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2995 }
2996 elf_section_data (sec)->this_hdr.sh_info = symindx;
2997 }
2998 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 2999 {
bcacc0f5
AM
3000 /* The ELF backend linker sets sh_info to -2 when the group
3001 signature symbol is global, and thus the index can't be
3002 set until all local symbols are output. */
3003 asection *igroup = elf_sec_group (elf_next_in_group (sec));
3004 struct bfd_elf_section_data *sec_data = elf_section_data (igroup);
3005 unsigned long symndx = sec_data->this_hdr.sh_info;
3006 unsigned long extsymoff = 0;
3007 struct elf_link_hash_entry *h;
3008
3009 if (!elf_bad_symtab (igroup->owner))
3010 {
3011 Elf_Internal_Shdr *symtab_hdr;
3012
3013 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3014 extsymoff = symtab_hdr->sh_info;
3015 }
3016 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3017 while (h->root.type == bfd_link_hash_indirect
3018 || h->root.type == bfd_link_hash_warning)
3019 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3020
3021 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 3022 }
dbb410c3 3023
1126897b 3024 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 3025 gas = TRUE;
dbb410c3
AM
3026 if (sec->contents == NULL)
3027 {
b34976b6 3028 gas = FALSE;
a50b1753 3029 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
3030
3031 /* Arrange for the section to be written out. */
3032 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
3033 if (sec->contents == NULL)
3034 {
b34976b6 3035 *failedptr = TRUE;
dbb410c3
AM
3036 return;
3037 }
3038 }
3039
eea6121a 3040 loc = sec->contents + sec->size;
dbb410c3 3041
9dce4196
AM
3042 /* Get the pointer to the first section in the group that gas
3043 squirreled away here. objcopy arranges for this to be set to the
3044 start of the input section group. */
3045 first = elt = elf_next_in_group (sec);
dbb410c3
AM
3046
3047 /* First element is a flag word. Rest of section is elf section
3048 indices for all the sections of the group. Write them backwards
3049 just to keep the group in the same order as given in .section
3050 directives, not that it matters. */
3051 while (elt != NULL)
3052 {
9dce4196 3053 asection *s;
9dce4196 3054
9dce4196 3055 s = elt;
415f38a6
AM
3056 if (!gas)
3057 s = s->output_section;
3058 if (s != NULL
3059 && !bfd_is_abs_section (s))
01e1a5bc 3060 {
415f38a6
AM
3061 unsigned int idx = elf_section_data (s)->this_idx;
3062
01e1a5bc 3063 loc -= 4;
01e1a5bc
NC
3064 H_PUT_32 (abfd, idx, loc);
3065 }
945906ff 3066 elt = elf_next_in_group (elt);
9dce4196
AM
3067 if (elt == first)
3068 break;
dbb410c3
AM
3069 }
3070
3d7f7666 3071 if ((loc -= 4) != sec->contents)
9dce4196 3072 abort ();
dbb410c3 3073
9dce4196 3074 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
3075}
3076
bd53a53a
L
3077/* Return the section which RELOC_SEC applies to. */
3078
3079asection *
3080_bfd_elf_get_reloc_section (asection *reloc_sec)
3081{
3082 const char *name;
3083 unsigned int type;
3084 bfd *abfd;
3085
3086 if (reloc_sec == NULL)
3087 return NULL;
3088
3089 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3090 if (type != SHT_REL && type != SHT_RELA)
3091 return NULL;
3092
3093 /* We look up the section the relocs apply to by name. */
3094 name = reloc_sec->name;
3095 if (type == SHT_REL)
3096 name += 4;
3097 else
3098 name += 5;
3099
3100 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3101 section apply to .got.plt section. */
3102 abfd = reloc_sec->owner;
3103 if (get_elf_backend_data (abfd)->want_got_plt
3104 && strcmp (name, ".plt") == 0)
87070c08
AM
3105 {
3106 /* .got.plt is a linker created input section. It may be mapped
3107 to some other output section. Try two likely sections. */
3108 name = ".got.plt";
3109 reloc_sec = bfd_get_section_by_name (abfd, name);
3110 if (reloc_sec != NULL)
3111 return reloc_sec;
3112 name = ".got";
3113 }
bd53a53a
L
3114
3115 reloc_sec = bfd_get_section_by_name (abfd, name);
3116 return reloc_sec;
3117}
3118
252b5132
RH
3119/* Assign all ELF section numbers. The dummy first section is handled here
3120 too. The link/info pointers for the standard section types are filled
3121 in here too, while we're at it. */
3122
b34976b6 3123static bfd_boolean
da9f89d4 3124assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
3125{
3126 struct elf_obj_tdata *t = elf_tdata (abfd);
3127 asection *sec;
2b0f7ef9 3128 unsigned int section_number, secn;
252b5132 3129 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 3130 struct bfd_elf_section_data *d;
3516e984 3131 bfd_boolean need_symtab;
252b5132
RH
3132
3133 section_number = 1;
3134
2b0f7ef9
JJ
3135 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3136
da9f89d4
L
3137 /* SHT_GROUP sections are in relocatable files only. */
3138 if (link_info == NULL || link_info->relocatable)
252b5132 3139 {
da9f89d4 3140 /* Put SHT_GROUP sections first. */
04dd1667 3141 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 3142 {
5daa8fe7 3143 d = elf_section_data (sec);
da9f89d4
L
3144
3145 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 3146 {
5daa8fe7 3147 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
3148 {
3149 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 3150 bfd_section_list_remove (abfd, sec);
da9f89d4 3151 abfd->section_count--;
da9f89d4 3152 }
08a40648 3153 else
4fbb74a6 3154 d->this_idx = section_number++;
da9f89d4 3155 }
47cc2cf5
PB
3156 }
3157 }
3158
3159 for (sec = abfd->sections; sec; sec = sec->next)
3160 {
3161 d = elf_section_data (sec);
3162
3163 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 3164 d->this_idx = section_number++;
2b0f7ef9 3165 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 3166 if (d->rel.hdr)
2b0f7ef9 3167 {
d4730f92
BS
3168 d->rel.idx = section_number++;
3169 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 3170 }
d4730f92
BS
3171 else
3172 d->rel.idx = 0;
23bc299b 3173
d4730f92 3174 if (d->rela.hdr)
2b0f7ef9 3175 {
d4730f92
BS
3176 d->rela.idx = section_number++;
3177 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 3178 }
23bc299b 3179 else
d4730f92 3180 d->rela.idx = 0;
252b5132
RH
3181 }
3182
12bd6957 3183 elf_shstrtab_sec (abfd) = section_number++;
2b0f7ef9 3184 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
12bd6957 3185 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
252b5132 3186
3516e984
L
3187 need_symtab = (bfd_get_symcount (abfd) > 0
3188 || (link_info == NULL
3189 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3190 == HAS_RELOC)));
3191 if (need_symtab)
252b5132 3192 {
12bd6957 3193 elf_onesymtab (abfd) = section_number++;
2b0f7ef9 3194 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 3195 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 3196 {
12bd6957 3197 elf_symtab_shndx (abfd) = section_number++;
9ad5cbcf
AM
3198 t->symtab_shndx_hdr.sh_name
3199 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3200 ".symtab_shndx", FALSE);
9ad5cbcf 3201 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 3202 return FALSE;
9ad5cbcf 3203 }
12bd6957 3204 elf_strtab_sec (abfd) = section_number++;
2b0f7ef9 3205 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3206 }
3207
1c52a645
L
3208 if (section_number >= SHN_LORESERVE)
3209 {
3210 _bfd_error_handler (_("%B: too many sections: %u"),
3211 abfd, section_number);
3212 return FALSE;
3213 }
3214
2b0f7ef9
JJ
3215 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
3216 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
3217
3218 elf_numsections (abfd) = section_number;
252b5132
RH
3219 elf_elfheader (abfd)->e_shnum = section_number;
3220
3221 /* Set up the list of section header pointers, in agreement with the
3222 indices. */
a50b1753
NC
3223 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
3224 sizeof (Elf_Internal_Shdr *));
252b5132 3225 if (i_shdrp == NULL)
b34976b6 3226 return FALSE;
252b5132 3227
a50b1753
NC
3228 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3229 sizeof (Elf_Internal_Shdr));
252b5132
RH
3230 if (i_shdrp[0] == NULL)
3231 {
3232 bfd_release (abfd, i_shdrp);
b34976b6 3233 return FALSE;
252b5132 3234 }
252b5132
RH
3235
3236 elf_elfsections (abfd) = i_shdrp;
3237
12bd6957 3238 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3516e984 3239 if (need_symtab)
252b5132 3240 {
12bd6957 3241 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
4fbb74a6 3242 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf 3243 {
12bd6957
AM
3244 i_shdrp[elf_symtab_shndx (abfd)] = &t->symtab_shndx_hdr;
3245 t->symtab_shndx_hdr.sh_link = elf_onesymtab (abfd);
9ad5cbcf 3246 }
12bd6957
AM
3247 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3248 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
252b5132 3249 }
38ce5b11 3250
252b5132
RH
3251 for (sec = abfd->sections; sec; sec = sec->next)
3252 {
252b5132 3253 asection *s;
252b5132 3254
91d6fa6a
NC
3255 d = elf_section_data (sec);
3256
252b5132 3257 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3258 if (d->rel.idx != 0)
3259 i_shdrp[d->rel.idx] = d->rel.hdr;
3260 if (d->rela.idx != 0)
3261 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3262
3263 /* Fill in the sh_link and sh_info fields while we're at it. */
3264
3265 /* sh_link of a reloc section is the section index of the symbol
3266 table. sh_info is the section index of the section to which
3267 the relocation entries apply. */
d4730f92 3268 if (d->rel.idx != 0)
252b5132 3269 {
12bd6957 3270 d->rel.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3271 d->rel.hdr->sh_info = d->this_idx;
9ef5d938 3272 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
252b5132 3273 }
d4730f92 3274 if (d->rela.idx != 0)
23bc299b 3275 {
12bd6957 3276 d->rela.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3277 d->rela.hdr->sh_info = d->this_idx;
9ef5d938 3278 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
23bc299b 3279 }
252b5132 3280
38ce5b11
L
3281 /* We need to set up sh_link for SHF_LINK_ORDER. */
3282 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3283 {
3284 s = elf_linked_to_section (sec);
3285 if (s)
38ce5b11 3286 {
f2876037 3287 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3288 if (link_info != NULL)
38ce5b11 3289 {
f2876037 3290 /* Check discarded linkonce section. */
dbaa2011 3291 if (discarded_section (s))
38ce5b11 3292 {
ccd2ec6a
L
3293 asection *kept;
3294 (*_bfd_error_handler)
3295 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3296 abfd, d->this_hdr.bfd_section,
3297 s, s->owner);
3298 /* Point to the kept section if it has the same
3299 size as the discarded one. */
c0f00686 3300 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3301 if (kept == NULL)
185d09ad 3302 {
ccd2ec6a
L
3303 bfd_set_error (bfd_error_bad_value);
3304 return FALSE;
185d09ad 3305 }
ccd2ec6a 3306 s = kept;
38ce5b11 3307 }
e424ecc8 3308
ccd2ec6a
L
3309 s = s->output_section;
3310 BFD_ASSERT (s != NULL);
38ce5b11 3311 }
f2876037
L
3312 else
3313 {
3314 /* Handle objcopy. */
3315 if (s->output_section == NULL)
3316 {
3317 (*_bfd_error_handler)
3318 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
3319 abfd, d->this_hdr.bfd_section, s, s->owner);
3320 bfd_set_error (bfd_error_bad_value);
3321 return FALSE;
3322 }
3323 s = s->output_section;
3324 }
ccd2ec6a
L
3325 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3326 }
3327 else
3328 {
3329 /* PR 290:
3330 The Intel C compiler generates SHT_IA_64_UNWIND with
3331 SHF_LINK_ORDER. But it doesn't set the sh_link or
3332 sh_info fields. Hence we could get the situation
08a40648 3333 where s is NULL. */
ccd2ec6a
L
3334 const struct elf_backend_data *bed
3335 = get_elf_backend_data (abfd);
3336 if (bed->link_order_error_handler)
3337 bed->link_order_error_handler
3338 (_("%B: warning: sh_link not set for section `%A'"),
3339 abfd, sec);
38ce5b11
L
3340 }
3341 }
3342
252b5132
RH
3343 switch (d->this_hdr.sh_type)
3344 {
3345 case SHT_REL:
3346 case SHT_RELA:
3347 /* A reloc section which we are treating as a normal BFD
3348 section. sh_link is the section index of the symbol
3349 table. sh_info is the section index of the section to
3350 which the relocation entries apply. We assume that an
3351 allocated reloc section uses the dynamic symbol table.
3352 FIXME: How can we be sure? */
3353 s = bfd_get_section_by_name (abfd, ".dynsym");
3354 if (s != NULL)
3355 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3356
bd53a53a 3357 s = get_elf_backend_data (abfd)->get_reloc_section (sec);
252b5132 3358 if (s != NULL)
9ef5d938
L
3359 {
3360 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3361 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3362 }
252b5132
RH
3363 break;
3364
3365 case SHT_STRTAB:
3366 /* We assume that a section named .stab*str is a stabs
3367 string section. We look for a section with the same name
3368 but without the trailing ``str'', and set its sh_link
3369 field to point to this section. */
0112cd26 3370 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3371 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3372 {
3373 size_t len;
3374 char *alc;
3375
3376 len = strlen (sec->name);
a50b1753 3377 alc = (char *) bfd_malloc (len - 2);
252b5132 3378 if (alc == NULL)
b34976b6 3379 return FALSE;
d4c88bbb 3380 memcpy (alc, sec->name, len - 3);
252b5132
RH
3381 alc[len - 3] = '\0';
3382 s = bfd_get_section_by_name (abfd, alc);
3383 free (alc);
3384 if (s != NULL)
3385 {
3386 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3387
3388 /* This is a .stab section. */
0594c12d
AM
3389 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3390 elf_section_data (s)->this_hdr.sh_entsize
3391 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3392 }
3393 }
3394 break;
3395
3396 case SHT_DYNAMIC:
3397 case SHT_DYNSYM:
3398 case SHT_GNU_verneed:
3399 case SHT_GNU_verdef:
3400 /* sh_link is the section header index of the string table
3401 used for the dynamic entries, or the symbol table, or the
3402 version strings. */
3403 s = bfd_get_section_by_name (abfd, ".dynstr");
3404 if (s != NULL)
3405 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3406 break;
3407
7f1204bb
JJ
3408 case SHT_GNU_LIBLIST:
3409 /* sh_link is the section header index of the prelink library
08a40648
AM
3410 list used for the dynamic entries, or the symbol table, or
3411 the version strings. */
7f1204bb
JJ
3412 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3413 ? ".dynstr" : ".gnu.libstr");
3414 if (s != NULL)
3415 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3416 break;
3417
252b5132 3418 case SHT_HASH:
fdc90cb4 3419 case SHT_GNU_HASH:
252b5132
RH
3420 case SHT_GNU_versym:
3421 /* sh_link is the section header index of the symbol table
3422 this hash table or version table is for. */
3423 s = bfd_get_section_by_name (abfd, ".dynsym");
3424 if (s != NULL)
3425 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3426 break;
dbb410c3
AM
3427
3428 case SHT_GROUP:
12bd6957 3429 d->this_hdr.sh_link = elf_onesymtab (abfd);
252b5132
RH
3430 }
3431 }
3432
2b0f7ef9 3433 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3434 if (i_shdrp[secn] == NULL)
3435 i_shdrp[secn] = i_shdrp[0];
3436 else
3437 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3438 i_shdrp[secn]->sh_name);
b34976b6 3439 return TRUE;
252b5132
RH
3440}
3441
5372391b 3442static bfd_boolean
217aa764 3443sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3444{
3445 /* If the backend has a special mapping, use it. */
9c5bfbb7 3446 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3447 if (bed->elf_backend_sym_is_global)
3448 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3449
e47bf690 3450 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3451 || bfd_is_und_section (bfd_get_section (sym))
3452 || bfd_is_com_section (bfd_get_section (sym)));
3453}
3454
5372391b 3455/* Don't output section symbols for sections that are not going to be
c6d8cab4 3456 output, that are duplicates or there is no BFD section. */
5372391b
AM
3457
3458static bfd_boolean
3459ignore_section_sym (bfd *abfd, asymbol *sym)
3460{
c6d8cab4
L
3461 elf_symbol_type *type_ptr;
3462
3463 if ((sym->flags & BSF_SECTION_SYM) == 0)
3464 return FALSE;
3465
3466 type_ptr = elf_symbol_from (abfd, sym);
3467 return ((type_ptr != NULL
3468 && type_ptr->internal_elf_sym.st_shndx != 0
3469 && bfd_is_abs_section (sym->section))
3470 || !(sym->section->owner == abfd
0f0a5e58 3471 || (sym->section->output_section->owner == abfd
2633a79c
AM
3472 && sym->section->output_offset == 0)
3473 || bfd_is_abs_section (sym->section)));
5372391b
AM
3474}
3475
2633a79c
AM
3476/* Map symbol from it's internal number to the external number, moving
3477 all local symbols to be at the head of the list. */
3478
b34976b6 3479static bfd_boolean
12bd6957 3480elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
252b5132 3481{
dc810e39 3482 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3483 asymbol **syms = bfd_get_outsymbols (abfd);
3484 asymbol **sect_syms;
dc810e39
AM
3485 unsigned int num_locals = 0;
3486 unsigned int num_globals = 0;
3487 unsigned int num_locals2 = 0;
3488 unsigned int num_globals2 = 0;
252b5132 3489 int max_index = 0;
dc810e39 3490 unsigned int idx;
252b5132
RH
3491 asection *asect;
3492 asymbol **new_syms;
252b5132
RH
3493
3494#ifdef DEBUG
3495 fprintf (stderr, "elf_map_symbols\n");
3496 fflush (stderr);
3497#endif
3498
252b5132
RH
3499 for (asect = abfd->sections; asect; asect = asect->next)
3500 {
3501 if (max_index < asect->index)
3502 max_index = asect->index;
3503 }
3504
3505 max_index++;
a50b1753 3506 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3507 if (sect_syms == NULL)
b34976b6 3508 return FALSE;
252b5132 3509 elf_section_syms (abfd) = sect_syms;
4e89ac30 3510 elf_num_section_syms (abfd) = max_index;
252b5132 3511
079e9a2f
AM
3512 /* Init sect_syms entries for any section symbols we have already
3513 decided to output. */
252b5132
RH
3514 for (idx = 0; idx < symcount; idx++)
3515 {
dc810e39 3516 asymbol *sym = syms[idx];
c044fabd 3517
252b5132 3518 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 3519 && sym->value == 0
2633a79c
AM
3520 && !ignore_section_sym (abfd, sym)
3521 && !bfd_is_abs_section (sym->section))
252b5132 3522 {
5372391b 3523 asection *sec = sym->section;
252b5132 3524
5372391b
AM
3525 if (sec->owner != abfd)
3526 sec = sec->output_section;
252b5132 3527
5372391b 3528 sect_syms[sec->index] = syms[idx];
252b5132
RH
3529 }
3530 }
3531
252b5132
RH
3532 /* Classify all of the symbols. */
3533 for (idx = 0; idx < symcount; idx++)
3534 {
2633a79c 3535 if (sym_is_global (abfd, syms[idx]))
252b5132 3536 num_globals++;
2633a79c
AM
3537 else if (!ignore_section_sym (abfd, syms[idx]))
3538 num_locals++;
252b5132 3539 }
079e9a2f 3540
5372391b 3541 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3542 sections will already have a section symbol in outsymbols, but
3543 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3544 at least in that case. */
252b5132
RH
3545 for (asect = abfd->sections; asect; asect = asect->next)
3546 {
079e9a2f 3547 if (sect_syms[asect->index] == NULL)
252b5132 3548 {
079e9a2f 3549 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3550 num_locals++;
3551 else
3552 num_globals++;
252b5132
RH
3553 }
3554 }
3555
3556 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
3557 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
3558 sizeof (asymbol *));
dc810e39 3559
252b5132 3560 if (new_syms == NULL)
b34976b6 3561 return FALSE;
252b5132
RH
3562
3563 for (idx = 0; idx < symcount; idx++)
3564 {
3565 asymbol *sym = syms[idx];
dc810e39 3566 unsigned int i;
252b5132 3567
2633a79c
AM
3568 if (sym_is_global (abfd, sym))
3569 i = num_locals + num_globals2++;
3570 else if (!ignore_section_sym (abfd, sym))
252b5132
RH
3571 i = num_locals2++;
3572 else
2633a79c 3573 continue;
252b5132
RH
3574 new_syms[i] = sym;
3575 sym->udata.i = i + 1;
3576 }
3577 for (asect = abfd->sections; asect; asect = asect->next)
3578 {
079e9a2f 3579 if (sect_syms[asect->index] == NULL)
252b5132 3580 {
079e9a2f 3581 asymbol *sym = asect->symbol;
dc810e39 3582 unsigned int i;
252b5132 3583
079e9a2f 3584 sect_syms[asect->index] = sym;
252b5132
RH
3585 if (!sym_is_global (abfd, sym))
3586 i = num_locals2++;
3587 else
3588 i = num_locals + num_globals2++;
3589 new_syms[i] = sym;
3590 sym->udata.i = i + 1;
3591 }
3592 }
3593
3594 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3595
12bd6957 3596 *pnum_locals = num_locals;
b34976b6 3597 return TRUE;
252b5132
RH
3598}
3599
3600/* Align to the maximum file alignment that could be required for any
3601 ELF data structure. */
3602
268b6b39 3603static inline file_ptr
217aa764 3604align_file_position (file_ptr off, int align)
252b5132
RH
3605{
3606 return (off + align - 1) & ~(align - 1);
3607}
3608
3609/* Assign a file position to a section, optionally aligning to the
3610 required section alignment. */
3611
217aa764
AM
3612file_ptr
3613_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3614 file_ptr offset,
3615 bfd_boolean align)
252b5132 3616{
72de5009
AM
3617 if (align && i_shdrp->sh_addralign > 1)
3618 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
3619 i_shdrp->sh_offset = offset;
3620 if (i_shdrp->bfd_section != NULL)
3621 i_shdrp->bfd_section->filepos = offset;
3622 if (i_shdrp->sh_type != SHT_NOBITS)
3623 offset += i_shdrp->sh_size;
3624 return offset;
3625}
3626
3627/* Compute the file positions we are going to put the sections at, and
3628 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3629 is not NULL, this is being called by the ELF backend linker. */
3630
b34976b6 3631bfd_boolean
217aa764
AM
3632_bfd_elf_compute_section_file_positions (bfd *abfd,
3633 struct bfd_link_info *link_info)
252b5132 3634{
9c5bfbb7 3635 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3636 struct fake_section_arg fsargs;
b34976b6 3637 bfd_boolean failed;
4b6c0f2f 3638 struct bfd_strtab_hash *strtab = NULL;
252b5132 3639 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 3640 bfd_boolean need_symtab;
252b5132
RH
3641
3642 if (abfd->output_has_begun)
b34976b6 3643 return TRUE;
252b5132
RH
3644
3645 /* Do any elf backend specific processing first. */
3646 if (bed->elf_backend_begin_write_processing)
3647 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3648
3649 if (! prep_headers (abfd))
b34976b6 3650 return FALSE;
252b5132 3651
e6c51ed4 3652 /* Post process the headers if necessary. */
78245035 3653 (*bed->elf_backend_post_process_headers) (abfd, link_info);
e6c51ed4 3654
d4730f92
BS
3655 fsargs.failed = FALSE;
3656 fsargs.link_info = link_info;
3657 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
3658 if (fsargs.failed)
b34976b6 3659 return FALSE;
252b5132 3660
da9f89d4 3661 if (!assign_section_numbers (abfd, link_info))
b34976b6 3662 return FALSE;
252b5132
RH
3663
3664 /* The backend linker builds symbol table information itself. */
3516e984
L
3665 need_symtab = (link_info == NULL
3666 && (bfd_get_symcount (abfd) > 0
3667 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3668 == HAS_RELOC)));
3669 if (need_symtab)
252b5132
RH
3670 {
3671 /* Non-zero if doing a relocatable link. */
3672 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3673
3674 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3675 return FALSE;
252b5132
RH
3676 }
3677
d4730f92 3678 failed = FALSE;
1126897b 3679 if (link_info == NULL)
dbb410c3 3680 {
1126897b 3681 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3682 if (failed)
b34976b6 3683 return FALSE;
dbb410c3
AM
3684 }
3685
252b5132
RH
3686 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3687 /* sh_name was set in prep_headers. */
3688 shstrtab_hdr->sh_type = SHT_STRTAB;
3689 shstrtab_hdr->sh_flags = 0;
3690 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3691 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3692 shstrtab_hdr->sh_entsize = 0;
3693 shstrtab_hdr->sh_link = 0;
3694 shstrtab_hdr->sh_info = 0;
3695 /* sh_offset is set in assign_file_positions_except_relocs. */
3696 shstrtab_hdr->sh_addralign = 1;
3697
c84fca4d 3698 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3699 return FALSE;
252b5132 3700
3516e984 3701 if (need_symtab)
252b5132
RH
3702 {
3703 file_ptr off;
3704 Elf_Internal_Shdr *hdr;
3705
12bd6957 3706 off = elf_next_file_pos (abfd);
252b5132
RH
3707
3708 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3709 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3710
9ad5cbcf
AM
3711 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3712 if (hdr->sh_size != 0)
b34976b6 3713 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3714
252b5132 3715 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3716 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3717
12bd6957 3718 elf_next_file_pos (abfd) = off;
252b5132
RH
3719
3720 /* Now that we know where the .strtab section goes, write it
08a40648 3721 out. */
252b5132
RH
3722 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3723 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3724 return FALSE;
252b5132
RH
3725 _bfd_stringtab_free (strtab);
3726 }
3727
b34976b6 3728 abfd->output_has_begun = TRUE;
252b5132 3729
b34976b6 3730 return TRUE;
252b5132
RH
3731}
3732
8ded5a0f
AM
3733/* Make an initial estimate of the size of the program header. If we
3734 get the number wrong here, we'll redo section placement. */
3735
3736static bfd_size_type
3737get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3738{
3739 size_t segs;
3740 asection *s;
2b05f1b7 3741 const struct elf_backend_data *bed;
8ded5a0f
AM
3742
3743 /* Assume we will need exactly two PT_LOAD segments: one for text
3744 and one for data. */
3745 segs = 2;
3746
3747 s = bfd_get_section_by_name (abfd, ".interp");
3748 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3749 {
3750 /* If we have a loadable interpreter section, we need a
3751 PT_INTERP segment. In this case, assume we also need a
3752 PT_PHDR segment, although that may not be true for all
3753 targets. */
3754 segs += 2;
3755 }
3756
3757 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3758 {
3759 /* We need a PT_DYNAMIC segment. */
3760 ++segs;
f210dcff 3761 }
08a40648 3762
ceae84aa 3763 if (info != NULL && info->relro)
f210dcff
L
3764 {
3765 /* We need a PT_GNU_RELRO segment. */
3766 ++segs;
8ded5a0f
AM
3767 }
3768
12bd6957 3769 if (elf_eh_frame_hdr (abfd))
8ded5a0f
AM
3770 {
3771 /* We need a PT_GNU_EH_FRAME segment. */
3772 ++segs;
3773 }
3774
12bd6957 3775 if (elf_stack_flags (abfd))
8ded5a0f 3776 {
2b05f1b7
L
3777 /* We need a PT_GNU_STACK segment. */
3778 ++segs;
3779 }
94b11780 3780
2b05f1b7
L
3781 for (s = abfd->sections; s != NULL; s = s->next)
3782 {
8ded5a0f 3783 if ((s->flags & SEC_LOAD) != 0
0112cd26 3784 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3785 {
3786 /* We need a PT_NOTE segment. */
3787 ++segs;
1c5265b5
JJ
3788 /* Try to create just one PT_NOTE segment
3789 for all adjacent loadable .note* sections.
