]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
gas: run the hwcaps-bump tests with 64-bit sparc objects only.
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91 2
6f2750fe 3 Copyright (C) 1993-2016 Free Software Foundation, Inc.
252b5132 4
5e8d7549 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
5e8d7549
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
5e8d7549 10 (at your option) any later version.
252b5132 11
5e8d7549
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
5e8d7549 17 You should have received a copy of the GNU General Public License
b34976b6 18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132 22
1b74d094
BW
23/*
24SECTION
252b5132
RH
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
661a3fd4 33 haven't bothered yet. */
252b5132 34
7ee38065
MS
35/* For sparc64-cross-sparc32. */
36#define _SYSCALL32
252b5132 37#include "sysdep.h"
3db64b00 38#include "bfd.h"
252b5132
RH
39#include "bfdlink.h"
40#include "libbfd.h"
41#define ARCH_SIZE 0
42#include "elf-bfd.h"
e0e8c97f 43#include "libiberty.h"
ff59fc36 44#include "safe-ctype.h"
de64ce13 45#include "elf-linux-core.h"
252b5132 46
8bc7f138
L
47#ifdef CORE_HEADER
48#include CORE_HEADER
49#endif
50
217aa764 51static int elf_sort_sections (const void *, const void *);
c84fca4d 52static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764 53static bfd_boolean prep_headers (bfd *);
ef10c3ac 54static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int) ;
718175fa
JK
55static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
56static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
57 file_ptr offset);
50b2bdb7 58
252b5132
RH
59/* Swap version information in and out. The version information is
60 currently size independent. If that ever changes, this code will
61 need to move into elfcode.h. */
62
63/* Swap in a Verdef structure. */
64
65void
217aa764
AM
66_bfd_elf_swap_verdef_in (bfd *abfd,
67 const Elf_External_Verdef *src,
68 Elf_Internal_Verdef *dst)
252b5132 69{
dc810e39
AM
70 dst->vd_version = H_GET_16 (abfd, src->vd_version);
71 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
72 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
73 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
74 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
75 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
76 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
77}
78
79/* Swap out a Verdef structure. */
80
81void
217aa764
AM
82_bfd_elf_swap_verdef_out (bfd *abfd,
83 const Elf_Internal_Verdef *src,
84 Elf_External_Verdef *dst)
252b5132 85{
dc810e39
AM
86 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
87 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
88 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
89 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
90 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
91 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
92 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
93}
94
95/* Swap in a Verdaux structure. */
96
97void
217aa764
AM
98_bfd_elf_swap_verdaux_in (bfd *abfd,
99 const Elf_External_Verdaux *src,
100 Elf_Internal_Verdaux *dst)
252b5132 101{
dc810e39
AM
102 dst->vda_name = H_GET_32 (abfd, src->vda_name);
103 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
104}
105
106/* Swap out a Verdaux structure. */
107
108void
217aa764
AM
109_bfd_elf_swap_verdaux_out (bfd *abfd,
110 const Elf_Internal_Verdaux *src,
111 Elf_External_Verdaux *dst)
252b5132 112{
dc810e39
AM
113 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
114 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
115}
116
117/* Swap in a Verneed structure. */
118
119void
217aa764
AM
120_bfd_elf_swap_verneed_in (bfd *abfd,
121 const Elf_External_Verneed *src,
122 Elf_Internal_Verneed *dst)
252b5132 123{
dc810e39
AM
124 dst->vn_version = H_GET_16 (abfd, src->vn_version);
125 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
126 dst->vn_file = H_GET_32 (abfd, src->vn_file);
127 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
128 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
129}
130
131/* Swap out a Verneed structure. */
132
133void
217aa764
AM
134_bfd_elf_swap_verneed_out (bfd *abfd,
135 const Elf_Internal_Verneed *src,
136 Elf_External_Verneed *dst)
252b5132 137{
dc810e39
AM
138 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
139 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
140 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
141 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
142 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
143}
144
145/* Swap in a Vernaux structure. */
146
147void
217aa764
AM
148_bfd_elf_swap_vernaux_in (bfd *abfd,
149 const Elf_External_Vernaux *src,
150 Elf_Internal_Vernaux *dst)
252b5132 151{
dc810e39
AM
152 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
153 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
154 dst->vna_other = H_GET_16 (abfd, src->vna_other);
155 dst->vna_name = H_GET_32 (abfd, src->vna_name);
156 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
157}
158
159/* Swap out a Vernaux structure. */
160
161void
217aa764
AM
162_bfd_elf_swap_vernaux_out (bfd *abfd,
163 const Elf_Internal_Vernaux *src,
164 Elf_External_Vernaux *dst)
252b5132 165{
dc810e39
AM
166 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
167 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
168 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
169 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
170 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
171}
172
173/* Swap in a Versym structure. */
174
175void
217aa764
AM
176_bfd_elf_swap_versym_in (bfd *abfd,
177 const Elf_External_Versym *src,
178 Elf_Internal_Versym *dst)
252b5132 179{
dc810e39 180 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
181}
182
183/* Swap out a Versym structure. */
184
185void
217aa764
AM
186_bfd_elf_swap_versym_out (bfd *abfd,
187 const Elf_Internal_Versym *src,
188 Elf_External_Versym *dst)
252b5132 189{
dc810e39 190 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
191}
192
193/* Standard ELF hash function. Do not change this function; you will
194 cause invalid hash tables to be generated. */
3a99b017 195
252b5132 196unsigned long
217aa764 197bfd_elf_hash (const char *namearg)
252b5132 198{
3a99b017 199 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
200 unsigned long h = 0;
201 unsigned long g;
202 int ch;
203
204 while ((ch = *name++) != '\0')
205 {
206 h = (h << 4) + ch;
207 if ((g = (h & 0xf0000000)) != 0)
208 {
209 h ^= g >> 24;
210 /* The ELF ABI says `h &= ~g', but this is equivalent in
211 this case and on some machines one insn instead of two. */
212 h ^= g;
213 }
214 }
32dfa85d 215 return h & 0xffffffff;
252b5132
RH
216}
217
fdc90cb4
JJ
218/* DT_GNU_HASH hash function. Do not change this function; you will
219 cause invalid hash tables to be generated. */
220
221unsigned long
222bfd_elf_gnu_hash (const char *namearg)
223{
224 const unsigned char *name = (const unsigned char *) namearg;
225 unsigned long h = 5381;
226 unsigned char ch;
227
228 while ((ch = *name++) != '\0')
229 h = (h << 5) + h + ch;
230 return h & 0xffffffff;
231}
232
0c8d6e5c
AM
233/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
234 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 235bfd_boolean
0c8d6e5c 236bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 237 size_t object_size,
4dfe6ac6 238 enum elf_target_id object_id)
252b5132 239{
0ffa91dd
NC
240 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
241 abfd->tdata.any = bfd_zalloc (abfd, object_size);
242 if (abfd->tdata.any == NULL)
243 return FALSE;
252b5132 244
0ffa91dd 245 elf_object_id (abfd) = object_id;
c0355132
AM
246 if (abfd->direction != read_direction)
247 {
248 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
249 if (o == NULL)
250 return FALSE;
251 elf_tdata (abfd)->o = o;
252 elf_program_header_size (abfd) = (bfd_size_type) -1;
253 }
b34976b6 254 return TRUE;
252b5132
RH
255}
256
0ffa91dd
NC
257
258bfd_boolean
ae95ffa6 259bfd_elf_make_object (bfd *abfd)
0ffa91dd 260{
ae95ffa6 261 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 262 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 263 bed->target_id);
0ffa91dd
NC
264}
265
b34976b6 266bfd_boolean
217aa764 267bfd_elf_mkcorefile (bfd *abfd)
252b5132 268{
c044fabd 269 /* I think this can be done just like an object file. */
228e534f
AM
270 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
271 return FALSE;
272 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
273 return elf_tdata (abfd)->core != NULL;
252b5132
RH
274}
275
72a80a16 276static char *
217aa764 277bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
278{
279 Elf_Internal_Shdr **i_shdrp;
f075ee0c 280 bfd_byte *shstrtab = NULL;
dc810e39
AM
281 file_ptr offset;
282 bfd_size_type shstrtabsize;
252b5132
RH
283
284 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
285 if (i_shdrp == 0
286 || shindex >= elf_numsections (abfd)
287 || i_shdrp[shindex] == 0)
f075ee0c 288 return NULL;
252b5132 289
f075ee0c 290 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
291 if (shstrtab == NULL)
292 {
c044fabd 293 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
294 offset = i_shdrp[shindex]->sh_offset;
295 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
296
297 /* Allocate and clear an extra byte at the end, to prevent crashes
298 in case the string table is not terminated. */
3471d59d 299 if (shstrtabsize + 1 <= 1
06614111
NC
300 || bfd_seek (abfd, offset, SEEK_SET) != 0
301 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL)
c6c60d09
JJ
302 shstrtab = NULL;
303 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
304 {
305 if (bfd_get_error () != bfd_error_system_call)
306 bfd_set_error (bfd_error_file_truncated);
06614111 307 bfd_release (abfd, shstrtab);
c6c60d09 308 shstrtab = NULL;
3471d59d
CC
309 /* Once we've failed to read it, make sure we don't keep
310 trying. Otherwise, we'll keep allocating space for
311 the string table over and over. */
312 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
313 }
314 else
315 shstrtab[shstrtabsize] = '\0';
217aa764 316 i_shdrp[shindex]->contents = shstrtab;
252b5132 317 }
f075ee0c 318 return (char *) shstrtab;
252b5132
RH
319}
320
321char *
217aa764
AM
322bfd_elf_string_from_elf_section (bfd *abfd,
323 unsigned int shindex,
324 unsigned int strindex)
252b5132
RH
325{
326 Elf_Internal_Shdr *hdr;
327
328 if (strindex == 0)
329 return "";
330
74f2e02b
AM
331 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
332 return NULL;
333
252b5132
RH
334 hdr = elf_elfsections (abfd)[shindex];
335
06614111
NC
336 if (hdr->contents == NULL)
337 {
338 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
339 {
340 /* PR 17512: file: f057ec89. */
695344c0 341 /* xgettext:c-format */
06614111
NC
342 _bfd_error_handler (_("%B: attempt to load strings from a non-string section (number %d)"),
343 abfd, shindex);
344 return NULL;
345 }
b1fa9dd6 346
06614111
NC
347 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
348 return NULL;
349 }
252b5132
RH
350
351 if (strindex >= hdr->sh_size)
352 {
1b3a8575 353 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
4eca0228 354 _bfd_error_handler
695344c0 355 /* xgettext:c-format */
d003868e
AM
356 (_("%B: invalid string offset %u >= %lu for section `%s'"),
357 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 358 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 359 ? ".shstrtab"
1b3a8575 360 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 361 return NULL;
252b5132
RH
362 }
363
364 return ((char *) hdr->contents) + strindex;
365}
366
6cdc0ccc
AM
367/* Read and convert symbols to internal format.
368 SYMCOUNT specifies the number of symbols to read, starting from
369 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
370 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
371 symbols, and symbol section index extensions, respectively.
372 Returns a pointer to the internal symbol buffer (malloced if necessary)
373 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
374
375Elf_Internal_Sym *
217aa764
AM
376bfd_elf_get_elf_syms (bfd *ibfd,
377 Elf_Internal_Shdr *symtab_hdr,
378 size_t symcount,
379 size_t symoffset,
380 Elf_Internal_Sym *intsym_buf,
381 void *extsym_buf,
382 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
383{
384 Elf_Internal_Shdr *shndx_hdr;
217aa764 385 void *alloc_ext;
df622259 386 const bfd_byte *esym;
6cdc0ccc
AM
387 Elf_External_Sym_Shndx *alloc_extshndx;
388 Elf_External_Sym_Shndx *shndx;
4dd07732 389 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
390 Elf_Internal_Sym *isym;
391 Elf_Internal_Sym *isymend;
9c5bfbb7 392 const struct elf_backend_data *bed;
6cdc0ccc
AM
393 size_t extsym_size;
394 bfd_size_type amt;
395 file_ptr pos;
396
e44a2c9c
AM
397 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
398 abort ();
399
6cdc0ccc
AM
400 if (symcount == 0)
401 return intsym_buf;
402
403 /* Normal syms might have section extension entries. */
404 shndx_hdr = NULL;
6a40cf0c
NC
405 if (elf_symtab_shndx_list (ibfd) != NULL)
406 {
407 elf_section_list * entry;
408 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
409
410 /* Find an index section that is linked to this symtab section. */
411 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
315350be
NC
412 {
413 /* PR 20063. */
414 if (entry->hdr.sh_link >= elf_numsections (ibfd))
415 continue;
416
417 if (sections[entry->hdr.sh_link] == symtab_hdr)
418 {
419 shndx_hdr = & entry->hdr;
420 break;
421 };
422 }
6a40cf0c
NC
423
424 if (shndx_hdr == NULL)
425 {
426 if (symtab_hdr == & elf_symtab_hdr (ibfd))
427 /* Not really accurate, but this was how the old code used to work. */
428 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
429 /* Otherwise we do nothing. The assumption is that
430 the index table will not be needed. */
431 }
432 }
6cdc0ccc
AM
433
434 /* Read the symbols. */
435 alloc_ext = NULL;
436 alloc_extshndx = NULL;
4dd07732 437 alloc_intsym = NULL;
6cdc0ccc
AM
438 bed = get_elf_backend_data (ibfd);
439 extsym_size = bed->s->sizeof_sym;
ef53be89 440 amt = (bfd_size_type) symcount * extsym_size;
6cdc0ccc
AM
441 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
442 if (extsym_buf == NULL)
443 {
d0fb9a8d 444 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
445 extsym_buf = alloc_ext;
446 }
447 if (extsym_buf == NULL
448 || bfd_seek (ibfd, pos, SEEK_SET) != 0
449 || bfd_bread (extsym_buf, amt, ibfd) != amt)
450 {
451 intsym_buf = NULL;
452 goto out;
453 }
454
455 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
456 extshndx_buf = NULL;
457 else
458 {
ef53be89 459 amt = (bfd_size_type) symcount * sizeof (Elf_External_Sym_Shndx);
6cdc0ccc
AM
460 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
461 if (extshndx_buf == NULL)
462 {
a50b1753
NC
463 alloc_extshndx = (Elf_External_Sym_Shndx *)
464 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
465 extshndx_buf = alloc_extshndx;
466 }
467 if (extshndx_buf == NULL
468 || bfd_seek (ibfd, pos, SEEK_SET) != 0
469 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
470 {
471 intsym_buf = NULL;
472 goto out;
473 }
474 }
475
476 if (intsym_buf == NULL)
477 {
a50b1753
NC
478 alloc_intsym = (Elf_Internal_Sym *)
479 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 480 intsym_buf = alloc_intsym;
6cdc0ccc
AM
481 if (intsym_buf == NULL)
482 goto out;
483 }
484
485 /* Convert the symbols to internal form. */
486 isymend = intsym_buf + symcount;
a50b1753
NC
487 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
488 shndx = extshndx_buf;
6cdc0ccc
AM
489 isym < isymend;
490 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
491 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
492 {
493 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
695344c0 494 /* xgettext:c-format */
4eca0228
AM
495 _bfd_error_handler (_("%B symbol number %lu references "
496 "nonexistent SHT_SYMTAB_SHNDX section"),
497 ibfd, (unsigned long) symoffset);
4dd07732
AM
498 if (alloc_intsym != NULL)
499 free (alloc_intsym);
8384fb8f
AM
500 intsym_buf = NULL;
501 goto out;
502 }
6cdc0ccc
AM
503
504 out:
505 if (alloc_ext != NULL)
506 free (alloc_ext);
507 if (alloc_extshndx != NULL)
508 free (alloc_extshndx);
509
510 return intsym_buf;
511}
512
5cab59f6
AM
513/* Look up a symbol name. */
514const char *
be8dd2ca
AM
515bfd_elf_sym_name (bfd *abfd,
516 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
517 Elf_Internal_Sym *isym,
518 asection *sym_sec)
5cab59f6 519{
26c61ae5 520 const char *name;
5cab59f6 521 unsigned int iname = isym->st_name;
be8dd2ca 522 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 523
138f35cc
JJ
524 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
525 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 526 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
527 {
528 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
529 shindex = elf_elfheader (abfd)->e_shstrndx;
530 }
531
26c61ae5
L
532 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
533 if (name == NULL)
534 name = "(null)";
535 else if (sym_sec && *name == '\0')
536 name = bfd_section_name (abfd, sym_sec);
537
538 return name;
5cab59f6
AM
539}
540
dbb410c3
AM
541/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
542 sections. The first element is the flags, the rest are section
543 pointers. */
544
545typedef union elf_internal_group {
546 Elf_Internal_Shdr *shdr;
547 unsigned int flags;
548} Elf_Internal_Group;
549
b885599b
AM
550/* Return the name of the group signature symbol. Why isn't the
551 signature just a string? */
552
553static const char *
217aa764 554group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 555{
9dce4196 556 Elf_Internal_Shdr *hdr;
9dce4196
AM
557 unsigned char esym[sizeof (Elf64_External_Sym)];
558 Elf_External_Sym_Shndx eshndx;
559 Elf_Internal_Sym isym;
b885599b 560
13792e9d
L
561 /* First we need to ensure the symbol table is available. Make sure
562 that it is a symbol table section. */
4fbb74a6
AM
563 if (ghdr->sh_link >= elf_numsections (abfd))
564 return NULL;
13792e9d
L
565 hdr = elf_elfsections (abfd) [ghdr->sh_link];
566 if (hdr->sh_type != SHT_SYMTAB
567 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
568 return NULL;
569
9dce4196
AM
570 /* Go read the symbol. */
571 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
572 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
573 &isym, esym, &eshndx) == NULL)
b885599b 574 return NULL;
9dce4196 575
26c61ae5 576 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
577}
578
dbb410c3
AM
579/* Set next_in_group list pointer, and group name for NEWSECT. */
580
b34976b6 581static bfd_boolean
217aa764 582setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
583{
584 unsigned int num_group = elf_tdata (abfd)->num_group;
585
586 /* If num_group is zero, read in all SHT_GROUP sections. The count
587 is set to -1 if there are no SHT_GROUP sections. */
588 if (num_group == 0)
589 {
590 unsigned int i, shnum;
591
592 /* First count the number of groups. If we have a SHT_GROUP
593 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 594 shnum = elf_numsections (abfd);
dbb410c3 595 num_group = 0;
08a40648 596
44534af3 597#define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
1783205a 598 ( (shdr)->sh_type == SHT_GROUP \
44534af3 599 && (shdr)->sh_size >= minsize \
1783205a
NC
600 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
601 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 602
dbb410c3
AM
603 for (i = 0; i < shnum; i++)
604 {
605 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 606
44534af3 607 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3
AM
608 num_group += 1;
609 }
610
611 if (num_group == 0)
20dbb49d
L
612 {
613 num_group = (unsigned) -1;
614 elf_tdata (abfd)->num_group = num_group;
615 }
616 else
dbb410c3
AM
617 {
618 /* We keep a list of elf section headers for group sections,
619 so we can find them quickly. */
20dbb49d 620 bfd_size_type amt;
d0fb9a8d 621
20dbb49d 622 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
623 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
624 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 625 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 626 return FALSE;
dbb410c3
AM
627
628 num_group = 0;
629 for (i = 0; i < shnum; i++)
630 {
631 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 632
44534af3 633 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3 634 {
973ffd63 635 unsigned char *src;
dbb410c3
AM
636 Elf_Internal_Group *dest;
637
638 /* Add to list of sections. */
639 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
640 num_group += 1;
641
642 /* Read the raw contents. */
643 BFD_ASSERT (sizeof (*dest) >= 4);
644 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
645 shdr->contents = (unsigned char *)
646 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
647 /* PR binutils/4110: Handle corrupt group headers. */
648 if (shdr->contents == NULL)
649 {
650 _bfd_error_handler
695344c0 651 /* xgettext:c-format */
493a3386 652 (_("%B: corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
1783205a 653 bfd_set_error (bfd_error_bad_value);
493a3386
NC
654 -- num_group;
655 continue;
1783205a
NC
656 }
657
658 memset (shdr->contents, 0, amt);
659
660 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
661 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
662 != shdr->sh_size))
493a3386
NC
663 {
664 _bfd_error_handler
695344c0 665 /* xgettext:c-format */
493a3386
NC
666 (_("%B: invalid size field in group section header: 0x%lx"), abfd, shdr->sh_size);
667 bfd_set_error (bfd_error_bad_value);
668 -- num_group;
669 /* PR 17510: If the group contents are even partially
670 corrupt, do not allow any of the contents to be used. */
671 memset (shdr->contents, 0, amt);
672 continue;
673 }
708d7d0d 674
dbb410c3
AM
675 /* Translate raw contents, a flag word followed by an
676 array of elf section indices all in target byte order,
677 to the flag word followed by an array of elf section
678 pointers. */
679 src = shdr->contents + shdr->sh_size;
680 dest = (Elf_Internal_Group *) (shdr->contents + amt);
06614111 681
dbb410c3
AM
682 while (1)
683 {
684 unsigned int idx;
685
686 src -= 4;
687 --dest;
688 idx = H_GET_32 (abfd, src);
689 if (src == shdr->contents)
690 {
691 dest->flags = idx;
b885599b
AM
692 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
693 shdr->bfd_section->flags
694 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
695 break;
696 }
697 if (idx >= shnum)
698 {
4eca0228
AM
699 _bfd_error_handler
700 (_("%B: invalid SHT_GROUP entry"), abfd);
dbb410c3
AM
701 idx = 0;
702 }
703 dest->shdr = elf_elfsections (abfd)[idx];
704 }
705 }
706 }
493a3386
NC
707
708 /* PR 17510: Corrupt binaries might contain invalid groups. */
709 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
710 {
711 elf_tdata (abfd)->num_group = num_group;
712
713 /* If all groups are invalid then fail. */
714 if (num_group == 0)
715 {
716 elf_tdata (abfd)->group_sect_ptr = NULL;
717 elf_tdata (abfd)->num_group = num_group = -1;
4eca0228
AM
718 _bfd_error_handler
719 (_("%B: no valid group sections found"), abfd);
493a3386
NC
720 bfd_set_error (bfd_error_bad_value);
721 }
722 }
dbb410c3
AM
723 }
724 }
725
726 if (num_group != (unsigned) -1)
727 {
728 unsigned int i;
729
730 for (i = 0; i < num_group; i++)
731 {
732 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
733 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
734 unsigned int n_elt = shdr->sh_size / 4;
735
736 /* Look through this group's sections to see if current
737 section is a member. */
738 while (--n_elt != 0)
739 if ((++idx)->shdr == hdr)
740 {
e0e8c97f 741 asection *s = NULL;
dbb410c3
AM
742
743 /* We are a member of this group. Go looking through
744 other members to see if any others are linked via
745 next_in_group. */
746 idx = (Elf_Internal_Group *) shdr->contents;
747 n_elt = shdr->sh_size / 4;
748 while (--n_elt != 0)
749 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 750 && elf_next_in_group (s) != NULL)
dbb410c3
AM
751 break;
752 if (n_elt != 0)
753 {
dbb410c3
AM
754 /* Snarf the group name from other member, and
755 insert current section in circular list. */
945906ff
AM
756 elf_group_name (newsect) = elf_group_name (s);
757 elf_next_in_group (newsect) = elf_next_in_group (s);
758 elf_next_in_group (s) = newsect;
dbb410c3
AM
759 }
760 else
761 {
dbb410c3
AM
762 const char *gname;
763
b885599b
AM
764 gname = group_signature (abfd, shdr);
765 if (gname == NULL)
b34976b6 766 return FALSE;
945906ff 767 elf_group_name (newsect) = gname;
dbb410c3
AM
768
769 /* Start a circular list with one element. */
945906ff 770 elf_next_in_group (newsect) = newsect;
dbb410c3 771 }
b885599b 772
9dce4196
AM
773 /* If the group section has been created, point to the
774 new member. */
dbb410c3 775 if (shdr->bfd_section != NULL)
945906ff 776 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 777
dbb410c3
AM
778 i = num_group - 1;
779 break;
780 }
781 }
782 }
783
945906ff 784 if (elf_group_name (newsect) == NULL)
dbb410c3 785 {
695344c0 786 /* xgettext:c-format */
4eca0228
AM
787 _bfd_error_handler (_("%B: no group info for section %A"),
788 abfd, newsect);
493a3386 789 return FALSE;
dbb410c3 790 }
b34976b6 791 return TRUE;
dbb410c3
AM
792}
793
3d7f7666 794bfd_boolean
dd863624 795_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
796{
797 unsigned int i;
798 unsigned int num_group = elf_tdata (abfd)->num_group;
799 bfd_boolean result = TRUE;
dd863624
L
800 asection *s;
801
802 /* Process SHF_LINK_ORDER. */
803 for (s = abfd->sections; s != NULL; s = s->next)
804 {
805 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
806 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
807 {
808 unsigned int elfsec = this_hdr->sh_link;
809 /* FIXME: The old Intel compiler and old strip/objcopy may
810 not set the sh_link or sh_info fields. Hence we could
811 get the situation where elfsec is 0. */
812 if (elfsec == 0)
813 {
4fbb74a6 814 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
815 if (bed->link_order_error_handler)
816 bed->link_order_error_handler
695344c0 817 /* xgettext:c-format */
dd863624
L
818 (_("%B: warning: sh_link not set for section `%A'"),
819 abfd, s);
820 }
821 else
822 {
91d6fa6a 823 asection *linksec = NULL;
25bbc984 824
4fbb74a6
AM
825 if (elfsec < elf_numsections (abfd))
826 {
827 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 828 linksec = this_hdr->bfd_section;
4fbb74a6 829 }
25bbc984
L
830
831 /* PR 1991, 2008:
832 Some strip/objcopy may leave an incorrect value in
833 sh_link. We don't want to proceed. */
91d6fa6a 834 if (linksec == NULL)
25bbc984 835 {
4eca0228 836 _bfd_error_handler
695344c0 837 /* xgettext:c-format */
25bbc984
L
838 (_("%B: sh_link [%d] in section `%A' is incorrect"),
839 s->owner, s, elfsec);
840 result = FALSE;
841 }
842
91d6fa6a 843 elf_linked_to_section (s) = linksec;
dd863624
L
844 }
845 }
53720c49
AM
846 else if (this_hdr->sh_type == SHT_GROUP
847 && elf_next_in_group (s) == NULL)
848 {
4eca0228 849 _bfd_error_handler
695344c0 850 /* xgettext:c-format */
53720c49
AM
851 (_("%B: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
852 abfd, elf_section_data (s)->this_idx);
853 result = FALSE;
854 }
dd863624 855 }
3d7f7666 856
dd863624 857 /* Process section groups. */
3d7f7666
L
858 if (num_group == (unsigned) -1)
859 return result;
860
861 for (i = 0; i < num_group; i++)
862 {
863 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
4b0e8a5f
NC
864 Elf_Internal_Group *idx;
865 unsigned int n_elt;
3d7f7666 866
4b0e8a5f
NC
867 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
868 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
869 {
4eca0228 870 _bfd_error_handler
695344c0 871 /* xgettext:c-format */
4b0e8a5f
NC
872 (_("%B: section group entry number %u is corrupt"),
873 abfd, i);
874 result = FALSE;
875 continue;
876 }
877
878 idx = (Elf_Internal_Group *) shdr->contents;
879 n_elt = shdr->sh_size / 4;
1b786873 880
3d7f7666
L
881 while (--n_elt != 0)
882 if ((++idx)->shdr->bfd_section)
883 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
884 else if (idx->shdr->sh_type == SHT_RELA
885 || idx->shdr->sh_type == SHT_REL)
886 /* We won't include relocation sections in section groups in
887 output object files. We adjust the group section size here
888 so that relocatable link will work correctly when
889 relocation sections are in section group in input object
890 files. */
891 shdr->bfd_section->size -= 4;
892 else
893 {
894 /* There are some unknown sections in the group. */
4eca0228 895 _bfd_error_handler
695344c0 896 /* xgettext:c-format */
d003868e
AM
897 (_("%B: unknown [%d] section `%s' in group [%s]"),
898 abfd,
3d7f7666 899 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
900 bfd_elf_string_from_elf_section (abfd,
901 (elf_elfheader (abfd)
902 ->e_shstrndx),
903 idx->shdr->sh_name),
3d7f7666
L
904 shdr->bfd_section->name);
905 result = FALSE;
906 }
907 }
908 return result;
909}
910
72adc230
AM
911bfd_boolean
912bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
913{
914 return elf_next_in_group (sec) != NULL;
915}
916
f6fe1ccd
L
917static char *
918convert_debug_to_zdebug (bfd *abfd, const char *name)
919{
920 unsigned int len = strlen (name);
921 char *new_name = bfd_alloc (abfd, len + 2);
922 if (new_name == NULL)
923 return NULL;
924 new_name[0] = '.';
925 new_name[1] = 'z';
926 memcpy (new_name + 2, name + 1, len);
927 return new_name;
928}
929
930static char *
931convert_zdebug_to_debug (bfd *abfd, const char *name)
932{
933 unsigned int len = strlen (name);
934 char *new_name = bfd_alloc (abfd, len);
935 if (new_name == NULL)
936 return NULL;
937 new_name[0] = '.';
938 memcpy (new_name + 1, name + 2, len - 1);
939 return new_name;
940}
941
252b5132
RH
942/* Make a BFD section from an ELF section. We store a pointer to the
943 BFD section in the bfd_section field of the header. */
944
b34976b6 945bfd_boolean
217aa764
AM
946_bfd_elf_make_section_from_shdr (bfd *abfd,
947 Elf_Internal_Shdr *hdr,
6dc132d9
L
948 const char *name,
949 int shindex)
252b5132
RH
950{
951 asection *newsect;
952 flagword flags;
9c5bfbb7 953 const struct elf_backend_data *bed;
252b5132
RH
954
955 if (hdr->bfd_section != NULL)
4e011fb5 956 return TRUE;
252b5132
RH
957
958 newsect = bfd_make_section_anyway (abfd, name);
959 if (newsect == NULL)
b34976b6 960 return FALSE;
252b5132 961
1829f4b2
AM
962 hdr->bfd_section = newsect;
963 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 964 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 965
2f89ff8d
L
966 /* Always use the real type/flags. */
967 elf_section_type (newsect) = hdr->sh_type;
968 elf_section_flags (newsect) = hdr->sh_flags;
969
252b5132
RH
970 newsect->filepos = hdr->sh_offset;
971
972 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
973 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
974 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 975 bfd_log2 (hdr->sh_addralign)))
b34976b6 976 return FALSE;
252b5132
RH
977
978 flags = SEC_NO_FLAGS;
979 if (hdr->sh_type != SHT_NOBITS)
980 flags |= SEC_HAS_CONTENTS;
dbb410c3 981 if (hdr->sh_type == SHT_GROUP)
b3096250 982 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
983 if ((hdr->sh_flags & SHF_ALLOC) != 0)
984 {
985 flags |= SEC_ALLOC;
986 if (hdr->sh_type != SHT_NOBITS)
987 flags |= SEC_LOAD;
988 }
989 if ((hdr->sh_flags & SHF_WRITE) == 0)
990 flags |= SEC_READONLY;
991 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
992 flags |= SEC_CODE;
993 else if ((flags & SEC_LOAD) != 0)
994 flags |= SEC_DATA;
f5fa8ca2
JJ
995 if ((hdr->sh_flags & SHF_MERGE) != 0)
996 {
997 flags |= SEC_MERGE;
998 newsect->entsize = hdr->sh_entsize;
f5fa8ca2 999 }
84865015
NC
1000 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1001 flags |= SEC_STRINGS;
dbb410c3
AM
1002 if (hdr->sh_flags & SHF_GROUP)
1003 if (!setup_group (abfd, hdr, newsect))
b34976b6 1004 return FALSE;
13ae64f3
JJ
1005 if ((hdr->sh_flags & SHF_TLS) != 0)
1006 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
1007 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1008 flags |= SEC_EXCLUDE;
252b5132 1009
3d2b39cf 1010 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 1011 {
3d2b39cf
L
1012 /* The debugging sections appear to be recognized only by name,
1013 not any sort of flag. Their SEC_ALLOC bits are cleared. */
3d2b39cf
L
1014 if (name [0] == '.')