3790 gABI requires that within a PT_NOTE segment
3791 (and also inside of each SHT_NOTE section)
3792 each note is padded to a multiple of 4 size,
3793 so we check whether the sections are correctly
3794 aligned. */
3795 if (s->alignment_power == 2)
3796 while (s->next != NULL
3797 && s->next->alignment_power == 2
3798 && (s->next->flags & SEC_LOAD) != 0
3799 && CONST_STRNEQ (s->next->name, ".note"))
3800 s = s->next;
8ded5a0f
AM
3801 }
3802 }
3803
3804 for (s = abfd->sections; s != NULL; s = s->next)
3805 {
3806 if (s->flags & SEC_THREAD_LOCAL)
3807 {
3808 /* We need a PT_TLS segment. */
3809 ++segs;
3810 break;
3811 }
3812 }
3813
3814 /* Let the backend count up any program headers it might need. */
2b05f1b7 3815 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
3816 if (bed->elf_backend_additional_program_headers)
3817 {
3818 int a;
3819
3820 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3821 if (a == -1)
3822 abort ();
3823 segs += a;
3824 }
3825
3826 return segs * bed->s->sizeof_phdr;
3827}
3828
2ea37f1c
NC
3829/* Find the segment that contains the output_section of section. */
3830
3831Elf_Internal_Phdr *
3832_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
3833{
3834 struct elf_segment_map *m;
3835 Elf_Internal_Phdr *p;
3836
12bd6957 3837 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
2ea37f1c
NC
3838 m != NULL;
3839 m = m->next, p++)
3840 {
3841 int i;
3842
3843 for (i = m->count - 1; i >= 0; i--)
3844 if (m->sections[i] == section)
3845 return p;
3846 }
3847
3848 return NULL;
3849}
3850
252b5132
RH
3851/* Create a mapping from a set of sections to a program segment. */
3852
217aa764
AM
3853static struct elf_segment_map *
3854make_mapping (bfd *abfd,
3855 asection **sections,
3856 unsigned int from,
3857 unsigned int to,
3858 bfd_boolean phdr)
252b5132
RH
3859{
3860 struct elf_segment_map *m;
3861 unsigned int i;
3862 asection **hdrpp;
dc810e39 3863 bfd_size_type amt;
252b5132 3864
dc810e39
AM
3865 amt = sizeof (struct elf_segment_map);
3866 amt += (to - from - 1) * sizeof (asection *);
a50b1753 3867 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
3868 if (m == NULL)
3869 return NULL;
3870 m->next = NULL;
3871 m->p_type = PT_LOAD;
3872 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3873 m->sections[i - from] = *hdrpp;
3874 m->count = to - from;
3875
3876 if (from == 0 && phdr)
3877 {
3878 /* Include the headers in the first PT_LOAD segment. */
3879 m->includes_filehdr = 1;
3880 m->includes_phdrs = 1;
3881 }
3882
3883 return m;
3884}
3885
229fcec5
MM
3886/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3887 on failure. */
3888
3889struct elf_segment_map *
3890_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3891{
3892 struct elf_segment_map *m;
3893
a50b1753
NC
3894 m = (struct elf_segment_map *) bfd_zalloc (abfd,
3895 sizeof (struct elf_segment_map));
229fcec5
MM
3896 if (m == NULL)
3897 return NULL;
3898 m->next = NULL;
3899 m->p_type = PT_DYNAMIC;
3900 m->count = 1;
3901 m->sections[0] = dynsec;
08a40648 3902
229fcec5
MM
3903 return m;
3904}
3905
8ded5a0f 3906/* Possibly add or remove segments from the segment map. */
252b5132 3907
b34976b6 3908static bfd_boolean
3dea8fca
AM
3909elf_modify_segment_map (bfd *abfd,
3910 struct bfd_link_info *info,
3911 bfd_boolean remove_empty_load)
252b5132 3912{
252e386e 3913 struct elf_segment_map **m;
8ded5a0f 3914 const struct elf_backend_data *bed;
252b5132 3915
8ded5a0f
AM
3916 /* The placement algorithm assumes that non allocated sections are
3917 not in PT_LOAD segments. We ensure this here by removing such
3918 sections from the segment map. We also remove excluded
252e386e
AM
3919 sections. Finally, any PT_LOAD segment without sections is
3920 removed. */
12bd6957 3921 m = &elf_seg_map (abfd);
252e386e 3922 while (*m)
8ded5a0f
AM
3923 {
3924 unsigned int i, new_count;
252b5132 3925
252e386e 3926 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3927 {
252e386e
AM
3928 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3929 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3930 || (*m)->p_type != PT_LOAD))
8ded5a0f 3931 {
252e386e
AM
3932 (*m)->sections[new_count] = (*m)->sections[i];
3933 new_count++;
8ded5a0f
AM
3934 }
3935 }
252e386e 3936 (*m)->count = new_count;
252b5132 3937
3dea8fca 3938 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
3939 *m = (*m)->next;
3940 else
3941 m = &(*m)->next;
8ded5a0f 3942 }
252b5132 3943
8ded5a0f
AM
3944 bed = get_elf_backend_data (abfd);
3945 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3946 {
252e386e 3947 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3948 return FALSE;
252b5132 3949 }
252b5132 3950
8ded5a0f
AM
3951 return TRUE;
3952}
252b5132 3953
8ded5a0f 3954/* Set up a mapping from BFD sections to program segments. */
252b5132 3955
8ded5a0f
AM
3956bfd_boolean
3957_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3958{
3959 unsigned int count;
3960 struct elf_segment_map *m;
3961 asection **sections = NULL;
3962 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 3963 bfd_boolean no_user_phdrs;
252b5132 3964
12bd6957 3965 no_user_phdrs = elf_seg_map (abfd) == NULL;
d324f6d6
RM
3966
3967 if (info != NULL)
3968 info->user_phdrs = !no_user_phdrs;
3969
3dea8fca 3970 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 3971 {
8ded5a0f
AM
3972 asection *s;
3973 unsigned int i;
3974 struct elf_segment_map *mfirst;
3975 struct elf_segment_map **pm;
3976 asection *last_hdr;
3977 bfd_vma last_size;
3978 unsigned int phdr_index;
3979 bfd_vma maxpagesize;
3980 asection **hdrpp;
3981 bfd_boolean phdr_in_segment = TRUE;
3982 bfd_boolean writable;
3983 int tls_count = 0;
3984 asection *first_tls = NULL;
3985 asection *dynsec, *eh_frame_hdr;
3986 bfd_size_type amt;
8d06853e 3987 bfd_vma addr_mask, wrap_to = 0;
252b5132 3988
8ded5a0f 3989 /* Select the allocated sections, and sort them. */
252b5132 3990
a50b1753
NC
3991 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
3992 sizeof (asection *));
8ded5a0f 3993 if (sections == NULL)
252b5132 3994 goto error_return;
252b5132 3995
8d06853e
AM
3996 /* Calculate top address, avoiding undefined behaviour of shift
3997 left operator when shift count is equal to size of type
3998 being shifted. */
3999 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4000 addr_mask = (addr_mask << 1) + 1;
4001
8ded5a0f
AM
4002 i = 0;
4003 for (s = abfd->sections; s != NULL; s = s->next)
4004 {
4005 if ((s->flags & SEC_ALLOC) != 0)
4006 {
4007 sections[i] = s;
4008 ++i;
8d06853e
AM
4009 /* A wrapping section potentially clashes with header. */
4010 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
4011 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
4012 }
4013 }
4014 BFD_ASSERT (i <= bfd_count_sections (abfd));
4015 count = i;
252b5132 4016
8ded5a0f 4017 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 4018
8ded5a0f 4019 /* Build the mapping. */
252b5132 4020
8ded5a0f
AM
4021 mfirst = NULL;
4022 pm = &mfirst;
252b5132 4023
8ded5a0f
AM
4024 /* If we have a .interp section, then create a PT_PHDR segment for
4025 the program headers and a PT_INTERP segment for the .interp
4026 section. */
4027 s = bfd_get_section_by_name (abfd, ".interp");
4028 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4029 {
4030 amt = sizeof (struct elf_segment_map);
a50b1753 4031 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4032 if (m == NULL)
4033 goto error_return;
4034 m->next = NULL;
4035 m->p_type = PT_PHDR;
4036 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
4037 m->p_flags = PF_R | PF_X;
4038 m->p_flags_valid = 1;
4039 m->includes_phdrs = 1;
252b5132 4040
8ded5a0f
AM
4041 *pm = m;
4042 pm = &m->next;
252b5132 4043
8ded5a0f 4044 amt = sizeof (struct elf_segment_map);
a50b1753 4045 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4046 if (m == NULL)
4047 goto error_return;
4048 m->next = NULL;
4049 m->p_type = PT_INTERP;
4050 m->count = 1;
4051 m->sections[0] = s;
4052
4053 *pm = m;
4054 pm = &m->next;
252b5132 4055 }
8ded5a0f
AM
4056
4057 /* Look through the sections. We put sections in the same program
4058 segment when the start of the second section can be placed within
4059 a few bytes of the end of the first section. */
4060 last_hdr = NULL;
4061 last_size = 0;
4062 phdr_index = 0;
4063 maxpagesize = bed->maxpagesize;
063bb025
NC
4064 /* PR 17512: file: c8455299.
4065 Avoid divide-by-zero errors later on.
4066 FIXME: Should we abort if the maxpagesize is zero ? */
4067 if (maxpagesize == 0)
4068 maxpagesize = 1;
8ded5a0f
AM
4069 writable = FALSE;
4070 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4071 if (dynsec != NULL
4072 && (dynsec->flags & SEC_LOAD) == 0)
4073 dynsec = NULL;
4074
4075 /* Deal with -Ttext or something similar such that the first section
4076 is not adjacent to the program headers. This is an
4077 approximation, since at this point we don't know exactly how many
4078 program headers we will need. */
4079 if (count > 0)
252b5132 4080 {
12bd6957 4081 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 4082
62d7a5f6 4083 if (phdr_size == (bfd_size_type) -1)
8ded5a0f 4084 phdr_size = get_program_header_size (abfd, info);
d2bcb0d1 4085 phdr_size += bed->s->sizeof_ehdr;
8ded5a0f 4086 if ((abfd->flags & D_PAGED) == 0
8d06853e
AM
4087 || (sections[0]->lma & addr_mask) < phdr_size
4088 || ((sections[0]->lma & addr_mask) % maxpagesize
4089 < phdr_size % maxpagesize)
4090 || (sections[0]->lma & addr_mask & -maxpagesize) < wrap_to)
8ded5a0f 4091 phdr_in_segment = FALSE;
252b5132
RH
4092 }
4093
8ded5a0f 4094 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 4095 {
8ded5a0f
AM
4096 asection *hdr;
4097 bfd_boolean new_segment;
4098
4099 hdr = *hdrpp;
4100
4101 /* See if this section and the last one will fit in the same
4102 segment. */
4103
4104 if (last_hdr == NULL)
4105 {
4106 /* If we don't have a segment yet, then we don't need a new
4107 one (we build the last one after this loop). */
4108 new_segment = FALSE;
4109 }
4110 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4111 {
4112 /* If this section has a different relation between the
4113 virtual address and the load address, then we need a new
4114 segment. */
4115 new_segment = TRUE;
4116 }
b5599592
AM
4117 else if (hdr->lma < last_hdr->lma + last_size
4118 || last_hdr->lma + last_size < last_hdr->lma)
4119 {
4120 /* If this section has a load address that makes it overlap
4121 the previous section, then we need a new segment. */
4122 new_segment = TRUE;
4123 }
39948a60
NC
4124 /* In the next test we have to be careful when last_hdr->lma is close
4125 to the end of the address space. If the aligned address wraps
4126 around to the start of the address space, then there are no more
4127 pages left in memory and it is OK to assume that the current
4128 section can be included in the current segment. */
4129 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4130 > last_hdr->lma)
4131 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 4132 <= hdr->lma))
8ded5a0f
AM
4133 {
4134 /* If putting this section in this segment would force us to
4135 skip a page in the segment, then we need a new segment. */
4136 new_segment = TRUE;
4137 }
4138 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
4139 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
4140 {
4141 /* We don't want to put a loadable section after a
4142 nonloadable section in the same segment.
4143 Consider .tbss sections as loadable for this purpose. */
4144 new_segment = TRUE;
4145 }
4146 else if ((abfd->flags & D_PAGED) == 0)
4147 {
4148 /* If the file is not demand paged, which means that we
4149 don't require the sections to be correctly aligned in the
4150 file, then there is no other reason for a new segment. */
4151 new_segment = FALSE;
4152 }
4153 else if (! writable
4154 && (hdr->flags & SEC_READONLY) == 0
8d06853e
AM
4155 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4156 != (hdr->lma & -maxpagesize)))
8ded5a0f
AM
4157 {
4158 /* We don't want to put a writable section in a read only
4159 segment, unless they are on the same page in memory
4160 anyhow. We already know that the last section does not
4161 bring us past the current section on the page, so the
4162 only case in which the new section is not on the same
4163 page as the previous section is when the previous section
4164 ends precisely on a page boundary. */
4165 new_segment = TRUE;
4166 }
4167 else
4168 {
4169 /* Otherwise, we can use the same segment. */
4170 new_segment = FALSE;
4171 }
4172
2889e75b 4173 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
4174 if (last_hdr != NULL
4175 && info != NULL
4176 && info->callbacks->override_segment_assignment != NULL)
4177 new_segment
4178 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4179 last_hdr,
4180 new_segment);
2889e75b 4181
8ded5a0f
AM
4182 if (! new_segment)
4183 {
4184 if ((hdr->flags & SEC_READONLY) == 0)
4185 writable = TRUE;
4186 last_hdr = hdr;
4187 /* .tbss sections effectively have zero size. */
4188 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4189 != SEC_THREAD_LOCAL)
4190 last_size = hdr->size;
4191 else
4192 last_size = 0;
4193 continue;
4194 }
4195
4196 /* We need a new program segment. We must create a new program
4197 header holding all the sections from phdr_index until hdr. */
4198
4199 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4200 if (m == NULL)
4201 goto error_return;
4202
4203 *pm = m;
4204 pm = &m->next;
4205
252b5132 4206 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 4207 writable = TRUE;
8ded5a0f
AM
4208 else
4209 writable = FALSE;
4210
baaff79e
JJ
4211 last_hdr = hdr;
4212 /* .tbss sections effectively have zero size. */
e5caec89 4213 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 4214 last_size = hdr->size;
baaff79e
JJ
4215 else
4216 last_size = 0;
8ded5a0f
AM
4217 phdr_index = i;
4218 phdr_in_segment = FALSE;
252b5132
RH
4219 }
4220
86b2281f
AM
4221 /* Create a final PT_LOAD program segment, but not if it's just
4222 for .tbss. */
4223 if (last_hdr != NULL
4224 && (i - phdr_index != 1
4225 || ((last_hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4226 != SEC_THREAD_LOCAL)))
8ded5a0f
AM
4227 {
4228 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4229 if (m == NULL)
4230 goto error_return;
252b5132 4231
8ded5a0f
AM
4232 *pm = m;
4233 pm = &m->next;
4234 }
252b5132 4235
8ded5a0f
AM
4236 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4237 if (dynsec != NULL)
4238 {
4239 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4240 if (m == NULL)
4241 goto error_return;
4242 *pm = m;
4243 pm = &m->next;
4244 }
252b5132 4245
1c5265b5
JJ
4246 /* For each batch of consecutive loadable .note sections,
4247 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4248 because if we link together nonloadable .note sections and
4249 loadable .note sections, we will generate two .note sections
4250 in the output file. FIXME: Using names for section types is
4251 bogus anyhow. */
8ded5a0f
AM
4252 for (s = abfd->sections; s != NULL; s = s->next)
4253 {
4254 if ((s->flags & SEC_LOAD) != 0
0112cd26 4255 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 4256 {
1c5265b5 4257 asection *s2;
91d6fa6a
NC
4258
4259 count = 1;
8ded5a0f 4260 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
4261 if (s->alignment_power == 2)
4262 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
4263 {
4264 if (s2->next->alignment_power == 2
4265 && (s2->next->flags & SEC_LOAD) != 0
4266 && CONST_STRNEQ (s2->next->name, ".note")
8d06853e
AM
4267 && align_power (s2->lma + s2->size, 2)
4268 == s2->next->lma)
55b581a6
JJ
4269 count++;
4270 else
4271 break;
4272 }
1c5265b5 4273 amt += (count - 1) * sizeof (asection *);
a50b1753 4274 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4275 if (m == NULL)
4276 goto error_return;
4277 m->next = NULL;
4278 m->p_type = PT_NOTE;
1c5265b5
JJ
4279 m->count = count;
4280 while (count > 1)
4281 {
4282 m->sections[m->count - count--] = s;
4283 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
4284 s = s->next;
4285 }
4286 m->sections[m->count - 1] = s;
4287 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
4288 *pm = m;
4289 pm = &m->next;
4290 }
4291 if (s->flags & SEC_THREAD_LOCAL)
4292 {
4293 if (! tls_count)
4294 first_tls = s;
4295 tls_count++;
4296 }
4297 }
252b5132 4298
8ded5a0f
AM
4299 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
4300 if (tls_count > 0)
4301 {
8ded5a0f
AM
4302 amt = sizeof (struct elf_segment_map);
4303 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 4304 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4305 if (m == NULL)
4306 goto error_return;
4307 m->next = NULL;
4308 m->p_type = PT_TLS;
4309 m->count = tls_count;
4310 /* Mandated PF_R. */
4311 m->p_flags = PF_R;
4312 m->p_flags_valid = 1;
d923cae0 4313 s = first_tls;
91d6fa6a 4314 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f 4315 {
d923cae0
L
4316 if ((s->flags & SEC_THREAD_LOCAL) == 0)
4317 {
4318 _bfd_error_handler
4319 (_("%B: TLS sections are not adjacent:"), abfd);
4320 s = first_tls;
4321 i = 0;
4322 while (i < (unsigned int) tls_count)
4323 {
4324 if ((s->flags & SEC_THREAD_LOCAL) != 0)
4325 {
4326 _bfd_error_handler (_(" TLS: %A"), s);
4327 i++;
4328 }
4329 else
4330 _bfd_error_handler (_(" non-TLS: %A"), s);
4331 s = s->next;
4332 }
4333 bfd_set_error (bfd_error_bad_value);
4334 goto error_return;
4335 }
4336 m->sections[i] = s;
4337 s = s->next;
8ded5a0f 4338 }
252b5132 4339
8ded5a0f
AM
4340 *pm = m;
4341 pm = &m->next;
4342 }
252b5132 4343
8ded5a0f
AM
4344 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4345 segment. */
12bd6957 4346 eh_frame_hdr = elf_eh_frame_hdr (abfd);
8ded5a0f
AM
4347 if (eh_frame_hdr != NULL
4348 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 4349 {
dc810e39 4350 amt = sizeof (struct elf_segment_map);
a50b1753 4351 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4352 if (m == NULL)
4353 goto error_return;
4354 m->next = NULL;
8ded5a0f 4355 m->p_type = PT_GNU_EH_FRAME;
252b5132 4356 m->count = 1;
8ded5a0f 4357 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
4358
4359 *pm = m;
4360 pm = &m->next;
4361 }
13ae64f3 4362
12bd6957 4363 if (elf_stack_flags (abfd))
13ae64f3 4364 {
8ded5a0f 4365 amt = sizeof (struct elf_segment_map);
a50b1753 4366 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4367 if (m == NULL)
4368 goto error_return;
4369 m->next = NULL;
2b05f1b7 4370 m->p_type = PT_GNU_STACK;
12bd6957 4371 m->p_flags = elf_stack_flags (abfd);
04c3a755 4372 m->p_align = bed->stack_align;
8ded5a0f 4373 m->p_flags_valid = 1;
04c3a755
NS
4374 m->p_align_valid = m->p_align != 0;
4375 if (info->stacksize > 0)
4376 {
4377 m->p_size = info->stacksize;
4378 m->p_size_valid = 1;
4379 }
252b5132 4380
8ded5a0f
AM
4381 *pm = m;
4382 pm = &m->next;
4383 }
65765700 4384
ceae84aa 4385 if (info != NULL && info->relro)
8ded5a0f 4386 {
f210dcff
L
4387 for (m = mfirst; m != NULL; m = m->next)
4388 {
3832a4d8
AM
4389 if (m->p_type == PT_LOAD
4390 && m->count != 0
4391 && m->sections[0]->vma >= info->relro_start
4392 && m->sections[0]->vma < info->relro_end)
f210dcff 4393 {
3832a4d8
AM
4394 i = m->count;
4395 while (--i != (unsigned) -1)
4396 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
4397 == (SEC_LOAD | SEC_HAS_CONTENTS))
4398 break;
4399
43a8475c 4400 if (i != (unsigned) -1)
f210dcff
L
4401 break;
4402 }
be01b344 4403 }
f210dcff
L
4404
4405 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
4406 if (m != NULL)
4407 {
4408 amt = sizeof (struct elf_segment_map);
a50b1753 4409 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
4410 if (m == NULL)
4411 goto error_return;
4412 m->next = NULL;
4413 m->p_type = PT_GNU_RELRO;
4414 m->p_flags = PF_R;
4415 m->p_flags_valid = 1;
4416
4417 *pm = m;
4418 pm = &m->next;
4419 }
8ded5a0f 4420 }
9ee5e499 4421
8ded5a0f 4422 free (sections);
12bd6957 4423 elf_seg_map (abfd) = mfirst;
9ee5e499
JJ
4424 }
4425
3dea8fca 4426 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 4427 return FALSE;
8c37241b 4428
12bd6957 4429 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
8ded5a0f 4430 ++count;
12bd6957 4431 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
252b5132 4432
b34976b6 4433 return TRUE;
252b5132
RH
4434
4435 error_return:
4436 if (sections != NULL)
4437 free (sections);
b34976b6 4438 return FALSE;
252b5132
RH
4439}
4440
4441/* Sort sections by address. */
4442
4443static int
217aa764 4444elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4445{
4446 const asection *sec1 = *(const asection **) arg1;
4447 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4448 bfd_size_type size1, size2;
252b5132
RH
4449
4450 /* Sort by LMA first, since this is the address used to
4451 place the section into a segment. */
4452 if (sec1->lma < sec2->lma)
4453 return -1;
4454 else if (sec1->lma > sec2->lma)
4455 return 1;
4456
4457 /* Then sort by VMA. Normally the LMA and the VMA will be
4458 the same, and this will do nothing. */
4459 if (sec1->vma < sec2->vma)
4460 return -1;
4461 else if (sec1->vma > sec2->vma)
4462 return 1;
4463
4464 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4465
07c6e936 4466#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4467
4468 if (TOEND (sec1))
4469 {
4470 if (TOEND (sec2))
00a7cdc5
NC
4471 {
4472 /* If the indicies are the same, do not return 0
4473 here, but continue to try the next comparison. */
4474 if (sec1->target_index - sec2->target_index != 0)
4475 return sec1->target_index - sec2->target_index;
4476 }
252b5132
RH
4477 else
4478 return 1;
4479 }
00a7cdc5 4480 else if (TOEND (sec2))
252b5132
RH
4481 return -1;
4482
4483#undef TOEND
4484
00a7cdc5
NC
4485 /* Sort by size, to put zero sized sections
4486 before others at the same address. */
252b5132 4487
eea6121a
AM
4488 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4489 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4490
4491 if (size1 < size2)
252b5132 4492 return -1;
eecdbe52 4493 if (size1 > size2)
252b5132
RH
4494 return 1;
4495
4496 return sec1->target_index - sec2->target_index;
4497}
4498
340b6d91
AC
4499/* Ian Lance Taylor writes:
4500
4501 We shouldn't be using % with a negative signed number. That's just
4502 not good. We have to make sure either that the number is not
4503 negative, or that the number has an unsigned type. When the types
4504 are all the same size they wind up as unsigned. When file_ptr is a
4505 larger signed type, the arithmetic winds up as signed long long,
4506 which is wrong.
4507
4508 What we're trying to say here is something like ``increase OFF by
4509 the least amount that will cause it to be equal to the VMA modulo
4510 the page size.'' */
4511/* In other words, something like:
4512
4513 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4514 off_offset = off % bed->maxpagesize;
4515 if (vma_offset < off_offset)
4516 adjustment = vma_offset + bed->maxpagesize - off_offset;
4517 else
4518 adjustment = vma_offset - off_offset;
08a40648 4519
340b6d91
AC
4520 which can can be collapsed into the expression below. */
4521
4522static file_ptr
4523vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4524{
dc9155b2
NC
4525 /* PR binutils/16199: Handle an alignment of zero. */
4526 if (maxpagesize == 0)
4527 maxpagesize = 1;
340b6d91
AC
4528 return ((vma - off) % maxpagesize);
4529}
4530
6d33f217
L
4531static void
4532print_segment_map (const struct elf_segment_map *m)
4533{
4534 unsigned int j;
4535 const char *pt = get_segment_type (m->p_type);
4536 char buf[32];
4537
4538 if (pt == NULL)
4539 {
4540 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4541 sprintf (buf, "LOPROC+%7.7x",
4542 (unsigned int) (m->p_type - PT_LOPROC));
4543 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4544 sprintf (buf, "LOOS+%7.7x",
4545 (unsigned int) (m->p_type - PT_LOOS));
4546 else
4547 snprintf (buf, sizeof (buf), "%8.8x",
4548 (unsigned int) m->p_type);
4549 pt = buf;
4550 }
4a97a0e5 4551 fflush (stdout);
6d33f217
L
4552 fprintf (stderr, "%s:", pt);
4553 for (j = 0; j < m->count; j++)
4554 fprintf (stderr, " %s", m->sections [j]->name);
4555 putc ('\n',stderr);
4a97a0e5 4556 fflush (stderr);
6d33f217
L
4557}
4558
32812159
AM
4559static bfd_boolean
4560write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
4561{
4562 void *buf;
4563 bfd_boolean ret;
4564
4565 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
4566 return FALSE;
4567 buf = bfd_zmalloc (len);
4568 if (buf == NULL)
4569 return FALSE;
4570 ret = bfd_bwrite (buf, len, abfd) == len;
4571 free (buf);
4572 return ret;
4573}
4574
252b5132
RH
4575/* Assign file positions to the sections based on the mapping from
4576 sections to segments. This function also sets up some fields in
f3520d2f 4577 the file header. */
252b5132 4578
b34976b6 4579static bfd_boolean
f3520d2f
AM
4580assign_file_positions_for_load_sections (bfd *abfd,
4581 struct bfd_link_info *link_info)
252b5132
RH
4582{
4583 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4584 struct elf_segment_map *m;
252b5132 4585 Elf_Internal_Phdr *phdrs;
252b5132 4586 Elf_Internal_Phdr *p;
02bf8d82 4587 file_ptr off;
3f570048 4588 bfd_size_type maxpagesize;
f3520d2f 4589 unsigned int alloc;
0920dee7 4590 unsigned int i, j;
2b0bc088 4591 bfd_vma header_pad = 0;
252b5132 4592
e36284ab 4593 if (link_info == NULL
ceae84aa 4594 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 4595 return FALSE;
252b5132 4596
8ded5a0f 4597 alloc = 0;
12bd6957 4598 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
2b0bc088
NC
4599 {
4600 ++alloc;
4601 if (m->header_size)
4602 header_pad = m->header_size;
4603 }
252b5132 4604
82f2dbf7
NC
4605 if (alloc)
4606 {
4607 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4608 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4609 }
4610 else
4611 {
4612 /* PR binutils/12467. */
4613 elf_elfheader (abfd)->e_phoff = 0;
4614 elf_elfheader (abfd)->e_phentsize = 0;
4615 }
d324f6d6 4616
8ded5a0f 4617 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4618
12bd6957
AM
4619 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
4620 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
8ded5a0f 4621 else
12bd6957 4622 BFD_ASSERT (elf_program_header_size (abfd)
59e0647f 4623 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4624
4625 if (alloc == 0)
f3520d2f 4626 {
12bd6957 4627 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
8ded5a0f 4628 return TRUE;
f3520d2f 4629 }
252b5132 4630
12bd6957 4631 /* We're writing the size in elf_program_header_size (abfd),
57268894
HPN
4632 see assign_file_positions_except_relocs, so make sure we have
4633 that amount allocated, with trailing space cleared.
12bd6957
AM
4634 The variable alloc contains the computed need, while
4635 elf_program_header_size (abfd) contains the size used for the
57268894
HPN
4636 layout.
4637 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
4638 where the layout is forced to according to a larger size in the
4639 last iterations for the testcase ld-elf/header. */
12bd6957 4640 BFD_ASSERT (elf_program_header_size (abfd) % bed->s->sizeof_phdr
57268894 4641 == 0);
a50b1753
NC
4642 phdrs = (Elf_Internal_Phdr *)
4643 bfd_zalloc2 (abfd,
12bd6957 4644 (elf_program_header_size (abfd) / bed->s->sizeof_phdr),
a50b1753 4645 sizeof (Elf_Internal_Phdr));
f3520d2f 4646 elf_tdata (abfd)->phdr = phdrs;
252b5132 4647 if (phdrs == NULL)
b34976b6 4648 return FALSE;
252b5132 4649
3f570048
AM
4650 maxpagesize = 1;
4651 if ((abfd->flags & D_PAGED) != 0)
4652 maxpagesize = bed->maxpagesize;
4653
252b5132
RH
4654 off = bed->s->sizeof_ehdr;
4655 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4656 if (header_pad < (bfd_vma) off)
4657 header_pad = 0;
4658 else
4659 header_pad -= off;
4660 off += header_pad;
252b5132 4661
12bd6957 4662 for (m = elf_seg_map (abfd), p = phdrs, j = 0;
252b5132 4663 m != NULL;
0920dee7 4664 m = m->next, p++, j++)
252b5132 4665 {
252b5132 4666 asection **secpp;
bf988460
AM
4667 bfd_vma off_adjust;
4668 bfd_boolean no_contents;
252b5132
RH
4669
4670 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4671 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4672 not be done to the PT_NOTE section of a corefile, which may
4673 contain several pseudo-sections artificially created by bfd.
4674 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4675 if (m->count > 1
4676 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4677 && m->p_type == PT_NOTE))
252b5132
RH
4678 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4679 elf_sort_sections);
4680
b301b248
AM
4681 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4682 number of sections with contents contributing to both p_filesz
4683 and p_memsz, followed by a number of sections with no contents
4684 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4685 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4686 p->p_type = m->p_type;
28a7f3e7 4687 p->p_flags = m->p_flags;
252b5132 4688
3f570048
AM
4689 if (m->count == 0)
4690 p->p_vaddr = 0;
4691 else
3271a814 4692 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4693
4694 if (m->p_paddr_valid)
4695 p->p_paddr = m->p_paddr;
4696 else if (m->count == 0)
4697 p->p_paddr = 0;
4698 else
08a40648 4699 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4700
4701 if (p->p_type == PT_LOAD
4702 && (abfd->flags & D_PAGED) != 0)
4703 {
4704 /* p_align in demand paged PT_LOAD segments effectively stores
4705 the maximum page size. When copying an executable with
4706 objcopy, we set m->p_align from the input file. Use this
4707 value for maxpagesize rather than bed->maxpagesize, which
4708 may be different. Note that we use maxpagesize for PT_TLS
4709 segment alignment later in this function, so we are relying
4710 on at least one PT_LOAD segment appearing before a PT_TLS
4711 segment. */
4712 if (m->p_align_valid)
4713 maxpagesize = m->p_align;
4714
4715 p->p_align = maxpagesize;
4716 }
3271a814
NS
4717 else if (m->p_align_valid)
4718 p->p_align = m->p_align;
e970b90a
DJ
4719 else if (m->count == 0)
4720 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4721 else
4722 p->p_align = 0;
4723
bf988460
AM
4724 no_contents = FALSE;
4725 off_adjust = 0;
252b5132 4726 if (p->p_type == PT_LOAD
b301b248 4727 && m->count > 0)
252b5132 4728 {
b301b248 4729 bfd_size_type align;
a49e53ed 4730 unsigned int align_power = 0;
b301b248 4731
3271a814
NS
4732 if (m->p_align_valid)
4733 align = p->p_align;
4734 else
252b5132 4735 {
3271a814
NS
4736 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4737 {
4738 unsigned int secalign;
08a40648 4739
3271a814
NS
4740 secalign = bfd_get_section_alignment (abfd, *secpp);
4741 if (secalign > align_power)
4742 align_power = secalign;
4743 }
4744 align = (bfd_size_type) 1 << align_power;
4745 if (align < maxpagesize)
4746 align = maxpagesize;
b301b248 4747 }
252b5132 4748
02bf8d82
AM
4749 for (i = 0; i < m->count; i++)
4750 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4751 /* If we aren't making room for this section, then
4752 it must be SHT_NOBITS regardless of what we've
4753 set via struct bfd_elf_special_section. */
4754 elf_section_type (m->sections[i]) = SHT_NOBITS;
4755
bf988460 4756 /* Find out whether this segment contains any loadable
aea274d3
AM
4757 sections. */
4758 no_contents = TRUE;
4759 for (i = 0; i < m->count; i++)
4760 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
4761 {
4762 no_contents = FALSE;
4763 break;
4764 }
bf988460 4765
85cfcbfb 4766 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
bf988460
AM
4767 off += off_adjust;
4768 if (no_contents)
4769 {
4770 /* We shouldn't need to align the segment on disk since
4771 the segment doesn't need file space, but the gABI
4772 arguably requires the alignment and glibc ld.so
4773 checks it. So to comply with the alignment
4774 requirement but not waste file space, we adjust
4775 p_offset for just this segment. (OFF_ADJUST is
4776 subtracted from OFF later.) This may put p_offset
4777 past the end of file, but that shouldn't matter. */
4778 }
4779 else
4780 off_adjust = 0;
252b5132 4781 }
b1a6d0b1
NC
4782 /* Make sure the .dynamic section is the first section in the
4783 PT_DYNAMIC segment. */
4784 else if (p->p_type == PT_DYNAMIC
4785 && m->count > 1
4786 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4787 {
4788 _bfd_error_handler
b301b248
AM
4789 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4790 abfd);
b1a6d0b1
NC
4791 bfd_set_error (bfd_error_bad_value);
4792 return FALSE;
4793 }
3f001e84
JK
4794 /* Set the note section type to SHT_NOTE. */
4795 else if (p->p_type == PT_NOTE)
4796 for (i = 0; i < m->count; i++)
4797 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 4798
252b5132
RH
4799 p->p_offset = 0;
4800 p->p_filesz = 0;
4801 p->p_memsz = 0;
4802
4803 if (m->includes_filehdr)
4804 {
bf988460 4805 if (!m->p_flags_valid)
252b5132 4806 p->p_flags |= PF_R;
252b5132
RH
4807 p->p_filesz = bed->s->sizeof_ehdr;
4808 p->p_memsz = bed->s->sizeof_ehdr;
4809 if (m->count > 0)
4810 {
252b5132
RH
4811 if (p->p_vaddr < (bfd_vma) off)
4812 {
caf47ea6 4813 (*_bfd_error_handler)
b301b248
AM
4814 (_("%B: Not enough room for program headers, try linking with -N"),
4815 abfd);
252b5132 4816 bfd_set_error (bfd_error_bad_value);
b34976b6 4817 return FALSE;
252b5132
RH
4818 }
4819
4820 p->p_vaddr -= off;
bf988460 4821 if (!m->p_paddr_valid)
252b5132
RH
4822 p->p_paddr -= off;
4823 }
252b5132
RH
4824 }
4825
4826 if (m->includes_phdrs)
4827 {
bf988460 4828 if (!m->p_flags_valid)
252b5132
RH
4829 p->p_flags |= PF_R;
4830
f3520d2f 4831 if (!m->includes_filehdr)
252b5132
RH
4832 {
4833 p->p_offset = bed->s->sizeof_ehdr;
4834
4835 if (m->count > 0)
4836 {
252b5132 4837 p->p_vaddr -= off - p->p_offset;
bf988460 4838 if (!m->p_paddr_valid)
252b5132
RH
4839 p->p_paddr -= off - p->p_offset;
4840 }
252b5132
RH
4841 }
4842
4843 p->p_filesz += alloc * bed->s->sizeof_phdr;
4844 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4845 if (m->count)
4846 {
4847 p->p_filesz += header_pad;
4848 p->p_memsz += header_pad;
4849 }
252b5132
RH
4850 }
4851
4852 if (p->p_type == PT_LOAD
4853 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4854 {
bf988460 4855 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 4856 p->p_offset = off;
252b5132
RH
4857 else
4858 {
4859 file_ptr adjust;
4860
4861 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
4862 if (!no_contents)
4863 p->p_filesz += adjust;
252b5132
RH
4864 p->p_memsz += adjust;
4865 }
4866 }
4867
1ea63fd2
AM
4868 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4869 maps. Set filepos for sections in PT_LOAD segments, and in
4870 core files, for sections in PT_NOTE segments.