1015 {
f073ced3
AM
1016 const char *p;
1017 int n;
1018 if (name[1] == 'd')
1019 p = ".debug", n = 6;
1020 else if (name[1] == 'g' && name[2] == 'n')
1021 p = ".gnu.linkonce.wi.", n = 17;
1022 else if (name[1] == 'g' && name[2] == 'd')
1023 p = ".gdb_index", n = 11; /* yes we really do mean 11. */
1024 else if (name[1] == 'l')
1025 p = ".line", n = 5;
1026 else if (name[1] == 's')
1027 p = ".stab", n = 5;
1028 else if (name[1] == 'z')
1029 p = ".zdebug", n = 7;
1030 else
1031 p = NULL, n = 0;
1032 if (p != NULL && strncmp (name, p, n) == 0)
3d2b39cf
L
1033 flags |= SEC_DEBUGGING;
1034 }
1035 }
252b5132
RH
1036
1037 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1038 only link a single copy of the section. This is used to support
1039 g++. g++ will emit each template expansion in its own section.
1040 The symbols will be defined as weak, so that multiple definitions
1041 are permitted. The GNU linker extension is to actually discard
1042 all but one of the sections. */
0112cd26 1043 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 1044 && elf_next_in_group (newsect) == NULL)
252b5132
RH
1045 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1046
fa152c49
JW
1047 bed = get_elf_backend_data (abfd);
1048 if (bed->elf_backend_section_flags)
1049 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 1050 return FALSE;
fa152c49 1051
252b5132 1052 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 1053 return FALSE;
252b5132 1054
718175fa
JK
1055 /* We do not parse the PT_NOTE segments as we are interested even in the
1056 separate debug info files which may have the segments offsets corrupted.
1057 PT_NOTEs from the core files are currently not parsed using BFD. */
1058 if (hdr->sh_type == SHT_NOTE)
1059 {
baea7ef1 1060 bfd_byte *contents;
718175fa 1061
baea7ef1 1062 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
1063 return FALSE;
1064
baea7ef1 1065 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
1066 free (contents);
1067 }
1068
252b5132
RH
1069 if ((flags & SEC_ALLOC) != 0)
1070 {
1071 Elf_Internal_Phdr *phdr;
6ffd7900
AM
1072 unsigned int i, nload;
1073
1074 /* Some ELF linkers produce binaries with all the program header
1075 p_paddr fields zero. If we have such a binary with more than
1076 one PT_LOAD header, then leave the section lma equal to vma
1077 so that we don't create sections with overlapping lma. */
1078 phdr = elf_tdata (abfd)->phdr;
1079 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1080 if (phdr->p_paddr != 0)
1081 break;
1082 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1083 ++nload;
1084 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1085 return TRUE;
252b5132 1086
252b5132
RH
1087 phdr = elf_tdata (abfd)->phdr;
1088 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1089 {
86b2281f
AM
1090 if (((phdr->p_type == PT_LOAD
1091 && (hdr->sh_flags & SHF_TLS) == 0)
1092 || phdr->p_type == PT_TLS)
9a83a553 1093 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 1094 {
88967714
AM
1095 if ((flags & SEC_LOAD) == 0)
1096 newsect->lma = (phdr->p_paddr
1097 + hdr->sh_addr - phdr->p_vaddr);
1098 else
1099 /* We used to use the same adjustment for SEC_LOAD
1100 sections, but that doesn't work if the segment
1101 is packed with code from multiple VMAs.
1102 Instead we calculate the section LMA based on
1103 the segment LMA. It is assumed that the
1104 segment will contain sections with contiguous
1105 LMAs, even if the VMAs are not. */
1106 newsect->lma = (phdr->p_paddr
1107 + hdr->sh_offset - phdr->p_offset);
1108
1109 /* With contiguous segments, we can't tell from file
1110 offsets whether a section with zero size should
1111 be placed at the end of one segment or the
1112 beginning of the next. Decide based on vaddr. */
1113 if (hdr->sh_addr >= phdr->p_vaddr
1114 && (hdr->sh_addr + hdr->sh_size
1115 <= phdr->p_vaddr + phdr->p_memsz))
1116 break;
252b5132
RH
1117 }
1118 }
1119 }
1120
4a114e3e
L
1121 /* Compress/decompress DWARF debug sections with names: .debug_* and
1122 .zdebug_*, after the section flags is set. */
1123 if ((flags & SEC_DEBUGGING)
1124 && ((name[1] == 'd' && name[6] == '_')
1125 || (name[1] == 'z' && name[7] == '_')))
1126 {
1127 enum { nothing, compress, decompress } action = nothing;
151411f8 1128 int compression_header_size;
dab394de 1129 bfd_size_type uncompressed_size;
151411f8
L
1130 bfd_boolean compressed
1131 = bfd_is_section_compressed_with_header (abfd, newsect,
dab394de
L
1132 &compression_header_size,
1133 &uncompressed_size);
4a114e3e 1134
151411f8 1135 if (compressed)
4a114e3e
L
1136 {
1137 /* Compressed section. Check if we should decompress. */
1138 if ((abfd->flags & BFD_DECOMPRESS))
1139 action = decompress;
1140 }
151411f8
L
1141
1142 /* Compress the uncompressed section or convert from/to .zdebug*
1143 section. Check if we should compress. */
1144 if (action == nothing)
4a114e3e 1145 {
151411f8
L
1146 if (newsect->size != 0
1147 && (abfd->flags & BFD_COMPRESS)
1148 && compression_header_size >= 0
dab394de 1149 && uncompressed_size > 0
151411f8
L
1150 && (!compressed
1151 || ((compression_header_size > 0)
1152 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
4a114e3e 1153 action = compress;
151411f8
L
1154 else
1155 return TRUE;
4a114e3e
L
1156 }
1157
151411f8 1158 if (action == compress)
4a114e3e 1159 {
4a114e3e
L
1160 if (!bfd_init_section_compress_status (abfd, newsect))
1161 {
4eca0228 1162 _bfd_error_handler
695344c0 1163 /* xgettext:c-format */
bc823199 1164 (_("%B: unable to initialize compress status for section %s"),
4a114e3e
L
1165 abfd, name);
1166 return FALSE;
1167 }
151411f8
L
1168 }
1169 else
1170 {
4a114e3e
L
1171 if (!bfd_init_section_decompress_status (abfd, newsect))
1172 {
4eca0228 1173 _bfd_error_handler
695344c0 1174 /* xgettext:c-format */
bc823199 1175 (_("%B: unable to initialize decompress status for section %s"),
4a114e3e
L
1176 abfd, name);
1177 return FALSE;
1178 }
151411f8
L
1179 }
1180
f6fe1ccd 1181 if (abfd->is_linker_input)
151411f8 1182 {
f6fe1ccd
L
1183 if (name[1] == 'z'
1184 && (action == decompress
1185 || (action == compress
1186 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
4e011fb5 1187 {
f6fe1ccd
L
1188 /* Convert section name from .zdebug_* to .debug_* so
1189 that linker will consider this section as a debug
1190 section. */
1191 char *new_name = convert_zdebug_to_debug (abfd, name);
151411f8
L
1192 if (new_name == NULL)
1193 return FALSE;
f6fe1ccd 1194 bfd_rename_section (abfd, newsect, new_name);
151411f8 1195 }
4a114e3e 1196 }
f6fe1ccd
L
1197 else
1198 /* For objdump, don't rename the section. For objcopy, delay
1199 section rename to elf_fake_sections. */
1200 newsect->flags |= SEC_ELF_RENAME;
4a114e3e
L
1201 }
1202
b34976b6 1203 return TRUE;
252b5132
RH
1204}
1205
84865015
NC
1206const char *const bfd_elf_section_type_names[] =
1207{
252b5132
RH
1208 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1209 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1210 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1211};
1212
1049f94e 1213/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1214 output, and the reloc is against an external symbol, and nothing
1215 has given us any additional addend, the resulting reloc will also
1216 be against the same symbol. In such a case, we don't want to
1217 change anything about the way the reloc is handled, since it will
1218 all be done at final link time. Rather than put special case code
1219 into bfd_perform_relocation, all the reloc types use this howto
1220 function. It just short circuits the reloc if producing
1049f94e 1221 relocatable output against an external symbol. */
252b5132 1222
252b5132 1223bfd_reloc_status_type
217aa764
AM
1224bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1225 arelent *reloc_entry,
1226 asymbol *symbol,
1227 void *data ATTRIBUTE_UNUSED,
1228 asection *input_section,
1229 bfd *output_bfd,
1230 char **error_message ATTRIBUTE_UNUSED)
1231{
1232 if (output_bfd != NULL
252b5132
RH
1233 && (symbol->flags & BSF_SECTION_SYM) == 0
1234 && (! reloc_entry->howto->partial_inplace
1235 || reloc_entry->addend == 0))
1236 {
1237 reloc_entry->address += input_section->output_offset;
1238 return bfd_reloc_ok;
1239 }
1240
1241 return bfd_reloc_continue;
1242}
1243\f
84865015
NC
1244/* Returns TRUE if section A matches section B.
1245 Names, addresses and links may be different, but everything else
1246 should be the same. */
1247
1248static bfd_boolean
5522f910
NC
1249section_match (const Elf_Internal_Shdr * a,
1250 const Elf_Internal_Shdr * b)
84865015
NC
1251{
1252 return
1253 a->sh_type == b->sh_type
5522f910
NC
1254 && (a->sh_flags & ~ SHF_INFO_LINK)
1255 == (b->sh_flags & ~ SHF_INFO_LINK)
84865015
NC
1256 && a->sh_addralign == b->sh_addralign
1257 && a->sh_size == b->sh_size
1258 && a->sh_entsize == b->sh_entsize
1259 /* FIXME: Check sh_addr ? */
1260 ;
1261}
1262
1263/* Find a section in OBFD that has the same characteristics
1264 as IHEADER. Return the index of this section or SHN_UNDEF if
1265 none can be found. Check's section HINT first, as this is likely
1266 to be the correct section. */
1267
1268static unsigned int
5522f910 1269find_link (const bfd * obfd, const Elf_Internal_Shdr * iheader, const unsigned int hint)
84865015
NC
1270{
1271 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1272 unsigned int i;
1273
1274 if (section_match (oheaders[hint], iheader))
1275 return hint;
1276
1277 for (i = 1; i < elf_numsections (obfd); i++)
1278 {
1279 Elf_Internal_Shdr * oheader = oheaders[i];
1280
1281 if (section_match (oheader, iheader))
1282 /* FIXME: Do we care if there is a potential for
1283 multiple matches ? */
1284 return i;
1285 }
1286
1287 return SHN_UNDEF;
1288}
1289
5522f910
NC
1290/* PR 19938: Attempt to set the ELF section header fields of an OS or
1291 Processor specific section, based upon a matching input section.
1292 Returns TRUE upon success, FALSE otherwise. */
1293
1294static bfd_boolean
1295copy_special_section_fields (const bfd *ibfd,
1296 bfd *obfd,
1297 const Elf_Internal_Shdr *iheader,
1298 Elf_Internal_Shdr *oheader,
1299 const unsigned int secnum)
1300{
1301 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1302 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1303 bfd_boolean changed = FALSE;
1304 unsigned int sh_link;
1305
1306 if (oheader->sh_type == SHT_NOBITS)
1307 {
1308 /* This is a feature for objcopy --only-keep-debug:
1309 When a section's type is changed to NOBITS, we preserve
1310 the sh_link and sh_info fields so that they can be
1311 matched up with the original.
1312
1313 Note: Strictly speaking these assignments are wrong.
1314 The sh_link and sh_info fields should point to the
1315 relevent sections in the output BFD, which may not be in
1316 the same location as they were in the input BFD. But
1317 the whole point of this action is to preserve the
1318 original values of the sh_link and sh_info fields, so
1319 that they can be matched up with the section headers in
1320 the original file. So strictly speaking we may be
1321 creating an invalid ELF file, but it is only for a file
1322 that just contains debug info and only for sections
1323 without any contents. */
1324 if (oheader->sh_link == 0)
1325 oheader->sh_link = iheader->sh_link;
1326 if (oheader->sh_info == 0)
1327 oheader->sh_info = iheader->sh_info;
1328 return TRUE;
1329 }
1330
1331 /* Allow the target a chance to decide how these fields should be set. */
1332 if (bed->elf_backend_copy_special_section_fields != NULL
1333 && bed->elf_backend_copy_special_section_fields
1334 (ibfd, obfd, iheader, oheader))
1335 return TRUE;
1336
1337 /* We have an iheader which might match oheader, and which has non-zero
1338 sh_info and/or sh_link fields. Attempt to follow those links and find
1339 the section in the output bfd which corresponds to the linked section
1340 in the input bfd. */
1341 if (iheader->sh_link != SHN_UNDEF)
1342 {
1343 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1344 if (sh_link != SHN_UNDEF)
1345 {
1346 oheader->sh_link = sh_link;
1347 changed = TRUE;
1348 }
1349 else
1350 /* FIXME: Should we install iheader->sh_link
1351 if we could not find a match ? */
1352 (* _bfd_error_handler)
695344c0 1353 /* xgettext:c-format */
5522f910
NC
1354 (_("%B: Failed to find link section for section %d"), obfd, secnum);
1355 }
1356
1357 if (iheader->sh_info)
1358 {
1359 /* The sh_info field can hold arbitrary information, but if the
1360 SHF_LINK_INFO flag is set then it should be interpreted as a
1361 section index. */
1362 if (iheader->sh_flags & SHF_INFO_LINK)
1363 {
1364 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1365 iheader->sh_info);
1366 if (sh_link != SHN_UNDEF)
1367 oheader->sh_flags |= SHF_INFO_LINK;
1368 }
1369 else
1370 /* No idea what it means - just copy it. */
1371 sh_link = iheader->sh_info;
1372
1373 if (sh_link != SHN_UNDEF)
1374 {
1375 oheader->sh_info = sh_link;
1376 changed = TRUE;
1377 }
1378 else
1379 (* _bfd_error_handler)
695344c0 1380 /* xgettext:c-format */
5522f910
NC
1381 (_("%B: Failed to find info section for section %d"), obfd, secnum);
1382 }
1383
1384 return changed;
1385}
1386
0ac4564e
L
1387/* Copy the program header and other data from one object module to
1388 another. */
252b5132 1389
b34976b6 1390bfd_boolean
217aa764 1391_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050 1392{
5522f910
NC
1393 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1394 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1395 const struct elf_backend_data *bed;
84865015
NC
1396 unsigned int i;
1397
2d502050 1398 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
84865015 1399 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1400 return TRUE;
2d502050 1401
57b828ef
L
1402 if (!elf_flags_init (obfd))
1403 {
1404 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1405 elf_flags_init (obfd) = TRUE;
1406 }
2d502050 1407
0ac4564e 1408 elf_gp (obfd) = elf_gp (ibfd);
57b828ef
L
1409
1410 /* Also copy the EI_OSABI field. */
1411 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1412 elf_elfheader (ibfd)->e_ident[EI_OSABI];
104d59d1 1413
5522f910
NC
1414 /* If set, copy the EI_ABIVERSION field. */
1415 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1416 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1417 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
1418
104d59d1
JM
1419 /* Copy object attributes. */
1420 _bfd_elf_copy_obj_attributes (ibfd, obfd);
63b9bbb7 1421
84865015
NC
1422 if (iheaders == NULL || oheaders == NULL)
1423 return TRUE;
63b9bbb7 1424
5522f910
NC
1425 bed = get_elf_backend_data (obfd);
1426
1427 /* Possibly copy other fields in the section header. */
84865015 1428 for (i = 1; i < elf_numsections (obfd); i++)
63b9bbb7 1429 {
84865015
NC
1430 unsigned int j;
1431 Elf_Internal_Shdr * oheader = oheaders[i];
63b9bbb7 1432
5522f910
NC
1433 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1434 because of a special case need for generating separate debug info
1435 files. See below for more details. */
84865015
NC
1436 if (oheader == NULL
1437 || (oheader->sh_type != SHT_NOBITS
5522f910
NC
1438 && oheader->sh_type < SHT_LOOS))
1439 continue;
1440
1441 /* Ignore empty sections, and sections whose
1442 fields have already been initialised. */
1443 if (oheader->sh_size == 0
84865015
NC
1444 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1445 continue;
63b9bbb7 1446
84865015 1447 /* Scan for the matching section in the input bfd.
5522f910
NC
1448 First we try for a direct mapping between the input and output sections. */
1449 for (j = 1; j < elf_numsections (ibfd); j++)
1450 {
1451 const Elf_Internal_Shdr * iheader = iheaders[j];
1452
1453 if (iheader == NULL)
1454 continue;
1455
1456 if (oheader->bfd_section != NULL
1457 && iheader->bfd_section != NULL
1458 && iheader->bfd_section->output_section != NULL
1459 && iheader->bfd_section->output_section == oheader->bfd_section)
1460 {
1461 /* We have found a connection from the input section to the
1462 output section. Attempt to copy the header fields. If
1463 this fails then do not try any further sections - there
1464 should only be a one-to-one mapping between input and output. */
1465 if (! copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1466 j = elf_numsections (ibfd);
1467 break;
1468 }
1469 }
1470
1471 if (j < elf_numsections (ibfd))
1472 continue;
1473
1474 /* That failed. So try to deduce the corresponding input section.
84865015
NC
1475 Unfortunately we cannot compare names as the output string table
1476 is empty, so instead we check size, address and type. */
1477 for (j = 1; j < elf_numsections (ibfd); j++)
1478 {
5522f910 1479 const Elf_Internal_Shdr * iheader = iheaders[j];
84865015 1480
5522f910
NC
1481 if (iheader == NULL)
1482 continue;
1483
1484 /* Try matching fields in the input section's header.
1485 Since --only-keep-debug turns all non-debug sections into
84865015
NC
1486 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1487 input type. */
1488 if ((oheader->sh_type == SHT_NOBITS
1489 || iheader->sh_type == oheader->sh_type)
5522f910
NC
1490 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1491 == (oheader->sh_flags & ~ SHF_INFO_LINK)
84865015
NC
1492 && iheader->sh_addralign == oheader->sh_addralign
1493 && iheader->sh_entsize == oheader->sh_entsize
1494 && iheader->sh_size == oheader->sh_size
1495 && iheader->sh_addr == oheader->sh_addr
1496 && (iheader->sh_info != oheader->sh_info
1497 || iheader->sh_link != oheader->sh_link))
63b9bbb7 1498 {
5522f910
NC
1499 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1500 break;
63b9bbb7
NC
1501 }
1502 }
5522f910
NC
1503
1504 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1505 {
1506 /* Final attempt. Call the backend copy function
1507 with a NULL input section. */
1508 if (bed->elf_backend_copy_special_section_fields != NULL)
1509 bed->elf_backend_copy_special_section_fields (ibfd, obfd, NULL, oheader);
1510 }
63b9bbb7
NC
1511 }
1512
b34976b6 1513 return TRUE;
2d502050
L
1514}
1515
cedc298e
L
1516static const char *
1517get_segment_type (unsigned int p_type)
1518{
1519 const char *pt;
1520 switch (p_type)
1521 {
1522 case PT_NULL: pt = "NULL"; break;
1523 case PT_LOAD: pt = "LOAD"; break;
1524 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1525 case PT_INTERP: pt = "INTERP"; break;
1526 case PT_NOTE: pt = "NOTE"; break;
1527 case PT_SHLIB: pt = "SHLIB"; break;
1528 case PT_PHDR: pt = "PHDR"; break;
1529 case PT_TLS: pt = "TLS"; break;
1530 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1531 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1532 case PT_GNU_RELRO: pt = "RELRO"; break;
1533 default: pt = NULL; break;
1534 }
1535 return pt;
1536}
1537
f0b79d91
L
1538/* Print out the program headers. */
1539
b34976b6 1540bfd_boolean
217aa764 1541_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1542{
a50b1753 1543 FILE *f = (FILE *) farg;
252b5132
RH
1544 Elf_Internal_Phdr *p;
1545 asection *s;
1546 bfd_byte *dynbuf = NULL;
1547
1548 p = elf_tdata (abfd)->phdr;
1549 if (p != NULL)
1550 {
1551 unsigned int i, c;
1552
1553 fprintf (f, _("\nProgram Header:\n"));
1554 c = elf_elfheader (abfd)->e_phnum;
1555 for (i = 0; i < c; i++, p++)
1556 {
cedc298e 1557 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1558 char buf[20];
1559
cedc298e 1560 if (pt == NULL)
252b5132 1561 {
cedc298e
L
1562 sprintf (buf, "0x%lx", p->p_type);
1563 pt = buf;
252b5132 1564 }
dc810e39 1565 fprintf (f, "%8s off 0x", pt);
60b89a18 1566 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1567 fprintf (f, " vaddr 0x");
60b89a18 1568 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1569 fprintf (f, " paddr 0x");
60b89a18 1570 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1571 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1572 fprintf (f, " filesz 0x");
60b89a18 1573 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1574 fprintf (f, " memsz 0x");
60b89a18 1575 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1576 fprintf (f, " flags %c%c%c",
1577 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1578 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1579 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1580 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1581 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1582 fprintf (f, "\n");
1583 }
1584 }
1585
1586 s = bfd_get_section_by_name (abfd, ".dynamic");
1587 if (s != NULL)
1588 {
cb33740c 1589 unsigned int elfsec;
dc810e39 1590 unsigned long shlink;
252b5132
RH
1591 bfd_byte *extdyn, *extdynend;
1592 size_t extdynsize;
217aa764 1593 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1594
1595 fprintf (f, _("\nDynamic Section:\n"));
1596
eea6121a 1597 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1598 goto error_return;
1599
1600 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1601 if (elfsec == SHN_BAD)
252b5132 1602 goto error_return;
dc810e39 1603 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1604
1605 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1606 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1607
1608 extdyn = dynbuf;
06614111
NC
1609 /* PR 17512: file: 6f427532. */
1610 if (s->size < extdynsize)
1611 goto error_return;
eea6121a 1612 extdynend = extdyn + s->size;
1036838a
NC
1613 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1614 Fix range check. */
1615 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
252b5132
RH
1616 {
1617 Elf_Internal_Dyn dyn;
ad9563d6 1618 const char *name = "";
252b5132 1619 char ab[20];
b34976b6 1620 bfd_boolean stringp;
ad9563d6 1621 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1622
217aa764 1623 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1624
1625 if (dyn.d_tag == DT_NULL)
1626 break;
1627
b34976b6 1628 stringp = FALSE;
252b5132
RH
1629 switch (dyn.d_tag)
1630 {
1631 default:
ad9563d6
CM
1632 if (bed->elf_backend_get_target_dtag)
1633 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1634
1635 if (!strcmp (name, ""))
1636 {
1637 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1638 name = ab;
1639 }
252b5132
RH
1640 break;
1641
b34976b6 1642 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1643 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1644 case DT_PLTGOT: name = "PLTGOT"; break;
1645 case DT_HASH: name = "HASH"; break;
1646 case DT_STRTAB: name = "STRTAB"; break;
1647 case DT_SYMTAB: name = "SYMTAB"; break;
1648 case DT_RELA: name = "RELA"; break;
1649 case DT_RELASZ: name = "RELASZ"; break;
1650 case DT_RELAENT: name = "RELAENT"; break;
1651 case DT_STRSZ: name = "STRSZ"; break;
1652 case DT_SYMENT: name = "SYMENT"; break;
1653 case DT_INIT: name = "INIT"; break;
1654 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1655 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1656 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1657 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1658 case DT_REL: name = "REL"; break;
1659 case DT_RELSZ: name = "RELSZ"; break;
1660 case DT_RELENT: name = "RELENT"; break;
1661 case DT_PLTREL: name = "PLTREL"; break;
1662 case DT_DEBUG: name = "DEBUG"; break;
1663 case DT_TEXTREL: name = "TEXTREL"; break;
1664 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1665 case DT_BIND_NOW: name = "BIND_NOW"; break;
1666 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1667 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1668 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1669 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1670 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1671 case DT_FLAGS: name = "FLAGS"; break;
1672 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1673 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1674 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1675 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1676 case DT_MOVEENT: name = "MOVEENT"; break;
1677 case DT_MOVESZ: name = "MOVESZ"; break;
1678 case DT_FEATURE: name = "FEATURE"; break;
1679 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1680 case DT_SYMINSZ: name = "SYMINSZ"; break;
1681 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1682 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1683 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1684 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1685 case DT_PLTPAD: name = "PLTPAD"; break;
1686 case DT_MOVETAB: name = "MOVETAB"; break;
1687 case DT_SYMINFO: name = "SYMINFO"; break;
1688 case DT_RELACOUNT: name = "RELACOUNT"; break;
1689 case DT_RELCOUNT: name = "RELCOUNT"; break;
1690 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1691 case DT_VERSYM: name = "VERSYM"; break;
1692 case DT_VERDEF: name = "VERDEF"; break;
1693 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1694 case DT_VERNEED: name = "VERNEED"; break;
1695 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1696 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1697 case DT_USED: name = "USED"; break;
b34976b6 1698 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1699 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1700 }
1701
ad9563d6 1702 fprintf (f, " %-20s ", name);
252b5132 1703 if (! stringp)
a1f3c56e
AN
1704 {
1705 fprintf (f, "0x");
1706 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1707 }
252b5132
RH
1708 else
1709 {
1710 const char *string;
dc810e39 1711 unsigned int tagv = dyn.d_un.d_val;
252b5132 1712
dc810e39 1713 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1714 if (string == NULL)
1715 goto error_return;
1716 fprintf (f, "%s", string);
1717 }
1718 fprintf (f, "\n");
1719 }
1720
1721 free (dynbuf);
1722 dynbuf = NULL;
1723 }
1724
1725 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1726 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1727 {
fc0e6df6 1728 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1729 return FALSE;
252b5132
RH
1730 }
1731
1732 if (elf_dynverdef (abfd) != 0)
1733 {
1734 Elf_Internal_Verdef *t;
1735
1736 fprintf (f, _("\nVersion definitions:\n"));
1737 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1738 {
1739 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1740 t->vd_flags, t->vd_hash,
1741 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1742 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1743 {
1744 Elf_Internal_Verdaux *a;
1745
1746 fprintf (f, "\t");
1747 for (a = t->vd_auxptr->vda_nextptr;
1748 a != NULL;
1749 a = a->vda_nextptr)
d0fb9a8d
JJ
1750 fprintf (f, "%s ",
1751 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1752 fprintf (f, "\n");
1753 }
1754 }
1755 }
1756
1757 if (elf_dynverref (abfd) != 0)
1758 {
1759 Elf_Internal_Verneed *t;
1760
1761 fprintf (f, _("\nVersion References:\n"));
1762 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1763 {
1764 Elf_Internal_Vernaux *a;
1765
d0fb9a8d
JJ
1766 fprintf (f, _(" required from %s:\n"),
1767 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1768 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1769 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1770 a->vna_flags, a->vna_other,
1771 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1772 }
1773 }
1774
b34976b6 1775 return TRUE;
252b5132
RH
1776
1777 error_return:
1778 if (dynbuf != NULL)
1779 free (dynbuf);
b34976b6 1780 return FALSE;
252b5132
RH
1781}
1782
bb4d2ac2
L
1783/* Get version string. */
1784
1785const char *
60bb06bc
L
1786_bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1787 bfd_boolean *hidden)
bb4d2ac2
L
1788{
1789 const char *version_string = NULL;
1790 if (elf_dynversym (abfd) != 0
1791 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1792 {
1793 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1794
1795 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1796 vernum &= VERSYM_VERSION;
1797
1798 if (vernum == 0)
1799 version_string = "";
1800 else if (vernum == 1)
1801 version_string = "Base";
1802 else if (vernum <= elf_tdata (abfd)->cverdefs)
1803 version_string =
1804 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1805 else
1806 {
1807 Elf_Internal_Verneed *t;
1808
1809 version_string = "";
1810 for (t = elf_tdata (abfd)->verref;
1811 t != NULL;
1812 t = t->vn_nextref)
1813 {
1814 Elf_Internal_Vernaux *a;
1815
1816 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1817 {
1818 if (a->vna_other == vernum)
1819 {
1820 version_string = a->vna_nodename;
1821 break;
1822 }
1823 }
1824 }
1825 }
1826 }
1827 return version_string;
1828}
1829
252b5132
RH
1830/* Display ELF-specific fields of a symbol. */
1831
1832void
217aa764
AM
1833bfd_elf_print_symbol (bfd *abfd,
1834 void *filep,
1835 asymbol *symbol,
1836 bfd_print_symbol_type how)
252b5132 1837{
a50b1753 1838 FILE *file = (FILE *) filep;
252b5132
RH
1839 switch (how)
1840 {
1841 case bfd_print_symbol_name:
1842 fprintf (file, "%s", symbol->name);
1843 break;
1844 case bfd_print_symbol_more:
1845 fprintf (file, "elf ");
60b89a18 1846 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1847 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1848 break;
1849 case bfd_print_symbol_all:
1850 {
4e8a9624
AM
1851 const char *section_name;
1852 const char *name = NULL;
9c5bfbb7 1853 const struct elf_backend_data *bed;
7a13edea 1854 unsigned char st_other;
dbb410c3 1855 bfd_vma val;
bb4d2ac2
L
1856 const char *version_string;
1857 bfd_boolean hidden;
c044fabd 1858
252b5132 1859 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1860
1861 bed = get_elf_backend_data (abfd);
1862 if (bed->elf_backend_print_symbol_all)
c044fabd 1863 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1864
1865 if (name == NULL)
1866 {
7ee38065 1867 name = symbol->name;
217aa764 1868 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1869 }
1870
252b5132
RH
1871 fprintf (file, " %s\t", section_name);
1872 /* Print the "other" value for a symbol. For common symbols,
1873 we've already printed the size; now print the alignment.
1874 For other symbols, we have no specified alignment, and
1875 we've printed the address; now print the size. */
dcf6c779 1876 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1877 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1878 else
1879 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1880 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1881
1882 /* If we have version information, print it. */
60bb06bc
L
1883 version_string = _bfd_elf_get_symbol_version_string (abfd,
1884 symbol,
1885 &hidden);
bb4d2ac2 1886 if (version_string)
252b5132 1887 {
bb4d2ac2 1888 if (!hidden)
252b5132
RH
1889 fprintf (file, " %-11s", version_string);
1890 else
1891 {
1892 int i;
1893
1894 fprintf (file, " (%s)", version_string);
1895 for (i = 10 - strlen (version_string); i > 0; --i)
1896 putc (' ', file);
1897 }
1898 }
1899
1900 /* If the st_other field is not zero, print it. */
7a13edea 1901 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1902
7a13edea
NC
1903 switch (st_other)
1904 {
1905 case 0: break;
1906 case STV_INTERNAL: fprintf (file, " .internal"); break;
1907 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1908 case STV_PROTECTED: fprintf (file, " .protected"); break;
1909 default:
1910 /* Some other non-defined flags are also present, so print
1911 everything hex. */
1912 fprintf (file, " 0x%02x", (unsigned int) st_other);
1913 }
252b5132 1914
587ff49e 1915 fprintf (file, " %s", name);
252b5132
RH
1916 }
1917 break;
1918 }
1919}
252b5132
RH
1920\f
1921/* ELF .o/exec file reading */
1922
c044fabd 1923/* Create a new bfd section from an ELF section header. */
252b5132 1924
b34976b6 1925bfd_boolean
217aa764 1926bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1927{
4fbb74a6
AM
1928 Elf_Internal_Shdr *hdr;
1929 Elf_Internal_Ehdr *ehdr;
1930 const struct elf_backend_data *bed;
90937f86 1931 const char *name;
bf67003b
NC
1932 bfd_boolean ret = TRUE;
1933 static bfd_boolean * sections_being_created = NULL;
5a4b0ccc 1934 static bfd * sections_being_created_abfd = NULL;
bf67003b 1935 static unsigned int nesting = 0;
252b5132 1936
4fbb74a6
AM
1937 if (shindex >= elf_numsections (abfd))
1938 return FALSE;
1939
bf67003b
NC
1940 if (++ nesting > 3)
1941 {
1942 /* PR17512: A corrupt ELF binary might contain a recursive group of
06614111 1943 sections, with each the string indicies pointing to the next in the
bf67003b
NC
1944 loop. Detect this here, by refusing to load a section that we are
1945 already in the process of loading. We only trigger this test if
1946 we have nested at least three sections deep as normal ELF binaries
5a4b0ccc
NC
1947 can expect to recurse at least once.
1948
1949 FIXME: It would be better if this array was attached to the bfd,
1950 rather than being held in a static pointer. */
1951
1952 if (sections_being_created_abfd != abfd)
1953 sections_being_created = NULL;
bf67003b
NC
1954 if (sections_being_created == NULL)
1955 {
1956 /* FIXME: It would be more efficient to attach this array to the bfd somehow. */
1957 sections_being_created = (bfd_boolean *)
1958 bfd_zalloc (abfd, elf_numsections (abfd) * sizeof (bfd_boolean));
5a4b0ccc 1959 sections_being_created_abfd = abfd;
bf67003b
NC
1960 }
1961 if (sections_being_created [shindex])
1962 {
4eca0228 1963 _bfd_error_handler
bf67003b
NC
1964 (_("%B: warning: loop in section dependencies detected"), abfd);
1965 return FALSE;
1966 }
1967 sections_being_created [shindex] = TRUE;
1968 }
1969
4fbb74a6
AM
1970 hdr = elf_elfsections (abfd)[shindex];
1971 ehdr = elf_elfheader (abfd);
1972 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1973 hdr->sh_name);
933d961a 1974 if (name == NULL)
bf67003b 1975 goto fail;
252b5132 1976
4fbb74a6 1977 bed = get_elf_backend_data (abfd);
252b5132
RH
1978 switch (hdr->sh_type)
1979 {
1980 case SHT_NULL:
1981 /* Inactive section. Throw it away. */
bf67003b 1982 goto success;
252b5132 1983
bf67003b
NC
1984 case SHT_PROGBITS: /* Normal section with contents. */
1985 case SHT_NOBITS: /* .bss section. */
1986 case SHT_HASH: /* .hash section. */
1987 case SHT_NOTE: /* .note section. */
25e27870
L
1988 case SHT_INIT_ARRAY: /* .init_array section. */
1989 case SHT_FINI_ARRAY: /* .fini_array section. */
1990 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1991 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1992 case SHT_GNU_HASH: /* .gnu.hash section. */
bf67003b
NC
1993 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1994 goto success;
252b5132 1995
797fc050 1996 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1997 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
1998 goto fail;
1999
cfcac11d
NC
2000 if (hdr->sh_link > elf_numsections (abfd))
2001 {
caa83f8b 2002 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
2003 field set to SHN_BEFORE or SHN_AFTER. */
2004 switch (bfd_get_arch (abfd))
2005 {
caa83f8b 2006 case bfd_arch_i386:
cfcac11d
NC
2007 case bfd_arch_sparc:
2008 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
2009 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
2010 break;
2011 /* Otherwise fall through. */
2012 default:
bf67003b 2013 goto fail;
cfcac11d
NC
2014 }
2015 }
2016 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
bf67003b 2017 goto fail;
cfcac11d 2018 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
2019 {
2020 Elf_Internal_Shdr *dynsymhdr;
2021
2022 /* The shared libraries distributed with hpux11 have a bogus
2023 sh_link field for the ".dynamic" section. Find the
2024 string table for the ".dynsym" section instead. */
2025 if (elf_dynsymtab (abfd) != 0)
2026 {
2027 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2028 hdr->sh_link = dynsymhdr->sh_link;
2029 }
2030 else
2031 {
2032 unsigned int i, num_sec;
2033
2034 num_sec = elf_numsections (abfd);
2035 for (i = 1; i < num_sec; i++)
2036 {
2037 dynsymhdr = elf_elfsections (abfd)[i];
2038 if (dynsymhdr->sh_type == SHT_DYNSYM)
2039 {
2040 hdr->sh_link = dynsymhdr->sh_link;
2041 break;
2042 }
2043 }
2044 }
2045 }
bf67003b 2046 goto success;
797fc050 2047
bf67003b 2048 case SHT_SYMTAB: /* A symbol table. */
252b5132 2049 if (elf_onesymtab (abfd) == shindex)
bf67003b 2050 goto success;
252b5132 2051
a50b2160 2052 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2053 goto fail;
2054
3337c1e5 2055 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
eee3b786
AM
2056 {
2057 if (hdr->sh_size != 0)
bf67003b 2058 goto fail;
eee3b786
AM
2059 /* Some assemblers erroneously set sh_info to one with a
2060 zero sh_size. ld sees this as a global symbol count
2061 of (unsigned) -1. Fix it here. */
2062 hdr->sh_info = 0;
bf67003b 2063 goto success;
eee3b786 2064 }
bf67003b 2065
16ad13ec
NC
2066 /* PR 18854: A binary might contain more than one symbol table.
2067 Unusual, but possible. Warn, but continue. */
2068 if (elf_onesymtab (abfd) != 0)
2069 {
4eca0228 2070 _bfd_error_handler
695344c0 2071 /* xgettext:c-format */
16ad13ec
NC
2072 (_("%B: warning: multiple symbol tables detected - ignoring the table in section %u"),
2073 abfd, shindex);
2074 goto success;
2075 }
252b5132 2076 elf_onesymtab (abfd) = shindex;
6a40cf0c
NC
2077 elf_symtab_hdr (abfd) = *hdr;
2078 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
252b5132
RH
2079 abfd->flags |= HAS_SYMS;
2080
2081 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
2082 SHF_ALLOC is set, and this is a shared object, then we also
2083 treat this section as a BFD section. We can not base the
2084 decision purely on SHF_ALLOC, because that flag is sometimes
2085 set in a relocatable object file, which would confuse the
2086 linker. */
252b5132
RH
2087 if ((hdr->sh_flags & SHF_ALLOC) != 0
2088 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
2089 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2090 shindex))
bf67003b 2091 goto fail;
252b5132 2092
1b3a8575
AM
2093 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2094 can't read symbols without that section loaded as well. It
2095 is most likely specified by the next section header. */
6a40cf0c
NC
2096 {
2097 elf_section_list * entry;
2098 unsigned int i, num_sec;
1b3a8575 2099
6a40cf0c
NC
2100 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2101 if (entry->hdr.sh_link == shindex)
2102 goto success;
2103
2104 num_sec = elf_numsections (abfd);
2105 for (i = shindex + 1; i < num_sec; i++)
2106 {
2107 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2108
2109 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2110 && hdr2->sh_link == shindex)
2111 break;
2112 }
2113
2114 if (i == num_sec)
2115 for (i = 1; i < shindex; i++)
1b3a8575
AM
2116 {
2117 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
6a40cf0c 2118
1b3a8575
AM
2119 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2120 && hdr2->sh_link == shindex)
2121 break;
2122 }
6a40cf0c
NC
2123
2124 if (i != shindex)
2125 ret = bfd_section_from_shdr (abfd, i);
2126 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2127 goto success;
2128 }
252b5132 2129
bf67003b 2130 case SHT_DYNSYM: /* A dynamic symbol table. */
252b5132 2131 if (elf_dynsymtab (abfd) == shindex)
bf67003b 2132 goto success;
252b5132 2133
a50b2160 2134 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2135 goto fail;
2136
eee3b786
AM
2137 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2138 {
2139 if (hdr->sh_size != 0)
bf67003b
NC
2140 goto fail;
2141
eee3b786
AM
2142 /* Some linkers erroneously set sh_info to one with a
2143 zero sh_size. ld sees this as a global symbol count
2144 of (unsigned) -1. Fix it here. */
2145 hdr->sh_info = 0;
bf67003b 2146 goto success;
eee3b786 2147 }
bf67003b 2148
16ad13ec
NC
2149 /* PR 18854: A binary might contain more than one dynamic symbol table.
2150 Unusual, but possible. Warn, but continue. */
2151 if (elf_dynsymtab (abfd) != 0)
2152 {
4eca0228 2153 _bfd_error_handler
695344c0 2154 /* xgettext:c-format */
16ad13ec
NC
2155 (_("%B: warning: multiple dynamic symbol tables detected - ignoring the table in section %u"),
2156 abfd, shindex);
2157 goto success;
2158 }
252b5132
RH
2159 elf_dynsymtab (abfd) = shindex;
2160 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2161 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2162 abfd->flags |= HAS_SYMS;
2163
2164 /* Besides being a symbol table, we also treat this as a regular
2165 section, so that objcopy can handle it. */
bf67003b
NC
2166 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2167 goto success;
252b5132 2168
bf67003b 2169 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
6a40cf0c
NC
2170 {
2171 elf_section_list * entry;
9ad5cbcf 2172
6a40cf0c
NC
2173 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2174 if (entry->ndx == shindex)
2175 goto success;
2176
2177 entry = bfd_alloc (abfd, sizeof * entry);
2178 if (entry == NULL)
2179 goto fail;
2180 entry->ndx = shindex;
2181 entry->hdr = * hdr;
2182 entry->next = elf_symtab_shndx_list (abfd);
2183 elf_symtab_shndx_list (abfd) = entry;
2184 elf_elfsections (abfd)[shindex] = & entry->hdr;
2185 goto success;
2186 }
9ad5cbcf 2187
bf67003b 2188 case SHT_STRTAB: /* A string table. */
252b5132 2189 if (hdr->bfd_section != NULL)
bf67003b
NC
2190 goto success;
2191
252b5132
RH
2192 if (ehdr->e_shstrndx == shindex)
2193 {
2194 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2195 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
bf67003b 2196 goto success;
252b5132 2197 }
bf67003b 2198
1b3a8575
AM
2199 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2200 {
2201 symtab_strtab:
2202 elf_tdata (abfd)->strtab_hdr = *hdr;
2203 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
bf67003b 2204 goto success;
1b3a8575 2205 }
bf67003b 2206
1b3a8575
AM
2207 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2208 {
2209 dynsymtab_strtab:
2210 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2211 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2212 elf_elfsections (abfd)[shindex] = hdr;
2213 /* We also treat this as a regular section, so that objcopy
2214 can handle it. */
bf67003b
NC
2215 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2216 shindex);
2217 goto success;
1b3a8575 2218 }
252b5132 2219
1b3a8575
AM
2220 /* If the string table isn't one of the above, then treat it as a
2221 regular section. We need to scan all the headers to be sure,
2222 just in case this strtab section appeared before the above. */
2223 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2224 {
2225 unsigned int i, num_sec;
252b5132 2226
1b3a8575
AM
2227 num_sec = elf_numsections (abfd);
2228 for (i = 1; i < num_sec; i++)
2229 {
2230 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2231 if (hdr2->sh_link == shindex)
2232 {
933d961a
JJ
2233 /* Prevent endless recursion on broken objects. */
2234 if (i == shindex)
bf67003b 2235 goto fail;
1b3a8575 2236 if (! bfd_section_from_shdr (abfd, i))
bf67003b 2237 goto fail;
1b3a8575
AM
2238 if (elf_onesymtab (abfd) == i)
2239 goto symtab_strtab;
2240 if (elf_dynsymtab (abfd) == i)
2241 goto dynsymtab_strtab;
2242 }
2243 }
2244 }
bf67003b
NC
2245 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2246 goto success;
252b5132
RH
2247
2248 case SHT_REL:
2249 case SHT_RELA:
2250 /* *These* do a lot of work -- but build no sections! */
2251 {
2252 asection *target_sect;
d4730f92 2253 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 2254 unsigned int num_sec = elf_numsections (abfd);
d4730f92 2255 struct bfd_elf_section_data *esdt;
252b5132 2256
aa2ca951
JJ
2257 if (hdr->sh_entsize
2258 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160 2259 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
bf67003b 2260 goto fail;
a50b2160 2261
03ae5f59 2262 /* Check for a bogus link to avoid crashing. */
4fbb74a6 2263 if (hdr->sh_link >= num_sec)
03ae5f59 2264 {
4eca0228 2265 _bfd_error_handler
695344c0 2266 /* xgettext:c-format */
4eca0228
AM
2267 (_("%B: invalid link %lu for reloc section %s (index %u)"),
2268 abfd, hdr->sh_link, name, shindex);
bf67003b
NC
2269 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2270 shindex);
2271 goto success;
03ae5f59
ILT
2272 }
2273
252b5132
RH
2274 /* For some incomprehensible reason Oracle distributes
2275 libraries for Solaris in which some of the objects have
2276 bogus sh_link fields. It would be nice if we could just
2277 reject them, but, unfortunately, some people need to use
2278 them. We scan through the section headers; if we find only
2279 one suitable symbol table, we clobber the sh_link to point
83b89087
L
2280 to it. I hope this doesn't break anything.
2281
2282 Don't do it on executable nor shared library. */
2283 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2284 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
2285 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2286 {
9ad5cbcf 2287 unsigned int scan;
252b5132
RH
2288 int found;
2289
2290 found = 0;
9ad5cbcf 2291 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2292 {
2293 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2294 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2295 {
2296 if (found != 0)
2297 {
2298 found = 0;
2299 break;
2300 }
2301 found = scan;
2302 }
2303 }
2304 if (found != 0)
2305 hdr->sh_link = found;
2306 }
2307
2308 /* Get the symbol table. */
1b3a8575
AM
2309 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2310 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2311 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
bf67003b 2312 goto fail;
252b5132
RH
2313
2314 /* If this reloc section does not use the main symbol table we
2315 don't treat it as a reloc section. BFD can't adequately
2316 represent such a section, so at least for now, we don't
c044fabd 2317 try. We just present it as a normal section. We also
60bcf0fa 2318 can't use it as a reloc section if it points to the null
83b89087
L
2319 section, an invalid section, another reloc section, or its
2320 sh_link points to the null section. */
185ef66d 2321 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 2322 || hdr->sh_link == SHN_UNDEF
185ef66d 2323 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
2324 || hdr->sh_info >= num_sec
2325 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2326 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
bf67003b
NC
2327 {
2328 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2329 shindex);
2330 goto success;
2331 }
252b5132
RH
2332
2333 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
bf67003b
NC
2334 goto fail;
2335
252b5132
RH
2336 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2337 if (target_sect == NULL)
bf67003b 2338 goto fail;
252b5132 2339
d4730f92
BS
2340 esdt = elf_section_data (target_sect);
2341 if (hdr->sh_type == SHT_RELA)
2342 p_hdr = &esdt->rela.hdr;
252b5132 2343 else
d4730f92
BS
2344 p_hdr = &esdt->rel.hdr;
2345
06614111
NC
2346 /* PR 17512: file: 0b4f81b7. */
2347 if (*p_hdr != NULL)
2348 goto fail;
ef53be89 2349 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
d4730f92 2350 if (hdr2 == NULL)
bf67003b 2351 goto fail;
252b5132 2352 *hdr2 = *hdr;
d4730f92 2353 *p_hdr = hdr2;
252b5132 2354 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2355 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2356 target_sect->flags |= SEC_RELOC;
2357 target_sect->relocation = NULL;
2358 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2359 /* In the section to which the relocations apply, mark whether
2360 its relocations are of the REL or RELA variety. */
72730e0c 2361 if (hdr->sh_size != 0)
d4730f92
BS
2362 {
2363 if (hdr->sh_type == SHT_RELA)
2364 target_sect->use_rela_p = 1;
2365 }
252b5132 2366 abfd->flags |= HAS_RELOC;
bf67003b 2367 goto success;
252b5132 2368 }
252b5132
RH
2369
2370 case SHT_GNU_verdef:
2371 elf_dynverdef (abfd) = shindex;
2372 elf_tdata (abfd)->dynverdef_hdr = *hdr;
bf67003b
NC
2373 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2374 goto success;
252b5132
RH
2375
2376 case SHT_GNU_versym:
a50b2160 2377 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
bf67003b
NC
2378 goto fail;
2379
252b5132
RH
2380 elf_dynversym (abfd) = shindex;
2381 elf_tdata (abfd)->dynversym_hdr = *hdr;
bf67003b
NC
2382 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2383 goto success;
252b5132
RH
2384
2385 case SHT_GNU_verneed:
2386 elf_dynverref (abfd) = shindex;
2387 elf_tdata (abfd)->dynverref_hdr = *hdr;
bf67003b
NC
2388 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2389 goto success;
252b5132
RH
2390
2391 case SHT_SHLIB:
bf67003b 2392 goto success;
252b5132 2393
dbb410c3 2394 case SHT_GROUP:
44534af3 2395 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
bf67003b
NC
2396 goto fail;
2397
6dc132d9 2398 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2399 goto fail;
2400
dbb410c3
AM
2401 if (hdr->contents != NULL)
2402 {
2403 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
06614111 2404 unsigned int n_elt = hdr->sh_size / sizeof (* idx);
dbb410c3
AM
2405 asection *s;
2406
06614111
NC
2407 if (n_elt == 0)
2408 goto fail;
b885599b
AM
2409 if (idx->flags & GRP_COMDAT)
2410 hdr->bfd_section->flags
2411 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2412
45c5e9ed
L
2413 /* We try to keep the same section order as it comes in. */
2414 idx += n_elt;
06614111 2415
dbb410c3 2416 while (--n_elt != 0)
1783205a
NC
2417 {
2418 --idx;
2419
2420 if (idx->shdr != NULL
2421 && (s = idx->shdr->bfd_section) != NULL
2422 && elf_next_in_group (s) != NULL)
2423 {
2424 elf_next_in_group (hdr->bfd_section) = s;
2425 break;
2426 }
2427 }
dbb410c3 2428 }
bf67003b 2429 goto success;
dbb410c3 2430
252b5132 2431 default:
104d59d1
JM
2432 /* Possibly an attributes section. */
2433 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2434 || hdr->sh_type == bed->obj_attrs_section_type)
2435 {
2436 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2437 goto fail;
104d59d1 2438 _bfd_elf_parse_attributes (abfd, hdr);
bf67003b 2439 goto success;
104d59d1
JM
2440 }
2441
252b5132 2442 /* Check for any processor-specific section types. */
3eb70a79 2443 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2444 goto success;
3eb70a79
L
2445
2446 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2447 {
2448 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2449 /* FIXME: How to properly handle allocated section reserved
2450 for applications? */
4eca0228 2451 _bfd_error_handler
695344c0 2452 /* xgettext:c-format */
3eb70a79
L
2453 (_("%B: don't know how to handle allocated, application "
2454 "specific section `%s' [0x%8x]"),
2455 abfd, name, hdr->sh_type);
2456 else
bf67003b
NC
2457 {
2458 /* Allow sections reserved for applications. */
2459 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2460 shindex);
2461 goto success;
2462 }
3eb70a79
L
2463 }
2464 else if (hdr->sh_type >= SHT_LOPROC
2465 && hdr->sh_type <= SHT_HIPROC)
2466 /* FIXME: We should handle this section. */
4eca0228 2467 _bfd_error_handler
695344c0 2468 /* xgettext:c-format */
3eb70a79
L
2469 (_("%B: don't know how to handle processor specific section "
2470 "`%s' [0x%8x]"),
2471 abfd, name, hdr->sh_type);
2472 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
2473 {
2474 /* Unrecognised OS-specific sections. */
2475 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2476 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 2477 required to correctly process the section and the file should
ff15b240 2478 be rejected with an error message. */
4eca0228 2479 _bfd_error_handler
695344c0 2480 /* xgettext:c-format */
ff15b240
NC
2481 (_("%B: don't know how to handle OS specific section "
2482 "`%s' [0x%8x]"),
2483 abfd, name, hdr->sh_type);
2484 else
bf67003b
NC
2485 {
2486 /* Otherwise it should be processed. */
2487 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2488 goto success;
2489 }
ff15b240 2490 }
3eb70a79
L
2491 else
2492 /* FIXME: We should handle this section. */
4eca0228 2493 _bfd_error_handler
695344c0 2494 /* xgettext:c-format */
3eb70a79
L
2495 (_("%B: don't know how to handle section `%s' [0x%8x]"),
2496 abfd, name, hdr->sh_type);
2497
bf67003b 2498 goto fail;
252b5132
RH
2499 }
2500
bf67003b
NC
2501 fail:
2502 ret = FALSE;
2503 success:
e5b470e2 2504 if (sections_being_created && sections_being_created_abfd == abfd)
bf67003b
NC
2505 sections_being_created [shindex] = FALSE;
2506 if (-- nesting == 0)
5a4b0ccc
NC
2507 {
2508 sections_being_created = NULL;
2509 sections_being_created_abfd = abfd;
2510 }
bf67003b 2511 return ret;
252b5132
RH
2512}
2513
87d72d41 2514/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2515
87d72d41
AM
2516Elf_Internal_Sym *
2517bfd_sym_from_r_symndx (struct sym_cache *cache,
2518 bfd *abfd,
2519 unsigned long r_symndx)
ec338859 2520{
ec338859
AM
2521 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2522
a5d1b3b5
AM
2523 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2524 {
2525 Elf_Internal_Shdr *symtab_hdr;
2526 unsigned char esym[sizeof (Elf64_External_Sym)];
2527 Elf_External_Sym_Shndx eshndx;
ec338859 2528
a5d1b3b5
AM
2529 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2530 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2531 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2532 return NULL;
9ad5cbcf 2533
a5d1b3b5
AM
2534 if (cache->abfd != abfd)
2535 {
2536 memset (cache->indx, -1, sizeof (cache->indx));
2537 cache->abfd = abfd;
2538 }
2539 cache->indx[ent] = r_symndx;
ec338859 2540 }
a5d1b3b5 2541
87d72d41 2542 return &cache->sym[ent];
ec338859
AM
2543}
2544
252b5132
RH
2545/* Given an ELF section number, retrieve the corresponding BFD
2546 section. */
2547
2548asection *
91d6fa6a 2549bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2550{
91d6fa6a 2551 if (sec_index >= elf_numsections (abfd))
252b5132 2552 return NULL;
91d6fa6a 2553 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2554}
2555
b35d266b 2556static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2557{
0112cd26
NC
2558 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2559 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2560};
2561
b35d266b 2562static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2563{
0112cd26
NC
2564 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2565 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2566};
2567
b35d266b 2568static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2569{
0112cd26
NC
2570 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2571 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
a9a72a65
DE
2572 /* There are more DWARF sections than these, but they needn't be added here
2573 unless you have to cope with broken compilers that don't emit section
2574 attributes or you want to help the user writing assembler. */
0112cd26
NC
2575 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2576 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2577 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2578 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2579 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2580 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2581 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2582 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2583 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2584};
2585
b35d266b 2586static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2587{
0112cd26
NC
2588 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2589 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2590 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2591};
2592
b35d266b 2593static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2594{
0112cd26 2595 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
68efed41 2596 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
0112cd26
NC
2597 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2598 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2599 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2600 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2601 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2602 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2603 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2604 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2605};
2606
b35d266b 2607static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2608{
0112cd26
NC
2609 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2610 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2611};
2612
b35d266b 2613static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2614{
0112cd26
NC
2615 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2616 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2617 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2618 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2619};
2620
b35d266b 2621static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2622{
0112cd26
NC
2623 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2624 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2625};
2626
b35d266b 2627static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2628{
0112cd26
NC
2629 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2630 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2631 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2632};
2633
b35d266b 2634static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2635{
0112cd26
NC
2636 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2637 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2638 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2639};
2640
b35d266b 2641static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2642{
0112cd26
NC
2643 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2644 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2645 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2646 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2647 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2648};
2649
b35d266b 2650static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2651{
0112cd26
NC
2652 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2653 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2654 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2655 /* See struct bfd_elf_special_section declaration for the semantics of
2656 this special case where .prefix_length != strlen (.prefix). */
2657 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2658 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2659};
2660
b35d266b 2661static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2662{
0112cd26
NC
2663 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2664 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2665 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2666 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2667};
2668
1b315056
CS
2669static const struct bfd_elf_special_section special_sections_z[] =
2670{
2671 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2672 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2673 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2674 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2675 { NULL, 0, 0, 0, 0 }
2676};
2677
e4c93b56 2678static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2679{
7f4d3958 2680 special_sections_b, /* 'b' */
98ece1b3 2681 special_sections_c, /* 'c' */
7f4d3958
L
2682 special_sections_d, /* 'd' */
2683 NULL, /* 'e' */
2684 special_sections_f, /* 'f' */
2685 special_sections_g, /* 'g' */
2686 special_sections_h, /* 'h' */
2687 special_sections_i, /* 'i' */
2688 NULL, /* 'j' */
2689 NULL, /* 'k' */
2690 special_sections_l, /* 'l' */
2691 NULL, /* 'm' */
2692 special_sections_n, /* 'n' */
2693 NULL, /* 'o' */
2694 special_sections_p, /* 'p' */
2695 NULL, /* 'q' */
2696 special_sections_r, /* 'r' */
2697 special_sections_s, /* 's' */
2698 special_sections_t, /* 't' */
1b315056
CS
2699 NULL, /* 'u' */
2700 NULL, /* 'v' */
2701 NULL, /* 'w' */
2702 NULL, /* 'x' */
2703 NULL, /* 'y' */
2704 special_sections_z /* 'z' */
7f4d3958
L
2705};
2706
551b43fd
AM
2707const struct bfd_elf_special_section *
2708_bfd_elf_get_special_section (const char *name,
2709 const struct bfd_elf_special_section *spec,
2710 unsigned int rela)
2f89ff8d
L
2711{
2712 int i;
7f4d3958 2713 int len;
7f4d3958 2714
551b43fd 2715 len = strlen (name);
7f4d3958 2716
551b43fd 2717 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2718 {
2719 int suffix_len;
551b43fd 2720 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2721
2722 if (len < prefix_len)
2723 continue;
551b43fd 2724 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2725 continue;
2726
551b43fd 2727 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2728 if (suffix_len <= 0)
2729 {
2730 if (name[prefix_len] != 0)
2731 {
2732 if (suffix_len == 0)
2733 continue;
2734 if (name[prefix_len] != '.'