4871 assign_file_positions_for_non_load_sections will set filepos
4872 for other sections and update p_filesz for other segments. */
252b5132
RH
4873 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4874 {
4875 asection *sec;
252b5132 4876 bfd_size_type align;
627b32bc 4877 Elf_Internal_Shdr *this_hdr;
252b5132
RH
4878
4879 sec = *secpp;
02bf8d82 4880 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 4881 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4882
88967714
AM
4883 if ((p->p_type == PT_LOAD
4884 || p->p_type == PT_TLS)
4885 && (this_hdr->sh_type != SHT_NOBITS
4886 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
4887 && ((this_hdr->sh_flags & SHF_TLS) == 0
4888 || p->p_type == PT_TLS))))
252b5132 4889 {
b5599592
AM
4890 bfd_vma p_start = p->p_paddr;
4891 bfd_vma p_end = p_start + p->p_memsz;
4892 bfd_vma s_start = sec->lma;
4893 bfd_vma adjust = s_start - p_end;
252b5132 4894
a2d1e028
L
4895 if (adjust != 0
4896 && (s_start < p_end
4897 || p_end < p_start))
252b5132 4898 {
88967714 4899 (*_bfd_error_handler)
b5599592
AM
4900 (_("%B: section %A lma %#lx adjusted to %#lx"), abfd, sec,
4901 (unsigned long) s_start, (unsigned long) p_end);
88967714 4902 adjust = 0;
b5599592 4903 sec->lma = p_end;
1cfb7d1e 4904 }
3ac9b6c9 4905 p->p_memsz += adjust;
1cfb7d1e 4906
88967714
AM
4907 if (this_hdr->sh_type != SHT_NOBITS)
4908 {
32812159
AM
4909 if (p->p_filesz + adjust < p->p_memsz)
4910 {
4911 /* We have a PROGBITS section following NOBITS ones.
4912 Allocate file space for the NOBITS section(s) and
4913 zero it. */
4914 adjust = p->p_memsz - p->p_filesz;
4915 if (!write_zeros (abfd, off, adjust))
4916 return FALSE;
4917 }
88967714
AM
4918 off += adjust;
4919 p->p_filesz += adjust;
252b5132 4920 }
252b5132
RH
4921 }
4922
4923 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4924 {
b301b248
AM
4925 /* The section at i == 0 is the one that actually contains
4926 everything. */
4a938328
MS
4927 if (i == 0)
4928 {
627b32bc 4929 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
4930 off += this_hdr->sh_size;
4931 p->p_filesz = this_hdr->sh_size;
b301b248
AM
4932 p->p_memsz = 0;
4933 p->p_align = 1;
252b5132 4934 }
4a938328 4935 else
252b5132 4936 {
b301b248 4937 /* The rest are fake sections that shouldn't be written. */
252b5132 4938 sec->filepos = 0;
eea6121a 4939 sec->size = 0;
b301b248
AM
4940 sec->flags = 0;
4941 continue;
252b5132 4942 }
252b5132
RH
4943 }
4944 else
4945 {
1e951488 4946 if (p->p_type == PT_LOAD)
b301b248 4947 {
1e951488
AM
4948 this_hdr->sh_offset = sec->filepos = off;
4949 if (this_hdr->sh_type != SHT_NOBITS)
4950 off += this_hdr->sh_size;
4951 }
4952 else if (this_hdr->sh_type == SHT_NOBITS
4953 && (this_hdr->sh_flags & SHF_TLS) != 0
4954 && this_hdr->sh_offset == 0)
4955 {
4956 /* This is a .tbss section that didn't get a PT_LOAD.
4957 (See _bfd_elf_map_sections_to_segments "Create a
4958 final PT_LOAD".) Set sh_offset to the value it
4959 would have if we had created a zero p_filesz and
4960 p_memsz PT_LOAD header for the section. This
4961 also makes the PT_TLS header have the same
4962 p_offset value. */
4963 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
4964 off, align);
4965 this_hdr->sh_offset = sec->filepos = off + adjust;
b301b248 4966 }
252b5132 4967
02bf8d82 4968 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 4969 {
6a3cd2b4 4970 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
4971 /* A load section without SHF_ALLOC is something like
4972 a note section in a PT_NOTE segment. These take
4973 file space but are not loaded into memory. */
4974 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 4975 p->p_memsz += this_hdr->sh_size;
b301b248 4976 }
6a3cd2b4 4977 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 4978 {
6a3cd2b4
AM
4979 if (p->p_type == PT_TLS)
4980 p->p_memsz += this_hdr->sh_size;
4981
4982 /* .tbss is special. It doesn't contribute to p_memsz of
4983 normal segments. */
4984 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
4985 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
4986 }
4987
b10a8ae0
L
4988 if (align > p->p_align
4989 && !m->p_align_valid
4990 && (p->p_type != PT_LOAD
4991 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4992 p->p_align = align;
4993 }
4994
bf988460 4995 if (!m->p_flags_valid)
252b5132
RH
4996 {
4997 p->p_flags |= PF_R;
02bf8d82 4998 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 4999 p->p_flags |= PF_X;
02bf8d82 5000 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
5001 p->p_flags |= PF_W;
5002 }
5003 }
43a8475c 5004
bf988460 5005 off -= off_adjust;
0920dee7 5006
7c928300
AM
5007 /* Check that all sections are in a PT_LOAD segment.
5008 Don't check funky gdb generated core files. */
5009 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
5010 {
5011 bfd_boolean check_vma = TRUE;
5012
5013 for (i = 1; i < m->count; i++)
5014 if (m->sections[i]->vma == m->sections[i - 1]->vma
5015 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5016 ->this_hdr), p) != 0
5017 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5018 ->this_hdr), p) != 0)
0920dee7 5019 {
9a83a553
AM
5020 /* Looks like we have overlays packed into the segment. */
5021 check_vma = FALSE;
5022 break;
0920dee7 5023 }
9a83a553
AM
5024
5025 for (i = 0; i < m->count; i++)
5026 {
5027 Elf_Internal_Shdr *this_hdr;
5028 asection *sec;
5029
5030 sec = m->sections[i];
5031 this_hdr = &(elf_section_data(sec)->this_hdr);
86b2281f
AM
5032 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5033 && !ELF_TBSS_SPECIAL (this_hdr, p))
9a83a553
AM
5034 {
5035 (*_bfd_error_handler)
5036 (_("%B: section `%A' can't be allocated in segment %d"),
5037 abfd, sec, j);
5038 print_segment_map (m);
5039 }
5040 }
5041 }
252b5132
RH
5042 }
5043
12bd6957 5044 elf_next_file_pos (abfd) = off;
f3520d2f
AM
5045 return TRUE;
5046}
5047
5048/* Assign file positions for the other sections. */
5049
5050static bfd_boolean
5051assign_file_positions_for_non_load_sections (bfd *abfd,
5052 struct bfd_link_info *link_info)
5053{
5054 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5055 Elf_Internal_Shdr **i_shdrpp;
5056 Elf_Internal_Shdr **hdrpp;
5057 Elf_Internal_Phdr *phdrs;
5058 Elf_Internal_Phdr *p;
5059 struct elf_segment_map *m;
62655c7b 5060 struct elf_segment_map *hdrs_segment;
f3520d2f
AM
5061 bfd_vma filehdr_vaddr, filehdr_paddr;
5062 bfd_vma phdrs_vaddr, phdrs_paddr;
5063 file_ptr off;
5064 unsigned int num_sec;
5065 unsigned int i;
5066 unsigned int count;
5067
5c182d5f
AM
5068 i_shdrpp = elf_elfsections (abfd);
5069 num_sec = elf_numsections (abfd);
12bd6957 5070 off = elf_next_file_pos (abfd);
5c182d5f
AM
5071 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
5072 {
5c182d5f
AM
5073 Elf_Internal_Shdr *hdr;
5074
5075 hdr = *hdrpp;
5076 if (hdr->bfd_section != NULL
252e386e
AM
5077 && (hdr->bfd_section->filepos != 0
5078 || (hdr->sh_type == SHT_NOBITS
5079 && hdr->contents == NULL)))
627b32bc 5080 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
5081 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
5082 {
e8d2ba53
AM
5083 if (hdr->sh_size != 0)
5084 (*_bfd_error_handler)
5085 (_("%B: warning: allocated section `%s' not in segment"),
5086 abfd,
5087 (hdr->bfd_section == NULL
5088 ? "*unknown*"
5089 : hdr->bfd_section->name));
3ba71138
L
5090 /* We don't need to page align empty sections. */
5091 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
5092 off += vma_page_aligned_bias (hdr->sh_addr, off,
5093 bed->maxpagesize);
5094 else
5095 off += vma_page_aligned_bias (hdr->sh_addr, off,
5096 hdr->sh_addralign);
5097 off = _bfd_elf_assign_file_position_for_section (hdr, off,
5098 FALSE);
5099 }
5100 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5101 && hdr->bfd_section == NULL)
12bd6957
AM
5102 || hdr == i_shdrpp[elf_onesymtab (abfd)]
5103 || hdr == i_shdrpp[elf_symtab_shndx (abfd)]
5104 || hdr == i_shdrpp[elf_strtab_sec (abfd)])
5c182d5f
AM
5105 hdr->sh_offset = -1;
5106 else
5107 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
5108 }
5109
252b5132
RH
5110 /* Now that we have set the section file positions, we can set up
5111 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
5112 count = 0;
5113 filehdr_vaddr = 0;
5114 filehdr_paddr = 0;
5115 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
5116 phdrs_paddr = 0;
62655c7b 5117 hdrs_segment = NULL;
f3520d2f 5118 phdrs = elf_tdata (abfd)->phdr;
12bd6957 5119 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
f3520d2f
AM
5120 {
5121 ++count;
5122 if (p->p_type != PT_LOAD)
5123 continue;
5124
5125 if (m->includes_filehdr)
5126 {
5127 filehdr_vaddr = p->p_vaddr;
5128 filehdr_paddr = p->p_paddr;
5129 }
5130 if (m->includes_phdrs)
5131 {
5132 phdrs_vaddr = p->p_vaddr;
5133 phdrs_paddr = p->p_paddr;
5134 if (m->includes_filehdr)
5135 {
62655c7b 5136 hdrs_segment = m;
f3520d2f
AM
5137 phdrs_vaddr += bed->s->sizeof_ehdr;
5138 phdrs_paddr += bed->s->sizeof_ehdr;
5139 }
5140 }
5141 }
5142
62655c7b
RM
5143 if (hdrs_segment != NULL && link_info != NULL)
5144 {
5145 /* There is a segment that contains both the file headers and the
5146 program headers, so provide a symbol __ehdr_start pointing there.
5147 A program can use this to examine itself robustly. */
5148
5149 struct elf_link_hash_entry *hash
5150 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5151 FALSE, FALSE, TRUE);
5152 /* If the symbol was referenced and not defined, define it. */
5153 if (hash != NULL
5154 && (hash->root.type == bfd_link_hash_new
5155 || hash->root.type == bfd_link_hash_undefined
5156 || hash->root.type == bfd_link_hash_undefweak
5157 || hash->root.type == bfd_link_hash_common))
5158 {
5159 asection *s = NULL;
5160 if (hdrs_segment->count != 0)
5161 /* The segment contains sections, so use the first one. */
5162 s = hdrs_segment->sections[0];
5163 else
5164 /* Use the first (i.e. lowest-addressed) section in any segment. */
12bd6957 5165 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62655c7b
RM
5166 if (m->count != 0)
5167 {
5168 s = m->sections[0];
5169 break;
5170 }
5171
5172 if (s != NULL)
5173 {
5174 hash->root.u.def.value = filehdr_vaddr - s->vma;
5175 hash->root.u.def.section = s;
5176 }
5177 else
5178 {
5179 hash->root.u.def.value = filehdr_vaddr;
5180 hash->root.u.def.section = bfd_abs_section_ptr;
5181 }
5182
5183 hash->root.type = bfd_link_hash_defined;
5184 hash->def_regular = 1;
5185 hash->non_elf = 0;
5186 }
5187 }
5188
12bd6957 5189 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
252b5132 5190 {
129af99f 5191 if (p->p_type == PT_GNU_RELRO)
252b5132 5192 {
b84a33b5 5193 const Elf_Internal_Phdr *lp;
3146fac4 5194 struct elf_segment_map *lm;
1ea63fd2 5195
129af99f 5196 if (link_info != NULL)
8c37241b 5197 {
129af99f
AS
5198 /* During linking the range of the RELRO segment is passed
5199 in link_info. */
12bd6957 5200 for (lm = elf_seg_map (abfd), lp = phdrs;
3146fac4
AM
5201 lm != NULL;
5202 lm = lm->next, lp++)
8c37241b
JJ
5203 {
5204 if (lp->p_type == PT_LOAD
b84a33b5 5205 && lp->p_vaddr < link_info->relro_end
3146fac4
AM
5206 && lm->count != 0
5207 && lm->sections[0]->vma >= link_info->relro_start)
8c37241b
JJ
5208 break;
5209 }
8981c88a 5210
3146fac4 5211 BFD_ASSERT (lm != NULL);
8c37241b 5212 }
129af99f
AS
5213 else
5214 {
5215 /* Otherwise we are copying an executable or shared
b84a33b5 5216 library, but we need to use the same linker logic. */
129af99f
AS
5217 for (lp = phdrs; lp < phdrs + count; ++lp)
5218 {
5219 if (lp->p_type == PT_LOAD
5220 && lp->p_paddr == p->p_paddr)
5221 break;
5222 }
b84a33b5
AM
5223 }
5224
5225 if (lp < phdrs + count)
5226 {
5227 p->p_vaddr = lp->p_vaddr;
5228 p->p_paddr = lp->p_paddr;
5229 p->p_offset = lp->p_offset;
5230 if (link_info != NULL)
5231 p->p_filesz = link_info->relro_end - lp->p_vaddr;
5232 else if (m->p_size_valid)
5233 p->p_filesz = m->p_size;
129af99f
AS
5234 else
5235 abort ();
b84a33b5 5236 p->p_memsz = p->p_filesz;
f3944f72
L
5237 /* Preserve the alignment and flags if they are valid. The
5238 gold linker generates RW/4 for the PT_GNU_RELRO section.
5239 It is better for objcopy/strip to honor these attributes
5240 otherwise gdb will choke when using separate debug files.
5241 */
5242 if (!m->p_align_valid)
5243 p->p_align = 1;
5244 if (!m->p_flags_valid)
5245 p->p_flags = (lp->p_flags & ~PF_W);
129af99f 5246 }
9433b9b1 5247 else
b84a33b5
AM
5248 {
5249 memset (p, 0, sizeof *p);
5250 p->p_type = PT_NULL;
5251 }
129af99f 5252 }
04c3a755
NS
5253 else if (p->p_type == PT_GNU_STACK)
5254 {
5255 if (m->p_size_valid)
5256 p->p_memsz = m->p_size;
5257 }
129af99f
AS
5258 else if (m->count != 0)
5259 {
5260 if (p->p_type != PT_LOAD
5261 && (p->p_type != PT_NOTE
5262 || bfd_get_format (abfd) != bfd_core))
5263 {
c86934ce
NC
5264 if (m->includes_filehdr || m->includes_phdrs)
5265 {
5266 /* PR 17512: file: 2195325e. */
5267 (*_bfd_error_handler)
5268 (_("%B: warning: non-load segment includes file header and/or program header"),
5269 abfd);
5270 return FALSE;
5271 }
129af99f 5272
86b2281f 5273 p->p_filesz = 0;
129af99f 5274 p->p_offset = m->sections[0]->filepos;
86b2281f
AM
5275 for (i = m->count; i-- != 0;)
5276 {
5277 asection *sect = m->sections[i];
5278 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
5279 if (hdr->sh_type != SHT_NOBITS)
5280 {
5281 p->p_filesz = (sect->filepos - m->sections[0]->filepos
5282 + hdr->sh_size);
5283 break;
5284 }
5285 }
129af99f
AS
5286 }
5287 }
5288 else if (m->includes_filehdr)
5289 {
5290 p->p_vaddr = filehdr_vaddr;
5291 if (! m->p_paddr_valid)
5292 p->p_paddr = filehdr_paddr;
5293 }
5294 else if (m->includes_phdrs)
5295 {
5296 p->p_vaddr = phdrs_vaddr;
5297 if (! m->p_paddr_valid)
5298 p->p_paddr = phdrs_paddr;
252b5132
RH
5299 }
5300 }
5301
12bd6957 5302 elf_next_file_pos (abfd) = off;
252b5132 5303
b34976b6 5304 return TRUE;
252b5132
RH
5305}
5306
252b5132
RH
5307/* Work out the file positions of all the sections. This is called by
5308 _bfd_elf_compute_section_file_positions. All the section sizes and
5309 VMAs must be known before this is called.
5310
e0638f70
AM
5311 Reloc sections come in two flavours: Those processed specially as
5312 "side-channel" data attached to a section to which they apply, and
5313 those that bfd doesn't process as relocations. The latter sort are
5314 stored in a normal bfd section by bfd_section_from_shdr. We don't
5315 consider the former sort here, unless they form part of the loadable
5316 image. Reloc sections not assigned here will be handled later by
5317 assign_file_positions_for_relocs.
252b5132
RH
5318
5319 We also don't set the positions of the .symtab and .strtab here. */
5320
b34976b6 5321static bfd_boolean
c84fca4d
AO
5322assign_file_positions_except_relocs (bfd *abfd,
5323 struct bfd_link_info *link_info)
252b5132 5324{
5c182d5f
AM
5325 struct elf_obj_tdata *tdata = elf_tdata (abfd);
5326 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
9c5bfbb7 5327 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5328
5329 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
5330 && bfd_get_format (abfd) != bfd_core)
5331 {
5c182d5f
AM
5332 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
5333 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
5334 Elf_Internal_Shdr **hdrpp;
5335 unsigned int i;
a485e98e 5336 file_ptr off;
252b5132
RH
5337
5338 /* Start after the ELF header. */
5339 off = i_ehdrp->e_ehsize;
5340
5341 /* We are not creating an executable, which means that we are
5342 not creating a program header, and that the actual order of
5343 the sections in the file is unimportant. */
9ad5cbcf 5344 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
5345 {
5346 Elf_Internal_Shdr *hdr;
5347
5348 hdr = *hdrpp;
e0638f70
AM
5349 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5350 && hdr->bfd_section == NULL)
12bd6957
AM
5351 || i == elf_onesymtab (abfd)
5352 || i == elf_symtab_shndx (abfd)
5353 || i == elf_strtab_sec (abfd))
252b5132
RH
5354 {
5355 hdr->sh_offset = -1;
252b5132 5356 }
9ad5cbcf 5357 else
b34976b6 5358 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 5359 }
a485e98e
AM
5360
5361 elf_next_file_pos (abfd) = off;
252b5132
RH
5362 }
5363 else
5364 {
f3520d2f
AM
5365 unsigned int alloc;
5366
252b5132 5367 /* Assign file positions for the loaded sections based on the
08a40648 5368 assignment of sections to segments. */
f3520d2f
AM
5369 if (!assign_file_positions_for_load_sections (abfd, link_info))
5370 return FALSE;
5371
5372 /* And for non-load sections. */
5373 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
5374 return FALSE;
5375
e36284ab
AM
5376 if (bed->elf_backend_modify_program_headers != NULL)
5377 {
5378 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
5379 return FALSE;
5380 }
5381
58e7ebac
L
5382 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=. */
5383 if (link_info != NULL
5384 && link_info->executable
5385 && link_info->shared)
5386 {
5387 unsigned int num_segments = elf_elfheader (abfd)->e_phnum;
5388 Elf_Internal_Phdr *segment = elf_tdata (abfd)->phdr;
5389 Elf_Internal_Phdr *end_segment = &segment[num_segments];
5390
5391 /* Find the lowest p_vaddr in PT_LOAD segments. */
5392 bfd_vma p_vaddr = (bfd_vma) -1;
5393 for (; segment < end_segment; segment++)
5394 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
5395 p_vaddr = segment->p_vaddr;
5396
5397 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
5398 segments is non-zero. */
5399 if (p_vaddr)
5400 i_ehdrp->e_type = ET_EXEC;
5401 }
5402
f3520d2f 5403 /* Write out the program headers. */
12bd6957 5404 alloc = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
f3520d2f
AM
5405 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
5406 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 5407 return FALSE;
252b5132
RH
5408 }
5409
b34976b6 5410 return TRUE;
252b5132
RH
5411}
5412
b34976b6 5413static bfd_boolean
217aa764 5414prep_headers (bfd *abfd)
252b5132 5415{
3d540e93 5416 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 5417 struct elf_strtab_hash *shstrtab;
9c5bfbb7 5418 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5419
5420 i_ehdrp = elf_elfheader (abfd);
252b5132 5421
2b0f7ef9 5422 shstrtab = _bfd_elf_strtab_init ();
252b5132 5423 if (shstrtab == NULL)
b34976b6 5424 return FALSE;
252b5132
RH
5425
5426 elf_shstrtab (abfd) = shstrtab;
5427
5428 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
5429 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
5430 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
5431 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
5432
5433 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
5434 i_ehdrp->e_ident[EI_DATA] =
5435 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
5436 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
5437
252b5132
RH
5438 if ((abfd->flags & DYNAMIC) != 0)
5439 i_ehdrp->e_type = ET_DYN;
5440 else if ((abfd->flags & EXEC_P) != 0)
5441 i_ehdrp->e_type = ET_EXEC;
5442 else if (bfd_get_format (abfd) == bfd_core)
5443 i_ehdrp->e_type = ET_CORE;
5444 else
5445 i_ehdrp->e_type = ET_REL;
5446
5447 switch (bfd_get_arch (abfd))
5448 {
5449 case bfd_arch_unknown:
5450 i_ehdrp->e_machine = EM_NONE;
5451 break;
aa4f99bb
AO
5452
5453 /* There used to be a long list of cases here, each one setting
5454 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
5455 in the corresponding bfd definition. To avoid duplication,
5456 the switch was removed. Machines that need special handling
5457 can generally do it in elf_backend_final_write_processing(),
5458 unless they need the information earlier than the final write.
5459 Such need can generally be supplied by replacing the tests for
5460 e_machine with the conditions used to determine it. */
252b5132 5461 default:
9c5bfbb7
AM
5462 i_ehdrp->e_machine = bed->elf_machine_code;
5463 }
aa4f99bb 5464
252b5132
RH
5465 i_ehdrp->e_version = bed->s->ev_current;
5466 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
5467
c044fabd 5468 /* No program header, for now. */
252b5132
RH
5469 i_ehdrp->e_phoff = 0;
5470 i_ehdrp->e_phentsize = 0;
5471 i_ehdrp->e_phnum = 0;
5472
c044fabd 5473 /* Each bfd section is section header entry. */
252b5132
RH
5474 i_ehdrp->e_entry = bfd_get_start_address (abfd);
5475 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
5476
c044fabd 5477 /* If we're building an executable, we'll need a program header table. */
252b5132 5478 if (abfd->flags & EXEC_P)
0e71e495
BE
5479 /* It all happens later. */
5480 ;
252b5132
RH
5481 else
5482 {
5483 i_ehdrp->e_phentsize = 0;
252b5132
RH
5484 i_ehdrp->e_phoff = 0;
5485 }
5486
5487 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 5488 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 5489 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 5490 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 5491 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 5492 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132 5493 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
17ca87fc 5494 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
252b5132 5495 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 5496 return FALSE;
252b5132 5497
b34976b6 5498 return TRUE;
252b5132
RH
5499}
5500
5501/* Assign file positions for all the reloc sections which are not part
a485e98e 5502 of the loadable file image, and the file position of section headers. */
252b5132 5503
a485e98e 5504static void
217aa764 5505_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
5506{
5507 file_ptr off;
9ad5cbcf 5508 unsigned int i, num_sec;
252b5132 5509 Elf_Internal_Shdr **shdrpp;
a485e98e
AM
5510 Elf_Internal_Ehdr *i_ehdrp;
5511 const struct elf_backend_data *bed;
252b5132 5512
12bd6957 5513 off = elf_next_file_pos (abfd);
252b5132 5514
9ad5cbcf
AM
5515 num_sec = elf_numsections (abfd);
5516 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
5517 {
5518 Elf_Internal_Shdr *shdrp;
5519
5520 shdrp = *shdrpp;
5521 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
5522 && shdrp->sh_offset == -1)
b34976b6 5523 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
5524 }
5525
a485e98e
AM
5526/* Place the section headers. */
5527 i_ehdrp = elf_elfheader (abfd);
5528 bed = get_elf_backend_data (abfd);
5529 off = align_file_position (off, 1 << bed->s->log_file_align);
5530 i_ehdrp->e_shoff = off;
5531 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
12bd6957 5532 elf_next_file_pos (abfd) = off;
252b5132
RH
5533}
5534
b34976b6 5535bfd_boolean
217aa764 5536_bfd_elf_write_object_contents (bfd *abfd)
252b5132 5537{
9c5bfbb7 5538 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5539 Elf_Internal_Shdr **i_shdrp;
b34976b6 5540 bfd_boolean failed;
9ad5cbcf 5541 unsigned int count, num_sec;
30e8ee25 5542 struct elf_obj_tdata *t;
252b5132
RH
5543
5544 if (! abfd->output_has_begun
217aa764 5545 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 5546 return FALSE;
252b5132
RH
5547
5548 i_shdrp = elf_elfsections (abfd);
252b5132 5549
b34976b6 5550 failed = FALSE;
252b5132
RH
5551 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
5552 if (failed)
b34976b6 5553 return FALSE;
252b5132
RH
5554
5555 _bfd_elf_assign_file_positions_for_relocs (abfd);
5556
c044fabd 5557 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
5558 num_sec = elf_numsections (abfd);
5559 for (count = 1; count < num_sec; count++)
252b5132
RH
5560 {
5561 if (bed->elf_backend_section_processing)
5562 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5563 if (i_shdrp[count]->contents)
5564 {
dc810e39
AM
5565 bfd_size_type amt = i_shdrp[count]->sh_size;
5566
252b5132 5567 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5568 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5569 return FALSE;
252b5132
RH
5570 }
5571 }
5572
5573 /* Write out the section header names. */
30e8ee25 5574 t = elf_tdata (abfd);
26ae6d5e 5575 if (elf_shstrtab (abfd) != NULL
30e8ee25 5576 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 5577 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5578 return FALSE;
252b5132
RH
5579
5580 if (bed->elf_backend_final_write_processing)
12bd6957 5581 (*bed->elf_backend_final_write_processing) (abfd, elf_linker (abfd));
252b5132 5582
ff59fc36
RM
5583 if (!bed->s->write_shdrs_and_ehdr (abfd))
5584 return FALSE;
5585
5586 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
c0355132
AM
5587 if (t->o->build_id.after_write_object_contents != NULL)
5588 return (*t->o->build_id.after_write_object_contents) (abfd);
ff59fc36
RM
5589
5590 return TRUE;
252b5132
RH
5591}
5592
b34976b6 5593bfd_boolean
217aa764 5594_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5595{
c044fabd 5596 /* Hopefully this can be done just like an object file. */
252b5132
RH
5597 return _bfd_elf_write_object_contents (abfd);
5598}
c044fabd
KH
5599
5600/* Given a section, search the header to find them. */
5601
cb33740c 5602unsigned int
198beae2 5603_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5604{
9c5bfbb7 5605 const struct elf_backend_data *bed;
91d6fa6a 5606 unsigned int sec_index;
252b5132 5607
9ad5cbcf
AM
5608 if (elf_section_data (asect) != NULL
5609 && elf_section_data (asect)->this_idx != 0)
5610 return elf_section_data (asect)->this_idx;
5611
5612 if (bfd_is_abs_section (asect))
91d6fa6a 5613 sec_index = SHN_ABS;
af746e92 5614 else if (bfd_is_com_section (asect))
91d6fa6a 5615 sec_index = SHN_COMMON;
af746e92 5616 else if (bfd_is_und_section (asect))
91d6fa6a 5617 sec_index = SHN_UNDEF;
af746e92 5618 else
91d6fa6a 5619 sec_index = SHN_BAD;
252b5132 5620
af746e92 5621 bed = get_elf_backend_data (abfd);
252b5132
RH
5622 if (bed->elf_backend_section_from_bfd_section)
5623 {
91d6fa6a 5624 int retval = sec_index;
9ad5cbcf 5625
af746e92
AM
5626 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5627 return retval;
252b5132
RH
5628 }
5629
91d6fa6a 5630 if (sec_index == SHN_BAD)
af746e92 5631 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5632
91d6fa6a 5633 return sec_index;
252b5132
RH
5634}
5635
5636/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5637 on error. */
5638
5639int
217aa764 5640_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5641{
5642 asymbol *asym_ptr = *asym_ptr_ptr;
5643 int idx;
5644 flagword flags = asym_ptr->flags;
5645
5646 /* When gas creates relocations against local labels, it creates its
5647 own symbol for the section, but does put the symbol into the
5648 symbol chain, so udata is 0. When the linker is generating
5649 relocatable output, this section symbol may be for one of the
5650 input sections rather than the output section. */
5651 if (asym_ptr->udata.i == 0
5652 && (flags & BSF_SECTION_SYM)
5653 && asym_ptr->section)
5654 {
5372391b 5655 asection *sec;
252b5132
RH
5656 int indx;
5657
5372391b
AM
5658 sec = asym_ptr->section;
5659 if (sec->owner != abfd && sec->output_section != NULL)
5660 sec = sec->output_section;
5661 if (sec->owner == abfd
5662 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5663 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5664 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5665 }
5666
5667 idx = asym_ptr->udata.i;
5668
5669 if (idx == 0)
5670 {
5671 /* This case can occur when using --strip-symbol on a symbol
08a40648 5672 which is used in a relocation entry. */
252b5132 5673 (*_bfd_error_handler)
d003868e
AM
5674 (_("%B: symbol `%s' required but not present"),
5675 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5676 bfd_set_error (bfd_error_no_symbols);
5677 return -1;
5678 }
5679
5680#if DEBUG & 4
5681 {
5682 fprintf (stderr,
9ccb8af9
AM
5683 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx\n",
5684 (long) asym_ptr, asym_ptr->name, idx, (long) flags);
252b5132
RH
5685 fflush (stderr);
5686 }
5687#endif
5688
5689 return idx;
5690}
5691
84d1d650 5692/* Rewrite program header information. */
252b5132 5693
b34976b6 5694static bfd_boolean
84d1d650 5695rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5696{
b34976b6
AM
5697 Elf_Internal_Ehdr *iehdr;
5698 struct elf_segment_map *map;
5699 struct elf_segment_map *map_first;
5700 struct elf_segment_map **pointer_to_map;
5701 Elf_Internal_Phdr *segment;
5702 asection *section;
5703 unsigned int i;
5704 unsigned int num_segments;
5705 bfd_boolean phdr_included = FALSE;
5c44b38e 5706 bfd_boolean p_paddr_valid;
b34976b6
AM
5707 bfd_vma maxpagesize;
5708 struct elf_segment_map *phdr_adjust_seg = NULL;
5709 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5710 const struct elf_backend_data *bed;
bc67d8a6 5711
caf47ea6 5712 bed = get_elf_backend_data (ibfd);
252b5132
RH
5713 iehdr = elf_elfheader (ibfd);
5714
bc67d8a6 5715 map_first = NULL;
c044fabd 5716 pointer_to_map = &map_first;
252b5132
RH
5717
5718 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5719 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5720
5721 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5722#define SEGMENT_END(segment, start) \
5723 (start + (segment->p_memsz > segment->p_filesz \
5724 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5725
eecdbe52
JJ
5726#define SECTION_SIZE(section, segment) \
5727 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5728 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5729 ? section->size : 0)
eecdbe52 5730
b34976b6 5731 /* Returns TRUE if the given section is contained within
bc67d8a6 5732 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5733#define IS_CONTAINED_BY_VMA(section, segment) \
5734 (section->vma >= segment->p_vaddr \
eecdbe52 5735 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5736 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5737
b34976b6 5738 /* Returns TRUE if the given section is contained within
bc67d8a6 5739 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5740#define IS_CONTAINED_BY_LMA(section, segment, base) \
5741 (section->lma >= base \
eecdbe52 5742 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5743 <= SEGMENT_END (segment, base)))
252b5132 5744
0efc80c8
L
5745 /* Handle PT_NOTE segment. */
5746#define IS_NOTE(p, s) \
aecc8f8a 5747 (p->p_type == PT_NOTE \
0efc80c8 5748 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 5749 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5750 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5751 <= p->p_offset + p->p_filesz))
252b5132 5752
0efc80c8
L
5753 /* Special case: corefile "NOTE" section containing regs, prpsinfo
5754 etc. */
5755#define IS_COREFILE_NOTE(p, s) \
5756 (IS_NOTE (p, s) \
5757 && bfd_get_format (ibfd) == bfd_core \
5758 && s->vma == 0 \
5759 && s->lma == 0)
5760
252b5132
RH
5761 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5762 linker, which generates a PT_INTERP section with p_vaddr and
5763 p_memsz set to 0. */
aecc8f8a
AM
5764#define IS_SOLARIS_PT_INTERP(p, s) \
5765 (p->p_vaddr == 0 \
5766 && p->p_paddr == 0 \
5767 && p->p_memsz == 0 \
5768 && p->p_filesz > 0 \
5769 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5770 && s->size > 0 \
aecc8f8a 5771 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5772 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5773 <= p->p_offset + p->p_filesz))
5c440b1e 5774
bc67d8a6
NC
5775 /* Decide if the given section should be included in the given segment.
5776 A section will be included if:
f5ffc919 5777 1. It is within the address space of the segment -- we use the LMA
08a40648 5778 if that is set for the segment and the VMA otherwise,
0efc80c8 5779 2. It is an allocated section or a NOTE section in a PT_NOTE
d324f6d6 5780 segment.
bc67d8a6 5781 3. There is an output section associated with it,
eecdbe52 5782 4. The section has not already been allocated to a previous segment.
2b05f1b7 5783 5. PT_GNU_STACK segments do not include any sections.
03394ac9 5784 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5785 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5786 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 5787 (with the possible exception of .dynamic). */
9f17e2a6 5788#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
5789 ((((segment->p_paddr \
5790 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5791 : IS_CONTAINED_BY_VMA (section, segment)) \
5792 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 5793 || IS_NOTE (segment, section)) \
2b05f1b7
L
5794 && segment->p_type != PT_GNU_STACK \
5795 && (segment->p_type != PT_TLS \
5796 || (section->flags & SEC_THREAD_LOCAL)) \
5797 && (segment->p_type == PT_LOAD \
5798 || segment->p_type == PT_TLS \
5799 || (section->flags & SEC_THREAD_LOCAL) == 0) \
5800 && (segment->p_type != PT_DYNAMIC \
5801 || SECTION_SIZE (section, segment) > 0 \
5802 || (segment->p_paddr \
5803 ? segment->p_paddr != section->lma \
5804 : segment->p_vaddr != section->vma) \
5805 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5806 == 0)) \
0067a569 5807 && !section->segment_mark)
bc67d8a6 5808
9f17e2a6
L
5809/* If the output section of a section in the input segment is NULL,
5810 it is removed from the corresponding output segment. */
5811#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
5812 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
5813 && section->output_section != NULL)
5814
b34976b6 5815 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5816#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5817 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5818
5819 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5820 their VMA address ranges and their LMA address ranges overlap.
5821 It is possible to have overlapping VMA ranges without overlapping LMA
5822 ranges. RedBoot images for example can have both .data and .bss mapped
5823 to the same VMA range, but with the .data section mapped to a different
5824 LMA. */
aecc8f8a 5825#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 5826 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 5827 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 5828 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 5829 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5830
5831 /* Initialise the segment mark field. */
5832 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5833 section->segment_mark = FALSE;
bc67d8a6 5834
5c44b38e
AM
5835 /* The Solaris linker creates program headers in which all the
5836 p_paddr fields are zero. When we try to objcopy or strip such a
5837 file, we get confused. Check for this case, and if we find it
5838 don't set the p_paddr_valid fields. */
5839 p_paddr_valid = FALSE;
5840 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5841 i < num_segments;
5842 i++, segment++)
5843 if (segment->p_paddr != 0)
5844 {
5845 p_paddr_valid = TRUE;
5846 break;
5847 }
5848
252b5132 5849 /* Scan through the segments specified in the program header
bc67d8a6 5850 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5851 in the loadable segments. These can be created by weird
aecc8f8a 5852 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5853 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5854 i < num_segments;
c044fabd 5855 i++, segment++)
252b5132 5856 {
252b5132 5857 unsigned int j;
c044fabd 5858 Elf_Internal_Phdr *segment2;
252b5132 5859
aecc8f8a
AM
5860 if (segment->p_type == PT_INTERP)
5861 for (section = ibfd->sections; section; section = section->next)
5862 if (IS_SOLARIS_PT_INTERP (segment, section))
5863 {
5864 /* Mininal change so that the normal section to segment
4cc11e76 5865 assignment code will work. */
aecc8f8a
AM
5866 segment->p_vaddr = section->vma;
5867 break;
5868 }
5869
bc67d8a6 5870 if (segment->p_type != PT_LOAD)
b10a8ae0
L
5871 {
5872 /* Remove PT_GNU_RELRO segment. */
5873 if (segment->p_type == PT_GNU_RELRO)
5874 segment->p_type = PT_NULL;
5875 continue;
5876 }
c044fabd 5877
bc67d8a6 5878 /* Determine if this segment overlaps any previous segments. */
0067a569 5879 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
5880 {
5881 bfd_signed_vma extra_length;
c044fabd 5882
bc67d8a6 5883 if (segment2->p_type != PT_LOAD
0067a569 5884 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 5885 continue;
c044fabd 5886
bc67d8a6
NC
5887 /* Merge the two segments together. */
5888 if (segment2->p_vaddr < segment->p_vaddr)
5889 {
c044fabd 5890 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 5891 SEGMENT. */
0067a569
AM
5892 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
5893 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 5894
bc67d8a6
NC
5895 if (extra_length > 0)
5896 {
0067a569 5897 segment2->p_memsz += extra_length;
bc67d8a6
NC
5898 segment2->p_filesz += extra_length;
5899 }
c044fabd 5900
bc67d8a6 5901 segment->p_type = PT_NULL;
c044fabd 5902
bc67d8a6
NC
5903 /* Since we have deleted P we must restart the outer loop. */
5904 i = 0;
5905 segment = elf_tdata (ibfd)->phdr;
5906 break;
5907 }
5908 else
5909 {
c044fabd 5910 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 5911 SEGMENT2. */
0067a569
AM
5912 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
5913 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 5914
bc67d8a6
NC
5915 if (extra_length > 0)
5916 {
0067a569 5917 segment->p_memsz += extra_length;
bc67d8a6
NC
5918 segment->p_filesz += extra_length;
5919 }
c044fabd 5920
bc67d8a6
NC
5921 segment2->p_type = PT_NULL;
5922 }
5923 }
5924 }
c044fabd 5925
bc67d8a6
NC
5926 /* The second scan attempts to assign sections to segments. */
5927 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5928 i < num_segments;
0067a569 5929 i++, segment++)
bc67d8a6 5930 {
0067a569
AM
5931 unsigned int section_count;
5932 asection **sections;
5933 asection *output_section;
5934 unsigned int isec;
5935 bfd_vma matching_lma;
5936 bfd_vma suggested_lma;
5937 unsigned int j;
dc810e39 5938 bfd_size_type amt;
0067a569
AM
5939 asection *first_section;
5940 bfd_boolean first_matching_lma;
5941 bfd_boolean first_suggested_lma;
bc67d8a6
NC
5942
5943 if (segment->p_type == PT_NULL)
5944 continue;
c044fabd 5945
9f17e2a6 5946 first_section = NULL;
bc67d8a6 5947 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5948 for (section = ibfd->sections, section_count = 0;
5949 section != NULL;
5950 section = section->next)
9f17e2a6
L
5951 {
5952 /* Find the first section in the input segment, which may be
5953 removed from the corresponding output segment. */
5954 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
5955 {
5956 if (first_section == NULL)
5957 first_section = section;
5958 if (section->output_section != NULL)
5959 ++section_count;
5960 }
5961 }
811072d8 5962
b5f852ea
NC
5963 /* Allocate a segment map big enough to contain
5964 all of the sections we have selected. */
dc810e39
AM
5965 amt = sizeof (struct elf_segment_map);
5966 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5967 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 5968 if (map == NULL)
b34976b6 5969 return FALSE;
252b5132
RH
5970
5971 /* Initialise the fields of the segment map. Default to
5972 using the physical address of the segment in the input BFD. */
0067a569
AM
5973 map->next = NULL;
5974 map->p_type = segment->p_type;
5975 map->p_flags = segment->p_flags;
bc67d8a6 5976 map->p_flags_valid = 1;
55d55ac7 5977
9f17e2a6
L
5978 /* If the first section in the input segment is removed, there is
5979 no need to preserve segment physical address in the corresponding
5980 output segment. */
945c025a 5981 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
5982 {
5983 map->p_paddr = segment->p_paddr;
5c44b38e 5984 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 5985 }
252b5132
RH
5986
5987 /* Determine if this segment contains the ELF file header
5988 and if it contains the program headers themselves. */
bc67d8a6
NC
5989 map->includes_filehdr = (segment->p_offset == 0
5990 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 5991 map->includes_phdrs = 0;
252b5132 5992
0067a569 5993 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 5994 {
bc67d8a6
NC
5995 map->includes_phdrs =
5996 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5997 && (segment->p_offset + segment->p_filesz
252b5132
RH
5998 >= ((bfd_vma) iehdr->e_phoff
5999 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 6000
bc67d8a6 6001 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 6002 phdr_included = TRUE;
252b5132
RH
6003 }
6004
bc67d8a6 6005 if (section_count == 0)
252b5132
RH
6006 {
6007 /* Special segments, such as the PT_PHDR segment, may contain
6008 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
6009 something. They are allowed by the ELF spec however, so only
6010 a warning is produced. */
bc67d8a6 6011 if (segment->p_type == PT_LOAD)
c86934ce
NC
6012 (*_bfd_error_handler) (_("\
6013%B: warning: Empty loadable segment detected, is this intentional ?"),
0067a569 6014 ibfd);
252b5132 6015
bc67d8a6 6016 map->count = 0;
c044fabd
KH
6017 *pointer_to_map = map;
6018 pointer_to_map = &map->next;
252b5132
RH
6019
6020 continue;
6021 }
6022
6023 /* Now scan the sections in the input BFD again and attempt
6024 to add their corresponding output sections to the segment map.
6025 The problem here is how to handle an output section which has
6026 been moved (ie had its LMA changed). There are four possibilities:
6027
6028 1. None of the sections have been moved.
6029 In this case we can continue to use the segment LMA from the
6030 input BFD.
6031
6032 2. All of the sections have been moved by the same amount.
6033 In this case we can change the segment's LMA to match the LMA
6034 of the first section.
6035
6036 3. Some of the sections have been moved, others have not.
6037 In this case those sections which have not been moved can be
6038 placed in the current segment which will have to have its size,
6039 and possibly its LMA changed, and a new segment or segments will
6040 have to be created to contain the other sections.
6041
b5f852ea 6042 4. The sections have been moved, but not by the same amount.
252b5132
RH
6043 In this case we can change the segment's LMA to match the LMA
6044 of the first section and we will have to create a new segment
6045 or segments to contain the other sections.
6046
6047 In order to save time, we allocate an array to hold the section
6048 pointers that we are interested in. As these sections get assigned
6049 to a segment, they are removed from this array. */
6050
a50b1753 6051 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 6052 if (sections == NULL)
b34976b6 6053 return FALSE;
252b5132
RH
6054
6055 /* Step One: Scan for segment vs section LMA conflicts.
6056 Also add the sections to the section array allocated above.
6057 Also add the sections to the current segment. In the common
6058 case, where the sections have not been moved, this means that
6059 we have completely filled the segment, and there is nothing
6060 more to do. */
252b5132 6061 isec = 0;
72730e0c 6062 matching_lma = 0;
252b5132 6063 suggested_lma = 0;
0067a569
AM
6064 first_matching_lma = TRUE;
6065 first_suggested_lma = TRUE;
252b5132 6066
147d51c2 6067 for (section = ibfd->sections;
bc67d8a6
NC
6068 section != NULL;
6069 section = section->next)
147d51c2
L
6070 if (section == first_section)
6071 break;
6072
6073 for (j = 0; section != NULL; section = section->next)
252b5132 6074 {
caf47ea6 6075 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 6076 {
bc67d8a6
NC
6077 output_section = section->output_section;
6078
0067a569 6079 sections[j++] = section;
252b5132
RH
6080
6081 /* The Solaris native linker always sets p_paddr to 0.
6082 We try to catch that case here, and set it to the
5e8d7549
NC
6083 correct value. Note - some backends require that
6084 p_paddr be left as zero. */
5c44b38e 6085 if (!p_paddr_valid
4455705d 6086 && segment->p_vaddr != 0
0067a569 6087 && !bed->want_p_paddr_set_to_zero
252b5132 6088 && isec == 0
bc67d8a6 6089 && output_section->lma != 0
0067a569
AM
6090 && output_section->vma == (segment->p_vaddr
6091 + (map->includes_filehdr
6092 ? iehdr->e_ehsize
6093 : 0)
6094 + (map->includes_phdrs
6095 ? (iehdr->e_phnum
6096 * iehdr->e_phentsize)
6097 : 0)))
bc67d8a6 6098 map->p_paddr = segment->p_vaddr;
252b5132
RH
6099
6100 /* Match up the physical address of the segment with the
6101 LMA address of the output section. */
bc67d8a6 6102 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 6103 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
6104 || (bed->want_p_paddr_set_to_zero
6105 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 6106 {
0067a569
AM
6107 if (first_matching_lma || output_section->lma < matching_lma)
6108 {
6109 matching_lma = output_section->lma;
6110 first_matching_lma = FALSE;
6111 }
252b5132
RH
6112
6113 /* We assume that if the section fits within the segment
bc67d8a6 6114 then it does not overlap any other section within that
252b5132 6115 segment. */
0067a569
AM
6116 map->sections[isec++] = output_section;
6117 }
6118 else if (first_suggested_lma)
6119 {
6120 suggested_lma = output_section->lma;
6121 first_suggested_lma = FALSE;
252b5132 6122 }
147d51c2
L
6123
6124 if (j == section_count)
6125 break;
252b5132
RH
6126 }
6127 }
6128
bc67d8a6 6129 BFD_ASSERT (j == section_count);
252b5132
RH
6130
6131 /* Step Two: Adjust the physical address of the current segment,
6132 if necessary. */
bc67d8a6 6133 if (isec == section_count)
252b5132
RH
6134 {
6135 /* All of the sections fitted within the segment as currently
6136 specified. This is the default case. Add the segment to
6137 the list of built segments and carry on to process the next
6138 program header in the input BFD. */
bc67d8a6 6139 map->count = section_count;
c044fabd
KH
6140 *pointer_to_map = map;
6141 pointer_to_map = &map->next;
08a40648 6142
5c44b38e
AM
6143 if (p_paddr_valid
6144 && !bed->want_p_paddr_set_to_zero
147d51c2 6145 && matching_lma != map->p_paddr
5c44b38e
AM
6146 && !map->includes_filehdr
6147 && !map->includes_phdrs)
3271a814
NS
6148 /* There is some padding before the first section in the
6149 segment. So, we must account for that in the output
6150 segment's vma. */
6151 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 6152
252b5132
RH
6153 free (sections);
6154 continue;
6155 }
252b5132
RH
6156 else
6157 {
0067a569 6158 if (!first_matching_lma)
72730e0c
AM
6159 {
6160 /* At least one section fits inside the current segment.
6161 Keep it, but modify its physical address to match the
6162 LMA of the first section that fitted. */
bc67d8a6 6163 map->p_paddr = matching_lma;
72730e0c
AM
6164 }
6165 else
6166 {
6167 /* None of the sections fitted inside the current segment.
6168 Change the current segment's physical address to match
6169 the LMA of the first section. */
bc67d8a6 6170 map->p_paddr = suggested_lma;
72730e0c
AM
6171 }
6172
bc67d8a6
NC
6173 /* Offset the segment physical address from the lma
6174 to allow for space taken up by elf headers. */
6175 if (map->includes_filehdr)
010c8431
AM
6176 {
6177 if (map->p_paddr >= iehdr->e_ehsize)
6178 map->p_paddr -= iehdr->e_ehsize;
6179 else
6180 {
6181 map->includes_filehdr = FALSE;
6182 map->includes_phdrs = FALSE;
6183 }
6184 }
252b5132 6185
bc67d8a6
NC
6186 if (map->includes_phdrs)
6187 {
010c8431
AM
6188 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
6189 {
6190 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
6191
6192 /* iehdr->e_phnum is just an estimate of the number
6193 of program headers that we will need. Make a note
6194 here of the number we used and the segment we chose
6195 to hold these headers, so that we can adjust the
6196 offset when we know the correct value. */
6197 phdr_adjust_num = iehdr->e_phnum;
6198 phdr_adjust_seg = map;
6199 }
6200 else
6201 map->includes_phdrs = FALSE;
bc67d8a6 6202 }
252b5132
RH
6203 }
6204
6205 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 6206 those that fit to the current segment and removing them from the
252b5132
RH
6207 sections array; but making sure not to leave large gaps. Once all
6208 possible sections have been assigned to the current segment it is
6209 added to the list of built segments and if sections still remain
6210 to be assigned, a new segment is constructed before repeating
6211 the loop. */
6212 isec = 0;
6213 do
6214 {
bc67d8a6 6215 map->count = 0;
252b5132 6216 suggested_lma = 0;
0067a569 6217 first_suggested_lma = TRUE;
252b5132
RH
6218
6219 /* Fill the current segment with sections that fit. */
bc67d8a6 6220 for (j = 0; j < section_count; j++)
252b5132 6221 {
bc67d8a6 6222 section = sections[j];
252b5132 6223
bc67d8a6 6224 if (section == NULL)
252b5132
RH
6225 continue;
6226
bc67d8a6 6227 output_section = section->output_section;
252b5132 6228
bc67d8a6 6229 BFD_ASSERT (output_section != NULL);
c044fabd 6230
bc67d8a6
NC
6231 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
6232 || IS_COREFILE_NOTE (segment, section))
252b5132 6233 {
bc67d8a6 6234 if (map->count == 0)
252b5132
RH
6235 {
6236 /* If the first section in a segment does not start at
bc67d8a6
NC
6237 the beginning of the segment, then something is
6238 wrong. */
0067a569
AM
6239 if (output_section->lma
6240 != (map->p_paddr
6241 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
6242 + (map->includes_phdrs
6243 ? iehdr->e_phnum * iehdr->e_phentsize
6244 : 0)))
252b5132
RH
6245 abort ();
6246 }
6247 else
6248 {
0067a569 6249 asection *prev_sec;
252b5132 6250
bc67d8a6 6251 prev_sec = map->sections[map->count - 1];
252b5132
RH
6252
6253 /* If the gap between the end of the previous section
bc67d8a6
NC
6254 and the start of this section is more than
6255 maxpagesize then we need to start a new segment. */
eea6121a 6256 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 6257 maxpagesize)
caf47ea6 6258 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 6259 || (prev_sec->lma + prev_sec->size
079e9a2f 6260 > output_section->lma))
252b5132 6261 {
0067a569
AM
6262 if (first_suggested_lma)
6263 {
6264 suggested_lma = output_section->lma;
6265 first_suggested_lma = FALSE;
6266 }
252b5132
RH
6267
6268 continue;
6269 }
6270 }
6271
bc67d8a6 6272 map->sections[map->count++] = output_section;
252b5132
RH
6273 ++isec;
6274 sections[j] = NULL;
b34976b6 6275 section->segment_mark = TRUE;
252b5132 6276 }
0067a569
AM
6277 else if (first_suggested_lma)
6278 {
6279 suggested_lma = output_section->lma;
6280 first_suggested_lma = FALSE;
6281 }
252b5132
RH
6282 }
6283
bc67d8a6 6284 BFD_ASSERT (map->count > 0);
252b5132
RH
6285
6286 /* Add the current segment to the list of built segments. */
c044fabd
KH
6287 *pointer_to_map = map;
6288 pointer_to_map = &map->next;
252b5132 6289
bc67d8a6 6290 if (isec < section_count)
252b5132
RH
6291 {
6292 /* We still have not allocated all of the sections to
6293 segments. Create a new segment here, initialise it
6294 and carry on looping. */
dc810e39
AM
6295 amt = sizeof (struct elf_segment_map);
6296 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
5964fc3a 6297 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 6298 if (map == NULL)
5ed6aba4
NC
6299 {
6300 free (sections);
6301 return FALSE;
6302 }
252b5132
RH
6303
6304 /* Initialise the fields of the segment map. Set the physical
6305 physical address to the LMA of the first section that has
6306 not yet been assigned. */
0067a569
AM
6307 map->next = NULL;
6308 map->p_type = segment->p_type;
6309 map->p_flags = segment->p_flags;
6310 map->p_flags_valid = 1;
6311 map->p_paddr = suggested_lma;
5c44b38e 6312 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 6313 map->includes_filehdr = 0;
0067a569 6314 map->includes_phdrs = 0;
252b5132
RH
6315 }
6316 }
bc67d8a6 6317 while (isec < section_count);
252b5132
RH
6318
6319 free (sections);
6320 }
6321
12bd6957 6322 elf_seg_map (obfd) = map_first;
bc67d8a6
NC
6323
6324 /* If we had to estimate the number of program headers that were
9ad5cbcf 6325 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
6326 the offset if necessary. */
6327 if (phdr_adjust_seg != NULL)
6328 {
6329 unsigned int count;
c044fabd 6330
bc67d8a6 6331 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 6332 count++;
252b5132 6333
bc67d8a6
NC
6334 if (count > phdr_adjust_num)
6335 phdr_adjust_seg->p_paddr
6336 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
6337 }
c044fabd 6338
bc67d8a6 6339#undef SEGMENT_END
eecdbe52 6340#undef SECTION_SIZE
bc67d8a6
NC
6341#undef IS_CONTAINED_BY_VMA
6342#undef IS_CONTAINED_BY_LMA
0efc80c8 6343#undef IS_NOTE
252b5132 6344#undef IS_COREFILE_NOTE
bc67d8a6 6345#undef IS_SOLARIS_PT_INTERP
9f17e2a6 6346#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
6347#undef INCLUDE_SECTION_IN_SEGMENT
6348#undef SEGMENT_AFTER_SEGMENT
6349#undef SEGMENT_OVERLAPS
b34976b6 6350 return TRUE;
252b5132
RH
6351}
6352
84d1d650
L
6353/* Copy ELF program header information. */
6354
6355static bfd_boolean
6356copy_elf_program_header (bfd *ibfd, bfd *obfd)
6357{
6358 Elf_Internal_Ehdr *iehdr;
6359 struct elf_segment_map *map;
6360 struct elf_segment_map *map_first;
6361 struct elf_segment_map **pointer_to_map;
6362 Elf_Internal_Phdr *segment;
6363 unsigned int i;
6364 unsigned int num_segments;
6365 bfd_boolean phdr_included = FALSE;
88967714 6366 bfd_boolean p_paddr_valid;
84d1d650
L
6367
6368 iehdr = elf_elfheader (ibfd);
6369
6370 map_first = NULL;
6371 pointer_to_map = &map_first;
6372
88967714
AM
6373 /* If all the segment p_paddr fields are zero, don't set
6374 map->p_paddr_valid. */
6375 p_paddr_valid = FALSE;
84d1d650 6376 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
6377 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6378 i < num_segments;
6379 i++, segment++)
6380 if (segment->p_paddr != 0)
6381 {
6382 p_paddr_valid = TRUE;
6383 break;
6384 }
6385
84d1d650
L
6386 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6387 i < num_segments;
6388 i++, segment++)
6389 {
6390 asection *section;
6391 unsigned int section_count;
6392 bfd_size_type amt;
6393 Elf_Internal_Shdr *this_hdr;
53020534 6394 asection *first_section = NULL;
a76e6f2f 6395 asection *lowest_section;
84d1d650 6396
84d1d650
L
6397 /* Compute how many sections are in this segment. */
6398 for (section = ibfd->sections, section_count = 0;
6399 section != NULL;
6400 section = section->next)
6401 {
6402 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6403 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 6404 {
a76e6f2f
AM
6405 if (first_section == NULL)
6406 first_section = section;
3271a814
NS
6407 section_count++;
6408 }
84d1d650
L
6409 }
6410
6411 /* Allocate a segment map big enough to contain
6412 all of the sections we have selected. */
6413 amt = sizeof (struct elf_segment_map);
6414 if (section_count != 0)
6415 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6416 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
6417 if (map == NULL)
6418 return FALSE;
6419
6420 /* Initialize the fields of the output segment map with the
6421 input segment. */
6422 map->next = NULL;
6423 map->p_type = segment->p_type;
6424 map->p_flags = segment->p_flags;
6425 map->p_flags_valid = 1;
6426 map->p_paddr = segment->p_paddr;
88967714 6427 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
6428 map->p_align = segment->p_align;
6429 map->p_align_valid = 1;
3271a814 6430 map->p_vaddr_offset = 0;
84d1d650 6431
04c3a755
NS
6432 if (map->p_type == PT_GNU_RELRO
6433 || map->p_type == PT_GNU_STACK)
b10a8ae0
L
6434 {
6435 /* The PT_GNU_RELRO segment may contain the first a few
6436 bytes in the .got.plt section even if the whole .got.plt
6437 section isn't in the PT_GNU_RELRO segment. We won't
04c3a755
NS
6438 change the size of the PT_GNU_RELRO segment.
6439 Similarly, PT_GNU_STACK size is significant on uclinux
6440 systems. */
9433b9b1 6441 map->p_size = segment->p_memsz;
b10a8ae0
L
6442 map->p_size_valid = 1;
6443 }
6444
84d1d650
L
6445 /* Determine if this segment contains the ELF file header
6446 and if it contains the program headers themselves. */
6447 map->includes_filehdr = (segment->p_offset == 0
6448 && segment->p_filesz >= iehdr->e_ehsize);
6449
6450 map->includes_phdrs = 0;
6451 if (! phdr_included || segment->p_type != PT_LOAD)
6452 {
6453 map->includes_phdrs =
6454 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6455 && (segment->p_offset + segment->p_filesz
6456 >= ((bfd_vma) iehdr->e_phoff
6457 + iehdr->e_phnum * iehdr->e_phentsize)));
6458
6459 if (segment->p_type == PT_LOAD && map->includes_phdrs)
6460 phdr_included = TRUE;
6461 }
6462
bbefd0a9 6463 lowest_section = NULL;
84d1d650
L
6464 if (section_count != 0)
6465 {
6466 unsigned int isec = 0;
6467
53020534 6468 for (section = first_section;
84d1d650
L
6469 section != NULL;
6470 section = section->next)
6471 {
6472 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6473 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
6474 {
6475 map->sections[isec++] = section->output_section;
a76e6f2f
AM
6476 if ((section->flags & SEC_ALLOC) != 0)
6477 {
6478 bfd_vma seg_off;
6479
bbefd0a9
AM
6480 if (lowest_section == NULL
6481 || section->lma < lowest_section->lma)
fb8a5684
AM
6482 lowest_section = section;
6483
a76e6f2f
AM
6484 /* Section lmas are set up from PT_LOAD header
6485 p_paddr in _bfd_elf_make_section_from_shdr.