2735 && (suffix_len == -2
551b43fd 2736 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2737 continue;
2738 }
2739 }
2740 else
2741 {
2742 if (len < prefix_len + suffix_len)
2743 continue;
2744 if (memcmp (name + len - suffix_len,
551b43fd 2745 spec[i].prefix + prefix_len,
7dcb9820
AM
2746 suffix_len) != 0)
2747 continue;
2748 }
551b43fd 2749 return &spec[i];
7dcb9820 2750 }
2f89ff8d
L
2751
2752 return NULL;
2753}
2754
7dcb9820 2755const struct bfd_elf_special_section *
29ef7005 2756_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2757{
551b43fd
AM
2758 int i;
2759 const struct bfd_elf_special_section *spec;
29ef7005 2760 const struct elf_backend_data *bed;
2f89ff8d
L
2761
2762 /* See if this is one of the special sections. */
551b43fd
AM
2763 if (sec->name == NULL)
2764 return NULL;
2f89ff8d 2765
29ef7005
L
2766 bed = get_elf_backend_data (abfd);
2767 spec = bed->special_sections;
2768 if (spec)
2769 {
2770 spec = _bfd_elf_get_special_section (sec->name,
2771 bed->special_sections,
2772 sec->use_rela_p);
2773 if (spec != NULL)
2774 return spec;
2775 }
2776
551b43fd
AM
2777 if (sec->name[0] != '.')
2778 return NULL;
2f89ff8d 2779
551b43fd 2780 i = sec->name[1] - 'b';
1b315056 2781 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2782 return NULL;
2783
2784 spec = special_sections[i];
2f89ff8d 2785
551b43fd
AM
2786 if (spec == NULL)
2787 return NULL;
2788
2789 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2790}
2791
b34976b6 2792bfd_boolean
217aa764 2793_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2794{
2795 struct bfd_elf_section_data *sdata;
551b43fd 2796 const struct elf_backend_data *bed;
7dcb9820 2797 const struct bfd_elf_special_section *ssect;
252b5132 2798
f0abc2a1
AM
2799 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2800 if (sdata == NULL)
2801 {
a50b1753
NC
2802 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2803 sizeof (*sdata));
f0abc2a1
AM
2804 if (sdata == NULL)
2805 return FALSE;
217aa764 2806 sec->used_by_bfd = sdata;
f0abc2a1 2807 }
bf572ba0 2808
551b43fd
AM
2809 /* Indicate whether or not this section should use RELA relocations. */
2810 bed = get_elf_backend_data (abfd);
2811 sec->use_rela_p = bed->default_use_rela_p;
2812
e843e0f8
L
2813 /* When we read a file, we don't need to set ELF section type and
2814 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2815 anyway. We will set ELF section type and flags for all linker
2816 created sections. If user specifies BFD section flags, we will
2817 set ELF section type and flags based on BFD section flags in
02ecc8e9
L
2818 elf_fake_sections. Special handling for .init_array/.fini_array
2819 output sections since they may contain .ctors/.dtors input
2820 sections. We don't want _bfd_elf_init_private_section_data to
2821 copy ELF section type from .ctors/.dtors input sections. */
2822 if (abfd->direction != read_direction
3496cb2a 2823 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2824 {
551b43fd 2825 ssect = (*bed->get_sec_type_attr) (abfd, sec);
02ecc8e9
L
2826 if (ssect != NULL
2827 && (!sec->flags
2828 || (sec->flags & SEC_LINKER_CREATED) != 0
2829 || ssect->type == SHT_INIT_ARRAY
2830 || ssect->type == SHT_FINI_ARRAY))
a31501e9
L
2831 {
2832 elf_section_type (sec) = ssect->type;
2833 elf_section_flags (sec) = ssect->attr;
2834 }
2f89ff8d
L
2835 }
2836
f592407e 2837 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2838}
2839
2840/* Create a new bfd section from an ELF program header.
2841
2842 Since program segments have no names, we generate a synthetic name
2843 of the form segment<NUM>, where NUM is generally the index in the
2844 program header table. For segments that are split (see below) we
2845 generate the names segment<NUM>a and segment<NUM>b.
2846
2847 Note that some program segments may have a file size that is different than
2848 (less than) the memory size. All this means is that at execution the
2849 system must allocate the amount of memory specified by the memory size,
2850 but only initialize it with the first "file size" bytes read from the
2851 file. This would occur for example, with program segments consisting
2852 of combined data+bss.
2853
2854 To handle the above situation, this routine generates TWO bfd sections
2855 for the single program segment. The first has the length specified by
2856 the file size of the segment, and the second has the length specified
2857 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2858 into its initialized and uninitialized parts.
252b5132
RH
2859
2860 */
2861
b34976b6 2862bfd_boolean
217aa764
AM
2863_bfd_elf_make_section_from_phdr (bfd *abfd,
2864 Elf_Internal_Phdr *hdr,
91d6fa6a 2865 int hdr_index,
a50b1753 2866 const char *type_name)
252b5132
RH
2867{
2868 asection *newsect;
2869 char *name;
2870 char namebuf[64];
d4c88bbb 2871 size_t len;
252b5132
RH
2872 int split;
2873
2874 split = ((hdr->p_memsz > 0)
2875 && (hdr->p_filesz > 0)
2876 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2877
2878 if (hdr->p_filesz > 0)
252b5132 2879 {
91d6fa6a 2880 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2881 len = strlen (namebuf) + 1;
a50b1753 2882 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2883 if (!name)
2884 return FALSE;
2885 memcpy (name, namebuf, len);
2886 newsect = bfd_make_section (abfd, name);
2887 if (newsect == NULL)
2888 return FALSE;
2889 newsect->vma = hdr->p_vaddr;
2890 newsect->lma = hdr->p_paddr;
2891 newsect->size = hdr->p_filesz;
2892 newsect->filepos = hdr->p_offset;
2893 newsect->flags |= SEC_HAS_CONTENTS;
2894 newsect->alignment_power = bfd_log2 (hdr->p_align);
2895 if (hdr->p_type == PT_LOAD)
252b5132 2896 {
d5191d0c
AM
2897 newsect->flags |= SEC_ALLOC;
2898 newsect->flags |= SEC_LOAD;
2899 if (hdr->p_flags & PF_X)
2900 {
2901 /* FIXME: all we known is that it has execute PERMISSION,
2902 may be data. */
2903 newsect->flags |= SEC_CODE;
2904 }
2905 }
2906 if (!(hdr->p_flags & PF_W))
2907 {
2908 newsect->flags |= SEC_READONLY;
252b5132 2909 }
252b5132
RH
2910 }
2911
d5191d0c 2912 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2913 {
d5191d0c
AM
2914 bfd_vma align;
2915
91d6fa6a 2916 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2917 len = strlen (namebuf) + 1;
a50b1753 2918 name = (char *) bfd_alloc (abfd, len);
252b5132 2919 if (!name)
b34976b6 2920 return FALSE;
d4c88bbb 2921 memcpy (name, namebuf, len);
252b5132
RH
2922 newsect = bfd_make_section (abfd, name);
2923 if (newsect == NULL)
b34976b6 2924 return FALSE;
252b5132
RH
2925 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2926 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2927 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2928 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2929 align = newsect->vma & -newsect->vma;
2930 if (align == 0 || align > hdr->p_align)
2931 align = hdr->p_align;
2932 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2933 if (hdr->p_type == PT_LOAD)
2934 {
d5191d0c
AM
2935 /* Hack for gdb. Segments that have not been modified do
2936 not have their contents written to a core file, on the
2937 assumption that a debugger can find the contents in the
2938 executable. We flag this case by setting the fake
2939 section size to zero. Note that "real" bss sections will
2940 always have their contents dumped to the core file. */
2941 if (bfd_get_format (abfd) == bfd_core)
2942 newsect->size = 0;
252b5132
RH
2943 newsect->flags |= SEC_ALLOC;
2944 if (hdr->p_flags & PF_X)
2945 newsect->flags |= SEC_CODE;
2946 }
2947 if (!(hdr->p_flags & PF_W))
2948 newsect->flags |= SEC_READONLY;
2949 }
2950
b34976b6 2951 return TRUE;
252b5132
RH
2952}
2953
b34976b6 2954bfd_boolean
91d6fa6a 2955bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2956{
9c5bfbb7 2957 const struct elf_backend_data *bed;
20cfcaae
NC
2958
2959 switch (hdr->p_type)
2960 {
2961 case PT_NULL:
91d6fa6a 2962 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2963
2964 case PT_LOAD:
91d6fa6a 2965 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2966
2967 case PT_DYNAMIC:
91d6fa6a 2968 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2969
2970 case PT_INTERP:
91d6fa6a 2971 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2972
2973 case PT_NOTE:
91d6fa6a 2974 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2975 return FALSE;
718175fa 2976 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2977 return FALSE;
2978 return TRUE;
20cfcaae
NC
2979
2980 case PT_SHLIB:
91d6fa6a 2981 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
2982
2983 case PT_PHDR:
91d6fa6a 2984 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 2985
811072d8 2986 case PT_GNU_EH_FRAME:
91d6fa6a 2987 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
2988 "eh_frame_hdr");
2989
2b05f1b7 2990 case PT_GNU_STACK:
91d6fa6a 2991 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 2992
8c37241b 2993 case PT_GNU_RELRO:
91d6fa6a 2994 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 2995
20cfcaae 2996 default:
8c1acd09 2997 /* Check for any processor-specific program segment types. */
20cfcaae 2998 bed = get_elf_backend_data (abfd);
91d6fa6a 2999 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
3000 }
3001}
3002
d4730f92
BS
3003/* Return the REL_HDR for SEC, assuming there is only a single one, either
3004 REL or RELA. */
3005
3006Elf_Internal_Shdr *
3007_bfd_elf_single_rel_hdr (asection *sec)
3008{
3009 if (elf_section_data (sec)->rel.hdr)
3010 {
3011 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3012 return elf_section_data (sec)->rel.hdr;
3013 }
3014 else
3015 return elf_section_data (sec)->rela.hdr;
3016}
3017
3e19fb8f
L
3018static bfd_boolean
3019_bfd_elf_set_reloc_sh_name (bfd *abfd,
3020 Elf_Internal_Shdr *rel_hdr,
3021 const char *sec_name,
3022 bfd_boolean use_rela_p)
3023{
3024 char *name = (char *) bfd_alloc (abfd,
3025 sizeof ".rela" + strlen (sec_name));
3026 if (name == NULL)
3027 return FALSE;
3028
3029 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3030 rel_hdr->sh_name =
3031 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3032 FALSE);
3033 if (rel_hdr->sh_name == (unsigned int) -1)
3034 return FALSE;
3035
3036 return TRUE;
3037}
3038
d4730f92
BS
3039/* Allocate and initialize a section-header for a new reloc section,
3040 containing relocations against ASECT. It is stored in RELDATA. If
3041 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3042 relocations. */
23bc299b 3043
5d13b3b3 3044static bfd_boolean
217aa764 3045_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 3046 struct bfd_elf_section_reloc_data *reldata,
f6fe1ccd 3047 const char *sec_name,
3e19fb8f
L
3048 bfd_boolean use_rela_p,
3049 bfd_boolean delay_st_name_p)
23bc299b 3050{
d4730f92 3051 Elf_Internal_Shdr *rel_hdr;
9c5bfbb7 3052 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3053
d4730f92 3054 BFD_ASSERT (reldata->hdr == NULL);
ef53be89 3055 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
d4730f92 3056 reldata->hdr = rel_hdr;
23bc299b 3057
3e19fb8f
L
3058 if (delay_st_name_p)
3059 rel_hdr->sh_name = (unsigned int) -1;
3060 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3061 use_rela_p))
b34976b6 3062 return FALSE;
23bc299b
MM
3063 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3064 rel_hdr->sh_entsize = (use_rela_p
3065 ? bed->s->sizeof_rela
3066 : bed->s->sizeof_rel);
72de5009 3067 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
3068 rel_hdr->sh_flags = 0;
3069 rel_hdr->sh_addr = 0;
3070 rel_hdr->sh_size = 0;
3071 rel_hdr->sh_offset = 0;
3072
b34976b6 3073 return TRUE;
23bc299b
MM
3074}
3075
94be91de
JB
3076/* Return the default section type based on the passed in section flags. */
3077
3078int
3079bfd_elf_get_default_section_type (flagword flags)
3080{
3081 if ((flags & SEC_ALLOC) != 0
2e76e85a 3082 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
3083 return SHT_NOBITS;
3084 return SHT_PROGBITS;
3085}
3086
d4730f92
BS
3087struct fake_section_arg
3088{
3089 struct bfd_link_info *link_info;
3090 bfd_boolean failed;
3091};
3092
252b5132
RH
3093/* Set up an ELF internal section header for a section. */
3094
252b5132 3095static void
d4730f92 3096elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 3097{
d4730f92 3098 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 3099 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3100 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 3101 Elf_Internal_Shdr *this_hdr;
0414f35b 3102 unsigned int sh_type;
0ce398f1 3103 const char *name = asect->name;
3e19fb8f 3104 bfd_boolean delay_st_name_p = FALSE;
252b5132 3105
d4730f92 3106 if (arg->failed)
252b5132
RH
3107 {
3108 /* We already failed; just get out of the bfd_map_over_sections
08a40648 3109 loop. */
252b5132
RH
3110 return;
3111 }
3112
d4730f92 3113 this_hdr = &esd->this_hdr;
252b5132 3114
f6fe1ccd 3115 if (arg->link_info)
0ce398f1 3116 {
f6fe1ccd
L
3117 /* ld: compress DWARF debug sections with names: .debug_*. */
3118 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
3119 && (asect->flags & SEC_DEBUGGING)
3120 && name[1] == 'd'
3121 && name[6] == '_')
3122 {
3123 /* Set SEC_ELF_COMPRESS to indicate this section should be
3124 compressed. */
3125 asect->flags |= SEC_ELF_COMPRESS;
0ce398f1 3126
dd905818 3127 /* If this section will be compressed, delay adding section
3e19fb8f
L
3128 name to section name section after it is compressed in
3129 _bfd_elf_assign_file_positions_for_non_load. */
3130 delay_st_name_p = TRUE;
f6fe1ccd
L
3131 }
3132 }
3133 else if ((asect->flags & SEC_ELF_RENAME))
3134 {
3135 /* objcopy: rename output DWARF debug section. */
3136 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
3137 {
3138 /* When we decompress or compress with SHF_COMPRESSED,
3139 convert section name from .zdebug_* to .debug_* if
3140 needed. */
3141 if (name[1] == 'z')
3142 {
3143 char *new_name = convert_zdebug_to_debug (abfd, name);
3144 if (new_name == NULL)
3145 {
3146 arg->failed = TRUE;
3147 return;
3148 }
3149 name = new_name;
3150 }
3151 }
3152 else if (asect->compress_status == COMPRESS_SECTION_DONE)
0ce398f1 3153 {
f6fe1ccd
L
3154 /* PR binutils/18087: Compression does not always make a
3155 section smaller. So only rename the section when
3156 compression has actually taken place. If input section
3157 name is .zdebug_*, we should never compress it again. */
3158 char *new_name = convert_debug_to_zdebug (abfd, name);
0ce398f1
L
3159 if (new_name == NULL)
3160 {
3161 arg->failed = TRUE;
3162 return;
3163 }
f6fe1ccd
L
3164 BFD_ASSERT (name[1] != 'z');
3165 name = new_name;
0ce398f1
L
3166 }
3167 }
3168
3e19fb8f
L
3169 if (delay_st_name_p)
3170 this_hdr->sh_name = (unsigned int) -1;
3171 else
252b5132 3172 {
3e19fb8f
L
3173 this_hdr->sh_name
3174 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3175 name, FALSE);
3176 if (this_hdr->sh_name == (unsigned int) -1)
3177 {
3178 arg->failed = TRUE;
3179 return;
3180 }
252b5132
RH
3181 }
3182
a4d8e49b 3183 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
3184
3185 if ((asect->flags & SEC_ALLOC) != 0
3186 || asect->user_set_vma)
3187 this_hdr->sh_addr = asect->vma;
3188 else
3189 this_hdr->sh_addr = 0;
3190
3191 this_hdr->sh_offset = 0;
eea6121a 3192 this_hdr->sh_size = asect->size;
252b5132 3193 this_hdr->sh_link = 0;
c86934ce
NC
3194 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3195 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3196 {
4eca0228 3197 _bfd_error_handler
695344c0 3198 /* xgettext:c-format */
c86934ce
NC
3199 (_("%B: error: Alignment power %d of section `%A' is too big"),
3200 abfd, asect, asect->alignment_power);
3201 arg->failed = TRUE;
3202 return;
3203 }
72de5009 3204 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
3205 /* The sh_entsize and sh_info fields may have been set already by
3206 copy_private_section_data. */
3207
3208 this_hdr->bfd_section = asect;
3209 this_hdr->contents = NULL;
3210
3cddba1e
L
3211 /* If the section type is unspecified, we set it based on
3212 asect->flags. */
98ece1b3
AM
3213 if ((asect->flags & SEC_GROUP) != 0)
3214 sh_type = SHT_GROUP;
98ece1b3 3215 else
94be91de 3216 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 3217
3cddba1e 3218 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
3219 this_hdr->sh_type = sh_type;
3220 else if (this_hdr->sh_type == SHT_NOBITS
3221 && sh_type == SHT_PROGBITS
3222 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 3223 {
98ece1b3
AM
3224 /* Warn if we are changing a NOBITS section to PROGBITS, but
3225 allow the link to proceed. This can happen when users link
3226 non-bss input sections to bss output sections, or emit data
3227 to a bss output section via a linker script. */
4eca0228 3228 _bfd_error_handler
58f0869b 3229 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 3230 this_hdr->sh_type = sh_type;
3cddba1e
L
3231 }
3232
2f89ff8d 3233 switch (this_hdr->sh_type)
252b5132 3234 {
2f89ff8d 3235 default:
2f89ff8d
L
3236 break;
3237
3238 case SHT_STRTAB:
2f89ff8d
L
3239 case SHT_NOTE:
3240 case SHT_NOBITS:
3241 case SHT_PROGBITS:
3242 break;
606851fb
AM
3243
3244 case SHT_INIT_ARRAY:
3245 case SHT_FINI_ARRAY:
3246 case SHT_PREINIT_ARRAY:
3247 this_hdr->sh_entsize = bed->s->arch_size / 8;
3248 break;
2f89ff8d
L
3249
3250 case SHT_HASH:
c7ac6ff8 3251 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 3252 break;
5de3bf90 3253
2f89ff8d 3254 case SHT_DYNSYM:
252b5132 3255 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
3256 break;
3257
3258 case SHT_DYNAMIC:
252b5132 3259 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
3260 break;
3261
3262 case SHT_RELA:
3263 if (get_elf_backend_data (abfd)->may_use_rela_p)
3264 this_hdr->sh_entsize = bed->s->sizeof_rela;
3265 break;
3266
3267 case SHT_REL:
3268 if (get_elf_backend_data (abfd)->may_use_rel_p)
3269 this_hdr->sh_entsize = bed->s->sizeof_rel;
3270 break;
3271
3272 case SHT_GNU_versym:
252b5132 3273 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
3274 break;
3275
3276 case SHT_GNU_verdef:
252b5132
RH
3277 this_hdr->sh_entsize = 0;
3278 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3279 cverdefs. The linker will set cverdefs, but sh_info will be
3280 zero. */
252b5132
RH
3281 if (this_hdr->sh_info == 0)
3282 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3283 else
3284 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3285 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
3286 break;
3287
3288 case SHT_GNU_verneed:
252b5132
RH
3289 this_hdr->sh_entsize = 0;
3290 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3291 cverrefs. The linker will set cverrefs, but sh_info will be
3292 zero. */
252b5132
RH
3293 if (this_hdr->sh_info == 0)
3294 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3295 else
3296 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3297 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
3298 break;
3299
3300 case SHT_GROUP:
1783205a 3301 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 3302 break;
fdc90cb4
JJ
3303
3304 case SHT_GNU_HASH:
3305 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3306 break;
dbb410c3 3307 }
252b5132
RH
3308
3309 if ((asect->flags & SEC_ALLOC) != 0)
3310 this_hdr->sh_flags |= SHF_ALLOC;
3311 if ((asect->flags & SEC_READONLY) == 0)
3312 this_hdr->sh_flags |= SHF_WRITE;
3313 if ((asect->flags & SEC_CODE) != 0)
3314 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
3315 if ((asect->flags & SEC_MERGE) != 0)
3316 {
3317 this_hdr->sh_flags |= SHF_MERGE;
3318 this_hdr->sh_entsize = asect->entsize;
f5fa8ca2 3319 }
84865015
NC
3320 if ((asect->flags & SEC_STRINGS) != 0)
3321 this_hdr->sh_flags |= SHF_STRINGS;
1126897b 3322 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 3323 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 3324 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
3325 {
3326 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
3327 if (asect->size == 0
3328 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 3329 {
3a800eb9 3330 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 3331
704afa60 3332 this_hdr->sh_size = 0;
3a800eb9
AM
3333 if (o != NULL)
3334 {
704afa60 3335 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
3336 if (this_hdr->sh_size != 0)
3337 this_hdr->sh_type = SHT_NOBITS;
3338 }
704afa60
JJ
3339 }
3340 }
18ae9cc1
L
3341 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3342 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 3343
d4730f92
BS
3344 /* If the section has relocs, set up a section header for the
3345 SHT_REL[A] section. If two relocation sections are required for
3346 this section, it is up to the processor-specific back-end to
3347 create the other. */
3348 if ((asect->flags & SEC_RELOC) != 0)
3349 {
3350 /* When doing a relocatable link, create both REL and RELA sections if
3351 needed. */
3352 if (arg->link_info
3353 /* Do the normal setup if we wouldn't create any sections here. */
3354 && esd->rel.count + esd->rela.count > 0
0e1862bb
L
3355 && (bfd_link_relocatable (arg->link_info)
3356 || arg->link_info->emitrelocations))
d4730f92
BS
3357 {
3358 if (esd->rel.count && esd->rel.hdr == NULL
3e19fb8f
L
3359 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name, FALSE,
3360 delay_st_name_p))
d4730f92
BS
3361 {
3362 arg->failed = TRUE;
3363 return;
3364 }
3365 if (esd->rela.count && esd->rela.hdr == NULL
3e19fb8f
L
3366 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name, TRUE,
3367 delay_st_name_p))
d4730f92
BS
3368 {
3369 arg->failed = TRUE;
3370 return;
3371 }
3372 }
3373 else if (!_bfd_elf_init_reloc_shdr (abfd,
3374 (asect->use_rela_p
3375 ? &esd->rela : &esd->rel),
f6fe1ccd 3376 name,
3e19fb8f
L
3377 asect->use_rela_p,
3378 delay_st_name_p))
d4730f92
BS
3379 arg->failed = TRUE;
3380 }
3381
252b5132 3382 /* Check for processor-specific section types. */
0414f35b 3383 sh_type = this_hdr->sh_type;
e1fddb6b
AO
3384 if (bed->elf_backend_fake_sections
3385 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
d4730f92 3386 arg->failed = TRUE;
252b5132 3387
42bb2e33 3388 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
3389 {
3390 /* Don't change the header type from NOBITS if we are being
42bb2e33 3391 called for objcopy --only-keep-debug. */
0414f35b
AM
3392 this_hdr->sh_type = sh_type;
3393 }
252b5132
RH
3394}
3395
bcacc0f5
AM
3396/* Fill in the contents of a SHT_GROUP section. Called from
3397 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3398 when ELF targets use the generic linker, ld. Called for ld -r
3399 from bfd_elf_final_link. */
dbb410c3 3400
1126897b 3401void
217aa764 3402bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 3403{
a50b1753 3404 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 3405 asection *elt, *first;
dbb410c3 3406 unsigned char *loc;
b34976b6 3407 bfd_boolean gas;
dbb410c3 3408
7e4111ad
L
3409 /* Ignore linker created group section. See elfNN_ia64_object_p in
3410 elfxx-ia64.c. */
3411 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
3412 || *failedptr)
3413 return;
3414
bcacc0f5
AM
3415 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3416 {
3417 unsigned long symindx = 0;
3418
3419 /* elf_group_id will have been set up by objcopy and the
3420 generic linker. */
3421 if (elf_group_id (sec) != NULL)
3422 symindx = elf_group_id (sec)->udata.i;
1126897b 3423
bcacc0f5
AM
3424 if (symindx == 0)
3425 {
3426 /* If called from the assembler, swap_out_syms will have set up
3427 elf_section_syms. */
3428 BFD_ASSERT (elf_section_syms (abfd) != NULL);
3429 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3430 }
3431 elf_section_data (sec)->this_hdr.sh_info = symindx;
3432 }
3433 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 3434 {
bcacc0f5
AM
3435 /* The ELF backend linker sets sh_info to -2 when the group
3436 signature symbol is global, and thus the index can't be
3437 set until all local symbols are output. */
53720c49
AM
3438 asection *igroup;
3439 struct bfd_elf_section_data *sec_data;
3440 unsigned long symndx;
3441 unsigned long extsymoff;
bcacc0f5
AM
3442 struct elf_link_hash_entry *h;
3443
53720c49
AM
3444 /* The point of this little dance to the first SHF_GROUP section
3445 then back to the SHT_GROUP section is that this gets us to
3446 the SHT_GROUP in the input object. */
3447 igroup = elf_sec_group (elf_next_in_group (sec));
3448 sec_data = elf_section_data (igroup);
3449 symndx = sec_data->this_hdr.sh_info;
3450 extsymoff = 0;
bcacc0f5
AM
3451 if (!elf_bad_symtab (igroup->owner))
3452 {
3453 Elf_Internal_Shdr *symtab_hdr;
3454
3455 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3456 extsymoff = symtab_hdr->sh_info;
3457 }
3458 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3459 while (h->root.type == bfd_link_hash_indirect
3460 || h->root.type == bfd_link_hash_warning)
3461 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3462
3463 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 3464 }
dbb410c3 3465
1126897b 3466 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 3467 gas = TRUE;
dbb410c3
AM
3468 if (sec->contents == NULL)
3469 {
b34976b6 3470 gas = FALSE;
a50b1753 3471 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
3472
3473 /* Arrange for the section to be written out. */
3474 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
3475 if (sec->contents == NULL)
3476 {
b34976b6 3477 *failedptr = TRUE;
dbb410c3
AM
3478 return;
3479 }
3480 }
3481
eea6121a 3482 loc = sec->contents + sec->size;
dbb410c3 3483
9dce4196
AM
3484 /* Get the pointer to the first section in the group that gas
3485 squirreled away here. objcopy arranges for this to be set to the
3486 start of the input section group. */
3487 first = elt = elf_next_in_group (sec);
dbb410c3
AM
3488
3489 /* First element is a flag word. Rest of section is elf section
3490 indices for all the sections of the group. Write them backwards
3491 just to keep the group in the same order as given in .section
3492 directives, not that it matters. */
3493 while (elt != NULL)
3494 {
9dce4196 3495 asection *s;
9dce4196 3496
9dce4196 3497 s = elt;
415f38a6
AM
3498 if (!gas)
3499 s = s->output_section;
3500 if (s != NULL
3501 && !bfd_is_abs_section (s))
01e1a5bc 3502 {
415f38a6
AM
3503 unsigned int idx = elf_section_data (s)->this_idx;
3504
01e1a5bc 3505 loc -= 4;
01e1a5bc
NC
3506 H_PUT_32 (abfd, idx, loc);
3507 }
945906ff 3508 elt = elf_next_in_group (elt);
9dce4196
AM
3509 if (elt == first)
3510 break;
dbb410c3
AM
3511 }
3512
3d7f7666 3513 if ((loc -= 4) != sec->contents)
9dce4196 3514 abort ();
dbb410c3 3515
9dce4196 3516 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
3517}
3518
bd53a53a
L
3519/* Return the section which RELOC_SEC applies to. */
3520
3521asection *
3522_bfd_elf_get_reloc_section (asection *reloc_sec)
3523{
3524 const char *name;
3525 unsigned int type;
3526 bfd *abfd;
3527
3528 if (reloc_sec == NULL)
3529 return NULL;
3530
3531 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3532 if (type != SHT_REL && type != SHT_RELA)
3533 return NULL;
3534
3535 /* We look up the section the relocs apply to by name. */
3536 name = reloc_sec->name;
3537 if (type == SHT_REL)
3538 name += 4;
3539 else
3540 name += 5;
3541
3542 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3543 section apply to .got.plt section. */
3544 abfd = reloc_sec->owner;
3545 if (get_elf_backend_data (abfd)->want_got_plt
3546 && strcmp (name, ".plt") == 0)
87070c08
AM
3547 {
3548 /* .got.plt is a linker created input section. It may be mapped
3549 to some other output section. Try two likely sections. */
3550 name = ".got.plt";
3551 reloc_sec = bfd_get_section_by_name (abfd, name);
3552 if (reloc_sec != NULL)
3553 return reloc_sec;
3554 name = ".got";
3555 }
bd53a53a
L
3556
3557 reloc_sec = bfd_get_section_by_name (abfd, name);
3558 return reloc_sec;
3559}
3560
252b5132
RH
3561/* Assign all ELF section numbers. The dummy first section is handled here
3562 too. The link/info pointers for the standard section types are filled
3563 in here too, while we're at it. */
3564
b34976b6 3565static bfd_boolean
da9f89d4 3566assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
3567{
3568 struct elf_obj_tdata *t = elf_tdata (abfd);
3569 asection *sec;
3e19fb8f 3570 unsigned int section_number;
252b5132 3571 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 3572 struct bfd_elf_section_data *d;
3516e984 3573 bfd_boolean need_symtab;
252b5132
RH
3574
3575 section_number = 1;
3576
2b0f7ef9
JJ
3577 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3578
da9f89d4 3579 /* SHT_GROUP sections are in relocatable files only. */
0e1862bb 3580 if (link_info == NULL || bfd_link_relocatable (link_info))
252b5132 3581 {
ef53be89 3582 size_t reloc_count = 0;
14f2c699 3583
da9f89d4 3584 /* Put SHT_GROUP sections first. */
04dd1667 3585 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 3586 {
5daa8fe7 3587 d = elf_section_data (sec);
da9f89d4
L
3588
3589 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 3590 {
5daa8fe7 3591 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
3592 {
3593 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 3594 bfd_section_list_remove (abfd, sec);
da9f89d4 3595 abfd->section_count--;
da9f89d4 3596 }
08a40648 3597 else
4fbb74a6 3598 d->this_idx = section_number++;
da9f89d4 3599 }
14f2c699
L
3600
3601 /* Count relocations. */
3602 reloc_count += sec->reloc_count;
47cc2cf5 3603 }
14f2c699
L
3604
3605 /* Clear HAS_RELOC if there are no relocations. */
3606 if (reloc_count == 0)
3607 abfd->flags &= ~HAS_RELOC;
47cc2cf5
PB
3608 }
3609
3610 for (sec = abfd->sections; sec; sec = sec->next)
3611 {
3612 d = elf_section_data (sec);
3613
3614 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 3615 d->this_idx = section_number++;
3e19fb8f
L
3616 if (d->this_hdr.sh_name != (unsigned int) -1)
3617 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 3618 if (d->rel.hdr)
2b0f7ef9 3619 {
d4730f92 3620 d->rel.idx = section_number++;
3e19fb8f
L
3621 if (d->rel.hdr->sh_name != (unsigned int) -1)
3622 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 3623 }
d4730f92
BS
3624 else
3625 d->rel.idx = 0;
23bc299b 3626
d4730f92 3627 if (d->rela.hdr)
2b0f7ef9 3628 {
d4730f92 3629 d->rela.idx = section_number++;
3e19fb8f
L
3630 if (d->rela.hdr->sh_name != (unsigned int) -1)
3631 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 3632 }
23bc299b 3633 else
d4730f92 3634 d->rela.idx = 0;
252b5132
RH
3635 }
3636
3516e984
L
3637 need_symtab = (bfd_get_symcount (abfd) > 0
3638 || (link_info == NULL
3639 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3640 == HAS_RELOC)));
3641 if (need_symtab)
252b5132 3642 {
12bd6957 3643 elf_onesymtab (abfd) = section_number++;
2b0f7ef9 3644 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 3645 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 3646 {
6a40cf0c
NC
3647 elf_section_list * entry;
3648
3649 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3650
3651 entry = bfd_zalloc (abfd, sizeof * entry);
3652 entry->ndx = section_number++;
3653 elf_symtab_shndx_list (abfd) = entry;
3654 entry->hdr.sh_name
9ad5cbcf 3655 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3656 ".symtab_shndx", FALSE);
6a40cf0c 3657 if (entry->hdr.sh_name == (unsigned int) -1)
b34976b6 3658 return FALSE;
9ad5cbcf 3659 }
12bd6957 3660 elf_strtab_sec (abfd) = section_number++;
2b0f7ef9 3661 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3662 }
3663
dd905818
NC
3664 elf_shstrtab_sec (abfd) = section_number++;
3665 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3666 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3667
1c52a645
L
3668 if (section_number >= SHN_LORESERVE)
3669 {
695344c0 3670 /* xgettext:c-format */
1c52a645
L
3671 _bfd_error_handler (_("%B: too many sections: %u"),
3672 abfd, section_number);
3673 return FALSE;
3674 }
3675
9ad5cbcf 3676 elf_numsections (abfd) = section_number;
252b5132
RH
3677 elf_elfheader (abfd)->e_shnum = section_number;
3678
3679 /* Set up the list of section header pointers, in agreement with the
3680 indices. */
a50b1753
NC
3681 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
3682 sizeof (Elf_Internal_Shdr *));
252b5132 3683 if (i_shdrp == NULL)
b34976b6 3684 return FALSE;
252b5132 3685
a50b1753
NC
3686 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3687 sizeof (Elf_Internal_Shdr));
252b5132
RH
3688 if (i_shdrp[0] == NULL)
3689 {
3690 bfd_release (abfd, i_shdrp);
b34976b6 3691 return FALSE;
252b5132 3692 }
252b5132
RH
3693
3694 elf_elfsections (abfd) = i_shdrp;
3695
12bd6957 3696 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3516e984 3697 if (need_symtab)
252b5132 3698 {
12bd6957 3699 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
4fbb74a6 3700 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf 3701 {
6a40cf0c
NC
3702 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3703 BFD_ASSERT (entry != NULL);
3704 i_shdrp[entry->ndx] = & entry->hdr;
3705 entry->hdr.sh_link = elf_onesymtab (abfd);
9ad5cbcf 3706 }
12bd6957
AM
3707 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3708 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
252b5132 3709 }
38ce5b11 3710
252b5132
RH
3711 for (sec = abfd->sections; sec; sec = sec->next)
3712 {
252b5132 3713 asection *s;
252b5132 3714
91d6fa6a
NC
3715 d = elf_section_data (sec);
3716
252b5132 3717 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3718 if (d->rel.idx != 0)
3719 i_shdrp[d->rel.idx] = d->rel.hdr;
3720 if (d->rela.idx != 0)
3721 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3722
3723 /* Fill in the sh_link and sh_info fields while we're at it. */
3724
3725 /* sh_link of a reloc section is the section index of the symbol
3726 table. sh_info is the section index of the section to which
3727 the relocation entries apply. */
d4730f92 3728 if (d->rel.idx != 0)
252b5132 3729 {
12bd6957 3730 d->rel.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3731 d->rel.hdr->sh_info = d->this_idx;
9ef5d938 3732 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
252b5132 3733 }
d4730f92 3734 if (d->rela.idx != 0)
23bc299b 3735 {
12bd6957 3736 d->rela.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3737 d->rela.hdr->sh_info = d->this_idx;
9ef5d938 3738 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
23bc299b 3739 }
252b5132 3740
38ce5b11
L
3741 /* We need to set up sh_link for SHF_LINK_ORDER. */
3742 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3743 {
3744 s = elf_linked_to_section (sec);
3745 if (s)
38ce5b11 3746 {
f2876037 3747 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3748 if (link_info != NULL)
38ce5b11 3749 {
f2876037 3750 /* Check discarded linkonce section. */
dbaa2011 3751 if (discarded_section (s))
38ce5b11 3752 {
ccd2ec6a 3753 asection *kept;
4eca0228 3754 _bfd_error_handler
695344c0 3755 /* xgettext:c-format */
ccd2ec6a
L
3756 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3757 abfd, d->this_hdr.bfd_section,
3758 s, s->owner);
3759 /* Point to the kept section if it has the same
3760 size as the discarded one. */
c0f00686 3761 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3762 if (kept == NULL)
185d09ad 3763 {
ccd2ec6a
L
3764 bfd_set_error (bfd_error_bad_value);
3765 return FALSE;
185d09ad 3766 }
ccd2ec6a 3767 s = kept;
38ce5b11 3768 }
e424ecc8 3769
ccd2ec6a
L
3770 s = s->output_section;
3771 BFD_ASSERT (s != NULL);
38ce5b11 3772 }
f2876037
L
3773 else
3774 {
3775 /* Handle objcopy. */
3776 if (s->output_section == NULL)
3777 {
4eca0228 3778 _bfd_error_handler
695344c0 3779 /* xgettext:c-format */
f2876037
L
3780 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
3781 abfd, d->this_hdr.bfd_section, s, s->owner);
3782 bfd_set_error (bfd_error_bad_value);
3783 return FALSE;
3784 }
3785 s = s->output_section;
3786 }
ccd2ec6a
L
3787 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3788 }
3789 else
3790 {
3791 /* PR 290:
3792 The Intel C compiler generates SHT_IA_64_UNWIND with
3793 SHF_LINK_ORDER. But it doesn't set the sh_link or
3794 sh_info fields. Hence we could get the situation
08a40648 3795 where s is NULL. */
ccd2ec6a
L
3796 const struct elf_backend_data *bed
3797 = get_elf_backend_data (abfd);
3798 if (bed->link_order_error_handler)
3799 bed->link_order_error_handler
695344c0 3800 /* xgettext:c-format */
ccd2ec6a
L
3801 (_("%B: warning: sh_link not set for section `%A'"),
3802 abfd, sec);
38ce5b11
L
3803 }
3804 }
3805
252b5132
RH
3806 switch (d->this_hdr.sh_type)
3807 {
3808 case SHT_REL:
3809 case SHT_RELA:
3810 /* A reloc section which we are treating as a normal BFD
3811 section. sh_link is the section index of the symbol
3812 table. sh_info is the section index of the section to
3813 which the relocation entries apply. We assume that an
3814 allocated reloc section uses the dynamic symbol table.
3815 FIXME: How can we be sure? */
3816 s = bfd_get_section_by_name (abfd, ".dynsym");
3817 if (s != NULL)
3818 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3819
bd53a53a 3820 s = get_elf_backend_data (abfd)->get_reloc_section (sec);
252b5132 3821 if (s != NULL)
9ef5d938
L
3822 {
3823 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3824 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3825 }
252b5132
RH
3826 break;
3827
3828 case SHT_STRTAB:
3829 /* We assume that a section named .stab*str is a stabs
3830 string section. We look for a section with the same name
3831 but without the trailing ``str'', and set its sh_link
3832 field to point to this section. */
0112cd26 3833 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3834 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3835 {
3836 size_t len;
3837 char *alc;
3838
3839 len = strlen (sec->name);
a50b1753 3840 alc = (char *) bfd_malloc (len - 2);
252b5132 3841 if (alc == NULL)
b34976b6 3842 return FALSE;
d4c88bbb 3843 memcpy (alc, sec->name, len - 3);
252b5132
RH
3844 alc[len - 3] = '\0';
3845 s = bfd_get_section_by_name (abfd, alc);
3846 free (alc);
3847 if (s != NULL)
3848 {
3849 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3850
3851 /* This is a .stab section. */
0594c12d
AM
3852 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3853 elf_section_data (s)->this_hdr.sh_entsize
3854 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3855 }
3856 }
3857 break;
3858
3859 case SHT_DYNAMIC:
3860 case SHT_DYNSYM:
3861 case SHT_GNU_verneed:
3862 case SHT_GNU_verdef:
3863 /* sh_link is the section header index of the string table
3864 used for the dynamic entries, or the symbol table, or the
3865 version strings. */
3866 s = bfd_get_section_by_name (abfd, ".dynstr");
3867 if (s != NULL)
3868 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3869 break;
3870
7f1204bb
JJ
3871 case SHT_GNU_LIBLIST:
3872 /* sh_link is the section header index of the prelink library
08a40648
AM
3873 list used for the dynamic entries, or the symbol table, or
3874 the version strings. */
7f1204bb
JJ
3875 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3876 ? ".dynstr" : ".gnu.libstr");
3877 if (s != NULL)
3878 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3879 break;
3880
252b5132 3881 case SHT_HASH:
fdc90cb4 3882 case SHT_GNU_HASH:
252b5132
RH
3883 case SHT_GNU_versym:
3884 /* sh_link is the section header index of the symbol table
3885 this hash table or version table is for. */
3886 s = bfd_get_section_by_name (abfd, ".dynsym");
3887 if (s != NULL)
3888 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3889 break;
dbb410c3
AM
3890
3891 case SHT_GROUP:
12bd6957 3892 d->this_hdr.sh_link = elf_onesymtab (abfd);
252b5132
RH
3893 }
3894 }
3895
3e19fb8f
L
3896 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
3897 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
3898 debug section name from .debug_* to .zdebug_* if needed. */
3899
b34976b6 3900 return TRUE;
252b5132
RH
3901}
3902
5372391b 3903static bfd_boolean
217aa764 3904sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3905{
3906 /* If the backend has a special mapping, use it. */
9c5bfbb7 3907 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3908 if (bed->elf_backend_sym_is_global)
3909 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3910
e47bf690 3911 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3912 || bfd_is_und_section (bfd_get_section (sym))
3913 || bfd_is_com_section (bfd_get_section (sym)));
3914}
3915
76359541
TP
3916/* Filter global symbols of ABFD to include in the import library. All
3917 SYMCOUNT symbols of ABFD can be examined from their pointers in
3918 SYMS. Pointers of symbols to keep should be stored contiguously at
3919 the beginning of that array.
3920
3921 Returns the number of symbols to keep. */
3922
3923unsigned int
3924_bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
3925 asymbol **syms, long symcount)
3926{
3927 long src_count, dst_count = 0;
3928
3929 for (src_count = 0; src_count < symcount; src_count++)
3930 {
3931 asymbol *sym = syms[src_count];
3932 char *name = (char *) bfd_asymbol_name (sym);
3933 struct bfd_link_hash_entry *h;
3934
3935 if (!sym_is_global (abfd, sym))
3936 continue;
3937
3938 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, FALSE);
5df1bc57
AM
3939 if (h == NULL)
3940 continue;
76359541
TP
3941 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
3942 continue;
76359541
TP
3943 if (h->linker_def || h->ldscript_def)
3944 continue;
3945
3946 syms[dst_count++] = sym;
3947 }
3948
3949 syms[dst_count] = NULL;
3950
3951 return dst_count;
3952}
3953
5372391b 3954/* Don't output section symbols for sections that are not going to be
c6d8cab4 3955 output, that are duplicates or there is no BFD section. */
5372391b
AM
3956
3957static bfd_boolean
3958ignore_section_sym (bfd *abfd, asymbol *sym)
3959{
c6d8cab4
L
3960 elf_symbol_type *type_ptr;
3961
3962 if ((sym->flags & BSF_SECTION_SYM) == 0)
3963 return FALSE;
3964
3965 type_ptr = elf_symbol_from (abfd, sym);
3966 return ((type_ptr != NULL
3967 && type_ptr->internal_elf_sym.st_shndx != 0
3968 && bfd_is_abs_section (sym->section))
3969 || !(sym->section->owner == abfd
0f0a5e58 3970 || (sym->section->output_section->owner == abfd
2633a79c
AM
3971 && sym->section->output_offset == 0)
3972 || bfd_is_abs_section (sym->section)));
5372391b
AM
3973}
3974
2633a79c
AM
3975/* Map symbol from it's internal number to the external number, moving
3976 all local symbols to be at the head of the list. */
3977
b34976b6 3978static bfd_boolean
12bd6957 3979elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
252b5132 3980{
dc810e39 3981 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3982 asymbol **syms = bfd_get_outsymbols (abfd);
3983 asymbol **sect_syms;
dc810e39
AM
3984 unsigned int num_locals = 0;
3985 unsigned int num_globals = 0;
3986 unsigned int num_locals2 = 0;
3987 unsigned int num_globals2 = 0;
7292b3ac 3988 unsigned int max_index = 0;
dc810e39 3989 unsigned int idx;
252b5132
RH
3990 asection *asect;
3991 asymbol **new_syms;
252b5132
RH
3992
3993#ifdef DEBUG
3994 fprintf (stderr, "elf_map_symbols\n");
3995 fflush (stderr);
3996#endif
3997
252b5132
RH
3998 for (asect = abfd->sections; asect; asect = asect->next)
3999 {
4000 if (max_index < asect->index)
4001 max_index = asect->index;
4002 }
4003
4004 max_index++;
a50b1753 4005 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 4006 if (sect_syms == NULL)
b34976b6 4007 return FALSE;
252b5132 4008 elf_section_syms (abfd) = sect_syms;
4e89ac30 4009 elf_num_section_syms (abfd) = max_index;
252b5132 4010
079e9a2f
AM
4011 /* Init sect_syms entries for any section symbols we have already
4012 decided to output. */
252b5132
RH
4013 for (idx = 0; idx < symcount; idx++)
4014 {
dc810e39 4015 asymbol *sym = syms[idx];
c044fabd 4016
252b5132 4017 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 4018 && sym->value == 0
2633a79c
AM
4019 && !ignore_section_sym (abfd, sym)
4020 && !bfd_is_abs_section (sym->section))
252b5132 4021 {
5372391b 4022 asection *sec = sym->section;
252b5132 4023
5372391b
AM
4024 if (sec->owner != abfd)
4025 sec = sec->output_section;
252b5132 4026
5372391b 4027 sect_syms[sec->index] = syms[idx];
252b5132
RH
4028 }
4029 }
4030
252b5132
RH
4031 /* Classify all of the symbols. */
4032 for (idx = 0; idx < symcount; idx++)
4033 {
2633a79c 4034 if (sym_is_global (abfd, syms[idx]))
252b5132 4035 num_globals++;
2633a79c
AM
4036 else if (!ignore_section_sym (abfd, syms[idx]))
4037 num_locals++;
252b5132 4038 }
079e9a2f 4039
5372391b 4040 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
4041 sections will already have a section symbol in outsymbols, but
4042 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4043 at least in that case. */
252b5132
RH
4044 for (asect = abfd->sections; asect; asect = asect->next)
4045 {
079e9a2f 4046 if (sect_syms[asect->index] == NULL)
252b5132 4047 {
079e9a2f 4048 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
4049 num_locals++;
4050 else
4051 num_globals++;
252b5132
RH
4052 }
4053 }
4054
4055 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
4056 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
4057 sizeof (asymbol *));
dc810e39 4058
252b5132 4059 if (new_syms == NULL)
b34976b6 4060 return FALSE;
252b5132
RH
4061
4062 for (idx = 0; idx < symcount; idx++)
4063 {
4064 asymbol *sym = syms[idx];
dc810e39 4065 unsigned int i;
252b5132 4066
2633a79c
AM
4067 if (sym_is_global (abfd, sym))
4068 i = num_locals + num_globals2++;
4069 else if (!ignore_section_sym (abfd, sym))
252b5132
RH
4070 i = num_locals2++;
4071 else
2633a79c 4072 continue;
252b5132
RH
4073 new_syms[i] = sym;
4074 sym->udata.i = i + 1;
4075 }
4076 for (asect = abfd->sections; asect; asect = asect->next)
4077 {
079e9a2f 4078 if (sect_syms[asect->index] == NULL)
252b5132 4079 {
079e9a2f 4080 asymbol *sym = asect->symbol;
dc810e39 4081 unsigned int i;
252b5132 4082
079e9a2f 4083 sect_syms[asect->index] = sym;
252b5132
RH
4084 if (!sym_is_global (abfd, sym))
4085 i = num_locals2++;
4086 else
4087 i = num_locals + num_globals2++;
4088 new_syms[i] = sym;
4089 sym->udata.i = i + 1;
4090 }
4091 }
4092
4093 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4094
12bd6957 4095 *pnum_locals = num_locals;
b34976b6 4096 return TRUE;
252b5132
RH
4097}
4098
4099/* Align to the maximum file alignment that could be required for any
4100 ELF data structure. */
4101
268b6b39 4102static inline file_ptr
217aa764 4103align_file_position (file_ptr off, int align)
252b5132
RH
4104{
4105 return (off + align - 1) & ~(align - 1);
4106}
4107
4108/* Assign a file position to a section, optionally aligning to the
4109 required section alignment. */
4110
217aa764
AM
4111file_ptr
4112_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4113 file_ptr offset,
4114 bfd_boolean align)
252b5132 4115{
72de5009
AM
4116 if (align && i_shdrp->sh_addralign > 1)
4117 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
4118 i_shdrp->sh_offset = offset;
4119 if (i_shdrp->bfd_section != NULL)
4120 i_shdrp->bfd_section->filepos = offset;
4121 if (i_shdrp->sh_type != SHT_NOBITS)
4122 offset += i_shdrp->sh_size;
4123 return offset;
4124}
4125
4126/* Compute the file positions we are going to put the sections at, and
4127 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4128 is not NULL, this is being called by the ELF backend linker. */
4129
b34976b6 4130bfd_boolean
217aa764
AM
4131_bfd_elf_compute_section_file_positions (bfd *abfd,
4132 struct bfd_link_info *link_info)
252b5132 4133{
9c5bfbb7 4134 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 4135 struct fake_section_arg fsargs;
b34976b6 4136 bfd_boolean failed;
ef10c3ac 4137 struct elf_strtab_hash *strtab = NULL;
252b5132 4138 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 4139 bfd_boolean need_symtab;
252b5132
RH
4140
4141 if (abfd->output_has_begun)
b34976b6 4142 return TRUE;
252b5132
RH
4143
4144 /* Do any elf backend specific processing first. */
4145 if (bed->elf_backend_begin_write_processing)
4146 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4147
4148 if (! prep_headers (abfd))
b34976b6 4149 return FALSE;
252b5132 4150
e6c51ed4 4151 /* Post process the headers if necessary. */
78245035 4152 (*bed->elf_backend_post_process_headers) (abfd, link_info);
e6c51ed4 4153
d4730f92
BS
4154 fsargs.failed = FALSE;
4155 fsargs.link_info = link_info;
4156 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4157 if (fsargs.failed)
b34976b6 4158 return FALSE;
252b5132 4159
da9f89d4 4160 if (!assign_section_numbers (abfd, link_info))
b34976b6 4161 return FALSE;
252b5132
RH
4162
4163 /* The backend linker builds symbol table information itself. */
3516e984
L
4164 need_symtab = (link_info == NULL
4165 && (bfd_get_symcount (abfd) > 0
4166 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4167 == HAS_RELOC)));
4168 if (need_symtab)
252b5132
RH
4169 {
4170 /* Non-zero if doing a relocatable link. */
4171 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4172
4173 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 4174 return FALSE;
252b5132
RH
4175 }
4176
d4730f92 4177 failed = FALSE;
1126897b 4178 if (link_info == NULL)
dbb410c3 4179 {
1126897b 4180 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 4181 if (failed)
b34976b6 4182 return FALSE;
dbb410c3
AM
4183 }
4184
252b5132
RH
4185 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
4186 /* sh_name was set in prep_headers. */
4187 shstrtab_hdr->sh_type = SHT_STRTAB;
84865015 4188 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
252b5132 4189 shstrtab_hdr->sh_addr = 0;
946748d5 4190 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4191 shstrtab_hdr->sh_entsize = 0;
4192 shstrtab_hdr->sh_link = 0;
4193 shstrtab_hdr->sh_info = 0;
3e19fb8f 4194 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4195 shstrtab_hdr->sh_addralign = 1;
4196
c84fca4d 4197 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 4198 return FALSE;
252b5132 4199
3516e984 4200 if (need_symtab)
252b5132
RH
4201 {
4202 file_ptr off;
4203 Elf_Internal_Shdr *hdr;
4204
12bd6957 4205 off = elf_next_file_pos (abfd);
252b5132 4206
6a40cf0c 4207 hdr = & elf_symtab_hdr (abfd);
b34976b6 4208 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4209
6a40cf0c
NC
4210 if (elf_symtab_shndx_list (abfd) != NULL)
4211 {
4212 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4213 if (hdr->sh_size != 0)
4214 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4215 /* FIXME: What about other symtab_shndx sections in the list ? */
4216 }
9ad5cbcf 4217
252b5132 4218 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 4219 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4220
12bd6957 4221 elf_next_file_pos (abfd) = off;
252b5132
RH
4222
4223 /* Now that we know where the .strtab section goes, write it
08a40648 4224 out. */
252b5132 4225 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
ef10c3ac 4226 || ! _bfd_elf_strtab_emit (abfd, strtab))
b34976b6 4227 return FALSE;
ef10c3ac 4228 _bfd_elf_strtab_free (strtab);
252b5132
RH
4229 }
4230
b34976b6 4231 abfd->output_has_begun = TRUE;
252b5132 4232
b34976b6 4233 return TRUE;
252b5132
RH
4234}
4235
8ded5a0f
AM
4236/* Make an initial estimate of the size of the program header. If we
4237 get the number wrong here, we'll redo section placement. */
4238
4239static bfd_size_type
4240get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4241{
4242 size_t segs;
4243 asection *s;
2b05f1b7 4244 const struct elf_backend_data *bed;
8ded5a0f
AM
4245
4246 /* Assume we will need exactly two PT_LOAD segments: one for text
4247 and one for data. */
4248 segs = 2;
4249
4250 s = bfd_get_section_by_name (abfd, ".interp");
4251 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4252 {
4253 /* If we have a loadable interpreter section, we need a
4254 PT_INTERP segment. In this case, assume we also need a
4255 PT_PHDR segment, although that may not be true for all
4256 targets. */
4257 segs += 2;
4258 }
4259
4260 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4261 {
4262 /* We need a PT_DYNAMIC segment. */
4263 ++segs;
f210dcff 4264 }
08a40648 4265
ceae84aa 4266 if (info != NULL && info->relro)
f210dcff
L
4267 {
4268 /* We need a PT_GNU_RELRO segment. */
4269 ++segs;
8ded5a0f
AM
4270 }
4271
12bd6957 4272 if (elf_eh_frame_hdr (abfd))
8ded5a0f
AM
4273 {
4274 /* We need a PT_GNU_EH_FRAME segment. */
4275 ++segs;
4276 }
4277
12bd6957 4278 if (elf_stack_flags (abfd))
8ded5a0f 4279 {
2b05f1b7
L
4280 /* We need a PT_GNU_STACK segment. */
4281 ++segs;
4282 }
94b11780 4283
2b05f1b7
L
4284 for (s = abfd->sections; s != NULL; s = s->next)
4285 {
8ded5a0f 4286 if ((s->flags & SEC_LOAD) != 0
0112cd26 4287 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
4288 {
4289 /* We need a PT_NOTE segment. */
4290 ++segs;
1c5265b5
JJ
4291 /* Try to create just one PT_NOTE segment
4292 for all adjacent loadable .note* sections.