6486 If this header has a p_paddr that disagrees
6487 with the section lma, flag the p_paddr as
6488 invalid. */
6489 if ((section->flags & SEC_LOAD) != 0)
6490 seg_off = this_hdr->sh_offset - segment->p_offset;
6491 else
6492 seg_off = this_hdr->sh_addr - segment->p_vaddr;
6493 if (section->lma - segment->p_paddr != seg_off)
6494 map->p_paddr_valid = FALSE;
6495 }
53020534
L
6496 if (isec == section_count)
6497 break;
6498 }
84d1d650
L
6499 }
6500 }
6501
a76e6f2f
AM
6502 if (map->includes_filehdr && lowest_section != NULL)
6503 /* We need to keep the space used by the headers fixed. */
6504 map->header_size = lowest_section->vma - segment->p_vaddr;
d324f6d6 6505
a76e6f2f
AM
6506 if (!map->includes_phdrs
6507 && !map->includes_filehdr
6508 && map->p_paddr_valid)
6509 /* There is some other padding before the first section. */
6510 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
6511 - segment->p_paddr);
6512
84d1d650
L
6513 map->count = section_count;
6514 *pointer_to_map = map;
6515 pointer_to_map = &map->next;
6516 }
6517
12bd6957 6518 elf_seg_map (obfd) = map_first;
84d1d650
L
6519 return TRUE;
6520}
6521
6522/* Copy private BFD data. This copies or rewrites ELF program header
6523 information. */
6524
6525static bfd_boolean
6526copy_private_bfd_data (bfd *ibfd, bfd *obfd)
6527{
84d1d650
L
6528 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6529 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6530 return TRUE;
6531
6532 if (elf_tdata (ibfd)->phdr == NULL)
6533 return TRUE;
6534
6535 if (ibfd->xvec == obfd->xvec)
6536 {
cb3ff1e5
NC
6537 /* Check to see if any sections in the input BFD
6538 covered by ELF program header have changed. */
d55ce4e2 6539 Elf_Internal_Phdr *segment;
84d1d650
L
6540 asection *section, *osec;
6541 unsigned int i, num_segments;
6542 Elf_Internal_Shdr *this_hdr;
147d51c2
L
6543 const struct elf_backend_data *bed;
6544
6545 bed = get_elf_backend_data (ibfd);
6546
6547 /* Regenerate the segment map if p_paddr is set to 0. */
6548 if (bed->want_p_paddr_set_to_zero)
6549 goto rewrite;
84d1d650
L
6550
6551 /* Initialize the segment mark field. */
6552 for (section = obfd->sections; section != NULL;
6553 section = section->next)
6554 section->segment_mark = FALSE;
6555
6556 num_segments = elf_elfheader (ibfd)->e_phnum;
6557 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6558 i < num_segments;
6559 i++, segment++)
6560 {
5f6999aa
NC
6561 /* PR binutils/3535. The Solaris linker always sets the p_paddr
6562 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
6563 which severly confuses things, so always regenerate the segment
6564 map in this case. */
6565 if (segment->p_paddr == 0
6566 && segment->p_memsz == 0
6567 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 6568 goto rewrite;
5f6999aa 6569
84d1d650
L
6570 for (section = ibfd->sections;
6571 section != NULL; section = section->next)
6572 {
6573 /* We mark the output section so that we know it comes
6574 from the input BFD. */
6575 osec = section->output_section;
6576 if (osec)
6577 osec->segment_mark = TRUE;
6578
6579 /* Check if this section is covered by the segment. */
6580 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6581 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
6582 {
6583 /* FIXME: Check if its output section is changed or
6584 removed. What else do we need to check? */
6585 if (osec == NULL
6586 || section->flags != osec->flags
6587 || section->lma != osec->lma
6588 || section->vma != osec->vma
6589 || section->size != osec->size
6590 || section->rawsize != osec->rawsize
6591 || section->alignment_power != osec->alignment_power)
6592 goto rewrite;
6593 }
6594 }
6595 }
6596
cb3ff1e5 6597 /* Check to see if any output section do not come from the
84d1d650
L
6598 input BFD. */
6599 for (section = obfd->sections; section != NULL;
6600 section = section->next)
6601 {
6602 if (section->segment_mark == FALSE)
6603 goto rewrite;
6604 else
6605 section->segment_mark = FALSE;
6606 }
6607
6608 return copy_elf_program_header (ibfd, obfd);
6609 }
6610
6611rewrite:
f1d85785
L
6612 if (ibfd->xvec == obfd->xvec)
6613 {
6614 /* When rewriting program header, set the output maxpagesize to
6615 the maximum alignment of input PT_LOAD segments. */
6616 Elf_Internal_Phdr *segment;
6617 unsigned int i;
6618 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
6619 bfd_vma maxpagesize = 0;
6620
6621 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6622 i < num_segments;
6623 i++, segment++)
6624 if (segment->p_type == PT_LOAD
6625 && maxpagesize < segment->p_align)
c86934ce
NC
6626 {
6627 /* PR 17512: file: f17299af. */
6628 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
6629 (*_bfd_error_handler) (_("\
6630%B: warning: segment alignment of 0x%llx is too large"),
6631 ibfd, (long long) segment->p_align);
6632 else
6633 maxpagesize = segment->p_align;
6634 }
f1d85785
L
6635
6636 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
6637 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
6638 }
6639
84d1d650
L
6640 return rewrite_elf_program_header (ibfd, obfd);
6641}
6642
ccd2ec6a
L
6643/* Initialize private output section information from input section. */
6644
6645bfd_boolean
6646_bfd_elf_init_private_section_data (bfd *ibfd,
6647 asection *isec,
6648 bfd *obfd,
6649 asection *osec,
6650 struct bfd_link_info *link_info)
6651
6652{
6653 Elf_Internal_Shdr *ihdr, *ohdr;
dfa7b0b8 6654 bfd_boolean final_link = link_info != NULL && !link_info->relocatable;
ccd2ec6a
L
6655
6656 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6657 || obfd->xvec->flavour != bfd_target_elf_flavour)
6658 return TRUE;
6659
ba85c43e
NC
6660 BFD_ASSERT (elf_section_data (osec) != NULL);
6661
dfa7b0b8
AM
6662 /* For objcopy and relocatable link, don't copy the output ELF
6663 section type from input if the output BFD section flags have been
6664 set to something different. For a final link allow some flags
6665 that the linker clears to differ. */
42bb2e33 6666 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
6667 && (osec->flags == isec->flags
6668 || (final_link
6669 && ((osec->flags ^ isec->flags)
0814be7d 6670 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 6671 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
6672
6673 /* FIXME: Is this correct for all OS/PROC specific flags? */
6674 elf_section_flags (osec) |= (elf_section_flags (isec)
6675 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
6676
6677 /* Set things up for objcopy and relocatable link. The output
6678 SHT_GROUP section will have its elf_next_in_group pointing back
6679 to the input group members. Ignore linker created group section.
6680 See elfNN_ia64_object_p in elfxx-ia64.c. */
dfa7b0b8 6681 if (!final_link)
ccd2ec6a
L
6682 {
6683 if (elf_sec_group (isec) == NULL
6684 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
6685 {
6686 if (elf_section_flags (isec) & SHF_GROUP)
6687 elf_section_flags (osec) |= SHF_GROUP;
6688 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 6689 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a 6690 }
68f5ff89
L
6691
6692 /* If not decompress, preserve SHF_COMPRESSED. */
6693 if ((ibfd->flags & BFD_DECOMPRESS) == 0)
6694 elf_section_flags (osec) |= (elf_section_flags (isec)
6695 & SHF_COMPRESSED);
ccd2ec6a
L
6696 }
6697
6698 ihdr = &elf_section_data (isec)->this_hdr;
6699
6700 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
6701 don't use the output section of the linked-to section since it
6702 may be NULL at this point. */
6703 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
6704 {
6705 ohdr = &elf_section_data (osec)->this_hdr;
6706 ohdr->sh_flags |= SHF_LINK_ORDER;
6707 elf_linked_to_section (osec) = elf_linked_to_section (isec);
6708 }
6709
6710 osec->use_rela_p = isec->use_rela_p;
6711
6712 return TRUE;
6713}
6714
252b5132
RH
6715/* Copy private section information. This copies over the entsize
6716 field, and sometimes the info field. */
6717
b34976b6 6718bfd_boolean
217aa764
AM
6719_bfd_elf_copy_private_section_data (bfd *ibfd,
6720 asection *isec,
6721 bfd *obfd,
6722 asection *osec)
252b5132
RH
6723{
6724 Elf_Internal_Shdr *ihdr, *ohdr;
6725
6726 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6727 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6728 return TRUE;
252b5132 6729
252b5132
RH
6730 ihdr = &elf_section_data (isec)->this_hdr;
6731 ohdr = &elf_section_data (osec)->this_hdr;
6732
6733 ohdr->sh_entsize = ihdr->sh_entsize;
6734
6735 if (ihdr->sh_type == SHT_SYMTAB
6736 || ihdr->sh_type == SHT_DYNSYM
6737 || ihdr->sh_type == SHT_GNU_verneed
6738 || ihdr->sh_type == SHT_GNU_verdef)
6739 ohdr->sh_info = ihdr->sh_info;
6740
ccd2ec6a
L
6741 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6742 NULL);
252b5132
RH
6743}
6744
d0bf826b
AM
6745/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
6746 necessary if we are removing either the SHT_GROUP section or any of
6747 the group member sections. DISCARDED is the value that a section's
6748 output_section has if the section will be discarded, NULL when this
6749 function is called from objcopy, bfd_abs_section_ptr when called
6750 from the linker. */
80fccad2
BW
6751
6752bfd_boolean
d0bf826b 6753_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 6754{
30288845
AM
6755 asection *isec;
6756
30288845 6757 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 6758 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
6759 {
6760 asection *first = elf_next_in_group (isec);
6761 asection *s = first;
d0bf826b
AM
6762 bfd_size_type removed = 0;
6763
30288845
AM
6764 while (s != NULL)
6765 {
415f38a6
AM
6766 /* If this member section is being output but the
6767 SHT_GROUP section is not, then clear the group info
6768 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
6769 if (s->output_section != discarded
6770 && isec->output_section == discarded)
30288845
AM
6771 {
6772 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6773 elf_group_name (s->output_section) = NULL;
6774 }
415f38a6
AM
6775 /* Conversely, if the member section is not being output
6776 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
6777 else if (s->output_section == discarded
6778 && isec->output_section != discarded)
6779 removed += 4;
30288845
AM
6780 s = elf_next_in_group (s);
6781 if (s == first)
6782 break;
6783 }
d0bf826b
AM
6784 if (removed != 0)
6785 {
6786 if (discarded != NULL)
6787 {
6788 /* If we've been called for ld -r, then we need to
6789 adjust the input section size. This function may
6790 be called multiple times, so save the original
6791 size. */
6792 if (isec->rawsize == 0)
6793 isec->rawsize = isec->size;
6794 isec->size = isec->rawsize - removed;
6795 }
6796 else
6797 {
6798 /* Adjust the output section size when called from
6799 objcopy. */
6800 isec->output_section->size -= removed;
6801 }
6802 }
30288845
AM
6803 }
6804
80fccad2
BW
6805 return TRUE;
6806}
6807
d0bf826b
AM
6808/* Copy private header information. */
6809
6810bfd_boolean
6811_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6812{
6813 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6814 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6815 return TRUE;
6816
6817 /* Copy over private BFD data if it has not already been copied.
6818 This must be done here, rather than in the copy_private_bfd_data
6819 entry point, because the latter is called after the section
6820 contents have been set, which means that the program headers have
6821 already been worked out. */
12bd6957 6822 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
d0bf826b
AM
6823 {
6824 if (! copy_private_bfd_data (ibfd, obfd))
6825 return FALSE;
6826 }
6827
6828 return _bfd_elf_fixup_group_sections (ibfd, NULL);
6829}
6830
252b5132
RH
6831/* Copy private symbol information. If this symbol is in a section
6832 which we did not map into a BFD section, try to map the section
6833 index correctly. We use special macro definitions for the mapped
6834 section indices; these definitions are interpreted by the
6835 swap_out_syms function. */
6836
9ad5cbcf
AM
6837#define MAP_ONESYMTAB (SHN_HIOS + 1)
6838#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6839#define MAP_STRTAB (SHN_HIOS + 3)
6840#define MAP_SHSTRTAB (SHN_HIOS + 4)
6841#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6842
b34976b6 6843bfd_boolean
217aa764
AM
6844_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6845 asymbol *isymarg,
6846 bfd *obfd,
6847 asymbol *osymarg)
252b5132
RH
6848{
6849 elf_symbol_type *isym, *osym;
6850
6851 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6852 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6853 return TRUE;
252b5132
RH
6854
6855 isym = elf_symbol_from (ibfd, isymarg);
6856 osym = elf_symbol_from (obfd, osymarg);
6857
6858 if (isym != NULL
8424d8f5 6859 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
6860 && osym != NULL
6861 && bfd_is_abs_section (isym->symbol.section))
6862 {
6863 unsigned int shndx;
6864
6865 shndx = isym->internal_elf_sym.st_shndx;
6866 if (shndx == elf_onesymtab (ibfd))
6867 shndx = MAP_ONESYMTAB;
6868 else if (shndx == elf_dynsymtab (ibfd))
6869 shndx = MAP_DYNSYMTAB;
12bd6957 6870 else if (shndx == elf_strtab_sec (ibfd))
252b5132 6871 shndx = MAP_STRTAB;
12bd6957 6872 else if (shndx == elf_shstrtab_sec (ibfd))
252b5132 6873 shndx = MAP_SHSTRTAB;
12bd6957 6874 else if (shndx == elf_symtab_shndx (ibfd))
9ad5cbcf 6875 shndx = MAP_SYM_SHNDX;
252b5132
RH
6876 osym->internal_elf_sym.st_shndx = shndx;
6877 }
6878
b34976b6 6879 return TRUE;
252b5132
RH
6880}
6881
6882/* Swap out the symbols. */
6883
b34976b6 6884static bfd_boolean
217aa764
AM
6885swap_out_syms (bfd *abfd,
6886 struct bfd_strtab_hash **sttp,
6887 int relocatable_p)
252b5132 6888{
9c5bfbb7 6889 const struct elf_backend_data *bed;
079e9a2f
AM
6890 int symcount;
6891 asymbol **syms;
6892 struct bfd_strtab_hash *stt;
6893 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6894 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6895 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6896 bfd_byte *outbound_syms;
6897 bfd_byte *outbound_shndx;
079e9a2f 6898 int idx;
12bd6957 6899 unsigned int num_locals;
079e9a2f 6900 bfd_size_type amt;
174fd7f9 6901 bfd_boolean name_local_sections;
252b5132 6902
12bd6957 6903 if (!elf_map_symbols (abfd, &num_locals))
b34976b6 6904 return FALSE;
252b5132 6905
c044fabd 6906 /* Dump out the symtabs. */
079e9a2f
AM
6907 stt = _bfd_elf_stringtab_init ();
6908 if (stt == NULL)
b34976b6 6909 return FALSE;
252b5132 6910
079e9a2f
AM
6911 bed = get_elf_backend_data (abfd);
6912 symcount = bfd_get_symcount (abfd);
6913 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6914 symtab_hdr->sh_type = SHT_SYMTAB;
6915 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6916 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
12bd6957 6917 symtab_hdr->sh_info = num_locals + 1;
72de5009 6918 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
6919
6920 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6921 symstrtab_hdr->sh_type = SHT_STRTAB;
6922
a50b1753
NC
6923 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
6924 bed->s->sizeof_sym);
079e9a2f 6925 if (outbound_syms == NULL)
5ed6aba4
NC
6926 {
6927 _bfd_stringtab_free (stt);
6928 return FALSE;
6929 }
217aa764 6930 symtab_hdr->contents = outbound_syms;
252b5132 6931
9ad5cbcf
AM
6932 outbound_shndx = NULL;
6933 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6934 if (symtab_shndx_hdr->sh_name != 0)
6935 {
6936 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
a50b1753
NC
6937 outbound_shndx = (bfd_byte *)
6938 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6939 if (outbound_shndx == NULL)
5ed6aba4
NC
6940 {
6941 _bfd_stringtab_free (stt);
6942 return FALSE;
6943 }
6944
9ad5cbcf
AM
6945 symtab_shndx_hdr->contents = outbound_shndx;
6946 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6947 symtab_shndx_hdr->sh_size = amt;
6948 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6949 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6950 }
6951
589e6347 6952 /* Now generate the data (for "contents"). */
079e9a2f
AM
6953 {
6954 /* Fill in zeroth symbol and swap it out. */
6955 Elf_Internal_Sym sym;
6956 sym.st_name = 0;
6957 sym.st_value = 0;
6958 sym.st_size = 0;
6959 sym.st_info = 0;
6960 sym.st_other = 0;
6961 sym.st_shndx = SHN_UNDEF;
35fc36a8 6962 sym.st_target_internal = 0;
9ad5cbcf 6963 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6964 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6965 if (outbound_shndx != NULL)
6966 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6967 }
252b5132 6968
174fd7f9
RS
6969 name_local_sections
6970 = (bed->elf_backend_name_local_section_symbols
6971 && bed->elf_backend_name_local_section_symbols (abfd));
6972
079e9a2f
AM
6973 syms = bfd_get_outsymbols (abfd);
6974 for (idx = 0; idx < symcount; idx++)
252b5132 6975 {
252b5132 6976 Elf_Internal_Sym sym;
079e9a2f
AM
6977 bfd_vma value = syms[idx]->value;
6978 elf_symbol_type *type_ptr;
6979 flagword flags = syms[idx]->flags;
6980 int type;
252b5132 6981
174fd7f9
RS
6982 if (!name_local_sections
6983 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6984 {
6985 /* Local section symbols have no name. */
6986 sym.st_name = 0;
6987 }
6988 else
6989 {
6990 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6991 syms[idx]->name,
b34976b6 6992 TRUE, FALSE);
079e9a2f 6993 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6994 {
6995 _bfd_stringtab_free (stt);
6996 return FALSE;
6997 }
079e9a2f 6998 }
252b5132 6999
079e9a2f 7000 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 7001
079e9a2f
AM
7002 if ((flags & BSF_SECTION_SYM) == 0
7003 && bfd_is_com_section (syms[idx]->section))
7004 {
7005 /* ELF common symbols put the alignment into the `value' field,
7006 and the size into the `size' field. This is backwards from
7007 how BFD handles it, so reverse it here. */
7008 sym.st_size = value;
7009 if (type_ptr == NULL
7010 || type_ptr->internal_elf_sym.st_value == 0)
7011 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
7012 else
7013 sym.st_value = type_ptr->internal_elf_sym.st_value;
7014 sym.st_shndx = _bfd_elf_section_from_bfd_section
7015 (abfd, syms[idx]->section);
7016 }
7017 else
7018 {
7019 asection *sec = syms[idx]->section;
cb33740c 7020 unsigned int shndx;
252b5132 7021
079e9a2f
AM
7022 if (sec->output_section)
7023 {
7024 value += sec->output_offset;
7025 sec = sec->output_section;
7026 }
589e6347 7027
079e9a2f
AM
7028 /* Don't add in the section vma for relocatable output. */
7029 if (! relocatable_p)
7030 value += sec->vma;
7031 sym.st_value = value;
7032 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
7033
7034 if (bfd_is_abs_section (sec)
7035 && type_ptr != NULL
7036 && type_ptr->internal_elf_sym.st_shndx != 0)
7037 {
7038 /* This symbol is in a real ELF section which we did
7039 not create as a BFD section. Undo the mapping done
7040 by copy_private_symbol_data. */
7041 shndx = type_ptr->internal_elf_sym.st_shndx;
7042 switch (shndx)
7043 {
7044 case MAP_ONESYMTAB:
7045 shndx = elf_onesymtab (abfd);
7046 break;
7047 case MAP_DYNSYMTAB:
7048 shndx = elf_dynsymtab (abfd);
7049 break;
7050 case MAP_STRTAB:
12bd6957 7051 shndx = elf_strtab_sec (abfd);
079e9a2f
AM
7052 break;
7053 case MAP_SHSTRTAB:
12bd6957 7054 shndx = elf_shstrtab_sec (abfd);
079e9a2f 7055 break;
9ad5cbcf 7056 case MAP_SYM_SHNDX:
12bd6957 7057 shndx = elf_symtab_shndx (abfd);
9ad5cbcf 7058 break;
079e9a2f 7059 default:
15bc576a 7060 shndx = SHN_ABS;
079e9a2f
AM
7061 break;
7062 }
7063 }
7064 else
7065 {
7066 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 7067
cb33740c 7068 if (shndx == SHN_BAD)
079e9a2f
AM
7069 {
7070 asection *sec2;
7071
7072 /* Writing this would be a hell of a lot easier if
7073 we had some decent documentation on bfd, and
7074 knew what to expect of the library, and what to
7075 demand of applications. For example, it
7076 appears that `objcopy' might not set the
7077 section of a symbol to be a section that is
7078 actually in the output file. */
7079 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
7080 if (sec2 == NULL)
7081 {
7082 _bfd_error_handler (_("\
7083Unable to find equivalent output section for symbol '%s' from section '%s'"),
7084 syms[idx]->name ? syms[idx]->name : "<Local sym>",
7085 sec->name);
811072d8 7086 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 7087 _bfd_stringtab_free (stt);
589e6347
NC
7088 return FALSE;
7089 }
811072d8 7090
079e9a2f 7091 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
cb33740c 7092 BFD_ASSERT (shndx != SHN_BAD);
079e9a2f
AM
7093 }
7094 }
252b5132 7095
079e9a2f
AM
7096 sym.st_shndx = shndx;
7097 }
252b5132 7098
13ae64f3
JJ
7099 if ((flags & BSF_THREAD_LOCAL) != 0)
7100 type = STT_TLS;
d8045f23
NC
7101 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
7102 type = STT_GNU_IFUNC;
13ae64f3 7103 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
7104 type = STT_FUNC;
7105 else if ((flags & BSF_OBJECT) != 0)
7106 type = STT_OBJECT;
d9352518
DB
7107 else if ((flags & BSF_RELC) != 0)
7108 type = STT_RELC;
7109 else if ((flags & BSF_SRELC) != 0)
7110 type = STT_SRELC;
079e9a2f
AM
7111 else
7112 type = STT_NOTYPE;
252b5132 7113
13ae64f3
JJ
7114 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
7115 type = STT_TLS;
7116
589e6347 7117 /* Processor-specific types. */
079e9a2f
AM
7118 if (type_ptr != NULL
7119 && bed->elf_backend_get_symbol_type)
7120 type = ((*bed->elf_backend_get_symbol_type)
7121 (&type_ptr->internal_elf_sym, type));
252b5132 7122
079e9a2f
AM
7123 if (flags & BSF_SECTION_SYM)
7124 {
7125 if (flags & BSF_GLOBAL)
7126 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
7127 else
7128 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
7129 }
7130 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 7131 {
504b7d20 7132#ifdef USE_STT_COMMON
0a40daed
MK
7133 if (type == STT_OBJECT)
7134 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_COMMON);
7135 else
504b7d20 7136#endif
c91e322a 7137 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 7138 }
079e9a2f
AM
7139 else if (bfd_is_und_section (syms[idx]->section))
7140 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
7141 ? STB_WEAK
7142 : STB_GLOBAL),
7143 type);
7144 else if (flags & BSF_FILE)
7145 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
7146 else
7147 {
7148 int bind = STB_LOCAL;
252b5132 7149
079e9a2f
AM
7150 if (flags & BSF_LOCAL)
7151 bind = STB_LOCAL;
3e7a7d11
NC
7152 else if (flags & BSF_GNU_UNIQUE)
7153 bind = STB_GNU_UNIQUE;
079e9a2f
AM
7154 else if (flags & BSF_WEAK)
7155 bind = STB_WEAK;
7156 else if (flags & BSF_GLOBAL)
7157 bind = STB_GLOBAL;
252b5132 7158
079e9a2f
AM
7159 sym.st_info = ELF_ST_INFO (bind, type);
7160 }
252b5132 7161
079e9a2f 7162 if (type_ptr != NULL)
35fc36a8
RS
7163 {
7164 sym.st_other = type_ptr->internal_elf_sym.st_other;
7165 sym.st_target_internal
7166 = type_ptr->internal_elf_sym.st_target_internal;
7167 }
079e9a2f 7168 else
35fc36a8
RS
7169 {
7170 sym.st_other = 0;
7171 sym.st_target_internal = 0;
7172 }
252b5132 7173
9ad5cbcf 7174 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 7175 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
7176 if (outbound_shndx != NULL)
7177 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 7178 }
252b5132 7179
079e9a2f
AM
7180 *sttp = stt;
7181 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
7182 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 7183
079e9a2f
AM
7184 symstrtab_hdr->sh_flags = 0;
7185 symstrtab_hdr->sh_addr = 0;
7186 symstrtab_hdr->sh_entsize = 0;
7187 symstrtab_hdr->sh_link = 0;
7188 symstrtab_hdr->sh_info = 0;
7189 symstrtab_hdr->sh_addralign = 1;
252b5132 7190
b34976b6 7191 return TRUE;
252b5132
RH
7192}
7193
7194/* Return the number of bytes required to hold the symtab vector.
7195
7196 Note that we base it on the count plus 1, since we will null terminate
7197 the vector allocated based on this size. However, the ELF symbol table
7198 always has a dummy entry as symbol #0, so it ends up even. */
7199
7200long
217aa764 7201_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
7202{
7203 long symcount;
7204 long symtab_size;
7205 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
7206
7207 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
7208 symtab_size = (symcount + 1) * (sizeof (asymbol *));
7209 if (symcount > 0)
7210 symtab_size -= sizeof (asymbol *);
252b5132
RH
7211
7212 return symtab_size;
7213}
7214
7215long
217aa764 7216_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
7217{
7218 long symcount;
7219 long symtab_size;
7220 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
7221
7222 if (elf_dynsymtab (abfd) == 0)
7223 {
7224 bfd_set_error (bfd_error_invalid_operation);
7225 return -1;
7226 }
7227
7228 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
7229 symtab_size = (symcount + 1) * (sizeof (asymbol *));
7230 if (symcount > 0)
7231 symtab_size -= sizeof (asymbol *);
252b5132
RH
7232
7233 return symtab_size;
7234}
7235
7236long
217aa764
AM
7237_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
7238 sec_ptr asect)
252b5132
RH
7239{
7240 return (asect->reloc_count + 1) * sizeof (arelent *);
7241}
7242
7243/* Canonicalize the relocs. */
7244
7245long
217aa764
AM
7246_bfd_elf_canonicalize_reloc (bfd *abfd,
7247 sec_ptr section,
7248 arelent **relptr,
7249 asymbol **symbols)
252b5132
RH
7250{
7251 arelent *tblptr;
7252 unsigned int i;
9c5bfbb7 7253 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 7254
b34976b6 7255 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
7256 return -1;
7257
7258 tblptr = section->relocation;
7259 for (i = 0; i < section->reloc_count; i++)
7260 *relptr++ = tblptr++;
7261
7262 *relptr = NULL;
7263
7264 return section->reloc_count;
7265}
7266
7267long
6cee3f79 7268_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 7269{
9c5bfbb7 7270 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 7271 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
7272
7273 if (symcount >= 0)
7274 bfd_get_symcount (abfd) = symcount;
7275 return symcount;
7276}
7277
7278long
217aa764
AM
7279_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
7280 asymbol **allocation)
252b5132 7281{
9c5bfbb7 7282 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 7283 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
7284
7285 if (symcount >= 0)
7286 bfd_get_dynamic_symcount (abfd) = symcount;
7287 return symcount;
252b5132
RH
7288}
7289
8615f3f2
AM
7290/* Return the size required for the dynamic reloc entries. Any loadable
7291 section that was actually installed in the BFD, and has type SHT_REL
7292 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
7293 dynamic reloc section. */
252b5132
RH
7294
7295long
217aa764 7296_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
7297{
7298 long ret;
7299 asection *s;
7300
7301 if (elf_dynsymtab (abfd) == 0)
7302 {
7303 bfd_set_error (bfd_error_invalid_operation);
7304 return -1;
7305 }
7306
7307 ret = sizeof (arelent *);
7308 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 7309 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
7310 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
7311 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 7312 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
7313 * sizeof (arelent *));
7314
7315 return ret;
7316}
7317
8615f3f2
AM
7318/* Canonicalize the dynamic relocation entries. Note that we return the
7319 dynamic relocations as a single block, although they are actually
7320 associated with particular sections; the interface, which was
7321 designed for SunOS style shared libraries, expects that there is only
7322 one set of dynamic relocs. Any loadable section that was actually
7323 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
7324 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
7325
7326long
217aa764
AM
7327_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
7328 arelent **storage,
7329 asymbol **syms)
252b5132 7330{
217aa764 7331 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
7332 asection *s;
7333 long ret;
7334
7335 if (elf_dynsymtab (abfd) == 0)
7336 {
7337 bfd_set_error (bfd_error_invalid_operation);
7338 return -1;
7339 }
7340
7341 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
7342 ret = 0;
7343 for (s = abfd->sections; s != NULL; s = s->next)
7344 {
266b05cf 7345 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
7346 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
7347 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
7348 {
7349 arelent *p;
7350 long count, i;
7351
b34976b6 7352 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 7353 return -1;
eea6121a 7354 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
7355 p = s->relocation;
7356 for (i = 0; i < count; i++)
7357 *storage++ = p++;
7358 ret += count;
7359 }
7360 }
7361
7362 *storage = NULL;
7363
7364 return ret;
7365}
7366\f
7367/* Read in the version information. */
7368
b34976b6 7369bfd_boolean
fc0e6df6 7370_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
7371{
7372 bfd_byte *contents = NULL;
fc0e6df6
PB
7373 unsigned int freeidx = 0;
7374
7375 if (elf_dynverref (abfd) != 0)
7376 {
7377 Elf_Internal_Shdr *hdr;
7378 Elf_External_Verneed *everneed;
7379 Elf_Internal_Verneed *iverneed;
7380 unsigned int i;
d0fb9a8d 7381 bfd_byte *contents_end;
fc0e6df6
PB
7382
7383 hdr = &elf_tdata (abfd)->dynverref_hdr;
7384
601a03ba 7385 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verneed))
d0fb9a8d 7386 {
601a03ba
AM
7387error_return_bad_verref:
7388 (*_bfd_error_handler)
7389 (_("%B: .gnu.version_r invalid entry"), abfd);
7390 bfd_set_error (bfd_error_bad_value);
d0fb9a8d
JJ
7391error_return_verref:
7392 elf_tdata (abfd)->verref = NULL;
7393 elf_tdata (abfd)->cverrefs = 0;
7394 goto error_return;
7395 }
601a03ba
AM
7396
7397 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
7398 if (contents == NULL)
7399 goto error_return_verref;
7400
fc0e6df6
PB
7401 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
7402 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 7403 goto error_return_verref;
fc0e6df6 7404
601a03ba
AM
7405 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
7406 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
7407
7408 if (elf_tdata (abfd)->verref == NULL)
d0fb9a8d
JJ
7409 goto error_return_verref;
7410
7411 BFD_ASSERT (sizeof (Elf_External_Verneed)
7412 == sizeof (Elf_External_Vernaux));
7413 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
7414 everneed = (Elf_External_Verneed *) contents;
7415 iverneed = elf_tdata (abfd)->verref;
7416 for (i = 0; i < hdr->sh_info; i++, iverneed++)
7417 {
7418 Elf_External_Vernaux *evernaux;
7419 Elf_Internal_Vernaux *ivernaux;
7420 unsigned int j;
7421
7422 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
7423
7424 iverneed->vn_bfd = abfd;
7425
7426 iverneed->vn_filename =
7427 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7428 iverneed->vn_file);
7429 if (iverneed->vn_filename == NULL)
601a03ba 7430 goto error_return_bad_verref;
fc0e6df6 7431
d0fb9a8d
JJ
7432 if (iverneed->vn_cnt == 0)
7433 iverneed->vn_auxptr = NULL;
7434 else
7435 {
a50b1753
NC
7436 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
7437 bfd_alloc2 (abfd, iverneed->vn_cnt,
7438 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
7439 if (iverneed->vn_auxptr == NULL)
7440 goto error_return_verref;
7441 }
7442
7443 if (iverneed->vn_aux
7444 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 7445 goto error_return_bad_verref;
fc0e6df6
PB
7446
7447 evernaux = ((Elf_External_Vernaux *)
7448 ((bfd_byte *) everneed + iverneed->vn_aux));
7449 ivernaux = iverneed->vn_auxptr;
7450 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
7451 {
7452 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
7453
7454 ivernaux->vna_nodename =
7455 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7456 ivernaux->vna_name);
7457 if (ivernaux->vna_nodename == NULL)
601a03ba 7458 goto error_return_bad_verref;
fc0e6df6 7459
25ff461f
AM
7460 if (ivernaux->vna_other > freeidx)
7461 freeidx = ivernaux->vna_other;
7462
7463 ivernaux->vna_nextptr = NULL;
7464 if (ivernaux->vna_next == 0)
7465 {
7466 iverneed->vn_cnt = j + 1;
7467 break;
7468 }
fc0e6df6
PB
7469 if (j + 1 < iverneed->vn_cnt)
7470 ivernaux->vna_nextptr = ivernaux + 1;
fc0e6df6 7471
d0fb9a8d
JJ
7472 if (ivernaux->vna_next
7473 > (size_t) (contents_end - (bfd_byte *) evernaux))
601a03ba 7474 goto error_return_bad_verref;
d0fb9a8d 7475
fc0e6df6
PB
7476 evernaux = ((Elf_External_Vernaux *)
7477 ((bfd_byte *) evernaux + ivernaux->vna_next));
fc0e6df6
PB
7478 }
7479
25ff461f
AM
7480 iverneed->vn_nextref = NULL;
7481 if (iverneed->vn_next == 0)
7482 break;
fc0e6df6
PB
7483 if (i + 1 < hdr->sh_info)
7484 iverneed->vn_nextref = iverneed + 1;
fc0e6df6 7485
d0fb9a8d
JJ
7486 if (iverneed->vn_next
7487 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 7488 goto error_return_bad_verref;
d0fb9a8d 7489
fc0e6df6
PB
7490 everneed = ((Elf_External_Verneed *)
7491 ((bfd_byte *) everneed + iverneed->vn_next));
7492 }
25ff461f 7493 elf_tdata (abfd)->cverrefs = i;
fc0e6df6
PB
7494
7495 free (contents);
7496 contents = NULL;
7497 }
252b5132
RH
7498
7499 if (elf_dynverdef (abfd) != 0)
7500 {
7501 Elf_Internal_Shdr *hdr;
7502 Elf_External_Verdef *everdef;
7503 Elf_Internal_Verdef *iverdef;
f631889e
UD
7504 Elf_Internal_Verdef *iverdefarr;
7505 Elf_Internal_Verdef iverdefmem;
252b5132 7506 unsigned int i;
062e2358 7507 unsigned int maxidx;
d0fb9a8d 7508 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
7509
7510 hdr = &elf_tdata (abfd)->dynverdef_hdr;
7511
601a03ba
AM
7512 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
7513 {
7514 error_return_bad_verdef:
7515 (*_bfd_error_handler)
7516 (_("%B: .gnu.version_d invalid entry"), abfd);
7517 bfd_set_error (bfd_error_bad_value);
7518 error_return_verdef:
7519 elf_tdata (abfd)->verdef = NULL;
7520 elf_tdata (abfd)->cverdefs = 0;
7521 goto error_return;
7522 }
7523
a50b1753 7524 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132 7525 if (contents == NULL)
601a03ba 7526 goto error_return_verdef;
252b5132 7527 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 7528 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
601a03ba 7529 goto error_return_verdef;
d0fb9a8d
JJ
7530
7531 BFD_ASSERT (sizeof (Elf_External_Verdef)
7532 >= sizeof (Elf_External_Verdaux));
7533 contents_end_def = contents + hdr->sh_size
7534 - sizeof (Elf_External_Verdef);
7535 contents_end_aux = contents + hdr->sh_size
7536 - sizeof (Elf_External_Verdaux);
7537
f631889e
UD
7538 /* We know the number of entries in the section but not the maximum
7539 index. Therefore we have to run through all entries and find
7540 the maximum. */
252b5132 7541 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
7542 maxidx = 0;
7543 for (i = 0; i < hdr->sh_info; ++i)
7544 {
7545 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7546
601a03ba
AM
7547 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
7548 goto error_return_bad_verdef;
062e2358
AM
7549 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
7550 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 7551
25ff461f
AM
7552 if (iverdefmem.vd_next == 0)
7553 break;
7554
d0fb9a8d
JJ
7555 if (iverdefmem.vd_next
7556 > (size_t) (contents_end_def - (bfd_byte *) everdef))
601a03ba 7557 goto error_return_bad_verdef;
d0fb9a8d 7558
f631889e
UD
7559 everdef = ((Elf_External_Verdef *)
7560 ((bfd_byte *) everdef + iverdefmem.vd_next));
7561 }
7562
fc0e6df6
PB
7563 if (default_imported_symver)
7564 {
7565 if (freeidx > maxidx)
7566 maxidx = ++freeidx;
7567 else
7568 freeidx = ++maxidx;
7569 }
201159ec 7570
601a03ba
AM
7571 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7572 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e 7573 if (elf_tdata (abfd)->verdef == NULL)
601a03ba 7574 goto error_return_verdef;
f631889e
UD
7575
7576 elf_tdata (abfd)->cverdefs = maxidx;
7577
7578 everdef = (Elf_External_Verdef *) contents;
7579 iverdefarr = elf_tdata (abfd)->verdef;
7580 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
7581 {
7582 Elf_External_Verdaux *everdaux;
7583 Elf_Internal_Verdaux *iverdaux;
7584 unsigned int j;
7585
f631889e
UD
7586 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7587
d0fb9a8d 7588 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
601a03ba 7589 goto error_return_bad_verdef;
d0fb9a8d 7590
f631889e
UD
7591 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
7592 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
7593
7594 iverdef->vd_bfd = abfd;
7595
d0fb9a8d
JJ
7596 if (iverdef->vd_cnt == 0)
7597 iverdef->vd_auxptr = NULL;
7598 else
7599 {
a50b1753
NC
7600 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7601 bfd_alloc2 (abfd, iverdef->vd_cnt,
7602 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7603 if (iverdef->vd_auxptr == NULL)
7604 goto error_return_verdef;
7605 }
7606
7607 if (iverdef->vd_aux
7608 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
601a03ba 7609 goto error_return_bad_verdef;
252b5132
RH
7610
7611 everdaux = ((Elf_External_Verdaux *)
7612 ((bfd_byte *) everdef + iverdef->vd_aux));
7613 iverdaux = iverdef->vd_auxptr;
7614 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
7615 {
7616 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
7617
7618 iverdaux->vda_nodename =
7619 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7620 iverdaux->vda_name);
7621 if (iverdaux->vda_nodename == NULL)
601a03ba 7622 goto error_return_bad_verdef;
252b5132 7623
25ff461f
AM
7624 iverdaux->vda_nextptr = NULL;
7625 if (iverdaux->vda_next == 0)
7626 {
7627 iverdef->vd_cnt = j + 1;
7628 break;
7629 }
252b5132
RH
7630 if (j + 1 < iverdef->vd_cnt)
7631 iverdaux->vda_nextptr = iverdaux + 1;
252b5132 7632
d0fb9a8d
JJ
7633 if (iverdaux->vda_next
7634 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
601a03ba 7635 goto error_return_bad_verdef;
d0fb9a8d 7636
252b5132
RH
7637 everdaux = ((Elf_External_Verdaux *)
7638 ((bfd_byte *) everdaux + iverdaux->vda_next));
7639 }
7640
d0fb9a8d
JJ
7641 if (iverdef->vd_cnt)
7642 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 7643
25ff461f
AM
7644 iverdef->vd_nextdef = NULL;
7645 if (iverdef->vd_next == 0)
7646 break;
d0fb9a8d 7647 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132 7648 iverdef->vd_nextdef = iverdef + 1;
252b5132
RH
7649
7650 everdef = ((Elf_External_Verdef *)
7651 ((bfd_byte *) everdef + iverdef->vd_next));
7652 }
7653
7654 free (contents);
7655 contents = NULL;
7656 }
fc0e6df6 7657 else if (default_imported_symver)
252b5132 7658 {
fc0e6df6
PB
7659 if (freeidx < 3)
7660 freeidx = 3;
7661 else
7662 freeidx++;
252b5132 7663
a50b1753
NC
7664 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7665 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 7666 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
7667 goto error_return;
7668
fc0e6df6
PB
7669 elf_tdata (abfd)->cverdefs = freeidx;
7670 }
252b5132 7671
fc0e6df6
PB
7672 /* Create a default version based on the soname. */
7673 if (default_imported_symver)
7674 {
7675 Elf_Internal_Verdef *iverdef;
7676 Elf_Internal_Verdaux *iverdaux;
252b5132 7677
5bb3703f 7678 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
252b5132 7679
fc0e6df6
PB
7680 iverdef->vd_version = VER_DEF_CURRENT;
7681 iverdef->vd_flags = 0;
7682 iverdef->vd_ndx = freeidx;
7683 iverdef->vd_cnt = 1;
252b5132 7684
fc0e6df6 7685 iverdef->vd_bfd = abfd;
252b5132 7686
fc0e6df6
PB
7687 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
7688 if (iverdef->vd_nodename == NULL)
d0fb9a8d 7689 goto error_return_verdef;
fc0e6df6 7690 iverdef->vd_nextdef = NULL;
601a03ba
AM
7691 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
7692 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
d0fb9a8d
JJ
7693 if (iverdef->vd_auxptr == NULL)
7694 goto error_return_verdef;
252b5132 7695
fc0e6df6
PB
7696 iverdaux = iverdef->vd_auxptr;
7697 iverdaux->vda_nodename = iverdef->vd_nodename;
252b5132
RH
7698 }
7699
b34976b6 7700 return TRUE;
252b5132
RH
7701
7702 error_return:
5ed6aba4 7703 if (contents != NULL)
252b5132 7704 free (contents);
b34976b6 7705 return FALSE;
252b5132
RH
7706}
7707\f
7708asymbol *
217aa764 7709_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
7710{
7711 elf_symbol_type *newsym;
7712
201159ec 7713 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof * newsym);
252b5132
RH
7714 if (!newsym)
7715 return NULL;
201159ec
NC
7716 newsym->symbol.the_bfd = abfd;
7717 return &newsym->symbol;
252b5132
RH
7718}
7719
7720void
217aa764
AM
7721_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
7722 asymbol *symbol,
7723 symbol_info *ret)
252b5132
RH
7724{
7725 bfd_symbol_info (symbol, ret);
7726}
7727
7728/* Return whether a symbol name implies a local symbol. Most targets
7729 use this function for the is_local_label_name entry point, but some
7730 override it. */
7731
b34976b6 7732bfd_boolean
217aa764
AM
7733_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
7734 const char *name)
252b5132
RH
7735{
7736 /* Normal local symbols start with ``.L''. */
7737 if (name[0] == '.' && name[1] == 'L')
b34976b6 7738 return TRUE;
252b5132
RH
7739
7740 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
7741 DWARF debugging symbols starting with ``..''. */
7742 if (name[0] == '.' && name[1] == '.')
b34976b6 7743 return TRUE;
252b5132
RH
7744
7745 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
7746 emitting DWARF debugging output. I suspect this is actually a
7747 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
7748 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
7749 underscore to be emitted on some ELF targets). For ease of use,
7750 we treat such symbols as local. */
7751 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 7752 return TRUE;
252b5132 7753
ffa54770
NC
7754 /* Treat assembler generated local labels as local. */
7755 if (name[0] == 'L' && name[strlen (name) - 1] < 32)
7756 return TRUE;
7757
b34976b6 7758 return FALSE;
252b5132
RH
7759}
7760
7761alent *
217aa764
AM
7762_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
7763 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
7764{
7765 abort ();
7766 return NULL;
7767}
7768
b34976b6 7769bfd_boolean
217aa764
AM
7770_bfd_elf_set_arch_mach (bfd *abfd,
7771 enum bfd_architecture arch,
7772 unsigned long machine)
252b5132
RH
7773{
7774 /* If this isn't the right architecture for this backend, and this
7775 isn't the generic backend, fail. */
7776 if (arch != get_elf_backend_data (abfd)->arch
7777 && arch != bfd_arch_unknown
7778 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 7779 return FALSE;
252b5132
RH
7780
7781 return bfd_default_set_arch_mach (abfd, arch, machine);
7782}
7783
d1fad7c6
NC
7784/* Find the nearest line to a particular section and offset,
7785 for error reporting. */
7786
b34976b6 7787bfd_boolean
217aa764 7788_bfd_elf_find_nearest_line (bfd *abfd,
217aa764 7789 asymbol **symbols,
fb167eb2 7790 asection *section,
217aa764
AM
7791 bfd_vma offset,
7792 const char **filename_ptr,
7793 const char **functionname_ptr,
fb167eb2
AM
7794 unsigned int *line_ptr,
7795 unsigned int *discriminator_ptr)
d1fad7c6 7796{
b34976b6 7797 bfd_boolean found;
d1fad7c6 7798
fb167eb2 7799 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
4e8a9624 7800 filename_ptr, functionname_ptr,
fb167eb2
AM
7801 line_ptr, discriminator_ptr,
7802 dwarf_debug_sections, 0,
e00e8198
AM
7803 &elf_tdata (abfd)->dwarf2_find_line_info)
7804 || _bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
7805 filename_ptr, functionname_ptr,
7806 line_ptr))
d1fad7c6
NC
7807 {
7808 if (!*functionname_ptr)
e00e8198
AM
7809 _bfd_elf_find_function (abfd, symbols, section, offset,
7810 *filename_ptr ? NULL : filename_ptr,
7811 functionname_ptr);
b34976b6 7812 return TRUE;
d1fad7c6
NC
7813 }
7814
7815 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7816 &found, filename_ptr,
7817 functionname_ptr, line_ptr,
7818 &elf_tdata (abfd)->line_info))
b34976b6 7819 return FALSE;
dc43ada5 7820 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7821 return TRUE;
d1fad7c6
NC
7822
7823 if (symbols == NULL)
b34976b6 7824 return FALSE;
d1fad7c6 7825
e00e8198
AM
7826 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
7827 filename_ptr, functionname_ptr))
b34976b6 7828 return FALSE;
d1fad7c6 7829
252b5132 7830 *line_ptr = 0;
b34976b6 7831 return TRUE;
252b5132
RH
7832}
7833
5420f73d
L
7834/* Find the line for a symbol. */
7835
7836bfd_boolean
7837_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7838 const char **filename_ptr, unsigned int *line_ptr)
9b8d1a36 7839{
fb167eb2
AM
7840 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
7841 filename_ptr, NULL, line_ptr, NULL,
7842 dwarf_debug_sections, 0,
7843 &elf_tdata (abfd)->dwarf2_find_line_info);
5420f73d
L
7844}
7845
4ab527b0
FF
7846/* After a call to bfd_find_nearest_line, successive calls to
7847 bfd_find_inliner_info can be used to get source information about
7848 each level of function inlining that terminated at the address
7849 passed to bfd_find_nearest_line. Currently this is only supported
7850 for DWARF2 with appropriate DWARF3 extensions. */
7851
7852bfd_boolean
7853_bfd_elf_find_inliner_info (bfd *abfd,
7854 const char **filename_ptr,
7855 const char **functionname_ptr,
7856 unsigned int *line_ptr)
7857{
7858 bfd_boolean found;
7859 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7860 functionname_ptr, line_ptr,
7861 & elf_tdata (abfd)->dwarf2_find_line_info);
7862 return found;
7863}
7864
252b5132 7865int
a6b96beb 7866_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7867{
8ded5a0f
AM
7868 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7869 int ret = bed->s->sizeof_ehdr;
252b5132 7870
a6b96beb 7871 if (!info->relocatable)
8ded5a0f 7872 {
12bd6957 7873 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 7874
62d7a5f6
AM
7875 if (phdr_size == (bfd_size_type) -1)
7876 {
7877 struct elf_segment_map *m;
7878
7879 phdr_size = 0;
12bd6957 7880 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62d7a5f6 7881 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7882
62d7a5f6
AM
7883 if (phdr_size == 0)
7884 phdr_size = get_program_header_size (abfd, info);
7885 }
8ded5a0f 7886
12bd6957 7887 elf_program_header_size (abfd) = phdr_size;
8ded5a0f
AM
7888 ret += phdr_size;
7889 }
7890
252b5132
RH
7891 return ret;
7892}
7893
b34976b6 7894bfd_boolean
217aa764
AM
7895_bfd_elf_set_section_contents (bfd *abfd,
7896 sec_ptr section,
0f867abe 7897 const void *location,
217aa764
AM
7898 file_ptr offset,
7899 bfd_size_type count)
252b5132
RH
7900{
7901 Elf_Internal_Shdr *hdr;
1b6aeedb 7902 file_ptr pos;
252b5132
RH
7903
7904 if (! abfd->output_has_begun
217aa764 7905 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7906 return FALSE;
252b5132
RH
7907
7908 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7909 pos = hdr->sh_offset + offset;
7910 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7911 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7912 return FALSE;
252b5132 7913
b34976b6 7914 return TRUE;
252b5132
RH
7915}
7916
7917void
217aa764
AM
7918_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7919 arelent *cache_ptr ATTRIBUTE_UNUSED,
7920 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7921{
7922 abort ();
7923}
7924
252b5132
RH
7925/* Try to convert a non-ELF reloc into an ELF one. */
7926
b34976b6 7927bfd_boolean
217aa764 7928_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7929{
c044fabd 7930 /* Check whether we really have an ELF howto. */
252b5132
RH
7931
7932 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7933 {
7934 bfd_reloc_code_real_type code;
7935 reloc_howto_type *howto;
7936
7937 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7938 equivalent ELF reloc. */
252b5132
RH
7939
7940 if (areloc->howto->pc_relative)
7941 {
7942 switch (areloc->howto->bitsize)
7943 {
7944 case 8:
7945 code = BFD_RELOC_8_PCREL;
7946 break;
7947 case 12:
7948 code = BFD_RELOC_12_PCREL;
7949 break;
7950 case 16:
7951 code = BFD_RELOC_16_PCREL;
7952 break;
7953 case 24:
7954 code = BFD_RELOC_24_PCREL;
7955 break;
7956 case 32:
7957 code = BFD_RELOC_32_PCREL;
7958 break;
7959 case 64:
7960 code = BFD_RELOC_64_PCREL;
7961 break;
7962 default:
7963 goto fail;
7964 }
7965
7966 howto = bfd_reloc_type_lookup (abfd, code);
7967
7968 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7969 {
7970 if (howto->pcrel_offset)
7971 areloc->addend += areloc->address;
7972 else
7973 areloc->addend -= areloc->address; /* addend is unsigned!! */
7974 }
7975 }
7976 else
7977 {
7978 switch (areloc->howto->bitsize)
7979 {
7980 case 8:
7981 code = BFD_RELOC_8;
7982 break;
7983 case 14:
7984 code = BFD_RELOC_14;
7985 break;
7986 case 16:
7987 code = BFD_RELOC_16;
7988 break;
7989 case 26:
7990 code = BFD_RELOC_26;
7991 break;
7992 case 32:
7993 code = BFD_RELOC_32;
7994 break;
7995 case 64:
7996 code = BFD_RELOC_64;
7997 break;
7998 default:
7999 goto fail;
8000 }
8001
8002 howto = bfd_reloc_type_lookup (abfd, code);
8003 }
8004
8005 if (howto)
8006 areloc->howto = howto;
8007 else
8008 goto fail;
8009 }
8010
b34976b6 8011 return TRUE;
252b5132
RH
8012
8013 fail:
8014 (*_bfd_error_handler)
d003868e
AM
8015 (_("%B: unsupported relocation type %s"),
8016 abfd, areloc->howto->name);
252b5132 8017 bfd_set_error (bfd_error_bad_value);
b34976b6 8018 return FALSE;
252b5132
RH
8019}
8020
b34976b6 8021bfd_boolean
217aa764 8022_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132 8023{
d9071b0c
TG
8024 struct elf_obj_tdata *tdata = elf_tdata (abfd);
8025 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
252b5132 8026 {
c0355132 8027 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 8028 _bfd_elf_strtab_free (elf_shstrtab (abfd));
d9071b0c 8029 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
252b5132
RH
8030 }
8031
8032 return _bfd_generic_close_and_cleanup (abfd);
8033}
8034
8035/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
8036 in the relocation's offset. Thus we cannot allow any sort of sanity
8037 range-checking to interfere. There is nothing else to do in processing
8038 this reloc. */
8039
8040bfd_reloc_status_type
217aa764
AM
8041_bfd_elf_rel_vtable_reloc_fn
8042 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 8043 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
8044 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
8045 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
8046{
8047 return bfd_reloc_ok;
8048}
252b5132
RH
8049\f
8050/* Elf core file support. Much of this only works on native
8051 toolchains, since we rely on knowing the
8052 machine-dependent procfs structure in order to pick
c044fabd 8053 out details about the corefile. */
252b5132
RH
8054
8055#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
8056/* Needed for new procfs interface on sparc-solaris. */
8057# define _STRUCTURED_PROC 1
252b5132
RH
8058# include <sys/procfs.h>
8059#endif
8060
261b8d08
PA
8061/* Return a PID that identifies a "thread" for threaded cores, or the
8062 PID of the main process for non-threaded cores. */
252b5132
RH
8063
8064static int
217aa764 8065elfcore_make_pid (bfd *abfd)
252b5132 8066{
261b8d08
PA
8067 int pid;
8068
228e534f 8069 pid = elf_tdata (abfd)->core->lwpid;
261b8d08 8070 if (pid == 0)
228e534f 8071 pid = elf_tdata (abfd)->core->pid;
261b8d08
PA
8072
8073 return pid;
252b5132
RH
8074}
8075
252b5132
RH
8076/* If there isn't a section called NAME, make one, using
8077 data from SECT. Note, this function will generate a
8078 reference to NAME, so you shouldn't deallocate or
c044fabd 8079 overwrite it. */
252b5132 8080
b34976b6 8081static bfd_boolean
217aa764 8082elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 8083{
c044fabd 8084 asection *sect2;
252b5132
RH
8085
8086 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 8087 return TRUE;
252b5132 8088
117ed4f8 8089 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 8090 if (sect2 == NULL)
b34976b6 8091 return FALSE;
252b5132 8092
eea6121a 8093 sect2->size = sect->size;
252b5132 8094 sect2->filepos = sect->filepos;
252b5132 8095 sect2->alignment_power = sect->alignment_power;
b34976b6 8096 return TRUE;
252b5132
RH
8097}
8098
bb0082d6
AM
8099/* Create a pseudosection containing SIZE bytes at FILEPOS. This
8100 actually creates up to two pseudosections:
8101 - For the single-threaded case, a section named NAME, unless
8102 such a section already exists.