4293 gABI requires that within a PT_NOTE segment
4294 (and also inside of each SHT_NOTE section)
4295 each note is padded to a multiple of 4 size,
4296 so we check whether the sections are correctly
4297 aligned. */
4298 if (s->alignment_power == 2)
4299 while (s->next != NULL
4300 && s->next->alignment_power == 2
4301 && (s->next->flags & SEC_LOAD) != 0
4302 && CONST_STRNEQ (s->next->name, ".note"))
4303 s = s->next;
8ded5a0f
AM
4304 }
4305 }
4306
4307 for (s = abfd->sections; s != NULL; s = s->next)
4308 {
4309 if (s->flags & SEC_THREAD_LOCAL)
4310 {
4311 /* We need a PT_TLS segment. */
4312 ++segs;
4313 break;
4314 }
4315 }
4316
4317 /* Let the backend count up any program headers it might need. */
2b05f1b7 4318 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
4319 if (bed->elf_backend_additional_program_headers)
4320 {
4321 int a;
4322
4323 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4324 if (a == -1)
4325 abort ();
4326 segs += a;
4327 }
4328
4329 return segs * bed->s->sizeof_phdr;
4330}
4331
2ea37f1c
NC
4332/* Find the segment that contains the output_section of section. */
4333
4334Elf_Internal_Phdr *
4335_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4336{
4337 struct elf_segment_map *m;
4338 Elf_Internal_Phdr *p;
4339
12bd6957 4340 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
2ea37f1c
NC
4341 m != NULL;
4342 m = m->next, p++)
4343 {
4344 int i;
4345
4346 for (i = m->count - 1; i >= 0; i--)
4347 if (m->sections[i] == section)
4348 return p;
4349 }
4350
4351 return NULL;
4352}
4353
252b5132
RH
4354/* Create a mapping from a set of sections to a program segment. */
4355
217aa764
AM
4356static struct elf_segment_map *
4357make_mapping (bfd *abfd,
4358 asection **sections,
4359 unsigned int from,
4360 unsigned int to,
4361 bfd_boolean phdr)
252b5132
RH
4362{
4363 struct elf_segment_map *m;
4364 unsigned int i;
4365 asection **hdrpp;
dc810e39 4366 bfd_size_type amt;
252b5132 4367
dc810e39
AM
4368 amt = sizeof (struct elf_segment_map);
4369 amt += (to - from - 1) * sizeof (asection *);
a50b1753 4370 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4371 if (m == NULL)
4372 return NULL;
4373 m->next = NULL;
4374 m->p_type = PT_LOAD;
4375 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4376 m->sections[i - from] = *hdrpp;
4377 m->count = to - from;
4378
4379 if (from == 0 && phdr)
4380 {
4381 /* Include the headers in the first PT_LOAD segment. */
4382 m->includes_filehdr = 1;
4383 m->includes_phdrs = 1;
4384 }
4385
4386 return m;
4387}
4388
229fcec5
MM
4389/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4390 on failure. */
4391
4392struct elf_segment_map *
4393_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4394{
4395 struct elf_segment_map *m;
4396
a50b1753
NC
4397 m = (struct elf_segment_map *) bfd_zalloc (abfd,
4398 sizeof (struct elf_segment_map));
229fcec5
MM
4399 if (m == NULL)
4400 return NULL;
4401 m->next = NULL;
4402 m->p_type = PT_DYNAMIC;
4403 m->count = 1;
4404 m->sections[0] = dynsec;
08a40648 4405
229fcec5
MM
4406 return m;
4407}
4408
8ded5a0f 4409/* Possibly add or remove segments from the segment map. */
252b5132 4410
b34976b6 4411static bfd_boolean
3dea8fca
AM
4412elf_modify_segment_map (bfd *abfd,
4413 struct bfd_link_info *info,
4414 bfd_boolean remove_empty_load)
252b5132 4415{
252e386e 4416 struct elf_segment_map **m;
8ded5a0f 4417 const struct elf_backend_data *bed;
252b5132 4418
8ded5a0f
AM
4419 /* The placement algorithm assumes that non allocated sections are
4420 not in PT_LOAD segments. We ensure this here by removing such
4421 sections from the segment map. We also remove excluded
252e386e
AM
4422 sections. Finally, any PT_LOAD segment without sections is
4423 removed. */
12bd6957 4424 m = &elf_seg_map (abfd);
252e386e 4425 while (*m)
8ded5a0f
AM
4426 {
4427 unsigned int i, new_count;
252b5132 4428
252e386e 4429 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 4430 {
252e386e
AM
4431 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4432 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4433 || (*m)->p_type != PT_LOAD))
8ded5a0f 4434 {
252e386e
AM
4435 (*m)->sections[new_count] = (*m)->sections[i];
4436 new_count++;
8ded5a0f
AM
4437 }
4438 }
252e386e 4439 (*m)->count = new_count;
252b5132 4440
3dea8fca 4441 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
4442 *m = (*m)->next;
4443 else
4444 m = &(*m)->next;
8ded5a0f 4445 }
252b5132 4446
8ded5a0f
AM
4447 bed = get_elf_backend_data (abfd);
4448 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 4449 {
252e386e 4450 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 4451 return FALSE;
252b5132 4452 }
252b5132 4453
8ded5a0f
AM
4454 return TRUE;
4455}
252b5132 4456
8ded5a0f 4457/* Set up a mapping from BFD sections to program segments. */
252b5132 4458
8ded5a0f
AM
4459bfd_boolean
4460_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4461{
4462 unsigned int count;
4463 struct elf_segment_map *m;
4464 asection **sections = NULL;
4465 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 4466 bfd_boolean no_user_phdrs;
252b5132 4467
12bd6957 4468 no_user_phdrs = elf_seg_map (abfd) == NULL;
d324f6d6
RM
4469
4470 if (info != NULL)
4471 info->user_phdrs = !no_user_phdrs;
4472
3dea8fca 4473 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 4474 {
8ded5a0f
AM
4475 asection *s;
4476 unsigned int i;
4477 struct elf_segment_map *mfirst;
4478 struct elf_segment_map **pm;
4479 asection *last_hdr;
4480 bfd_vma last_size;
4481 unsigned int phdr_index;
4482 bfd_vma maxpagesize;
4483 asection **hdrpp;
4484 bfd_boolean phdr_in_segment = TRUE;
4485 bfd_boolean writable;
4486 int tls_count = 0;
4487 asection *first_tls = NULL;
4488 asection *dynsec, *eh_frame_hdr;
4489 bfd_size_type amt;
8d06853e 4490 bfd_vma addr_mask, wrap_to = 0;
252b5132 4491
8ded5a0f 4492 /* Select the allocated sections, and sort them. */
252b5132 4493
a50b1753
NC
4494 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
4495 sizeof (asection *));
8ded5a0f 4496 if (sections == NULL)
252b5132 4497 goto error_return;
252b5132 4498
8d06853e
AM
4499 /* Calculate top address, avoiding undefined behaviour of shift
4500 left operator when shift count is equal to size of type
4501 being shifted. */
4502 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4503 addr_mask = (addr_mask << 1) + 1;
4504
8ded5a0f
AM
4505 i = 0;
4506 for (s = abfd->sections; s != NULL; s = s->next)
4507 {
4508 if ((s->flags & SEC_ALLOC) != 0)
4509 {
4510 sections[i] = s;
4511 ++i;
8d06853e
AM
4512 /* A wrapping section potentially clashes with header. */
4513 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
4514 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
4515 }
4516 }
4517 BFD_ASSERT (i <= bfd_count_sections (abfd));
4518 count = i;
252b5132 4519
8ded5a0f 4520 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 4521
8ded5a0f 4522 /* Build the mapping. */
252b5132 4523
8ded5a0f
AM
4524 mfirst = NULL;
4525 pm = &mfirst;
252b5132 4526
8ded5a0f
AM
4527 /* If we have a .interp section, then create a PT_PHDR segment for
4528 the program headers and a PT_INTERP segment for the .interp
4529 section. */
4530 s = bfd_get_section_by_name (abfd, ".interp");
4531 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4532 {
4533 amt = sizeof (struct elf_segment_map);
a50b1753 4534 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4535 if (m == NULL)
4536 goto error_return;
4537 m->next = NULL;
4538 m->p_type = PT_PHDR;
4539 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
4540 m->p_flags = PF_R | PF_X;
4541 m->p_flags_valid = 1;
4542 m->includes_phdrs = 1;
252b5132 4543
8ded5a0f
AM
4544 *pm = m;
4545 pm = &m->next;
252b5132 4546
8ded5a0f 4547 amt = sizeof (struct elf_segment_map);
a50b1753 4548 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4549 if (m == NULL)
4550 goto error_return;
4551 m->next = NULL;
4552 m->p_type = PT_INTERP;
4553 m->count = 1;
4554 m->sections[0] = s;
4555
4556 *pm = m;
4557 pm = &m->next;
252b5132 4558 }
8ded5a0f
AM
4559
4560 /* Look through the sections. We put sections in the same program
4561 segment when the start of the second section can be placed within
4562 a few bytes of the end of the first section. */
4563 last_hdr = NULL;
4564 last_size = 0;
4565 phdr_index = 0;
4566 maxpagesize = bed->maxpagesize;
063bb025
NC
4567 /* PR 17512: file: c8455299.
4568 Avoid divide-by-zero errors later on.
4569 FIXME: Should we abort if the maxpagesize is zero ? */
4570 if (maxpagesize == 0)
4571 maxpagesize = 1;
8ded5a0f
AM
4572 writable = FALSE;
4573 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4574 if (dynsec != NULL
4575 && (dynsec->flags & SEC_LOAD) == 0)
4576 dynsec = NULL;
4577
4578 /* Deal with -Ttext or something similar such that the first section
4579 is not adjacent to the program headers. This is an
4580 approximation, since at this point we don't know exactly how many
4581 program headers we will need. */
4582 if (count > 0)
252b5132 4583 {
12bd6957 4584 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 4585
62d7a5f6 4586 if (phdr_size == (bfd_size_type) -1)
8ded5a0f 4587 phdr_size = get_program_header_size (abfd, info);
d2bcb0d1 4588 phdr_size += bed->s->sizeof_ehdr;
8ded5a0f 4589 if ((abfd->flags & D_PAGED) == 0
8d06853e
AM
4590 || (sections[0]->lma & addr_mask) < phdr_size
4591 || ((sections[0]->lma & addr_mask) % maxpagesize
4592 < phdr_size % maxpagesize)
4593 || (sections[0]->lma & addr_mask & -maxpagesize) < wrap_to)
8ded5a0f 4594 phdr_in_segment = FALSE;
252b5132
RH
4595 }
4596
8ded5a0f 4597 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 4598 {
8ded5a0f
AM
4599 asection *hdr;
4600 bfd_boolean new_segment;
4601
4602 hdr = *hdrpp;
4603
4604 /* See if this section and the last one will fit in the same
4605 segment. */
4606
4607 if (last_hdr == NULL)
4608 {
4609 /* If we don't have a segment yet, then we don't need a new
4610 one (we build the last one after this loop). */
4611 new_segment = FALSE;
4612 }
4613 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4614 {
4615 /* If this section has a different relation between the
4616 virtual address and the load address, then we need a new
4617 segment. */
4618 new_segment = TRUE;
4619 }
b5599592
AM
4620 else if (hdr->lma < last_hdr->lma + last_size
4621 || last_hdr->lma + last_size < last_hdr->lma)
4622 {
4623 /* If this section has a load address that makes it overlap
4624 the previous section, then we need a new segment. */
4625 new_segment = TRUE;
4626 }
39948a60
NC
4627 /* In the next test we have to be careful when last_hdr->lma is close
4628 to the end of the address space. If the aligned address wraps
4629 around to the start of the address space, then there are no more
4630 pages left in memory and it is OK to assume that the current
4631 section can be included in the current segment. */
4632 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4633 > last_hdr->lma)
4634 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 4635 <= hdr->lma))
8ded5a0f
AM
4636 {
4637 /* If putting this section in this segment would force us to
4638 skip a page in the segment, then we need a new segment. */
4639 new_segment = TRUE;
4640 }
4641 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
e5654c0f
AM
4642 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0
4643 && ((abfd->flags & D_PAGED) == 0
4644 || (((last_hdr->lma + last_size - 1) & -maxpagesize)
4645 != (hdr->lma & -maxpagesize))))
8ded5a0f 4646 {
e5654c0f
AM
4647 /* We don't want to put a loaded section after a
4648 nonloaded (ie. bss style) section in the same segment
4649 as that will force the non-loaded section to be loaded.
4650 Consider .tbss sections as loaded for this purpose.
4651 However, like the writable/non-writable case below,
4652 if they are on the same page then they must be put
4653 in the same segment. */
8ded5a0f
AM
4654 new_segment = TRUE;
4655 }
4656 else if ((abfd->flags & D_PAGED) == 0)
4657 {
4658 /* If the file is not demand paged, which means that we
4659 don't require the sections to be correctly aligned in the
4660 file, then there is no other reason for a new segment. */
4661 new_segment = FALSE;
4662 }
4663 else if (! writable
4664 && (hdr->flags & SEC_READONLY) == 0
8d06853e
AM
4665 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4666 != (hdr->lma & -maxpagesize)))
8ded5a0f
AM
4667 {
4668 /* We don't want to put a writable section in a read only
4669 segment, unless they are on the same page in memory
4670 anyhow. We already know that the last section does not
4671 bring us past the current section on the page, so the
4672 only case in which the new section is not on the same
4673 page as the previous section is when the previous section
4674 ends precisely on a page boundary. */
4675 new_segment = TRUE;
4676 }
4677 else
4678 {
4679 /* Otherwise, we can use the same segment. */
4680 new_segment = FALSE;
4681 }
4682
2889e75b 4683 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
4684 if (last_hdr != NULL
4685 && info != NULL
4686 && info->callbacks->override_segment_assignment != NULL)
4687 new_segment
4688 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4689 last_hdr,
4690 new_segment);
2889e75b 4691
8ded5a0f
AM
4692 if (! new_segment)
4693 {
4694 if ((hdr->flags & SEC_READONLY) == 0)
4695 writable = TRUE;
4696 last_hdr = hdr;
4697 /* .tbss sections effectively have zero size. */
4698 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4699 != SEC_THREAD_LOCAL)
4700 last_size = hdr->size;
4701 else
4702 last_size = 0;
4703 continue;
4704 }
4705
4706 /* We need a new program segment. We must create a new program
4707 header holding all the sections from phdr_index until hdr. */
4708
4709 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4710 if (m == NULL)
4711 goto error_return;
4712
4713 *pm = m;
4714 pm = &m->next;
4715
252b5132 4716 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 4717 writable = TRUE;
8ded5a0f
AM
4718 else
4719 writable = FALSE;
4720
baaff79e
JJ
4721 last_hdr = hdr;
4722 /* .tbss sections effectively have zero size. */
e5caec89 4723 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 4724 last_size = hdr->size;
baaff79e
JJ
4725 else
4726 last_size = 0;
8ded5a0f
AM
4727 phdr_index = i;
4728 phdr_in_segment = FALSE;
252b5132
RH
4729 }
4730
86b2281f
AM
4731 /* Create a final PT_LOAD program segment, but not if it's just
4732 for .tbss. */
4733 if (last_hdr != NULL
4734 && (i - phdr_index != 1
4735 || ((last_hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4736 != SEC_THREAD_LOCAL)))
8ded5a0f
AM
4737 {
4738 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4739 if (m == NULL)
4740 goto error_return;
252b5132 4741
8ded5a0f
AM
4742 *pm = m;
4743 pm = &m->next;
4744 }
252b5132 4745
8ded5a0f
AM
4746 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4747 if (dynsec != NULL)
4748 {
4749 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4750 if (m == NULL)
4751 goto error_return;
4752 *pm = m;
4753 pm = &m->next;
4754 }
252b5132 4755
1c5265b5
JJ
4756 /* For each batch of consecutive loadable .note sections,
4757 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4758 because if we link together nonloadable .note sections and
4759 loadable .note sections, we will generate two .note sections
4760 in the output file. FIXME: Using names for section types is
4761 bogus anyhow. */
8ded5a0f
AM
4762 for (s = abfd->sections; s != NULL; s = s->next)
4763 {
4764 if ((s->flags & SEC_LOAD) != 0
0112cd26 4765 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 4766 {
1c5265b5 4767 asection *s2;
91d6fa6a
NC
4768
4769 count = 1;
8ded5a0f 4770 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
4771 if (s->alignment_power == 2)
4772 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
4773 {
4774 if (s2->next->alignment_power == 2
4775 && (s2->next->flags & SEC_LOAD) != 0
4776 && CONST_STRNEQ (s2->next->name, ".note")
8d06853e
AM
4777 && align_power (s2->lma + s2->size, 2)
4778 == s2->next->lma)
55b581a6
JJ
4779 count++;
4780 else
4781 break;
4782 }
1c5265b5 4783 amt += (count - 1) * sizeof (asection *);
a50b1753 4784 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4785 if (m == NULL)
4786 goto error_return;
4787 m->next = NULL;
4788 m->p_type = PT_NOTE;
1c5265b5
JJ
4789 m->count = count;
4790 while (count > 1)
4791 {
4792 m->sections[m->count - count--] = s;
4793 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
4794 s = s->next;
4795 }
4796 m->sections[m->count - 1] = s;
4797 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
4798 *pm = m;
4799 pm = &m->next;
4800 }
4801 if (s->flags & SEC_THREAD_LOCAL)
4802 {
4803 if (! tls_count)
4804 first_tls = s;
4805 tls_count++;
4806 }
4807 }
252b5132 4808
8ded5a0f
AM
4809 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
4810 if (tls_count > 0)
4811 {
8ded5a0f
AM
4812 amt = sizeof (struct elf_segment_map);
4813 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 4814 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4815 if (m == NULL)
4816 goto error_return;
4817 m->next = NULL;
4818 m->p_type = PT_TLS;
4819 m->count = tls_count;
4820 /* Mandated PF_R. */
4821 m->p_flags = PF_R;
4822 m->p_flags_valid = 1;
d923cae0 4823 s = first_tls;
91d6fa6a 4824 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f 4825 {
d923cae0
L
4826 if ((s->flags & SEC_THREAD_LOCAL) == 0)
4827 {
4828 _bfd_error_handler
4829 (_("%B: TLS sections are not adjacent:"), abfd);
4830 s = first_tls;
4831 i = 0;
4832 while (i < (unsigned int) tls_count)
4833 {
4834 if ((s->flags & SEC_THREAD_LOCAL) != 0)
4835 {
4836 _bfd_error_handler (_(" TLS: %A"), s);
4837 i++;
4838 }
4839 else
4840 _bfd_error_handler (_(" non-TLS: %A"), s);
4841 s = s->next;
4842 }
4843 bfd_set_error (bfd_error_bad_value);
4844 goto error_return;
4845 }
4846 m->sections[i] = s;
4847 s = s->next;
8ded5a0f 4848 }
252b5132 4849
8ded5a0f
AM
4850 *pm = m;
4851 pm = &m->next;
4852 }
252b5132 4853
8ded5a0f
AM
4854 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4855 segment. */
12bd6957 4856 eh_frame_hdr = elf_eh_frame_hdr (abfd);
8ded5a0f
AM
4857 if (eh_frame_hdr != NULL
4858 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 4859 {
dc810e39 4860 amt = sizeof (struct elf_segment_map);
a50b1753 4861 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4862 if (m == NULL)
4863 goto error_return;
4864 m->next = NULL;
8ded5a0f 4865 m->p_type = PT_GNU_EH_FRAME;
252b5132 4866 m->count = 1;
8ded5a0f 4867 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
4868
4869 *pm = m;
4870 pm = &m->next;
4871 }
13ae64f3 4872
12bd6957 4873 if (elf_stack_flags (abfd))
13ae64f3 4874 {
8ded5a0f 4875 amt = sizeof (struct elf_segment_map);
a50b1753 4876 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4877 if (m == NULL)
4878 goto error_return;
4879 m->next = NULL;
2b05f1b7 4880 m->p_type = PT_GNU_STACK;
12bd6957 4881 m->p_flags = elf_stack_flags (abfd);
04c3a755 4882 m->p_align = bed->stack_align;
8ded5a0f 4883 m->p_flags_valid = 1;
04c3a755
NS
4884 m->p_align_valid = m->p_align != 0;
4885 if (info->stacksize > 0)
4886 {
4887 m->p_size = info->stacksize;
4888 m->p_size_valid = 1;
4889 }
252b5132 4890
8ded5a0f
AM
4891 *pm = m;
4892 pm = &m->next;
4893 }
65765700 4894
ceae84aa 4895 if (info != NULL && info->relro)
8ded5a0f 4896 {
f210dcff
L
4897 for (m = mfirst; m != NULL; m = m->next)
4898 {
3832a4d8
AM
4899 if (m->p_type == PT_LOAD
4900 && m->count != 0
4901 && m->sections[0]->vma >= info->relro_start
4902 && m->sections[0]->vma < info->relro_end)
f210dcff 4903 {
3832a4d8
AM
4904 i = m->count;
4905 while (--i != (unsigned) -1)
4906 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
4907 == (SEC_LOAD | SEC_HAS_CONTENTS))
4908 break;
4909
43a8475c 4910 if (i != (unsigned) -1)
f210dcff
L
4911 break;
4912 }
be01b344 4913 }
f210dcff
L
4914
4915 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
4916 if (m != NULL)
4917 {
4918 amt = sizeof (struct elf_segment_map);
a50b1753 4919 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
4920 if (m == NULL)
4921 goto error_return;
4922 m->next = NULL;
4923 m->p_type = PT_GNU_RELRO;
f210dcff
L
4924 *pm = m;
4925 pm = &m->next;
4926 }
8ded5a0f 4927 }
9ee5e499 4928
8ded5a0f 4929 free (sections);
12bd6957 4930 elf_seg_map (abfd) = mfirst;
9ee5e499
JJ
4931 }
4932
3dea8fca 4933 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 4934 return FALSE;
8c37241b 4935
12bd6957 4936 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
8ded5a0f 4937 ++count;
12bd6957 4938 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
252b5132 4939
b34976b6 4940 return TRUE;
252b5132
RH
4941
4942 error_return:
4943 if (sections != NULL)
4944 free (sections);
b34976b6 4945 return FALSE;
252b5132
RH
4946}
4947
4948/* Sort sections by address. */
4949
4950static int
217aa764 4951elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4952{
4953 const asection *sec1 = *(const asection **) arg1;
4954 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4955 bfd_size_type size1, size2;
252b5132
RH
4956
4957 /* Sort by LMA first, since this is the address used to
4958 place the section into a segment. */
4959 if (sec1->lma < sec2->lma)
4960 return -1;
4961 else if (sec1->lma > sec2->lma)
4962 return 1;
4963
4964 /* Then sort by VMA. Normally the LMA and the VMA will be
4965 the same, and this will do nothing. */
4966 if (sec1->vma < sec2->vma)
4967 return -1;
4968 else if (sec1->vma > sec2->vma)
4969 return 1;
4970
4971 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4972
07c6e936 4973#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4974
4975 if (TOEND (sec1))
4976 {
4977 if (TOEND (sec2))
00a7cdc5
NC
4978 {
4979 /* If the indicies are the same, do not return 0
4980 here, but continue to try the next comparison. */
4981 if (sec1->target_index - sec2->target_index != 0)
4982 return sec1->target_index - sec2->target_index;
4983 }
252b5132
RH
4984 else
4985 return 1;
4986 }
00a7cdc5 4987 else if (TOEND (sec2))
252b5132
RH
4988 return -1;
4989
4990#undef TOEND
4991
00a7cdc5
NC
4992 /* Sort by size, to put zero sized sections
4993 before others at the same address. */
252b5132 4994
eea6121a
AM
4995 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4996 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4997
4998 if (size1 < size2)
252b5132 4999 return -1;
eecdbe52 5000 if (size1 > size2)
252b5132
RH
5001 return 1;
5002
5003 return sec1->target_index - sec2->target_index;
5004}
5005
340b6d91
AC
5006/* Ian Lance Taylor writes:
5007
5008 We shouldn't be using % with a negative signed number. That's just
5009 not good. We have to make sure either that the number is not
5010 negative, or that the number has an unsigned type. When the types
5011 are all the same size they wind up as unsigned. When file_ptr is a
5012 larger signed type, the arithmetic winds up as signed long long,
5013 which is wrong.
5014
5015 What we're trying to say here is something like ``increase OFF by
5016 the least amount that will cause it to be equal to the VMA modulo
5017 the page size.'' */
5018/* In other words, something like:
5019
5020 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5021 off_offset = off % bed->maxpagesize;
5022 if (vma_offset < off_offset)
5023 adjustment = vma_offset + bed->maxpagesize - off_offset;
5024 else
5025 adjustment = vma_offset - off_offset;
08a40648 5026
340b6d91
AC
5027 which can can be collapsed into the expression below. */
5028
5029static file_ptr
5030vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5031{
dc9155b2
NC
5032 /* PR binutils/16199: Handle an alignment of zero. */
5033 if (maxpagesize == 0)
5034 maxpagesize = 1;
340b6d91
AC
5035 return ((vma - off) % maxpagesize);
5036}
5037
6d33f217
L
5038static void
5039print_segment_map (const struct elf_segment_map *m)
5040{
5041 unsigned int j;
5042 const char *pt = get_segment_type (m->p_type);
5043 char buf[32];
5044
5045 if (pt == NULL)
5046 {
5047 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5048 sprintf (buf, "LOPROC+%7.7x",
5049 (unsigned int) (m->p_type - PT_LOPROC));
5050 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5051 sprintf (buf, "LOOS+%7.7x",
5052 (unsigned int) (m->p_type - PT_LOOS));
5053 else
5054 snprintf (buf, sizeof (buf), "%8.8x",
5055 (unsigned int) m->p_type);
5056 pt = buf;
5057 }
4a97a0e5 5058 fflush (stdout);
6d33f217
L
5059 fprintf (stderr, "%s:", pt);
5060 for (j = 0; j < m->count; j++)
5061 fprintf (stderr, " %s", m->sections [j]->name);
5062 putc ('\n',stderr);
4a97a0e5 5063 fflush (stderr);
6d33f217
L
5064}
5065
32812159
AM
5066static bfd_boolean
5067write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5068{
5069 void *buf;
5070 bfd_boolean ret;
5071
5072 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5073 return FALSE;
5074 buf = bfd_zmalloc (len);
5075 if (buf == NULL)
5076 return FALSE;
5077 ret = bfd_bwrite (buf, len, abfd) == len;
5078 free (buf);
5079 return ret;
5080}
5081
252b5132
RH
5082/* Assign file positions to the sections based on the mapping from
5083 sections to segments. This function also sets up some fields in
f3520d2f 5084 the file header. */
252b5132 5085
b34976b6 5086static bfd_boolean
f3520d2f
AM
5087assign_file_positions_for_load_sections (bfd *abfd,
5088 struct bfd_link_info *link_info)
252b5132
RH
5089{
5090 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5091 struct elf_segment_map *m;
252b5132 5092 Elf_Internal_Phdr *phdrs;
252b5132 5093 Elf_Internal_Phdr *p;
02bf8d82 5094 file_ptr off;
3f570048 5095 bfd_size_type maxpagesize;
f3520d2f 5096 unsigned int alloc;
0920dee7 5097 unsigned int i, j;
2b0bc088 5098 bfd_vma header_pad = 0;
252b5132 5099
e36284ab 5100 if (link_info == NULL
ceae84aa 5101 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 5102 return FALSE;
252b5132 5103
8ded5a0f 5104 alloc = 0;
12bd6957 5105 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
2b0bc088
NC
5106 {
5107 ++alloc;
5108 if (m->header_size)
5109 header_pad = m->header_size;
5110 }
252b5132 5111
82f2dbf7
NC
5112 if (alloc)
5113 {
5114 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5115 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5116 }
5117 else
5118 {
5119 /* PR binutils/12467. */
5120 elf_elfheader (abfd)->e_phoff = 0;
5121 elf_elfheader (abfd)->e_phentsize = 0;
5122 }
d324f6d6 5123
8ded5a0f 5124 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 5125
12bd6957
AM
5126 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
5127 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
8ded5a0f 5128 else
12bd6957 5129 BFD_ASSERT (elf_program_header_size (abfd)
59e0647f 5130 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
5131
5132 if (alloc == 0)
f3520d2f 5133 {
12bd6957 5134 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
8ded5a0f 5135 return TRUE;
f3520d2f 5136 }
252b5132 5137
12bd6957 5138 /* We're writing the size in elf_program_header_size (abfd),
57268894
HPN
5139 see assign_file_positions_except_relocs, so make sure we have
5140 that amount allocated, with trailing space cleared.
12bd6957
AM
5141 The variable alloc contains the computed need, while
5142 elf_program_header_size (abfd) contains the size used for the
57268894
HPN
5143 layout.
5144 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5145 where the layout is forced to according to a larger size in the
5146 last iterations for the testcase ld-elf/header. */
12bd6957 5147 BFD_ASSERT (elf_program_header_size (abfd) % bed->s->sizeof_phdr
57268894 5148 == 0);
a50b1753
NC
5149 phdrs = (Elf_Internal_Phdr *)
5150 bfd_zalloc2 (abfd,
12bd6957 5151 (elf_program_header_size (abfd) / bed->s->sizeof_phdr),
a50b1753 5152 sizeof (Elf_Internal_Phdr));
f3520d2f 5153 elf_tdata (abfd)->phdr = phdrs;
252b5132 5154 if (phdrs == NULL)
b34976b6 5155 return FALSE;
252b5132 5156
3f570048
AM
5157 maxpagesize = 1;
5158 if ((abfd->flags & D_PAGED) != 0)
5159 maxpagesize = bed->maxpagesize;
5160
252b5132
RH
5161 off = bed->s->sizeof_ehdr;
5162 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
5163 if (header_pad < (bfd_vma) off)
5164 header_pad = 0;
5165 else
5166 header_pad -= off;
5167 off += header_pad;
252b5132 5168
12bd6957 5169 for (m = elf_seg_map (abfd), p = phdrs, j = 0;
252b5132 5170 m != NULL;
0920dee7 5171 m = m->next, p++, j++)
252b5132 5172 {
252b5132 5173 asection **secpp;
bf988460
AM
5174 bfd_vma off_adjust;
5175 bfd_boolean no_contents;
252b5132
RH
5176
5177 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 5178 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
5179 not be done to the PT_NOTE section of a corefile, which may
5180 contain several pseudo-sections artificially created by bfd.