8103 - For the multi-threaded case, a section named "NAME/PID", where
8104 PID is elfcore_make_pid (abfd).
8105 Both pseudosections have identical contents. */
b34976b6 8106bfd_boolean
217aa764
AM
8107_bfd_elfcore_make_pseudosection (bfd *abfd,
8108 char *name,
8109 size_t size,
8110 ufile_ptr filepos)
bb0082d6
AM
8111{
8112 char buf[100];
8113 char *threaded_name;
d4c88bbb 8114 size_t len;
bb0082d6
AM
8115 asection *sect;
8116
8117 /* Build the section name. */
8118
8119 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 8120 len = strlen (buf) + 1;
a50b1753 8121 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 8122 if (threaded_name == NULL)
b34976b6 8123 return FALSE;
d4c88bbb 8124 memcpy (threaded_name, buf, len);
bb0082d6 8125
117ed4f8
AM
8126 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
8127 SEC_HAS_CONTENTS);
bb0082d6 8128 if (sect == NULL)
b34976b6 8129 return FALSE;
eea6121a 8130 sect->size = size;
bb0082d6 8131 sect->filepos = filepos;
bb0082d6
AM
8132 sect->alignment_power = 2;
8133
936e320b 8134 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
8135}
8136
252b5132 8137/* prstatus_t exists on:
4a938328 8138 solaris 2.5+
252b5132
RH
8139 linux 2.[01] + glibc
8140 unixware 4.2
8141*/
8142
8143#if defined (HAVE_PRSTATUS_T)
a7b97311 8144
b34976b6 8145static bfd_boolean
217aa764 8146elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 8147{
eea6121a 8148 size_t size;
7ee38065 8149 int offset;
252b5132 8150
4a938328
MS
8151 if (note->descsz == sizeof (prstatus_t))
8152 {
8153 prstatus_t prstat;
252b5132 8154
eea6121a 8155 size = sizeof (prstat.pr_reg);
7ee38065 8156 offset = offsetof (prstatus_t, pr_reg);
4a938328 8157 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 8158
fa49d224
NC
8159 /* Do not overwrite the core signal if it
8160 has already been set by another thread. */
228e534f
AM
8161 if (elf_tdata (abfd)->core->signal == 0)
8162 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
8163 if (elf_tdata (abfd)->core->pid == 0)
8164 elf_tdata (abfd)->core->pid = prstat.pr_pid;
252b5132 8165
4a938328
MS
8166 /* pr_who exists on:
8167 solaris 2.5+
8168 unixware 4.2
8169 pr_who doesn't exist on:
8170 linux 2.[01]
8171 */
252b5132 8172#if defined (HAVE_PRSTATUS_T_PR_WHO)
228e534f 8173 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 8174#else
228e534f 8175 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
252b5132 8176#endif
4a938328 8177 }
7ee38065 8178#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
8179 else if (note->descsz == sizeof (prstatus32_t))
8180 {
8181 /* 64-bit host, 32-bit corefile */
8182 prstatus32_t prstat;
8183
eea6121a 8184 size = sizeof (prstat.pr_reg);
7ee38065 8185 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
8186 memcpy (&prstat, note->descdata, sizeof (prstat));
8187
fa49d224
NC
8188 /* Do not overwrite the core signal if it
8189 has already been set by another thread. */
228e534f
AM
8190 if (elf_tdata (abfd)->core->signal == 0)
8191 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
8192 if (elf_tdata (abfd)->core->pid == 0)
8193 elf_tdata (abfd)->core->pid = prstat.pr_pid;
4a938328
MS
8194
8195 /* pr_who exists on:
8196 solaris 2.5+
8197 unixware 4.2
8198 pr_who doesn't exist on:
8199 linux 2.[01]
8200 */
7ee38065 8201#if defined (HAVE_PRSTATUS32_T_PR_WHO)
228e534f 8202 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 8203#else
228e534f 8204 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
4a938328
MS
8205#endif
8206 }
7ee38065 8207#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
8208 else
8209 {
8210 /* Fail - we don't know how to handle any other
8211 note size (ie. data object type). */
b34976b6 8212 return TRUE;
4a938328 8213 }
252b5132 8214
bb0082d6 8215 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 8216 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 8217 size, note->descpos + offset);
252b5132
RH
8218}
8219#endif /* defined (HAVE_PRSTATUS_T) */
8220
bb0082d6 8221/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 8222static bfd_boolean
217aa764
AM
8223elfcore_make_note_pseudosection (bfd *abfd,
8224 char *name,
8225 Elf_Internal_Note *note)
252b5132 8226{
936e320b
AM
8227 return _bfd_elfcore_make_pseudosection (abfd, name,
8228 note->descsz, note->descpos);
252b5132
RH
8229}
8230
ff08c6bb
JB
8231/* There isn't a consistent prfpregset_t across platforms,
8232 but it doesn't matter, because we don't have to pick this
c044fabd
KH
8233 data structure apart. */
8234
b34976b6 8235static bfd_boolean
217aa764 8236elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8237{
8238 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8239}
8240
ff08c6bb 8241/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 8242 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 8243 literally. */
c044fabd 8244
b34976b6 8245static bfd_boolean
217aa764 8246elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8247{
8248 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8249}
8250
4339cae0
L
8251/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
8252 with a note type of NT_X86_XSTATE. Just include the whole note's
8253 contents literally. */
8254
8255static bfd_boolean
8256elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
8257{
8258 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
8259}
8260
97753bd5
AM
8261static bfd_boolean
8262elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
8263{
8264 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
8265}
8266
89eeb0bc
LM
8267static bfd_boolean
8268elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
8269{
8270 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
8271}
97753bd5 8272
0675e188
UW
8273static bfd_boolean
8274elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
8275{
8276 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
8277}
8278
d7eeb400
MS
8279static bfd_boolean
8280elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
8281{
8282 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
8283}
8284
8285static bfd_boolean
8286elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
8287{
8288 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
8289}
8290
8291static bfd_boolean
8292elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
8293{
8294 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
8295}
8296
8297static bfd_boolean
8298elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
8299{
8300 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
8301}
8302
8303static bfd_boolean
8304elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
8305{
8306 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
8307}
8308
355b81d9
UW
8309static bfd_boolean
8310elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
8311{
8312 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
8313}
8314
8315static bfd_boolean
8316elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
8317{
8318 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
8319}
8320
abb3f6cc
NC
8321static bfd_boolean
8322elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
8323{
8324 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
8325}
8326
4ef9f41a
AA
8327static bfd_boolean
8328elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
8329{
8330 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
8331}
8332
8333static bfd_boolean
8334elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
8335{
8336 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
8337}
8338
faa9a424
UW
8339static bfd_boolean
8340elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
8341{
8342 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
8343}
8344
652451f8
YZ
8345static bfd_boolean
8346elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
8347{
8348 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
8349}
8350
8351static bfd_boolean
8352elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
8353{
8354 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
8355}
8356
8357static bfd_boolean
8358elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
8359{
8360 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
8361}
8362
252b5132 8363#if defined (HAVE_PRPSINFO_T)
4a938328 8364typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 8365#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
8366typedef prpsinfo32_t elfcore_psinfo32_t;
8367#endif
252b5132
RH
8368#endif
8369
8370#if defined (HAVE_PSINFO_T)
4a938328 8371typedef psinfo_t elfcore_psinfo_t;
7ee38065 8372#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
8373typedef psinfo32_t elfcore_psinfo32_t;
8374#endif
252b5132
RH
8375#endif
8376
252b5132
RH
8377/* return a malloc'ed copy of a string at START which is at
8378 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 8379 the copy will always have a terminating '\0'. */
252b5132 8380
936e320b 8381char *
217aa764 8382_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 8383{
dc810e39 8384 char *dups;
a50b1753 8385 char *end = (char *) memchr (start, '\0', max);
dc810e39 8386 size_t len;
252b5132
RH
8387
8388 if (end == NULL)
8389 len = max;
8390 else
8391 len = end - start;
8392
a50b1753 8393 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 8394 if (dups == NULL)
252b5132
RH
8395 return NULL;
8396
dc810e39
AM
8397 memcpy (dups, start, len);
8398 dups[len] = '\0';
252b5132 8399
dc810e39 8400 return dups;
252b5132
RH
8401}
8402
bb0082d6 8403#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 8404static bfd_boolean
217aa764 8405elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 8406{
4a938328
MS
8407 if (note->descsz == sizeof (elfcore_psinfo_t))
8408 {
8409 elfcore_psinfo_t psinfo;
252b5132 8410
7ee38065 8411 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 8412
335e41d4 8413#if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
228e534f 8414 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 8415#endif
228e534f 8416 elf_tdata (abfd)->core->program
936e320b
AM
8417 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
8418 sizeof (psinfo.pr_fname));
252b5132 8419
228e534f 8420 elf_tdata (abfd)->core->command
936e320b
AM
8421 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
8422 sizeof (psinfo.pr_psargs));
4a938328 8423 }
7ee38065 8424#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
8425 else if (note->descsz == sizeof (elfcore_psinfo32_t))
8426 {
8427 /* 64-bit host, 32-bit corefile */
8428 elfcore_psinfo32_t psinfo;
8429
7ee38065 8430 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 8431
335e41d4 8432#if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
228e534f 8433 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 8434#endif
228e534f 8435 elf_tdata (abfd)->core->program
936e320b
AM
8436 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
8437 sizeof (psinfo.pr_fname));
4a938328 8438
228e534f 8439 elf_tdata (abfd)->core->command
936e320b
AM
8440 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
8441 sizeof (psinfo.pr_psargs));
4a938328
MS
8442 }
8443#endif
8444
8445 else
8446 {
8447 /* Fail - we don't know how to handle any other
8448 note size (ie. data object type). */
b34976b6 8449 return TRUE;
4a938328 8450 }
252b5132
RH
8451
8452 /* Note that for some reason, a spurious space is tacked
8453 onto the end of the args in some (at least one anyway)
c044fabd 8454 implementations, so strip it off if it exists. */
252b5132
RH
8455
8456 {
228e534f 8457 char *command = elf_tdata (abfd)->core->command;
252b5132
RH
8458 int n = strlen (command);
8459
8460 if (0 < n && command[n - 1] == ' ')
8461 command[n - 1] = '\0';
8462 }
8463
b34976b6 8464 return TRUE;
252b5132
RH
8465}
8466#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
8467
252b5132 8468#if defined (HAVE_PSTATUS_T)
b34976b6 8469static bfd_boolean
217aa764 8470elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 8471{
f572a39d
AM
8472 if (note->descsz == sizeof (pstatus_t)
8473#if defined (HAVE_PXSTATUS_T)
8474 || note->descsz == sizeof (pxstatus_t)
8475#endif
8476 )
4a938328
MS
8477 {
8478 pstatus_t pstat;
252b5132 8479
4a938328 8480 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 8481
228e534f 8482 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328 8483 }
7ee38065 8484#if defined (HAVE_PSTATUS32_T)
4a938328
MS
8485 else if (note->descsz == sizeof (pstatus32_t))
8486 {
8487 /* 64-bit host, 32-bit corefile */
8488 pstatus32_t pstat;
252b5132 8489
4a938328 8490 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 8491
228e534f 8492 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328
MS
8493 }
8494#endif
252b5132
RH
8495 /* Could grab some more details from the "representative"
8496 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 8497 NT_LWPSTATUS note, presumably. */
252b5132 8498
b34976b6 8499 return TRUE;
252b5132
RH
8500}
8501#endif /* defined (HAVE_PSTATUS_T) */
8502
252b5132 8503#if defined (HAVE_LWPSTATUS_T)
b34976b6 8504static bfd_boolean
217aa764 8505elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
8506{
8507 lwpstatus_t lwpstat;
8508 char buf[100];
c044fabd 8509 char *name;
d4c88bbb 8510 size_t len;
c044fabd 8511 asection *sect;
252b5132 8512
f572a39d
AM
8513 if (note->descsz != sizeof (lwpstat)
8514#if defined (HAVE_LWPXSTATUS_T)
8515 && note->descsz != sizeof (lwpxstatus_t)
8516#endif
8517 )
b34976b6 8518 return TRUE;
252b5132
RH
8519
8520 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
8521
228e534f 8522 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
a1504221
JB
8523 /* Do not overwrite the core signal if it has already been set by
8524 another thread. */
228e534f
AM
8525 if (elf_tdata (abfd)->core->signal == 0)
8526 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
252b5132 8527
c044fabd 8528 /* Make a ".reg/999" section. */
252b5132
RH
8529
8530 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 8531 len = strlen (buf) + 1;
217aa764 8532 name = bfd_alloc (abfd, len);
252b5132 8533 if (name == NULL)
b34976b6 8534 return FALSE;
d4c88bbb 8535 memcpy (name, buf, len);
252b5132 8536
117ed4f8 8537 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8538 if (sect == NULL)
b34976b6 8539 return FALSE;
252b5132
RH
8540
8541#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8542 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
8543 sect->filepos = note->descpos
8544 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
8545#endif
8546
8547#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 8548 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
8549 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
8550#endif
8551
252b5132
RH
8552 sect->alignment_power = 2;
8553
8554 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8555 return FALSE;
252b5132
RH
8556
8557 /* Make a ".reg2/999" section */
8558
8559 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 8560 len = strlen (buf) + 1;
217aa764 8561 name = bfd_alloc (abfd, len);
252b5132 8562 if (name == NULL)
b34976b6 8563 return FALSE;
d4c88bbb 8564 memcpy (name, buf, len);
252b5132 8565
117ed4f8 8566 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8567 if (sect == NULL)
b34976b6 8568 return FALSE;
252b5132
RH
8569
8570#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8571 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
8572 sect->filepos = note->descpos
8573 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
8574#endif
8575
8576#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 8577 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
8578 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
8579#endif
8580
252b5132
RH
8581 sect->alignment_power = 2;
8582
936e320b 8583 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
8584}
8585#endif /* defined (HAVE_LWPSTATUS_T) */
8586
b34976b6 8587static bfd_boolean
217aa764 8588elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
8589{
8590 char buf[30];
c044fabd 8591 char *name;
d4c88bbb 8592 size_t len;
c044fabd 8593 asection *sect;
4a6636fb
PA
8594 int type;
8595 int is_active_thread;
8596 bfd_vma base_addr;
16e9c715 8597
4a6636fb 8598 if (note->descsz < 728)
b34976b6 8599 return TRUE;
16e9c715 8600
4a6636fb
PA
8601 if (! CONST_STRNEQ (note->namedata, "win32"))
8602 return TRUE;
8603
8604 type = bfd_get_32 (abfd, note->descdata);
c044fabd 8605
4a6636fb 8606 switch (type)
16e9c715 8607 {
4a6636fb 8608 case 1 /* NOTE_INFO_PROCESS */:
228e534f 8609 /* FIXME: need to add ->core->command. */
4a6636fb 8610 /* process_info.pid */
228e534f 8611 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
4a6636fb 8612 /* process_info.signal */
228e534f 8613 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 8614 break;
16e9c715 8615
4a6636fb 8616 case 2 /* NOTE_INFO_THREAD */:
16e9c715 8617 /* Make a ".reg/999" section. */
4a6636fb
PA
8618 /* thread_info.tid */
8619 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 8620
d4c88bbb 8621 len = strlen (buf) + 1;
a50b1753 8622 name = (char *) bfd_alloc (abfd, len);
16e9c715 8623 if (name == NULL)
b34976b6 8624 return FALSE;
c044fabd 8625
d4c88bbb 8626 memcpy (name, buf, len);
16e9c715 8627
117ed4f8 8628 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 8629 if (sect == NULL)
b34976b6 8630 return FALSE;
c044fabd 8631
4a6636fb
PA
8632 /* sizeof (thread_info.thread_context) */
8633 sect->size = 716;
8634 /* offsetof (thread_info.thread_context) */
8635 sect->filepos = note->descpos + 12;
16e9c715
NC
8636 sect->alignment_power = 2;
8637
4a6636fb
PA
8638 /* thread_info.is_active_thread */
8639 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
8640
8641 if (is_active_thread)
16e9c715 8642 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8643 return FALSE;
16e9c715
NC
8644 break;
8645
4a6636fb 8646 case 3 /* NOTE_INFO_MODULE */:
16e9c715 8647 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
8648 /* module_info.base_address */
8649 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 8650 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 8651
d4c88bbb 8652 len = strlen (buf) + 1;
a50b1753 8653 name = (char *) bfd_alloc (abfd, len);
16e9c715 8654 if (name == NULL)
b34976b6 8655 return FALSE;
c044fabd 8656
d4c88bbb 8657 memcpy (name, buf, len);
252b5132 8658
117ed4f8 8659 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 8660
16e9c715 8661 if (sect == NULL)
b34976b6 8662 return FALSE;
c044fabd 8663
eea6121a 8664 sect->size = note->descsz;
16e9c715 8665 sect->filepos = note->descpos;
16e9c715
NC
8666 sect->alignment_power = 2;
8667 break;
8668
8669 default:
b34976b6 8670 return TRUE;
16e9c715
NC
8671 }
8672
b34976b6 8673 return TRUE;
16e9c715 8674}
252b5132 8675
b34976b6 8676static bfd_boolean
217aa764 8677elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 8678{
9c5bfbb7 8679 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 8680
252b5132
RH
8681 switch (note->type)
8682 {
8683 default:
b34976b6 8684 return TRUE;
252b5132 8685
252b5132 8686 case NT_PRSTATUS:
bb0082d6
AM
8687 if (bed->elf_backend_grok_prstatus)
8688 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 8689 return TRUE;
bb0082d6 8690#if defined (HAVE_PRSTATUS_T)
252b5132 8691 return elfcore_grok_prstatus (abfd, note);
bb0082d6 8692#else
b34976b6 8693 return TRUE;
252b5132
RH
8694#endif
8695
8696#if defined (HAVE_PSTATUS_T)
8697 case NT_PSTATUS:
8698 return elfcore_grok_pstatus (abfd, note);
8699#endif
8700
8701#if defined (HAVE_LWPSTATUS_T)
8702 case NT_LWPSTATUS:
8703 return elfcore_grok_lwpstatus (abfd, note);
8704#endif
8705
8706 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
8707 return elfcore_grok_prfpreg (abfd, note);
8708
c044fabd 8709 case NT_WIN32PSTATUS:
16e9c715 8710 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 8711
c044fabd 8712 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
8713 if (note->namesz == 6
8714 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
8715 return elfcore_grok_prxfpreg (abfd, note);
8716 else
b34976b6 8717 return TRUE;
ff08c6bb 8718
4339cae0
L
8719 case NT_X86_XSTATE: /* Linux XSAVE extension */
8720 if (note->namesz == 6
8721 && strcmp (note->namedata, "LINUX") == 0)
8722 return elfcore_grok_xstatereg (abfd, note);
8723 else
8724 return TRUE;
8725
97753bd5
AM
8726 case NT_PPC_VMX:
8727 if (note->namesz == 6
8728 && strcmp (note->namedata, "LINUX") == 0)
8729 return elfcore_grok_ppc_vmx (abfd, note);
8730 else
8731 return TRUE;
8732
89eeb0bc
LM
8733 case NT_PPC_VSX:
8734 if (note->namesz == 6
8735 && strcmp (note->namedata, "LINUX") == 0)
8736 return elfcore_grok_ppc_vsx (abfd, note);
8737 else
8738 return TRUE;
8739
0675e188
UW
8740 case NT_S390_HIGH_GPRS:
8741 if (note->namesz == 6
8742 && strcmp (note->namedata, "LINUX") == 0)
8743 return elfcore_grok_s390_high_gprs (abfd, note);
8744 else
8745 return TRUE;
8746
d7eeb400
MS
8747 case NT_S390_TIMER:
8748 if (note->namesz == 6
8749 && strcmp (note->namedata, "LINUX") == 0)
8750 return elfcore_grok_s390_timer (abfd, note);
8751 else
8752 return TRUE;
8753
8754 case NT_S390_TODCMP:
8755 if (note->namesz == 6
8756 && strcmp (note->namedata, "LINUX") == 0)
8757 return elfcore_grok_s390_todcmp (abfd, note);
8758 else
8759 return TRUE;
8760
8761 case NT_S390_TODPREG:
8762 if (note->namesz == 6
8763 && strcmp (note->namedata, "LINUX") == 0)
8764 return elfcore_grok_s390_todpreg (abfd, note);
8765 else
8766 return TRUE;
8767
8768 case NT_S390_CTRS:
8769 if (note->namesz == 6
8770 && strcmp (note->namedata, "LINUX") == 0)
8771 return elfcore_grok_s390_ctrs (abfd, note);
8772 else
8773 return TRUE;
8774
8775 case NT_S390_PREFIX:
8776 if (note->namesz == 6
8777 && strcmp (note->namedata, "LINUX") == 0)
8778 return elfcore_grok_s390_prefix (abfd, note);
8779 else
8780 return TRUE;
8781
355b81d9
UW
8782 case NT_S390_LAST_BREAK:
8783 if (note->namesz == 6
8784 && strcmp (note->namedata, "LINUX") == 0)
8785 return elfcore_grok_s390_last_break (abfd, note);
8786 else
8787 return TRUE;
8788
8789 case NT_S390_SYSTEM_CALL:
8790 if (note->namesz == 6
8791 && strcmp (note->namedata, "LINUX") == 0)
8792 return elfcore_grok_s390_system_call (abfd, note);
8793 else
8794 return TRUE;
8795
abb3f6cc
NC
8796 case NT_S390_TDB:
8797 if (note->namesz == 6
8798 && strcmp (note->namedata, "LINUX") == 0)
8799 return elfcore_grok_s390_tdb (abfd, note);
8800 else
8801 return TRUE;
8802
4ef9f41a
AA
8803 case NT_S390_VXRS_LOW:
8804 if (note->namesz == 6
8805 && strcmp (note->namedata, "LINUX") == 0)
8806 return elfcore_grok_s390_vxrs_low (abfd, note);
8807 else
8808 return TRUE;
8809
8810 case NT_S390_VXRS_HIGH:
8811 if (note->namesz == 6
8812 && strcmp (note->namedata, "LINUX") == 0)
8813 return elfcore_grok_s390_vxrs_high (abfd, note);
8814 else
8815 return TRUE;
8816
faa9a424
UW
8817 case NT_ARM_VFP:
8818 if (note->namesz == 6
8819 && strcmp (note->namedata, "LINUX") == 0)
8820 return elfcore_grok_arm_vfp (abfd, note);
8821 else
8822 return TRUE;
8823
652451f8
YZ
8824 case NT_ARM_TLS:
8825 if (note->namesz == 6
8826 && strcmp (note->namedata, "LINUX") == 0)
8827 return elfcore_grok_aarch_tls (abfd, note);
8828 else
8829 return TRUE;
8830
8831 case NT_ARM_HW_BREAK:
8832 if (note->namesz == 6
8833 && strcmp (note->namedata, "LINUX") == 0)
8834 return elfcore_grok_aarch_hw_break (abfd, note);
8835 else
8836 return TRUE;
8837
8838 case NT_ARM_HW_WATCH:
8839 if (note->namesz == 6
8840 && strcmp (note->namedata, "LINUX") == 0)
8841 return elfcore_grok_aarch_hw_watch (abfd, note);
8842 else
8843 return TRUE;
8844
252b5132
RH
8845 case NT_PRPSINFO:
8846 case NT_PSINFO:
bb0082d6
AM
8847 if (bed->elf_backend_grok_psinfo)
8848 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 8849 return TRUE;
bb0082d6 8850#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 8851 return elfcore_grok_psinfo (abfd, note);
bb0082d6 8852#else
b34976b6 8853 return TRUE;
252b5132 8854#endif
3333a7c3
RM
8855
8856 case NT_AUXV:
8857 {
117ed4f8
AM
8858 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8859 SEC_HAS_CONTENTS);
3333a7c3
RM
8860
8861 if (sect == NULL)
8862 return FALSE;
eea6121a 8863 sect->size = note->descsz;
3333a7c3 8864 sect->filepos = note->descpos;
3333a7c3
RM
8865 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8866
8867 return TRUE;
8868 }
9015683b 8869
451b7c33
TT
8870 case NT_FILE:
8871 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
8872 note);
8873
9015683b
TT
8874 case NT_SIGINFO:
8875 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
8876 note);
252b5132
RH
8877 }
8878}
8879
718175fa
JK
8880static bfd_boolean
8881elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
8882{
30e8ee25
AM
8883 struct elf_obj_tdata *t;
8884
8885 if (note->descsz == 0)
8886 return FALSE;
8887
8888 t = elf_tdata (abfd);
c0355132 8889 t->build_id = bfd_alloc (abfd, sizeof (*t->build_id) - 1 + note->descsz);
30e8ee25 8890 if (t->build_id == NULL)
718175fa
JK
8891 return FALSE;
8892
c0355132
AM
8893 t->build_id->size = note->descsz;
8894 memcpy (t->build_id->data, note->descdata, note->descsz);
718175fa
JK
8895
8896 return TRUE;
8897}
8898
8899static bfd_boolean
8900elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
8901{
8902 switch (note->type)
8903 {
8904 default:
8905 return TRUE;
8906
8907 case NT_GNU_BUILD_ID:
8908 return elfobj_grok_gnu_build_id (abfd, note);
8909 }
8910}
8911
e21e5835
NC
8912static bfd_boolean
8913elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
8914{
8915 struct sdt_note *cur =
8916 (struct sdt_note *) bfd_alloc (abfd, sizeof (struct sdt_note)
8917 + note->descsz);
8918
8919 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
8920 cur->size = (bfd_size_type) note->descsz;
8921 memcpy (cur->data, note->descdata, note->descsz);
8922
8923 elf_tdata (abfd)->sdt_note_head = cur;
8924
8925 return TRUE;
8926}
8927
8928static bfd_boolean
8929elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
8930{
8931 switch (note->type)
8932 {
8933 case NT_STAPSDT:
8934 return elfobj_grok_stapsdt_note_1 (abfd, note);
8935
8936 default:
8937 return TRUE;
8938 }
8939}
8940
b34976b6 8941static bfd_boolean
217aa764 8942elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
8943{
8944 char *cp;
8945
8946 cp = strchr (note->namedata, '@');
8947 if (cp != NULL)
8948 {
d2b64500 8949 *lwpidp = atoi(cp + 1);
b34976b6 8950 return TRUE;
50b2bdb7 8951 }
b34976b6 8952 return FALSE;
50b2bdb7
AM
8953}
8954
b34976b6 8955static bfd_boolean
217aa764 8956elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 8957{
50b2bdb7 8958 /* Signal number at offset 0x08. */
228e534f 8959 elf_tdata (abfd)->core->signal
50b2bdb7
AM
8960 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8961
8962 /* Process ID at offset 0x50. */
228e534f 8963 elf_tdata (abfd)->core->pid
50b2bdb7
AM
8964 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
8965
8966 /* Command name at 0x7c (max 32 bytes, including nul). */
228e534f 8967 elf_tdata (abfd)->core->command
50b2bdb7
AM
8968 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
8969
7720ba9f
MK
8970 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
8971 note);
50b2bdb7
AM
8972}
8973
b34976b6 8974static bfd_boolean
217aa764 8975elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
8976{
8977 int lwp;
8978
8979 if (elfcore_netbsd_get_lwpid (note, &lwp))
228e534f 8980 elf_tdata (abfd)->core->lwpid = lwp;
50b2bdb7 8981
b4db1224 8982 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
8983 {
8984 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
8985 find this note before any of the others, which is fine,
8986 since the kernel writes this note out first when it
8987 creates a core file. */
47d9a591 8988
50b2bdb7
AM
8989 return elfcore_grok_netbsd_procinfo (abfd, note);
8990 }
8991
b4db1224
JT
8992 /* As of Jan 2002 there are no other machine-independent notes
8993 defined for NetBSD core files. If the note type is less
8994 than the start of the machine-dependent note types, we don't
8995 understand it. */
47d9a591 8996
b4db1224 8997 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 8998 return TRUE;
50b2bdb7
AM
8999
9000
9001 switch (bfd_get_arch (abfd))
9002 {
08a40648
AM
9003 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
9004 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
9005
9006 case bfd_arch_alpha:
9007 case bfd_arch_sparc:
9008 switch (note->type)
08a40648
AM
9009 {
9010 case NT_NETBSDCORE_FIRSTMACH+0:
9011 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 9012
08a40648
AM
9013 case NT_NETBSDCORE_FIRSTMACH+2:
9014 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 9015
08a40648
AM
9016 default:
9017 return TRUE;
9018 }
50b2bdb7 9019
08a40648
AM
9020 /* On all other arch's, PT_GETREGS == mach+1 and
9021 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
9022
9023 default:
9024 switch (note->type)
08a40648
AM
9025 {
9026 case NT_NETBSDCORE_FIRSTMACH+1:
9027 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 9028
08a40648
AM
9029 case NT_NETBSDCORE_FIRSTMACH+3:
9030 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 9031
08a40648
AM
9032 default:
9033 return TRUE;
9034 }
50b2bdb7
AM
9035 }
9036 /* NOTREACHED */
9037}
9038
67cc5033
MK
9039static bfd_boolean
9040elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
9041{
9042 /* Signal number at offset 0x08. */
228e534f 9043 elf_tdata (abfd)->core->signal
67cc5033
MK
9044 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
9045
9046 /* Process ID at offset 0x20. */
228e534f 9047 elf_tdata (abfd)->core->pid
67cc5033
MK
9048 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
9049
9050 /* Command name at 0x48 (max 32 bytes, including nul). */
228e534f 9051 elf_tdata (abfd)->core->command
67cc5033
MK
9052 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
9053
9054 return TRUE;
9055}
9056
9057static bfd_boolean
9058elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
9059{
9060 if (note->type == NT_OPENBSD_PROCINFO)
9061 return elfcore_grok_openbsd_procinfo (abfd, note);
9062
9063 if (note->type == NT_OPENBSD_REGS)
9064 return elfcore_make_note_pseudosection (abfd, ".reg", note);
9065
9066 if (note->type == NT_OPENBSD_FPREGS)
9067 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9068
9069 if (note->type == NT_OPENBSD_XFPREGS)
9070 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9071
9072 if (note->type == NT_OPENBSD_AUXV)
9073 {
9074 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9075 SEC_HAS_CONTENTS);
9076
9077 if (sect == NULL)
9078 return FALSE;
9079 sect->size = note->descsz;
9080 sect->filepos = note->descpos;
9081 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9082
9083 return TRUE;
9084 }
9085
9086 if (note->type == NT_OPENBSD_WCOOKIE)
9087 {
9088 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
9089 SEC_HAS_CONTENTS);
9090
9091 if (sect == NULL)
9092 return FALSE;
9093 sect->size = note->descsz;
9094 sect->filepos = note->descpos;
9095 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9096
9097 return TRUE;
9098 }
9099
9100 return TRUE;
9101}
9102
07c6e936 9103static bfd_boolean
d3fd4074 9104elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
9105{
9106 void *ddata = note->descdata;
9107 char buf[100];
9108 char *name;
9109 asection *sect;
f8843e87
AM
9110 short sig;
9111 unsigned flags;
07c6e936
NC
9112
9113 /* nto_procfs_status 'pid' field is at offset 0. */
228e534f 9114 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
07c6e936 9115
f8843e87
AM
9116 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
9117 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
9118
9119 /* nto_procfs_status 'flags' field is at offset 8. */
9120 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
9121
9122 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
9123 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
9124 {
228e534f
AM
9125 elf_tdata (abfd)->core->signal = sig;
9126 elf_tdata (abfd)->core->lwpid = *tid;
f8843e87 9127 }
07c6e936 9128
f8843e87
AM
9129 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
9130 do not come from signals so we make sure we set the current
9131 thread just in case. */
9132 if (flags & 0x00000080)
228e534f 9133 elf_tdata (abfd)->core->lwpid = *tid;
07c6e936
NC
9134
9135 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 9136 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 9137
a50b1753 9138 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
9139 if (name == NULL)
9140 return FALSE;
9141 strcpy (name, buf);
9142
117ed4f8 9143 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
9144 if (sect == NULL)
9145 return FALSE;
9146
eea6121a 9147 sect->size = note->descsz;
07c6e936 9148 sect->filepos = note->descpos;
07c6e936
NC
9149 sect->alignment_power = 2;
9150
9151 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
9152}
9153
9154static bfd_boolean
d69f560c
KW
9155elfcore_grok_nto_regs (bfd *abfd,
9156 Elf_Internal_Note *note,
d3fd4074 9157 long tid,
d69f560c 9158 char *base)
07c6e936
NC
9159{
9160 char buf[100];
9161 char *name;
9162 asection *sect;
9163
d69f560c 9164 /* Make a "(base)/%d" section. */
d3fd4074 9165 sprintf (buf, "%s/%ld", base, tid);
07c6e936 9166
a50b1753 9167 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
9168 if (name == NULL)
9169 return FALSE;
9170 strcpy (name, buf);
9171
117ed4f8 9172 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
9173 if (sect == NULL)
9174 return FALSE;
9175
eea6121a 9176 sect->size = note->descsz;
07c6e936 9177 sect->filepos = note->descpos;
07c6e936
NC
9178 sect->alignment_power = 2;
9179
f8843e87 9180 /* This is the current thread. */
228e534f 9181 if (elf_tdata (abfd)->core->lwpid == tid)
d69f560c 9182 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
9183
9184 return TRUE;
07c6e936
NC
9185}
9186
9187#define BFD_QNT_CORE_INFO 7
9188#define BFD_QNT_CORE_STATUS 8
9189#define BFD_QNT_CORE_GREG 9
9190#define BFD_QNT_CORE_FPREG 10
9191
9192static bfd_boolean
217aa764 9193elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
9194{
9195 /* Every GREG section has a STATUS section before it. Store the
811072d8 9196 tid from the previous call to pass down to the next gregs
07c6e936 9197 function. */
d3fd4074 9198 static long tid = 1;
07c6e936
NC
9199
9200 switch (note->type)
9201 {
d69f560c
KW
9202 case BFD_QNT_CORE_INFO:
9203 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
9204 case BFD_QNT_CORE_STATUS:
9205 return elfcore_grok_nto_status (abfd, note, &tid);
9206 case BFD_QNT_CORE_GREG:
9207 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
9208 case BFD_QNT_CORE_FPREG:
9209 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
9210 default:
9211 return TRUE;
07c6e936
NC
9212 }
9213}
9214
b15fa79e
AM
9215static bfd_boolean
9216elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
9217{
9218 char *name;
9219 asection *sect;
9220 size_t len;
9221
9222 /* Use note name as section name. */
9223 len = note->namesz;
a50b1753 9224 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
9225 if (name == NULL)
9226 return FALSE;
9227 memcpy (name, note->namedata, len);
9228 name[len - 1] = '\0';
9229
9230 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
9231 if (sect == NULL)
9232 return FALSE;
9233
9234 sect->size = note->descsz;
9235 sect->filepos = note->descpos;
9236 sect->alignment_power = 1;
9237
9238 return TRUE;
9239}
9240
7c76fa91
MS
9241/* Function: elfcore_write_note
9242
47d9a591 9243 Inputs:
a39f3346 9244 buffer to hold note, and current size of buffer
7c76fa91
MS
9245 name of note
9246 type of note
9247 data for note
9248 size of data for note
9249
a39f3346
AM
9250 Writes note to end of buffer. ELF64 notes are written exactly as
9251 for ELF32, despite the current (as of 2006) ELF gabi specifying
9252 that they ought to have 8-byte namesz and descsz field, and have
9253 8-byte alignment. Other writers, eg. Linux kernel, do the same.
9254
7c76fa91 9255 Return:
a39f3346 9256 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
9257
9258char *
a39f3346 9259elfcore_write_note (bfd *abfd,
217aa764 9260 char *buf,
a39f3346 9261 int *bufsiz,
217aa764 9262 const char *name,
a39f3346 9263 int type,
217aa764 9264 const void *input,
a39f3346 9265 int size)
7c76fa91
MS
9266{
9267 Elf_External_Note *xnp;
d4c88bbb 9268 size_t namesz;
d4c88bbb 9269 size_t newspace;
a39f3346 9270 char *dest;
7c76fa91 9271
d4c88bbb 9272 namesz = 0;
d4c88bbb 9273 if (name != NULL)
a39f3346 9274 namesz = strlen (name) + 1;
d4c88bbb 9275
a39f3346 9276 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 9277
a50b1753 9278 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
9279 if (buf == NULL)
9280 return buf;
a39f3346 9281 dest = buf + *bufsiz;
7c76fa91
MS
9282 *bufsiz += newspace;
9283 xnp = (Elf_External_Note *) dest;
9284 H_PUT_32 (abfd, namesz, xnp->namesz);
9285 H_PUT_32 (abfd, size, xnp->descsz);
9286 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
9287 dest = xnp->name;
9288 if (name != NULL)
9289 {
9290 memcpy (dest, name, namesz);
9291 dest += namesz;
a39f3346 9292 while (namesz & 3)
d4c88bbb
AM
9293 {
9294 *dest++ = '\0';
a39f3346 9295 ++namesz;
d4c88bbb
AM
9296 }
9297 }
9298 memcpy (dest, input, size);
a39f3346
AM
9299 dest += size;
9300 while (size & 3)
9301 {
9302 *dest++ = '\0';
9303 ++size;
9304 }
9305 return buf;
7c76fa91
MS
9306}
9307
7c76fa91 9308char *
217aa764
AM
9309elfcore_write_prpsinfo (bfd *abfd,
9310 char *buf,
9311 int *bufsiz,
9312 const char *fname,
9313 const char *psargs)
7c76fa91 9314{
183e98be
AM
9315 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9316
9317 if (bed->elf_backend_write_core_note != NULL)
9318 {
9319 char *ret;
9320 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
9321 NT_PRPSINFO, fname, psargs);
9322 if (ret != NULL)
9323 return ret;
9324 }
7c76fa91 9325
1f20dca5 9326#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
183e98be
AM
9327#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
9328 if (bed->s->elfclass == ELFCLASS32)
9329 {
9330#if defined (HAVE_PSINFO32_T)
9331 psinfo32_t data;
9332 int note_type = NT_PSINFO;
9333#else
9334 prpsinfo32_t data;
9335 int note_type = NT_PRPSINFO;
9336#endif
9337
9338 memset (&data, 0, sizeof (data));
9339 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
9340 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
9341 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 9342 "CORE", note_type, &data, sizeof (data));
183e98be
AM
9343 }
9344 else
9345#endif
9346 {
7c76fa91 9347#if defined (HAVE_PSINFO_T)
183e98be
AM
9348 psinfo_t data;
9349 int note_type = NT_PSINFO;
7c76fa91 9350#else
183e98be
AM
9351 prpsinfo_t data;
9352 int note_type = NT_PRPSINFO;
7c76fa91
MS
9353#endif
9354
183e98be
AM
9355 memset (&data, 0, sizeof (data));
9356 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
9357 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
9358 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 9359 "CORE", note_type, &data, sizeof (data));
183e98be 9360 }
7c76fa91
MS
9361#endif /* PSINFO_T or PRPSINFO_T */
9362
1f20dca5
UW
9363 free (buf);
9364 return NULL;
9365}
9366
70a38d42
SDJ
9367char *
9368elfcore_write_linux_prpsinfo32
9369 (bfd *abfd, char *buf, int *bufsiz,
9370 const struct elf_internal_linux_prpsinfo *prpsinfo)
9371{
9372 struct elf_external_linux_prpsinfo32 data;
9373
9374 memset (&data, 0, sizeof (data));
9375 LINUX_PRPSINFO32_SWAP_FIELDS (abfd, prpsinfo, data);
9376
9377 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
9378 &data, sizeof (data));
9379}
9380
9381char *
9382elfcore_write_linux_prpsinfo64
9383 (bfd *abfd, char *buf, int *bufsiz,
9384 const struct elf_internal_linux_prpsinfo *prpsinfo)
9385{
9386 struct elf_external_linux_prpsinfo64 data;
9387
9388 memset (&data, 0, sizeof (data));
9389 LINUX_PRPSINFO64_SWAP_FIELDS (abfd, prpsinfo, data);
9390
9391 return elfcore_write_note (abfd, buf, bufsiz,
9392 "CORE", NT_PRPSINFO, &data, sizeof (data));
9393}
9394
7c76fa91 9395char *
217aa764
AM
9396elfcore_write_prstatus (bfd *abfd,
9397 char *buf,
9398 int *bufsiz,
9399 long pid,
9400 int cursig,
9401 const void *gregs)
7c76fa91 9402{
183e98be 9403 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 9404
183e98be
AM
9405 if (bed->elf_backend_write_core_note != NULL)
9406 {
9407 char *ret;
9408 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
9409 NT_PRSTATUS,
9410 pid, cursig, gregs);
9411 if (ret != NULL)
9412 return ret;
9413 }
9414
1f20dca5 9415#if defined (HAVE_PRSTATUS_T)
183e98be
AM
9416#if defined (HAVE_PRSTATUS32_T)
9417 if (bed->s->elfclass == ELFCLASS32)
9418 {
9419 prstatus32_t prstat;
9420
9421 memset (&prstat, 0, sizeof (prstat));
9422 prstat.pr_pid = pid;
9423 prstat.pr_cursig = cursig;
9424 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 9425 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
9426 NT_PRSTATUS, &prstat, sizeof (prstat));
9427 }
9428 else
9429#endif
9430 {
9431 prstatus_t prstat;
9432
9433 memset (&prstat, 0, sizeof (prstat));
9434 prstat.pr_pid = pid;
9435 prstat.pr_cursig = cursig;
9436 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 9437 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
9438 NT_PRSTATUS, &prstat, sizeof (prstat));
9439 }
7c76fa91
MS
9440#endif /* HAVE_PRSTATUS_T */
9441
1f20dca5
UW
9442 free (buf);
9443 return NULL;
9444}
9445
51316059
MS
9446#if defined (HAVE_LWPSTATUS_T)
9447char *
217aa764
AM
9448elfcore_write_lwpstatus (bfd *abfd,
9449 char *buf,
9450 int *bufsiz,
9451 long pid,
9452 int cursig,
9453 const void *gregs)
51316059
MS
9454{
9455 lwpstatus_t lwpstat;
183e98be 9456 const char *note_name = "CORE";
51316059
MS
9457
9458 memset (&lwpstat, 0, sizeof (lwpstat));
9459 lwpstat.pr_lwpid = pid >> 16;
9460 lwpstat.pr_cursig = cursig;
9461#if defined (HAVE_LWPSTATUS_T_PR_REG)
d1e8523e 9462 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
51316059
MS
9463#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
9464#if !defined(gregs)
9465 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
9466 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
9467#else
9468 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
9469 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
9470#endif
9471#endif
47d9a591 9472 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
9473 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
9474}
9475#endif /* HAVE_LWPSTATUS_T */
9476
7c76fa91
MS
9477#if defined (HAVE_PSTATUS_T)
9478char *
217aa764
AM
9479elfcore_write_pstatus (bfd *abfd,
9480 char *buf,
9481 int *bufsiz,
9482 long pid,
6c10990d
NC
9483 int cursig ATTRIBUTE_UNUSED,
9484 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 9485{
183e98be
AM
9486 const char *note_name = "CORE";
9487#if defined (HAVE_PSTATUS32_T)
9488 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 9489
183e98be
AM
9490 if (bed->s->elfclass == ELFCLASS32)
9491 {
9492 pstatus32_t pstat;
9493
9494 memset (&pstat, 0, sizeof (pstat));
9495 pstat.pr_pid = pid & 0xffff;
9496 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
9497 NT_PSTATUS, &pstat, sizeof (pstat));
9498 return buf;
9499 }
9500 else
9501#endif
9502 {
9503 pstatus_t pstat;
9504
9505 memset (&pstat, 0, sizeof (pstat));
9506 pstat.pr_pid = pid & 0xffff;
9507 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
9508 NT_PSTATUS, &pstat, sizeof (pstat));
9509 return buf;
9510 }
7c76fa91
MS
9511}
9512#endif /* HAVE_PSTATUS_T */
9513
9514char *
217aa764
AM
9515elfcore_write_prfpreg (bfd *abfd,
9516 char *buf,
9517 int *bufsiz,
9518 const void *fpregs,
9519 int size)
7c76fa91 9520{
183e98be 9521 const char *note_name = "CORE";
47d9a591 9522 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
9523 note_name, NT_FPREGSET, fpregs, size);
9524}
9525
9526char *
217aa764
AM
9527elfcore_write_prxfpreg (bfd *abfd,
9528 char *buf,
9529 int *bufsiz,
9530 const void *xfpregs,
9531 int size)
7c76fa91
MS
9532{
9533 char *note_name = "LINUX";
47d9a591 9534 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
9535 note_name, NT_PRXFPREG, xfpregs, size);
9536}
9537
4339cae0
L
9538char *
9539elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
9540 const void *xfpregs, int size)
9541{
9542 char *note_name = "LINUX";
9543 return elfcore_write_note (abfd, buf, bufsiz,
9544 note_name, NT_X86_XSTATE, xfpregs, size);
9545}
9546
97753bd5
AM
9547char *
9548elfcore_write_ppc_vmx (bfd *abfd,
9549 char *buf,
9550 int *bufsiz,
9551 const void *ppc_vmx,
9552 int size)
9553{
9554 char *note_name = "LINUX";
9555 return elfcore_write_note (abfd, buf, bufsiz,
9556 note_name, NT_PPC_VMX, ppc_vmx, size);
9557}
9558
89eeb0bc
LM
9559char *
9560elfcore_write_ppc_vsx (bfd *abfd,
9561 char *buf,
9562 int *bufsiz,
9563 const void *ppc_vsx,
9564 int size)
9565{
9566 char *note_name = "LINUX";
9567 return elfcore_write_note (abfd, buf, bufsiz,
9568 note_name, NT_PPC_VSX, ppc_vsx, size);
9569}
9570
0675e188
UW
9571static char *
9572elfcore_write_s390_high_gprs (bfd *abfd,
9573 char *buf,
9574 int *bufsiz,
9575 const void *s390_high_gprs,
9576 int size)
9577{
9578 char *note_name = "LINUX";
9579 return elfcore_write_note (abfd, buf, bufsiz,
9580 note_name, NT_S390_HIGH_GPRS,
9581 s390_high_gprs, size);
9582}
9583
d7eeb400
MS
9584char *
9585elfcore_write_s390_timer (bfd *abfd,
9586 char *buf,
9587 int *bufsiz,
9588 const void *s390_timer,
9589 int size)
9590{
9591 char *note_name = "LINUX";
9592 return elfcore_write_note (abfd, buf, bufsiz,
9593 note_name, NT_S390_TIMER, s390_timer, size);
9594}
9595
9596char *
9597elfcore_write_s390_todcmp (bfd *abfd,
9598 char *buf,
9599 int *bufsiz,
9600 const void *s390_todcmp,
9601 int size)
9602{
9603 char *note_name = "LINUX";
9604 return elfcore_write_note (abfd, buf, bufsiz,
9605 note_name, NT_S390_TODCMP, s390_todcmp, size);
9606}
9607
9608char *
9609elfcore_write_s390_todpreg (bfd *abfd,
9610 char *buf,
9611 int *bufsiz,
9612 const void *s390_todpreg,
9613 int size)
9614{
9615 char *note_name = "LINUX";
9616 return elfcore_write_note (abfd, buf, bufsiz,
9617 note_name, NT_S390_TODPREG, s390_todpreg, size);
9618}
9619
9620char *
9621elfcore_write_s390_ctrs (bfd *abfd,
9622 char *buf,
9623 int *bufsiz,
9624 const void *s390_ctrs,
9625 int size)
9626{
9627 char *note_name = "LINUX";
9628 return elfcore_write_note (abfd, buf, bufsiz,
9629 note_name, NT_S390_CTRS, s390_ctrs, size);
9630}
9631
9632char *
9633elfcore_write_s390_prefix (bfd *abfd,
9634 char *buf,
9635 int *bufsiz,
9636 const void *s390_prefix,
9637 int size)
9638{
9639 char *note_name = "LINUX";
9640 return elfcore_write_note (abfd, buf, bufsiz,
9641 note_name, NT_S390_PREFIX, s390_prefix, size);
9642}
9643
355b81d9
UW
9644char *
9645elfcore_write_s390_last_break (bfd *abfd,
9646 char *buf,
9647 int *bufsiz,
9648 const void *s390_last_break,
9649 int size)
9650{
9651 char *note_name = "LINUX";
9652 return elfcore_write_note (abfd, buf, bufsiz,
9653 note_name, NT_S390_LAST_BREAK,
9654 s390_last_break, size);
9655}
9656
9657char *
9658elfcore_write_s390_system_call (bfd *abfd,
9659 char *buf,
9660 int *bufsiz,
9661 const void *s390_system_call,
9662 int size)
9663{
9664 char *note_name = "LINUX";
9665 return elfcore_write_note (abfd, buf, bufsiz,
9666 note_name, NT_S390_SYSTEM_CALL,
9667 s390_system_call, size);
9668}
9669
abb3f6cc
NC
9670char *
9671elfcore_write_s390_tdb (bfd *abfd,
9672 char *buf,
9673 int *bufsiz,
9674 const void *s390_tdb,
9675 int size)
9676{
9677 char *note_name = "LINUX";
9678 return elfcore_write_note (abfd, buf, bufsiz,
9679 note_name, NT_S390_TDB, s390_tdb, size);
9680}
9681
4ef9f41a
AA
9682char *
9683elfcore_write_s390_vxrs_low (bfd *abfd,
9684 char *buf,
9685 int *bufsiz,
9686 const void *s390_vxrs_low,
9687 int size)
9688{
9689 char *note_name = "LINUX";
9690 return elfcore_write_note (abfd, buf, bufsiz,
9691 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
9692}
9693
9694char *
9695elfcore_write_s390_vxrs_high (bfd *abfd,
9696 char *buf,
9697 int *bufsiz,
9698 const void *s390_vxrs_high,
9699 int size)
9700{
9701 char *note_name = "LINUX";
9702 return elfcore_write_note (abfd, buf, bufsiz,
9703 note_name, NT_S390_VXRS_HIGH,
9704 s390_vxrs_high, size);
9705}
9706
faa9a424
UW
9707char *
9708elfcore_write_arm_vfp (bfd *abfd,
9709 char *buf,
9710 int *bufsiz,
9711 const void *arm_vfp,
9712 int size)
9713{
9714 char *note_name = "LINUX";
9715 return elfcore_write_note (abfd, buf, bufsiz,
9716 note_name, NT_ARM_VFP, arm_vfp, size);
9717}
9718
652451f8
YZ
9719char *
9720elfcore_write_aarch_tls (bfd *abfd,
9721 char *buf,
9722 int *bufsiz,
9723 const void *aarch_tls,
9724 int size)
9725{
9726 char *note_name = "LINUX";
9727 return elfcore_write_note (abfd, buf, bufsiz,
9728 note_name, NT_ARM_TLS, aarch_tls, size);
9729}
9730
9731char *
9732elfcore_write_aarch_hw_break (bfd *abfd,
9733 char *buf,
9734 int *bufsiz,
9735 const void *aarch_hw_break,
9736 int size)
9737{
9738 char *note_name = "LINUX";
9739 return elfcore_write_note (abfd, buf, bufsiz,
9740 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
9741}
9742
9743char *
9744elfcore_write_aarch_hw_watch (bfd *abfd,
9745 char *buf,
9746 int *bufsiz,
9747 const void *aarch_hw_watch,
9748 int size)
9749{
9750 char *note_name = "LINUX";
9751 return elfcore_write_note (abfd, buf, bufsiz,
9752 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
9753}
9754
bb864ac1
CES
9755char *
9756elfcore_write_register_note (bfd *abfd,
9757 char *buf,
9758 int *bufsiz,
9759 const char *section,
9760 const void *data,
9761 int size)
9762{
9763 if (strcmp (section, ".reg2") == 0)
9764 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
9765 if (strcmp (section, ".reg-xfp") == 0)
9766 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
9767 if (strcmp (section, ".reg-xstate") == 0)
9768 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
9769 if (strcmp (section, ".reg-ppc-vmx") == 0)
9770 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
9771 if (strcmp (section, ".reg-ppc-vsx") == 0)
9772 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
9773 if (strcmp (section, ".reg-s390-high-gprs") == 0)
9774 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
9775 if (strcmp (section, ".reg-s390-timer") == 0)
9776 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
9777 if (strcmp (section, ".reg-s390-todcmp") == 0)
9778 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
9779 if (strcmp (section, ".reg-s390-todpreg") == 0)
9780 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
9781 if (strcmp (section, ".reg-s390-ctrs") == 0)
9782 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
9783 if (strcmp (section, ".reg-s390-prefix") == 0)
9784 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
355b81d9
UW
9785 if (strcmp (section, ".reg-s390-last-break") == 0)
9786 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
9787 if (strcmp (section, ".reg-s390-system-call") == 0)
9788 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
abb3f6cc
NC
9789 if (strcmp (section, ".reg-s390-tdb") == 0)
9790 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
4ef9f41a
AA
9791 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
9792 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
9793 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
9794 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
faa9a424
UW
9795 if (strcmp (section, ".reg-arm-vfp") == 0)
9796 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
652451f8
YZ
9797 if (strcmp (section, ".reg-aarch-tls") == 0)
9798 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
9799 if (strcmp (section, ".reg-aarch-hw-break") == 0)
9800 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
9801 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
9802 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
bb864ac1
CES
9803 return NULL;
9804}
9805
b34976b6 9806static bfd_boolean
718175fa 9807elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 9808{
c044fabd 9809 char *p;
252b5132 9810
252b5132
RH
9811 p = buf;
9812 while (p < buf + size)
9813 {
c044fabd
KH
9814 /* FIXME: bad alignment assumption. */
9815 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
9816 Elf_Internal_Note in;
9817
baea7ef1
AM
9818 if (offsetof (Elf_External_Note, name) > buf - p + size)
9819 return FALSE;
9820
dc810e39 9821 in.type = H_GET_32 (abfd, xnp->type);
252b5132 9822
dc810e39 9823 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 9824 in.namedata = xnp->name;
baea7ef1
AM
9825 if (in.namesz > buf - in.namedata + size)
9826 return FALSE;
252b5132 9827
dc810e39 9828 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
9829 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
9830 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
9831 if (in.descsz != 0
9832 && (in.descdata >= buf + size
9833 || in.descsz > buf - in.descdata + size))
9834 return FALSE;
252b5132 9835
718175fa
JK
9836 switch (bfd_get_format (abfd))
9837 {
9838 default:
9839 return TRUE;
9840
9841 case bfd_core:
f64e188b 9842 {
8acbedd6 9843#define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
f64e188b 9844 struct
718175fa 9845 {
f64e188b 9846 const char * string;
8acbedd6 9847 size_t len;
f64e188b 9848 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
718175fa 9849 }
f64e188b 9850 grokers[] =
b15fa79e 9851 {
8acbedd6
KS
9852 GROKER_ELEMENT ("", elfcore_grok_note),
9853 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
9854 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
9855 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
9856 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note)
f64e188b 9857 };
8acbedd6 9858#undef GROKER_ELEMENT
f64e188b
NC
9859 int i;
9860
9861 for (i = ARRAY_SIZE (grokers); i--;)
8acbedd6
KS
9862 {
9863 if (in.namesz >= grokers[i].len
9864 && strncmp (in.namedata, grokers[i].string,
9865 grokers[i].len) == 0)
9866 {
9867 if (! grokers[i].func (abfd, & in))
9868 return FALSE;
9869 break;
9870 }
9871 }
f64e188b
NC
9872 break;
9873 }
718175fa
JK
9874
9875 case bfd_object:
9876 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
9877 {
9878 if (! elfobj_grok_gnu_note (abfd, &in))
9879 return FALSE;
9880 }
e21e5835
NC
9881 else if (in.namesz == sizeof "stapsdt"
9882 && strcmp (in.namedata, "stapsdt") == 0)
9883 {
9884 if (! elfobj_grok_stapsdt_note (abfd, &in))
9885 return FALSE;
9886 }
718175fa 9887 break;
08a40648 9888 }
252b5132
RH
9889
9890 p = in.descdata + BFD_ALIGN (in.descsz, 4);
9891 }
9892
718175fa
JK
9893 return TRUE;
9894}
9895
9896static bfd_boolean
9897elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
9898{
9899 char *buf;
9900
9901 if (size <= 0)
9902 return TRUE;
9903
9904 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
9905 return FALSE;
9906
f64e188b 9907 buf = (char *) bfd_malloc (size + 1);
718175fa
JK
9908 if (buf == NULL)
9909 return FALSE;
9910
f64e188b
NC
9911 /* PR 17512: file: ec08f814
9912 0-termintate the buffer so that string searches will not overflow. */
9913 buf[size] = 0;
9914
718175fa
JK
9915 if (bfd_bread (buf, size, abfd) != size
9916 || !elf_parse_notes (abfd, buf, size, offset))
9917 {
9918 free (buf);
9919 return FALSE;
9920 }
9921
252b5132 9922 free (buf);
b34976b6 9923 return TRUE;
252b5132 9924}
98d8431c
JB
9925\f
9926/* Providing external access to the ELF program header table. */
9927
9928/* Return an upper bound on the number of bytes required to store a
9929 copy of ABFD's program header table entries. Return -1 if an error
9930 occurs; bfd_get_error will return an appropriate code. */
c044fabd 9931
98d8431c 9932long
217aa764 9933bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
9934{
9935 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9936 {
9937 bfd_set_error (bfd_error_wrong_format);
9938 return -1;
9939 }
9940
936e320b 9941 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
9942}
9943
98d8431c
JB
9944/* Copy ABFD's program header table entries to *PHDRS. The entries
9945 will be stored as an array of Elf_Internal_Phdr structures, as
9946 defined in include/elf/internal.h. To find out how large the
9947 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
9948
9949 Return the number of program header table entries read, or -1 if an
9950 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 9951
98d8431c 9952int
217aa764 9953bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
9954{
9955 int num_phdrs;
9956
9957 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9958 {
9959 bfd_set_error (bfd_error_wrong_format);
9960 return -1;
9961 }
9962
9963 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 9964 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
9965 num_phdrs * sizeof (Elf_Internal_Phdr));
9966
9967 return num_phdrs;
9968}
ae4221d7 9969
db6751f2 9970enum elf_reloc_type_class
7e612e98
AM
9971_bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
9972 const asection *rel_sec ATTRIBUTE_UNUSED,
9973 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
9974{
9975 return reloc_class_normal;
9976}
f8df10f4 9977
47d9a591 9978/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
9979 relocation against a local symbol. */
9980
9981bfd_vma
217aa764
AM
9982_bfd_elf_rela_local_sym (bfd *abfd,
9983 Elf_Internal_Sym *sym,
8517fae7 9984 asection **psec,
217aa764 9985 Elf_Internal_Rela *rel)
f8df10f4 9986{
8517fae7 9987 asection *sec = *psec;
f8df10f4
JJ
9988 bfd_vma relocation;
9989
9990 relocation = (sec->output_section->vma
9991 + sec->output_offset
9992 + sym->st_value);
9993 if ((sec->flags & SEC_MERGE)
c629eae0 9994 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 9995 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
f8df10f4 9996 {
f8df10f4 9997 rel->r_addend =
8517fae7 9998 _bfd_merged_section_offset (abfd, psec,
65765700 9999 elf_section_data (sec)->sec_info,
753731ee
AM
10000 sym->st_value + rel->r_addend);
10001 if (sec != *psec)
10002 {
10003 /* If we have changed the section, and our original section is
10004 marked with SEC_EXCLUDE, it means that the original
10005 SEC_MERGE section has been completely subsumed in some
10006 other SEC_MERGE section. In this case, we need to leave
10007 some info around for --emit-relocs. */
10008 if ((sec->flags & SEC_EXCLUDE) != 0)
10009 sec->kept_section = *psec;
10010 sec = *psec;
10011 }
8517fae7
AM
10012 rel->r_addend -= relocation;
10013 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
10014 }
10015 return relocation;
10016}
c629eae0
JJ
10017
10018bfd_vma
217aa764
AM
10019_bfd_elf_rel_local_sym (bfd *abfd,
10020 Elf_Internal_Sym *sym,
10021 asection **psec,
10022 bfd_vma addend)
47d9a591 10023{
c629eae0
JJ
10024 asection *sec = *psec;
10025
dbaa2011 10026 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
c629eae0
JJ
10027 return sym->st_value + addend;
10028
10029 return _bfd_merged_section_offset (abfd, psec,
65765700 10030 elf_section_data (sec)->sec_info,
753731ee 10031 sym->st_value + addend);
c629eae0
JJ
10032}
10033
10034bfd_vma
217aa764 10035_bfd_elf_section_offset (bfd *abfd,
92e4ec35 10036 struct bfd_link_info *info,
217aa764
AM
10037 asection *sec,
10038 bfd_vma offset)
c629eae0 10039{
68bfbfcc 10040 switch (sec->sec_info_type)
65765700 10041 {
dbaa2011 10042 case SEC_INFO_TYPE_STABS:
eea6121a
AM
10043 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
10044 offset);
dbaa2011 10045 case SEC_INFO_TYPE_EH_FRAME:
92e4ec35 10046 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700 10047 default:
310fd250
L
10048 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
10049 {
10050 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10051 bfd_size_type address_size = bed->s->arch_size / 8;
10052 offset = sec->size - offset - address_size;
10053 }
65765700
JJ
10054 return offset;
10055 }
c629eae0 10056}
3333a7c3
RM
10057\f
10058/* Create a new BFD as if by bfd_openr. Rather than opening a file,
10059 reconstruct an ELF file by reading the segments out of remote memory
10060 based on the ELF file header at EHDR_VMA and the ELF program headers it
10061 points to. If not null, *LOADBASEP is filled in with the difference
10062 between the VMAs from which the segments were read, and the VMAs the
10063 file headers (and hence BFD's idea of each section's VMA) put them at.
10064
10065 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
10066 remote memory at target address VMA into the local buffer at MYADDR; it
10067 should return zero on success or an `errno' code on failure. TEMPL must
10068 be a BFD for an ELF target with the word size and byte order found in
10069 the remote memory. */
10070
10071bfd *
217aa764
AM
10072bfd_elf_bfd_from_remote_memory
10073 (bfd *templ,
10074 bfd_vma ehdr_vma,
f0a5d95a 10075 bfd_size_type size,
217aa764 10076 bfd_vma *loadbasep,
fe78531d 10077 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
3333a7c3
RM
10078{
10079 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
5979d6b6 10080 (templ, ehdr_vma, size, loadbasep, target_read_memory);
3333a7c3 10081}
4c45e5c9
JJ
10082\f
10083long
c9727e01
AM
10084_bfd_elf_get_synthetic_symtab (bfd *abfd,
10085 long symcount ATTRIBUTE_UNUSED,
10086 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 10087 long dynsymcount,
c9727e01
AM
10088 asymbol **dynsyms,
10089 asymbol **ret)
4c45e5c9
JJ
10090{
10091 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10092 asection *relplt;
10093 asymbol *s;
10094 const char *relplt_name;
10095 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
10096 arelent *p;
10097 long count, i, n;
10098 size_t size;
10099 Elf_Internal_Shdr *hdr;
10100 char *names;
10101 asection *plt;
10102
8615f3f2
AM
10103 *ret = NULL;
10104
90e3cdf2
JJ
10105 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
10106 return 0;
10107
8615f3f2
AM
10108 if (dynsymcount <= 0)
10109 return 0;
10110
4c45e5c9
JJ
10111 if (!bed->plt_sym_val)
10112 return 0;
10113
10114 relplt_name = bed->relplt_name;
10115 if (relplt_name == NULL)
d35fd659 10116 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
10117 relplt = bfd_get_section_by_name (abfd, relplt_name);
10118 if (relplt == NULL)
10119 return 0;
10120
10121 hdr = &elf_section_data (relplt)->this_hdr;
10122 if (hdr->sh_link != elf_dynsymtab (abfd)
10123 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
10124 return 0;
10125
10126 plt = bfd_get_section_by_name (abfd, ".plt");
10127 if (plt == NULL)
10128 return 0;
10129
10130 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 10131 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
10132 return -1;
10133
eea6121a 10134 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
10135 size = count * sizeof (asymbol);
10136 p = relplt->relocation;
cb53bf42 10137 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
10138 {
10139 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
10140 if (p->addend != 0)
10141 {
10142#ifdef BFD64
10143 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
10144#else
10145 size += sizeof ("+0x") - 1 + 8;
10146#endif
10147 }
10148 }
4c45e5c9 10149
a50b1753 10150 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
10151 if (s == NULL)
10152 return -1;
10153
10154 names = (char *) (s + count);
10155 p = relplt->relocation;
10156 n = 0;
cb53bf42 10157 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
10158 {
10159 size_t len;
10160 bfd_vma addr;
10161
10162 addr = bed->plt_sym_val (i, plt, p);
10163 if (addr == (bfd_vma) -1)
10164 continue;
10165
10166 *s = **p->sym_ptr_ptr;
65a7a66f
AM
10167 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
10168 we are defining a symbol, ensure one of them is set. */
10169 if ((s->flags & BSF_LOCAL) == 0)
10170 s->flags |= BSF_GLOBAL;
6ba2a415 10171 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
10172 s->section = plt;
10173 s->value = addr - plt->vma;
10174 s->name = names;
8f39ba8e 10175 s->udata.p = NULL;
4c45e5c9
JJ
10176 len = strlen ((*p->sym_ptr_ptr)->name);
10177 memcpy (names, (*p->sym_ptr_ptr)->name, len);
10178 names += len;
041de40d
AM
10179 if (p->addend != 0)
10180 {
1d770845 10181 char buf[30], *a;
d324f6d6 10182
041de40d
AM
10183 memcpy (names, "+0x", sizeof ("+0x") - 1);
10184 names += sizeof ("+0x") - 1;
1d770845
L
10185 bfd_sprintf_vma (abfd, buf, p->addend);
10186 for (a = buf; *a == '0'; ++a)
10187 ;
10188 len = strlen (a);
10189 memcpy (names, a, len);
10190 names += len;
041de40d 10191 }
4c45e5c9
JJ
10192 memcpy (names, "@plt", sizeof ("@plt"));
10193 names += sizeof ("@plt");
8f39ba8e 10194 ++s, ++n;
4c45e5c9
JJ
10195 }
10196
10197 return n;
10198}
3d7f7666 10199
3b22753a
L
10200/* It is only used by x86-64 so far. */
10201asection _bfd_elf_large_com_section
10202 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 10203 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 10204
d1036acb 10205void
78245035
L
10206_bfd_elf_post_process_headers (bfd * abfd,
10207 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
d1036acb
L
10208{
10209 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
10210
10211 i_ehdrp = elf_elfheader (abfd);
10212
10213 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
10214
10215 /* To make things simpler for the loader on Linux systems we set the
9c55345c 10216 osabi field to ELFOSABI_GNU if the binary contains symbols of
f64b2e8d 10217 the STT_GNU_IFUNC type or STB_GNU_UNIQUE binding. */
d8045f23 10218 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
f64b2e8d 10219 && elf_tdata (abfd)->has_gnu_symbols)
9c55345c 10220 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
d1036acb 10221}
fcb93ecf
PB
10222
10223
10224/* Return TRUE for ELF symbol types that represent functions.
10225 This is the default version of this function, which is sufficient for
d8045f23 10226 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
10227
10228bfd_boolean
10229_bfd_elf_is_function_type (unsigned int type)
10230{
d8045f23
NC
10231 return (type == STT_FUNC
10232 || type == STT_GNU_IFUNC);
fcb93ecf 10233}
9f296da3 10234
aef36ac1
AM
10235/* If the ELF symbol SYM might be a function in SEC, return the
10236 function size and set *CODE_OFF to the function's entry point,
10237 otherwise return zero. */
9f296da3 10238
aef36ac1
AM
10239bfd_size_type
10240_bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
10241 bfd_vma *code_off)
9f296da3 10242{
aef36ac1
AM
10243 bfd_size_type size;
10244
ff9e0f5b 10245 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
aef36ac1
AM
10246 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
10247 || sym->section != sec)
10248 return 0;
ff9e0f5b 10249
ff9e0f5b 10250 *code_off = sym->value;
aef36ac1
AM
10251 size = 0;
10252 if (!(sym->flags & BSF_SYNTHETIC))
10253 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
10254 if (size == 0)
10255 size = 1;
10256 return size;
9f296da3 10257}