5181 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
5182 if (m->count > 1
5183 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 5184 && m->p_type == PT_NOTE))
252b5132
RH
5185 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5186 elf_sort_sections);
5187
b301b248
AM
5188 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5189 number of sections with contents contributing to both p_filesz
5190 and p_memsz, followed by a number of sections with no contents
5191 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 5192 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 5193 p->p_type = m->p_type;
28a7f3e7 5194 p->p_flags = m->p_flags;
252b5132 5195
3f570048
AM
5196 if (m->count == 0)
5197 p->p_vaddr = 0;
5198 else
3271a814 5199 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
5200
5201 if (m->p_paddr_valid)
5202 p->p_paddr = m->p_paddr;
5203 else if (m->count == 0)
5204 p->p_paddr = 0;
5205 else
08a40648 5206 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
5207
5208 if (p->p_type == PT_LOAD
5209 && (abfd->flags & D_PAGED) != 0)
5210 {
5211 /* p_align in demand paged PT_LOAD segments effectively stores
5212 the maximum page size. When copying an executable with
5213 objcopy, we set m->p_align from the input file. Use this
5214 value for maxpagesize rather than bed->maxpagesize, which
5215 may be different. Note that we use maxpagesize for PT_TLS
5216 segment alignment later in this function, so we are relying
5217 on at least one PT_LOAD segment appearing before a PT_TLS
5218 segment. */
5219 if (m->p_align_valid)
5220 maxpagesize = m->p_align;
5221
5222 p->p_align = maxpagesize;
5223 }
3271a814
NS
5224 else if (m->p_align_valid)
5225 p->p_align = m->p_align;
e970b90a
DJ
5226 else if (m->count == 0)
5227 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
5228 else
5229 p->p_align = 0;
5230
bf988460
AM
5231 no_contents = FALSE;
5232 off_adjust = 0;
252b5132 5233 if (p->p_type == PT_LOAD
b301b248 5234 && m->count > 0)
252b5132 5235 {
b301b248 5236 bfd_size_type align;
a49e53ed 5237 unsigned int align_power = 0;
b301b248 5238
3271a814
NS
5239 if (m->p_align_valid)
5240 align = p->p_align;
5241 else
252b5132 5242 {
3271a814
NS
5243 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5244 {
5245 unsigned int secalign;
08a40648 5246
3271a814
NS
5247 secalign = bfd_get_section_alignment (abfd, *secpp);
5248 if (secalign > align_power)
5249 align_power = secalign;
5250 }
5251 align = (bfd_size_type) 1 << align_power;
5252 if (align < maxpagesize)
5253 align = maxpagesize;
b301b248 5254 }
252b5132 5255
02bf8d82
AM
5256 for (i = 0; i < m->count; i++)
5257 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5258 /* If we aren't making room for this section, then
5259 it must be SHT_NOBITS regardless of what we've
5260 set via struct bfd_elf_special_section. */
5261 elf_section_type (m->sections[i]) = SHT_NOBITS;
5262
bf988460 5263 /* Find out whether this segment contains any loadable
aea274d3
AM
5264 sections. */
5265 no_contents = TRUE;
5266 for (i = 0; i < m->count; i++)
5267 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5268 {
5269 no_contents = FALSE;
5270 break;
5271 }
bf988460 5272
85cfcbfb 5273 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
bf988460
AM
5274 off += off_adjust;
5275 if (no_contents)
5276 {
5277 /* We shouldn't need to align the segment on disk since
5278 the segment doesn't need file space, but the gABI
5279 arguably requires the alignment and glibc ld.so
5280 checks it. So to comply with the alignment
5281 requirement but not waste file space, we adjust
5282 p_offset for just this segment. (OFF_ADJUST is
5283 subtracted from OFF later.) This may put p_offset
5284 past the end of file, but that shouldn't matter. */
5285 }
5286 else
5287 off_adjust = 0;
252b5132 5288 }
b1a6d0b1
NC
5289 /* Make sure the .dynamic section is the first section in the
5290 PT_DYNAMIC segment. */
5291 else if (p->p_type == PT_DYNAMIC
5292 && m->count > 1
5293 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5294 {
5295 _bfd_error_handler
b301b248
AM
5296 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
5297 abfd);
b1a6d0b1
NC
5298 bfd_set_error (bfd_error_bad_value);
5299 return FALSE;
5300 }
3f001e84
JK
5301 /* Set the note section type to SHT_NOTE. */
5302 else if (p->p_type == PT_NOTE)
5303 for (i = 0; i < m->count; i++)
5304 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 5305
252b5132
RH
5306 p->p_offset = 0;
5307 p->p_filesz = 0;
5308 p->p_memsz = 0;
5309
5310 if (m->includes_filehdr)
5311 {
bf988460 5312 if (!m->p_flags_valid)
252b5132 5313 p->p_flags |= PF_R;
252b5132
RH
5314 p->p_filesz = bed->s->sizeof_ehdr;
5315 p->p_memsz = bed->s->sizeof_ehdr;
5316 if (m->count > 0)
5317 {
9ab82472
L
5318 if (p->p_vaddr < (bfd_vma) off
5319 || (!m->p_paddr_valid
5320 && p->p_paddr < (bfd_vma) off))
252b5132 5321 {
4eca0228 5322 _bfd_error_handler
b301b248
AM
5323 (_("%B: Not enough room for program headers, try linking with -N"),
5324 abfd);
252b5132 5325 bfd_set_error (bfd_error_bad_value);
b34976b6 5326 return FALSE;
252b5132
RH
5327 }
5328
5329 p->p_vaddr -= off;
bf988460 5330 if (!m->p_paddr_valid)
252b5132
RH
5331 p->p_paddr -= off;
5332 }
252b5132
RH
5333 }
5334
5335 if (m->includes_phdrs)
5336 {
bf988460 5337 if (!m->p_flags_valid)
252b5132
RH
5338 p->p_flags |= PF_R;
5339
f3520d2f 5340 if (!m->includes_filehdr)
252b5132
RH
5341 {
5342 p->p_offset = bed->s->sizeof_ehdr;
5343
5344 if (m->count > 0)
5345 {
252b5132 5346 p->p_vaddr -= off - p->p_offset;
bf988460 5347 if (!m->p_paddr_valid)
252b5132
RH
5348 p->p_paddr -= off - p->p_offset;
5349 }
252b5132
RH
5350 }
5351
5352 p->p_filesz += alloc * bed->s->sizeof_phdr;
5353 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
5354 if (m->count)
5355 {
5356 p->p_filesz += header_pad;
5357 p->p_memsz += header_pad;
5358 }
252b5132
RH
5359 }
5360
5361 if (p->p_type == PT_LOAD
5362 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5363 {
bf988460 5364 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 5365 p->p_offset = off;
252b5132
RH
5366 else
5367 {
5368 file_ptr adjust;
5369
5370 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
5371 if (!no_contents)
5372 p->p_filesz += adjust;
252b5132
RH
5373 p->p_memsz += adjust;
5374 }
5375 }
5376
1ea63fd2
AM
5377 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5378 maps. Set filepos for sections in PT_LOAD segments, and in
5379 core files, for sections in PT_NOTE segments.
5380 assign_file_positions_for_non_load_sections will set filepos
5381 for other sections and update p_filesz for other segments. */
252b5132
RH
5382 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5383 {
5384 asection *sec;
252b5132 5385 bfd_size_type align;
627b32bc 5386 Elf_Internal_Shdr *this_hdr;
252b5132
RH
5387
5388 sec = *secpp;
02bf8d82 5389 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 5390 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 5391
88967714
AM
5392 if ((p->p_type == PT_LOAD
5393 || p->p_type == PT_TLS)
5394 && (this_hdr->sh_type != SHT_NOBITS
5395 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5396 && ((this_hdr->sh_flags & SHF_TLS) == 0
5397 || p->p_type == PT_TLS))))
252b5132 5398 {
b5599592
AM
5399 bfd_vma p_start = p->p_paddr;
5400 bfd_vma p_end = p_start + p->p_memsz;
5401 bfd_vma s_start = sec->lma;
5402 bfd_vma adjust = s_start - p_end;
252b5132 5403
a2d1e028
L
5404 if (adjust != 0
5405 && (s_start < p_end
5406 || p_end < p_start))
252b5132 5407 {
4eca0228 5408 _bfd_error_handler
695344c0 5409 /* xgettext:c-format */
b5599592
AM
5410 (_("%B: section %A lma %#lx adjusted to %#lx"), abfd, sec,
5411 (unsigned long) s_start, (unsigned long) p_end);
88967714 5412 adjust = 0;
b5599592 5413 sec->lma = p_end;
1cfb7d1e 5414 }
3ac9b6c9 5415 p->p_memsz += adjust;
1cfb7d1e 5416
88967714
AM
5417 if (this_hdr->sh_type != SHT_NOBITS)
5418 {
32812159
AM
5419 if (p->p_filesz + adjust < p->p_memsz)
5420 {
5421 /* We have a PROGBITS section following NOBITS ones.
5422 Allocate file space for the NOBITS section(s) and
5423 zero it. */
5424 adjust = p->p_memsz - p->p_filesz;
5425 if (!write_zeros (abfd, off, adjust))
5426 return FALSE;
5427 }
88967714
AM
5428 off += adjust;
5429 p->p_filesz += adjust;
252b5132 5430 }
252b5132
RH
5431 }
5432
5433 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5434 {
b301b248
AM
5435 /* The section at i == 0 is the one that actually contains
5436 everything. */
4a938328
MS
5437 if (i == 0)
5438 {
627b32bc 5439 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
5440 off += this_hdr->sh_size;
5441 p->p_filesz = this_hdr->sh_size;
b301b248
AM
5442 p->p_memsz = 0;
5443 p->p_align = 1;
252b5132 5444 }
4a938328 5445 else
252b5132 5446 {
b301b248 5447 /* The rest are fake sections that shouldn't be written. */
252b5132 5448 sec->filepos = 0;
eea6121a 5449 sec->size = 0;
b301b248
AM
5450 sec->flags = 0;
5451 continue;
252b5132 5452 }
252b5132
RH
5453 }
5454 else
5455 {
1e951488 5456 if (p->p_type == PT_LOAD)
b301b248 5457 {
1e951488
AM
5458 this_hdr->sh_offset = sec->filepos = off;
5459 if (this_hdr->sh_type != SHT_NOBITS)
5460 off += this_hdr->sh_size;
5461 }
5462 else if (this_hdr->sh_type == SHT_NOBITS
5463 && (this_hdr->sh_flags & SHF_TLS) != 0
5464 && this_hdr->sh_offset == 0)
5465 {
5466 /* This is a .tbss section that didn't get a PT_LOAD.
5467 (See _bfd_elf_map_sections_to_segments "Create a
5468 final PT_LOAD".) Set sh_offset to the value it
5469 would have if we had created a zero p_filesz and
5470 p_memsz PT_LOAD header for the section. This
5471 also makes the PT_TLS header have the same
5472 p_offset value. */
5473 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5474 off, align);
5475 this_hdr->sh_offset = sec->filepos = off + adjust;
b301b248 5476 }
252b5132 5477
02bf8d82 5478 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 5479 {
6a3cd2b4 5480 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
5481 /* A load section without SHF_ALLOC is something like
5482 a note section in a PT_NOTE segment. These take
5483 file space but are not loaded into memory. */
5484 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 5485 p->p_memsz += this_hdr->sh_size;
b301b248 5486 }
6a3cd2b4 5487 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 5488 {
6a3cd2b4
AM
5489 if (p->p_type == PT_TLS)
5490 p->p_memsz += this_hdr->sh_size;
5491
5492 /* .tbss is special. It doesn't contribute to p_memsz of
5493 normal segments. */
5494 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5495 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
5496 }
5497
b10a8ae0
L
5498 if (align > p->p_align
5499 && !m->p_align_valid
5500 && (p->p_type != PT_LOAD
5501 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
5502 p->p_align = align;
5503 }
5504
bf988460 5505 if (!m->p_flags_valid)
252b5132
RH
5506 {
5507 p->p_flags |= PF_R;
02bf8d82 5508 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 5509 p->p_flags |= PF_X;
02bf8d82 5510 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
5511 p->p_flags |= PF_W;
5512 }
5513 }
43a8475c 5514
bf988460 5515 off -= off_adjust;
0920dee7 5516
7c928300
AM
5517 /* Check that all sections are in a PT_LOAD segment.
5518 Don't check funky gdb generated core files. */
5519 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
5520 {
5521 bfd_boolean check_vma = TRUE;
5522
5523 for (i = 1; i < m->count; i++)
5524 if (m->sections[i]->vma == m->sections[i - 1]->vma
5525 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5526 ->this_hdr), p) != 0
5527 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5528 ->this_hdr), p) != 0)
0920dee7 5529 {
9a83a553
AM
5530 /* Looks like we have overlays packed into the segment. */
5531 check_vma = FALSE;
5532 break;
0920dee7 5533 }
9a83a553
AM
5534
5535 for (i = 0; i < m->count; i++)
5536 {
5537 Elf_Internal_Shdr *this_hdr;
5538 asection *sec;
5539
5540 sec = m->sections[i];
5541 this_hdr = &(elf_section_data(sec)->this_hdr);
86b2281f
AM
5542 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5543 && !ELF_TBSS_SPECIAL (this_hdr, p))
9a83a553 5544 {
4eca0228 5545 _bfd_error_handler
695344c0 5546 /* xgettext:c-format */
9a83a553
AM
5547 (_("%B: section `%A' can't be allocated in segment %d"),
5548 abfd, sec, j);
5549 print_segment_map (m);
5550 }
5551 }
5552 }
252b5132
RH
5553 }
5554
12bd6957 5555 elf_next_file_pos (abfd) = off;
f3520d2f
AM
5556 return TRUE;
5557}
5558
5559/* Assign file positions for the other sections. */
5560
5561static bfd_boolean
5562assign_file_positions_for_non_load_sections (bfd *abfd,
5563 struct bfd_link_info *link_info)
5564{
5565 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5566 Elf_Internal_Shdr **i_shdrpp;
e06efbf1 5567 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
f3520d2f
AM
5568 Elf_Internal_Phdr *phdrs;
5569 Elf_Internal_Phdr *p;
5570 struct elf_segment_map *m;
62655c7b 5571 struct elf_segment_map *hdrs_segment;
f3520d2f
AM
5572 bfd_vma filehdr_vaddr, filehdr_paddr;
5573 bfd_vma phdrs_vaddr, phdrs_paddr;
5574 file_ptr off;
f3520d2f
AM
5575 unsigned int count;
5576
5c182d5f 5577 i_shdrpp = elf_elfsections (abfd);
e06efbf1 5578 end_hdrpp = i_shdrpp + elf_numsections (abfd);
12bd6957 5579 off = elf_next_file_pos (abfd);
e06efbf1 5580 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
5c182d5f 5581 {
5c182d5f
AM
5582 Elf_Internal_Shdr *hdr;
5583
5584 hdr = *hdrpp;
5585 if (hdr->bfd_section != NULL
252e386e
AM
5586 && (hdr->bfd_section->filepos != 0
5587 || (hdr->sh_type == SHT_NOBITS
5588 && hdr->contents == NULL)))
627b32bc 5589 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
5590 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
5591 {
e8d2ba53 5592 if (hdr->sh_size != 0)
4eca0228 5593 _bfd_error_handler
695344c0 5594 /* xgettext:c-format */
e8d2ba53
AM
5595 (_("%B: warning: allocated section `%s' not in segment"),
5596 abfd,
5597 (hdr->bfd_section == NULL
5598 ? "*unknown*"
5599 : hdr->bfd_section->name));
3ba71138
L
5600 /* We don't need to page align empty sections. */
5601 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
5602 off += vma_page_aligned_bias (hdr->sh_addr, off,
5603 bed->maxpagesize);
5604 else
5605 off += vma_page_aligned_bias (hdr->sh_addr, off,
5606 hdr->sh_addralign);
5607 off = _bfd_elf_assign_file_position_for_section (hdr, off,
5608 FALSE);
5609 }
5610 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5611 && hdr->bfd_section == NULL)
0ce398f1
L
5612 || (hdr->bfd_section != NULL
5613 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS))
5614 /* Compress DWARF debug sections. */
12bd6957 5615 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6a40cf0c
NC
5616 || (elf_symtab_shndx_list (abfd) != NULL
5617 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
5618 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
5619 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
5c182d5f
AM
5620 hdr->sh_offset = -1;
5621 else
5622 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
5623 }
5624
252b5132
RH
5625 /* Now that we have set the section file positions, we can set up
5626 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
5627 count = 0;
5628 filehdr_vaddr = 0;
5629 filehdr_paddr = 0;
5630 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
5631 phdrs_paddr = 0;
62655c7b 5632 hdrs_segment = NULL;
f3520d2f 5633 phdrs = elf_tdata (abfd)->phdr;
12bd6957 5634 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
f3520d2f
AM
5635 {
5636 ++count;
5637 if (p->p_type != PT_LOAD)
5638 continue;
5639
5640 if (m->includes_filehdr)
5641 {
5642 filehdr_vaddr = p->p_vaddr;
5643 filehdr_paddr = p->p_paddr;
5644 }
5645 if (m->includes_phdrs)
5646 {
5647 phdrs_vaddr = p->p_vaddr;
5648 phdrs_paddr = p->p_paddr;
5649 if (m->includes_filehdr)
5650 {
62655c7b 5651 hdrs_segment = m;
f3520d2f
AM
5652 phdrs_vaddr += bed->s->sizeof_ehdr;
5653 phdrs_paddr += bed->s->sizeof_ehdr;
5654 }
5655 }
5656 }
5657
62655c7b
RM
5658 if (hdrs_segment != NULL && link_info != NULL)
5659 {
5660 /* There is a segment that contains both the file headers and the
5661 program headers, so provide a symbol __ehdr_start pointing there.
5662 A program can use this to examine itself robustly. */
5663
5664 struct elf_link_hash_entry *hash
5665 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5666 FALSE, FALSE, TRUE);
5667 /* If the symbol was referenced and not defined, define it. */
5668 if (hash != NULL
5669 && (hash->root.type == bfd_link_hash_new
5670 || hash->root.type == bfd_link_hash_undefined
5671 || hash->root.type == bfd_link_hash_undefweak
5672 || hash->root.type == bfd_link_hash_common))
5673 {
5674 asection *s = NULL;
5675 if (hdrs_segment->count != 0)
5676 /* The segment contains sections, so use the first one. */
5677 s = hdrs_segment->sections[0];
5678 else
5679 /* Use the first (i.e. lowest-addressed) section in any segment. */
12bd6957 5680 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62655c7b
RM
5681 if (m->count != 0)
5682 {
5683 s = m->sections[0];
5684 break;
5685 }
5686
5687 if (s != NULL)
5688 {
5689 hash->root.u.def.value = filehdr_vaddr - s->vma;
5690 hash->root.u.def.section = s;
5691 }
5692 else
5693 {
5694 hash->root.u.def.value = filehdr_vaddr;
5695 hash->root.u.def.section = bfd_abs_section_ptr;
5696 }
5697
5698 hash->root.type = bfd_link_hash_defined;
5699 hash->def_regular = 1;
5700 hash->non_elf = 0;
5701 }
5702 }
5703
12bd6957 5704 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
252b5132 5705 {
129af99f 5706 if (p->p_type == PT_GNU_RELRO)
252b5132 5707 {
b84a33b5 5708 const Elf_Internal_Phdr *lp;
3146fac4 5709 struct elf_segment_map *lm;
1ea63fd2 5710
129af99f 5711 if (link_info != NULL)
8c37241b 5712 {
129af99f
AS
5713 /* During linking the range of the RELRO segment is passed
5714 in link_info. */
12bd6957 5715 for (lm = elf_seg_map (abfd), lp = phdrs;
3146fac4
AM
5716 lm != NULL;
5717 lm = lm->next, lp++)
8c37241b
JJ
5718 {
5719 if (lp->p_type == PT_LOAD
b84a33b5 5720 && lp->p_vaddr < link_info->relro_end
3146fac4
AM
5721 && lm->count != 0
5722 && lm->sections[0]->vma >= link_info->relro_start)
8c37241b
JJ
5723 break;
5724 }
8981c88a 5725
3146fac4 5726 BFD_ASSERT (lm != NULL);
8c37241b 5727 }
129af99f
AS
5728 else
5729 {
5730 /* Otherwise we are copying an executable or shared
b84a33b5 5731 library, but we need to use the same linker logic. */
129af99f
AS
5732 for (lp = phdrs; lp < phdrs + count; ++lp)
5733 {
5734 if (lp->p_type == PT_LOAD
5735 && lp->p_paddr == p->p_paddr)
5736 break;
5737 }
b84a33b5
AM
5738 }
5739
5740 if (lp < phdrs + count)
5741 {
5742 p->p_vaddr = lp->p_vaddr;
5743 p->p_paddr = lp->p_paddr;
5744 p->p_offset = lp->p_offset;
5745 if (link_info != NULL)
5746 p->p_filesz = link_info->relro_end - lp->p_vaddr;
5747 else if (m->p_size_valid)
5748 p->p_filesz = m->p_size;
129af99f
AS
5749 else
5750 abort ();
b84a33b5 5751 p->p_memsz = p->p_filesz;
f3944f72
L
5752 /* Preserve the alignment and flags if they are valid. The
5753 gold linker generates RW/4 for the PT_GNU_RELRO section.
5754 It is better for objcopy/strip to honor these attributes
5755 otherwise gdb will choke when using separate debug files.
5756 */
5757 if (!m->p_align_valid)
5758 p->p_align = 1;
5759 if (!m->p_flags_valid)
341b8ee7 5760 p->p_flags = PF_R;
129af99f 5761 }
9433b9b1 5762 else
b84a33b5
AM
5763 {
5764 memset (p, 0, sizeof *p);
5765 p->p_type = PT_NULL;
5766 }
129af99f 5767 }
04c3a755
NS
5768 else if (p->p_type == PT_GNU_STACK)
5769 {
5770 if (m->p_size_valid)
5771 p->p_memsz = m->p_size;
5772 }
129af99f
AS
5773 else if (m->count != 0)
5774 {
e06efbf1 5775 unsigned int i;
129af99f
AS
5776 if (p->p_type != PT_LOAD
5777 && (p->p_type != PT_NOTE
5778 || bfd_get_format (abfd) != bfd_core))
5779 {
c86934ce
NC
5780 if (m->includes_filehdr || m->includes_phdrs)
5781 {
b1fa9dd6 5782 /* PR 17512: file: 2195325e. */
4eca0228 5783 _bfd_error_handler
c86934ce
NC
5784 (_("%B: warning: non-load segment includes file header and/or program header"),
5785 abfd);
5786 return FALSE;
5787 }
129af99f 5788
86b2281f 5789 p->p_filesz = 0;
129af99f 5790 p->p_offset = m->sections[0]->filepos;
86b2281f
AM
5791 for (i = m->count; i-- != 0;)
5792 {
5793 asection *sect = m->sections[i];
5794 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
5795 if (hdr->sh_type != SHT_NOBITS)
5796 {
5797 p->p_filesz = (sect->filepos - m->sections[0]->filepos
5798 + hdr->sh_size);
5799 break;
5800 }
5801 }
129af99f
AS
5802 }
5803 }
5804 else if (m->includes_filehdr)
5805 {
5806 p->p_vaddr = filehdr_vaddr;
5807 if (! m->p_paddr_valid)
5808 p->p_paddr = filehdr_paddr;
5809 }
5810 else if (m->includes_phdrs)
5811 {
5812 p->p_vaddr = phdrs_vaddr;
5813 if (! m->p_paddr_valid)
5814 p->p_paddr = phdrs_paddr;
252b5132
RH
5815 }
5816 }
5817
12bd6957 5818 elf_next_file_pos (abfd) = off;
252b5132 5819
b34976b6 5820 return TRUE;
252b5132
RH
5821}
5822
6a40cf0c
NC
5823static elf_section_list *
5824find_section_in_list (unsigned int i, elf_section_list * list)
5825{
5826 for (;list != NULL; list = list->next)
5827 if (list->ndx == i)
5828 break;
5829 return list;
5830}
5831
252b5132
RH
5832/* Work out the file positions of all the sections. This is called by
5833 _bfd_elf_compute_section_file_positions. All the section sizes and
5834 VMAs must be known before this is called.
5835
e0638f70
AM
5836 Reloc sections come in two flavours: Those processed specially as
5837 "side-channel" data attached to a section to which they apply, and
5838 those that bfd doesn't process as relocations. The latter sort are
5839 stored in a normal bfd section by bfd_section_from_shdr. We don't
5840 consider the former sort here, unless they form part of the loadable
5841 image. Reloc sections not assigned here will be handled later by
5842 assign_file_positions_for_relocs.
252b5132
RH
5843
5844 We also don't set the positions of the .symtab and .strtab here. */
5845
b34976b6 5846static bfd_boolean
c84fca4d
AO
5847assign_file_positions_except_relocs (bfd *abfd,
5848 struct bfd_link_info *link_info)
252b5132 5849{
5c182d5f
AM
5850 struct elf_obj_tdata *tdata = elf_tdata (abfd);
5851 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
9c5bfbb7 5852 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5853
5854 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
5855 && bfd_get_format (abfd) != bfd_core)
5856 {
5c182d5f
AM
5857 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
5858 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
5859 Elf_Internal_Shdr **hdrpp;
5860 unsigned int i;
a485e98e 5861 file_ptr off;
252b5132
RH
5862
5863 /* Start after the ELF header. */
5864 off = i_ehdrp->e_ehsize;
5865
5866 /* We are not creating an executable, which means that we are
5867 not creating a program header, and that the actual order of
5868 the sections in the file is unimportant. */
9ad5cbcf 5869 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
5870 {
5871 Elf_Internal_Shdr *hdr;
5872
5873 hdr = *hdrpp;
e0638f70
AM
5874 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5875 && hdr->bfd_section == NULL)
0ce398f1
L
5876 || (hdr->bfd_section != NULL
5877 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS))
5878 /* Compress DWARF debug sections. */
12bd6957 5879 || i == elf_onesymtab (abfd)
6a40cf0c
NC
5880 || (elf_symtab_shndx_list (abfd) != NULL
5881 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
5882 || i == elf_strtab_sec (abfd)
5883 || i == elf_shstrtab_sec (abfd))
252b5132
RH
5884 {
5885 hdr->sh_offset = -1;
252b5132 5886 }
9ad5cbcf 5887 else
b34976b6 5888 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 5889 }
a485e98e
AM
5890
5891 elf_next_file_pos (abfd) = off;
252b5132
RH
5892 }
5893 else
5894 {
f3520d2f
AM
5895 unsigned int alloc;
5896
252b5132 5897 /* Assign file positions for the loaded sections based on the
08a40648 5898 assignment of sections to segments. */
f3520d2f
AM
5899 if (!assign_file_positions_for_load_sections (abfd, link_info))
5900 return FALSE;
5901
5902 /* And for non-load sections. */
5903 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
5904 return FALSE;
5905
e36284ab
AM
5906 if (bed->elf_backend_modify_program_headers != NULL)
5907 {
5908 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
5909 return FALSE;
5910 }
5911
58e7ebac 5912 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=. */
0e1862bb 5913 if (link_info != NULL && bfd_link_pie (link_info))
58e7ebac
L
5914 {
5915 unsigned int num_segments = elf_elfheader (abfd)->e_phnum;
5916 Elf_Internal_Phdr *segment = elf_tdata (abfd)->phdr;
5917 Elf_Internal_Phdr *end_segment = &segment[num_segments];
5918
5919 /* Find the lowest p_vaddr in PT_LOAD segments. */
5920 bfd_vma p_vaddr = (bfd_vma) -1;
5921 for (; segment < end_segment; segment++)
5922 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
5923 p_vaddr = segment->p_vaddr;
5924
5925 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
5926 segments is non-zero. */
5927 if (p_vaddr)
5928 i_ehdrp->e_type = ET_EXEC;
5929 }
5930
f3520d2f 5931 /* Write out the program headers. */
12bd6957 5932 alloc = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
f3520d2f
AM
5933 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
5934 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 5935 return FALSE;
252b5132
RH
5936 }
5937
b34976b6 5938 return TRUE;
252b5132
RH
5939}
5940
b34976b6 5941static bfd_boolean
217aa764 5942prep_headers (bfd *abfd)
252b5132 5943{
3d540e93 5944 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 5945 struct elf_strtab_hash *shstrtab;
9c5bfbb7 5946 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5947
5948 i_ehdrp = elf_elfheader (abfd);
252b5132 5949
2b0f7ef9 5950 shstrtab = _bfd_elf_strtab_init ();
252b5132 5951 if (shstrtab == NULL)
b34976b6 5952 return FALSE;
252b5132
RH
5953
5954 elf_shstrtab (abfd) = shstrtab;
5955
5956 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
5957 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
5958 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
5959 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
5960
5961 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
5962 i_ehdrp->e_ident[EI_DATA] =
5963 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
5964 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
5965
252b5132
RH
5966 if ((abfd->flags & DYNAMIC) != 0)
5967 i_ehdrp->e_type = ET_DYN;
5968 else if ((abfd->flags & EXEC_P) != 0)
5969 i_ehdrp->e_type = ET_EXEC;
5970 else if (bfd_get_format (abfd) == bfd_core)
5971 i_ehdrp->e_type = ET_CORE;
5972 else
5973 i_ehdrp->e_type = ET_REL;
5974
5975 switch (bfd_get_arch (abfd))
5976 {
5977 case bfd_arch_unknown:
5978 i_ehdrp->e_machine = EM_NONE;
5979 break;
aa4f99bb
AO
5980
5981 /* There used to be a long list of cases here, each one setting
5982 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
5983 in the corresponding bfd definition. To avoid duplication,
5984 the switch was removed. Machines that need special handling
5985 can generally do it in elf_backend_final_write_processing(),
5986 unless they need the information earlier than the final write.
5987 Such need can generally be supplied by replacing the tests for
5988 e_machine with the conditions used to determine it. */
252b5132 5989 default:
9c5bfbb7
AM
5990 i_ehdrp->e_machine = bed->elf_machine_code;
5991 }
aa4f99bb 5992
252b5132
RH
5993 i_ehdrp->e_version = bed->s->ev_current;
5994 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
5995
c044fabd 5996 /* No program header, for now. */
252b5132
RH
5997 i_ehdrp->e_phoff = 0;
5998 i_ehdrp->e_phentsize = 0;
5999 i_ehdrp->e_phnum = 0;
6000
c044fabd 6001 /* Each bfd section is section header entry. */
252b5132
RH
6002 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6003 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6004
c044fabd 6005 /* If we're building an executable, we'll need a program header table. */
252b5132 6006 if (abfd->flags & EXEC_P)
0e71e495
BE
6007 /* It all happens later. */
6008 ;
252b5132
RH
6009 else
6010 {
6011 i_ehdrp->e_phentsize = 0;
252b5132
RH
6012 i_ehdrp->e_phoff = 0;
6013 }
6014
6015 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 6016 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 6017 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 6018 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 6019 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 6020 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132 6021 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
17ca87fc 6022 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
252b5132 6023 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 6024 return FALSE;
252b5132 6025
b34976b6 6026 return TRUE;
252b5132
RH
6027}
6028
6029/* Assign file positions for all the reloc sections which are not part
a485e98e 6030 of the loadable file image, and the file position of section headers. */
252b5132 6031
0ce398f1
L
6032static bfd_boolean
6033_bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
252b5132
RH
6034{
6035 file_ptr off;
e06efbf1 6036 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
3e19fb8f 6037 Elf_Internal_Shdr *shdrp;
a485e98e
AM
6038 Elf_Internal_Ehdr *i_ehdrp;
6039 const struct elf_backend_data *bed;
252b5132 6040
12bd6957 6041 off = elf_next_file_pos (abfd);
252b5132 6042
e06efbf1
L
6043 shdrpp = elf_elfsections (abfd);
6044 end_shdrpp = shdrpp + elf_numsections (abfd);
6045 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
252b5132 6046 {
252b5132 6047 shdrp = *shdrpp;
0ce398f1
L
6048 if (shdrp->sh_offset == -1)
6049 {
3e19fb8f 6050 asection *sec = shdrp->bfd_section;
0ce398f1
L
6051 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
6052 || shdrp->sh_type == SHT_RELA);
6053 if (is_rel
3e19fb8f 6054 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
0ce398f1
L
6055 {
6056 if (!is_rel)
6057 {
3e19fb8f
L
6058 const char *name = sec->name;
6059 struct bfd_elf_section_data *d;
6060
0ce398f1 6061 /* Compress DWARF debug sections. */
3e19fb8f 6062 if (!bfd_compress_section (abfd, sec,
0ce398f1
L
6063 shdrp->contents))
6064 return FALSE;
3e19fb8f
L
6065
6066 if (sec->compress_status == COMPRESS_SECTION_DONE
6067 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
6068 {
6069 /* If section is compressed with zlib-gnu, convert
6070 section name from .debug_* to .zdebug_*. */
6071 char *new_name
6072 = convert_debug_to_zdebug (abfd, name);
6073 if (new_name == NULL)
6074 return FALSE;
6075 name = new_name;
6076 }
dd905818 6077 /* Add section name to section name section. */
3e19fb8f
L
6078 if (shdrp->sh_name != (unsigned int) -1)
6079 abort ();
6080 shdrp->sh_name
6081 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6082 name, FALSE);
6083 d = elf_section_data (sec);
6084
dd905818 6085 /* Add reloc section name to section name section. */
3e19fb8f
L
6086 if (d->rel.hdr
6087 && !_bfd_elf_set_reloc_sh_name (abfd,
6088 d->rel.hdr,
6089 name, FALSE))
6090 return FALSE;
6091 if (d->rela.hdr
6092 && !_bfd_elf_set_reloc_sh_name (abfd,
6093 d->rela.hdr,
91cb26da 6094 name, TRUE))
3e19fb8f
L
6095 return FALSE;
6096
0ce398f1 6097 /* Update section size and contents. */
3e19fb8f
L
6098 shdrp->sh_size = sec->size;
6099 shdrp->contents = sec->contents;
0ce398f1
L
6100 shdrp->bfd_section->contents = NULL;
6101 }
6102 off = _bfd_elf_assign_file_position_for_section (shdrp,
6103 off,
6104 TRUE);
6105 }
6106 }
252b5132
RH
6107 }
6108
3e19fb8f
L
6109 /* Place section name section after DWARF debug sections have been
6110 compressed. */
6111 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6112 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6113 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6114 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
6115
6116 /* Place the section headers. */
a485e98e
AM
6117 i_ehdrp = elf_elfheader (abfd);
6118 bed = get_elf_backend_data (abfd);
6119 off = align_file_position (off, 1 << bed->s->log_file_align);
6120 i_ehdrp->e_shoff = off;
6121 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
12bd6957 6122 elf_next_file_pos (abfd) = off;
0ce398f1
L
6123
6124 return TRUE;
252b5132
RH
6125}
6126
b34976b6 6127bfd_boolean
217aa764 6128_bfd_elf_write_object_contents (bfd *abfd)
252b5132 6129{
9c5bfbb7 6130 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6131 Elf_Internal_Shdr **i_shdrp;
b34976b6 6132 bfd_boolean failed;
9ad5cbcf 6133 unsigned int count, num_sec;
30e8ee25 6134 struct elf_obj_tdata *t;
252b5132
RH
6135
6136 if (! abfd->output_has_begun
217aa764 6137 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6138 return FALSE;
252b5132
RH
6139
6140 i_shdrp = elf_elfsections (abfd);
252b5132 6141
b34976b6 6142 failed = FALSE;
252b5132
RH
6143 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6144 if (failed)
b34976b6 6145 return FALSE;
252b5132 6146
0ce398f1
L
6147 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6148 return FALSE;
252b5132 6149
c044fabd 6150 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
6151 num_sec = elf_numsections (abfd);
6152 for (count = 1; count < num_sec; count++)
252b5132 6153 {
3e19fb8f
L
6154 i_shdrp[count]->sh_name
6155 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6156 i_shdrp[count]->sh_name);
252b5132
RH
6157 if (bed->elf_backend_section_processing)
6158 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
6159 if (i_shdrp[count]->contents)
6160 {
dc810e39
AM
6161 bfd_size_type amt = i_shdrp[count]->sh_size;
6162
252b5132 6163 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 6164 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 6165 return FALSE;
252b5132
RH
6166 }
6167 }
6168
6169 /* Write out the section header names. */
30e8ee25 6170 t = elf_tdata (abfd);
26ae6d5e 6171 if (elf_shstrtab (abfd) != NULL
30e8ee25 6172 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 6173 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 6174 return FALSE;
252b5132
RH
6175
6176 if (bed->elf_backend_final_write_processing)
12bd6957 6177 (*bed->elf_backend_final_write_processing) (abfd, elf_linker (abfd));
252b5132 6178
ff59fc36
RM
6179 if (!bed->s->write_shdrs_and_ehdr (abfd))
6180 return FALSE;
6181
6182 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
c0355132
AM
6183 if (t->o->build_id.after_write_object_contents != NULL)
6184 return (*t->o->build_id.after_write_object_contents) (abfd);
ff59fc36
RM
6185
6186 return TRUE;
252b5132
RH
6187}
6188
b34976b6 6189bfd_boolean
217aa764 6190_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 6191{
c044fabd 6192 /* Hopefully this can be done just like an object file. */
252b5132
RH
6193 return _bfd_elf_write_object_contents (abfd);
6194}
c044fabd
KH
6195
6196/* Given a section, search the header to find them. */
6197
cb33740c 6198unsigned int
198beae2 6199_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 6200{
9c5bfbb7 6201 const struct elf_backend_data *bed;
91d6fa6a 6202 unsigned int sec_index;
252b5132 6203
9ad5cbcf
AM
6204 if (elf_section_data (asect) != NULL
6205 && elf_section_data (asect)->this_idx != 0)
6206 return elf_section_data (asect)->this_idx;
6207
6208 if (bfd_is_abs_section (asect))
91d6fa6a 6209 sec_index = SHN_ABS;
af746e92 6210 else if (bfd_is_com_section (asect))
91d6fa6a 6211 sec_index = SHN_COMMON;
af746e92 6212 else if (bfd_is_und_section (asect))
91d6fa6a 6213 sec_index = SHN_UNDEF;
af746e92 6214 else
91d6fa6a 6215 sec_index = SHN_BAD;
252b5132 6216
af746e92 6217 bed = get_elf_backend_data (abfd);
252b5132
RH
6218 if (bed->elf_backend_section_from_bfd_section)
6219 {
91d6fa6a 6220 int retval = sec_index;
9ad5cbcf 6221
af746e92
AM
6222 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6223 return retval;
252b5132
RH
6224 }
6225
91d6fa6a 6226 if (sec_index == SHN_BAD)
af746e92 6227 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 6228
91d6fa6a 6229 return sec_index;
252b5132
RH
6230}
6231
6232/* Given a BFD symbol, return the index in the ELF symbol table, or -1
6233 on error. */
6234
6235int
217aa764 6236_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
6237{
6238 asymbol *asym_ptr = *asym_ptr_ptr;
6239 int idx;
6240 flagword flags = asym_ptr->flags;
6241
6242 /* When gas creates relocations against local labels, it creates its
6243 own symbol for the section, but does put the symbol into the
6244 symbol chain, so udata is 0. When the linker is generating
6245 relocatable output, this section symbol may be for one of the
6246 input sections rather than the output section. */
6247 if (asym_ptr->udata.i == 0
6248 && (flags & BSF_SECTION_SYM)
6249 && asym_ptr->section)
6250 {
5372391b 6251 asection *sec;
252b5132
RH
6252 int indx;
6253
5372391b
AM
6254 sec = asym_ptr->section;
6255 if (sec->owner != abfd && sec->output_section != NULL)
6256 sec = sec->output_section;
6257 if (sec->owner == abfd
6258 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 6259 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
6260 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
6261 }
6262
6263 idx = asym_ptr->udata.i;
6264
6265 if (idx == 0)
6266 {
6267 /* This case can occur when using --strip-symbol on a symbol
08a40648 6268 which is used in a relocation entry. */
4eca0228 6269 _bfd_error_handler
695344c0 6270 /* xgettext:c-format */
d003868e
AM
6271 (_("%B: symbol `%s' required but not present"),
6272 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
6273 bfd_set_error (bfd_error_no_symbols);
6274 return -1;
6275 }
6276
6277#if DEBUG & 4
6278 {
6279 fprintf (stderr,
9ccb8af9
AM
6280 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx\n",
6281 (long) asym_ptr, asym_ptr->name, idx, (long) flags);
252b5132
RH
6282 fflush (stderr);
6283 }
6284#endif
6285
6286 return idx;
6287}
6288
84d1d650 6289/* Rewrite program header information. */
252b5132 6290
b34976b6 6291static bfd_boolean
84d1d650 6292rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 6293{
b34976b6
AM
6294 Elf_Internal_Ehdr *iehdr;
6295 struct elf_segment_map *map;
6296 struct elf_segment_map *map_first;
6297 struct elf_segment_map **pointer_to_map;
6298 Elf_Internal_Phdr *segment;
6299 asection *section;
6300 unsigned int i;
6301 unsigned int num_segments;
6302 bfd_boolean phdr_included = FALSE;
5c44b38e 6303 bfd_boolean p_paddr_valid;
b34976b6
AM
6304 bfd_vma maxpagesize;
6305 struct elf_segment_map *phdr_adjust_seg = NULL;
6306 unsigned int phdr_adjust_num = 0;
9c5bfbb7 6307 const struct elf_backend_data *bed;
bc67d8a6 6308
caf47ea6 6309 bed = get_elf_backend_data (ibfd);
252b5132
RH
6310 iehdr = elf_elfheader (ibfd);
6311
bc67d8a6 6312 map_first = NULL;
c044fabd 6313 pointer_to_map = &map_first;
252b5132
RH
6314
6315 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
6316 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6317
6318 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
6319#define SEGMENT_END(segment, start) \
6320 (start + (segment->p_memsz > segment->p_filesz \
6321 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 6322
eecdbe52
JJ
6323#define SECTION_SIZE(section, segment) \
6324 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6325 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 6326 ? section->size : 0)
eecdbe52 6327
b34976b6 6328 /* Returns TRUE if the given section is contained within
bc67d8a6 6329 the given segment. VMA addresses are compared. */
aecc8f8a
AM
6330#define IS_CONTAINED_BY_VMA(section, segment) \
6331 (section->vma >= segment->p_vaddr \
eecdbe52 6332 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 6333 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 6334
b34976b6 6335 /* Returns TRUE if the given section is contained within
bc67d8a6 6336 the given segment. LMA addresses are compared. */
aecc8f8a
AM
6337#define IS_CONTAINED_BY_LMA(section, segment, base) \
6338 (section->lma >= base \
eecdbe52 6339 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 6340 <= SEGMENT_END (segment, base)))
252b5132 6341
0efc80c8
L
6342 /* Handle PT_NOTE segment. */
6343#define IS_NOTE(p, s) \
aecc8f8a 6344 (p->p_type == PT_NOTE \
0efc80c8 6345 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 6346 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6347 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6348 <= p->p_offset + p->p_filesz))
252b5132 6349
0efc80c8
L
6350 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6351 etc. */
6352#define IS_COREFILE_NOTE(p, s) \
6353 (IS_NOTE (p, s) \
6354 && bfd_get_format (ibfd) == bfd_core \
6355 && s->vma == 0 \
6356 && s->lma == 0)
6357
252b5132
RH
6358 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6359 linker, which generates a PT_INTERP section with p_vaddr and
6360 p_memsz set to 0. */
aecc8f8a
AM
6361#define IS_SOLARIS_PT_INTERP(p, s) \
6362 (p->p_vaddr == 0 \
6363 && p->p_paddr == 0 \
6364 && p->p_memsz == 0 \
6365 && p->p_filesz > 0 \
6366 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 6367 && s->size > 0 \
aecc8f8a 6368 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6369 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6370 <= p->p_offset + p->p_filesz))
5c440b1e 6371
bc67d8a6
NC
6372 /* Decide if the given section should be included in the given segment.
6373 A section will be included if:
f5ffc919 6374 1. It is within the address space of the segment -- we use the LMA
08a40648 6375 if that is set for the segment and the VMA otherwise,
0efc80c8 6376 2. It is an allocated section or a NOTE section in a PT_NOTE
d324f6d6 6377 segment.
bc67d8a6 6378 3. There is an output section associated with it,
eecdbe52 6379 4. The section has not already been allocated to a previous segment.
2b05f1b7 6380 5. PT_GNU_STACK segments do not include any sections.
03394ac9 6381 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
6382 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6383 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 6384 (with the possible exception of .dynamic). */
9f17e2a6 6385#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
6386 ((((segment->p_paddr \
6387 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
6388 : IS_CONTAINED_BY_VMA (section, segment)) \
6389 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 6390 || IS_NOTE (segment, section)) \
2b05f1b7
L
6391 && segment->p_type != PT_GNU_STACK \
6392 && (segment->p_type != PT_TLS \
6393 || (section->flags & SEC_THREAD_LOCAL)) \
6394 && (segment->p_type == PT_LOAD \
6395 || segment->p_type == PT_TLS \
6396 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6397 && (segment->p_type != PT_DYNAMIC \
6398 || SECTION_SIZE (section, segment) > 0 \
6399 || (segment->p_paddr \
6400 ? segment->p_paddr != section->lma \
6401 : segment->p_vaddr != section->vma) \
6402 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
6403 == 0)) \
0067a569 6404 && !section->segment_mark)
bc67d8a6 6405
9f17e2a6
L
6406/* If the output section of a section in the input segment is NULL,
6407 it is removed from the corresponding output segment. */
6408#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
6409 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
6410 && section->output_section != NULL)
6411
b34976b6 6412 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
6413#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6414 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6415
6416 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6417 their VMA address ranges and their LMA address ranges overlap.
6418 It is possible to have overlapping VMA ranges without overlapping LMA
6419 ranges. RedBoot images for example can have both .data and .bss mapped
6420 to the same VMA range, but with the .data section mapped to a different
6421 LMA. */
aecc8f8a 6422#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 6423 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 6424 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 6425 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 6426 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
6427
6428 /* Initialise the segment mark field. */
6429 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 6430 section->segment_mark = FALSE;
bc67d8a6 6431
5c44b38e
AM
6432 /* The Solaris linker creates program headers in which all the
6433 p_paddr fields are zero. When we try to objcopy or strip such a
6434 file, we get confused. Check for this case, and if we find it
6435 don't set the p_paddr_valid fields. */
6436 p_paddr_valid = FALSE;
6437 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6438 i < num_segments;
6439 i++, segment++)
6440 if (segment->p_paddr != 0)
6441 {
6442 p_paddr_valid = TRUE;
6443 break;
6444 }
6445
252b5132 6446 /* Scan through the segments specified in the program header
bc67d8a6 6447 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 6448 in the loadable segments. These can be created by weird
aecc8f8a 6449 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
6450 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6451 i < num_segments;
c044fabd 6452 i++, segment++)
252b5132 6453 {
252b5132 6454 unsigned int j;
c044fabd 6455 Elf_Internal_Phdr *segment2;
252b5132 6456
aecc8f8a
AM
6457 if (segment->p_type == PT_INTERP)
6458 for (section = ibfd->sections; section; section = section->next)
6459 if (IS_SOLARIS_PT_INTERP (segment, section))
6460 {
6461 /* Mininal change so that the normal section to segment
4cc11e76 6462 assignment code will work. */
aecc8f8a
AM
6463 segment->p_vaddr = section->vma;
6464 break;
6465 }
6466
bc67d8a6 6467 if (segment->p_type != PT_LOAD)
b10a8ae0
L
6468 {
6469 /* Remove PT_GNU_RELRO segment. */
6470 if (segment->p_type == PT_GNU_RELRO)
6471 segment->p_type = PT_NULL;
6472 continue;
6473 }
c044fabd 6474
bc67d8a6 6475 /* Determine if this segment overlaps any previous segments. */
0067a569 6476 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
6477 {
6478 bfd_signed_vma extra_length;
c044fabd 6479
bc67d8a6 6480 if (segment2->p_type != PT_LOAD
0067a569 6481 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 6482 continue;
c044fabd 6483
bc67d8a6
NC
6484 /* Merge the two segments together. */
6485 if (segment2->p_vaddr < segment->p_vaddr)
6486 {
c044fabd 6487 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 6488 SEGMENT. */
0067a569
AM
6489 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
6490 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 6491
bc67d8a6
NC
6492 if (extra_length > 0)
6493 {
0067a569 6494 segment2->p_memsz += extra_length;
bc67d8a6
NC
6495 segment2->p_filesz += extra_length;
6496 }
c044fabd 6497
bc67d8a6 6498 segment->p_type = PT_NULL;
c044fabd 6499
bc67d8a6
NC
6500 /* Since we have deleted P we must restart the outer loop. */
6501 i = 0;
6502 segment = elf_tdata (ibfd)->phdr;
6503 break;
6504 }
6505 else
6506 {
c044fabd 6507 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 6508 SEGMENT2. */
0067a569
AM
6509 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
6510 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 6511
bc67d8a6
NC
6512 if (extra_length > 0)
6513 {
0067a569 6514 segment->p_memsz += extra_length;
bc67d8a6
NC
6515 segment->p_filesz += extra_length;
6516 }
c044fabd 6517
bc67d8a6
NC
6518 segment2->p_type = PT_NULL;
6519 }
6520 }
6521 }
c044fabd 6522
bc67d8a6
NC
6523 /* The second scan attempts to assign sections to segments. */
6524 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6525 i < num_segments;
0067a569 6526 i++, segment++)
bc67d8a6 6527 {
0067a569
AM
6528 unsigned int section_count;
6529 asection **sections;
6530 asection *output_section;
6531 unsigned int isec;
6532 bfd_vma matching_lma;
6533 bfd_vma suggested_lma;
6534 unsigned int j;
dc810e39 6535 bfd_size_type amt;
0067a569
AM
6536 asection *first_section;
6537 bfd_boolean first_matching_lma;
6538 bfd_boolean first_suggested_lma;
bc67d8a6
NC
6539
6540 if (segment->p_type == PT_NULL)
6541 continue;
c044fabd 6542
9f17e2a6 6543 first_section = NULL;
bc67d8a6 6544 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
6545 for (section = ibfd->sections, section_count = 0;
6546 section != NULL;
6547 section = section->next)
9f17e2a6
L
6548 {
6549 /* Find the first section in the input segment, which may be
6550 removed from the corresponding output segment. */
6551 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
6552 {
6553 if (first_section == NULL)
6554 first_section = section;
6555 if (section->output_section != NULL)
6556 ++section_count;
6557 }
6558 }
811072d8 6559
b5f852ea
NC
6560 /* Allocate a segment map big enough to contain
6561 all of the sections we have selected. */
dc810e39
AM
6562 amt = sizeof (struct elf_segment_map);
6563 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6564 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 6565 if (map == NULL)
b34976b6 6566 return FALSE;
252b5132
RH
6567
6568 /* Initialise the fields of the segment map. Default to
6569 using the physical address of the segment in the input BFD. */
0067a569
AM
6570 map->next = NULL;
6571 map->p_type = segment->p_type;
6572 map->p_flags = segment->p_flags;
bc67d8a6 6573 map->p_flags_valid = 1;
55d55ac7 6574
9f17e2a6
L
6575 /* If the first section in the input segment is removed, there is
6576 no need to preserve segment physical address in the corresponding
6577 output segment. */
945c025a 6578 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
6579 {
6580 map->p_paddr = segment->p_paddr;
5c44b38e 6581 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 6582 }
252b5132
RH
6583
6584 /* Determine if this segment contains the ELF file header
6585 and if it contains the program headers themselves. */
bc67d8a6
NC
6586 map->includes_filehdr = (segment->p_offset == 0
6587 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 6588 map->includes_phdrs = 0;
252b5132 6589
0067a569 6590 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 6591 {
bc67d8a6
NC
6592 map->includes_phdrs =
6593 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6594 && (segment->p_offset + segment->p_filesz
252b5132
RH
6595 >= ((bfd_vma) iehdr->e_phoff
6596 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 6597
bc67d8a6 6598 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 6599 phdr_included = TRUE;
252b5132
RH
6600 }
6601
bc67d8a6 6602 if (section_count == 0)
252b5132
RH
6603 {
6604 /* Special segments, such as the PT_PHDR segment, may contain
6605 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
6606 something. They are allowed by the ELF spec however, so only
6607 a warning is produced. */
bc67d8a6 6608 if (segment->p_type == PT_LOAD)
4eca0228 6609 _bfd_error_handler (_("\
c86934ce 6610%B: warning: Empty loadable segment detected, is this intentional ?"),
4eca0228 6611 ibfd);
252b5132 6612
bc67d8a6 6613 map->count = 0;
c044fabd
KH
6614 *pointer_to_map = map;
6615 pointer_to_map = &map->next;
252b5132
RH
6616
6617 continue;
6618 }
6619
6620 /* Now scan the sections in the input BFD again and attempt
6621 to add their corresponding output sections to the segment map.
6622 The problem here is how to handle an output section which has
6623 been moved (ie had its LMA changed). There are four possibilities:
6624
6625 1. None of the sections have been moved.
6626 In this case we can continue to use the segment LMA from the
6627 input BFD.
6628
6629 2. All of the sections have been moved by the same amount.
6630 In this case we can change the segment's LMA to match the LMA
6631 of the first section.
6632
6633 3. Some of the sections have been moved, others have not.
6634 In this case those sections which have not been moved can be
6635 placed in the current segment which will have to have its size,
6636 and possibly its LMA changed, and a new segment or segments will
6637 have to be created to contain the other sections.
6638
b5f852ea 6639 4. The sections have been moved, but not by the same amount.
252b5132
RH
6640 In this case we can change the segment's LMA to match the LMA
6641 of the first section and we will have to create a new segment
6642 or segments to contain the other sections.
6643
6644 In order to save time, we allocate an array to hold the section
6645 pointers that we are interested in. As these sections get assigned
6646 to a segment, they are removed from this array. */
6647
a50b1753 6648 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 6649 if (sections == NULL)
b34976b6 6650 return FALSE;
252b5132
RH
6651
6652 /* Step One: Scan for segment vs section LMA conflicts.
6653 Also add the sections to the section array allocated above.
6654 Also add the sections to the current segment. In the common
6655 case, where the sections have not been moved, this means that
6656 we have completely filled the segment, and there is nothing
6657 more to do. */
252b5132 6658 isec = 0;
72730e0c 6659 matching_lma = 0;
252b5132 6660 suggested_lma = 0;
0067a569
AM
6661 first_matching_lma = TRUE;
6662 first_suggested_lma = TRUE;
252b5132 6663
461c4b2e 6664 for (section = first_section, j = 0;
bc67d8a6
NC
6665 section != NULL;
6666 section = section->next)
252b5132 6667 {
caf47ea6 6668 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 6669 {
bc67d8a6
NC
6670 output_section = section->output_section;
6671
0067a569 6672 sections[j++] = section;
252b5132
RH
6673
6674 /* The Solaris native linker always sets p_paddr to 0.
6675 We try to catch that case here, and set it to the
5e8d7549
NC
6676 correct value. Note - some backends require that
6677 p_paddr be left as zero. */
5c44b38e 6678 if (!p_paddr_valid
4455705d 6679 && segment->p_vaddr != 0
0067a569 6680 && !bed->want_p_paddr_set_to_zero
252b5132 6681 && isec == 0
bc67d8a6 6682 && output_section->lma != 0
0067a569
AM
6683 && output_section->vma == (segment->p_vaddr
6684 + (map->includes_filehdr
6685 ? iehdr->e_ehsize
6686 : 0)
6687 + (map->includes_phdrs
6688 ? (iehdr->e_phnum
6689 * iehdr->e_phentsize)
6690 : 0)))
bc67d8a6 6691 map->p_paddr = segment->p_vaddr;
252b5132
RH
6692
6693 /* Match up the physical address of the segment with the
6694 LMA address of the output section. */
bc67d8a6 6695 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 6696 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
6697 || (bed->want_p_paddr_set_to_zero
6698 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 6699 {
0067a569
AM
6700 if (first_matching_lma || output_section->lma < matching_lma)
6701 {
6702 matching_lma = output_section->lma;
6703 first_matching_lma = FALSE;
6704 }
252b5132
RH
6705
6706 /* We assume that if the section fits within the segment
bc67d8a6 6707 then it does not overlap any other section within that
252b5132 6708 segment. */
0067a569
AM
6709 map->sections[isec++] = output_section;
6710 }
6711 else if (first_suggested_lma)
6712 {
6713 suggested_lma = output_section->lma;
6714 first_suggested_lma = FALSE;
252b5132 6715 }
147d51c2
L
6716
6717 if (j == section_count)
6718 break;
252b5132
RH
6719 }
6720 }
6721
bc67d8a6 6722 BFD_ASSERT (j == section_count);
252b5132
RH
6723
6724 /* Step Two: Adjust the physical address of the current segment,
6725 if necessary. */
bc67d8a6 6726 if (isec == section_count)
252b5132
RH
6727 {
6728 /* All of the sections fitted within the segment as currently
6729 specified. This is the default case. Add the segment to
6730 the list of built segments and carry on to process the next
6731 program header in the input BFD. */
bc67d8a6 6732 map->count = section_count;
c044fabd
KH
6733 *pointer_to_map = map;
6734 pointer_to_map = &map->next;
08a40648 6735
5c44b38e
AM
6736 if (p_paddr_valid
6737 && !bed->want_p_paddr_set_to_zero
147d51c2 6738 && matching_lma != map->p_paddr
5c44b38e
AM
6739 && !map->includes_filehdr
6740 && !map->includes_phdrs)
3271a814
NS
6741 /* There is some padding before the first section in the
6742 segment. So, we must account for that in the output
6743 segment's vma. */
6744 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 6745
252b5132
RH
6746 free (sections);
6747 continue;
6748 }
252b5132
RH
6749 else
6750 {
0067a569 6751 if (!first_matching_lma)
72730e0c
AM
6752 {
6753 /* At least one section fits inside the current segment.
6754 Keep it, but modify its physical address to match the
6755 LMA of the first section that fitted. */
bc67d8a6 6756 map->p_paddr = matching_lma;
72730e0c
AM
6757 }
6758 else
6759 {
6760 /* None of the sections fitted inside the current segment.
6761 Change the current segment's physical address to match
6762 the LMA of the first section. */
bc67d8a6 6763 map->p_paddr = suggested_lma;
72730e0c
AM
6764 }
6765
bc67d8a6
NC
6766 /* Offset the segment physical address from the lma
6767 to allow for space taken up by elf headers. */
6768 if (map->includes_filehdr)
010c8431
AM
6769 {
6770 if (map->p_paddr >= iehdr->e_ehsize)
6771 map->p_paddr -= iehdr->e_ehsize;
6772 else
6773 {
6774 map->includes_filehdr = FALSE;
6775 map->includes_phdrs = FALSE;
6776 }
6777 }
252b5132 6778
bc67d8a6
NC
6779 if (map->includes_phdrs)
6780 {
010c8431
AM
6781 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
6782 {
6783 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
6784
6785 /* iehdr->e_phnum is just an estimate of the number
6786 of program headers that we will need. Make a note
6787 here of the number we used and the segment we chose
6788 to hold these headers, so that we can adjust the
6789 offset when we know the correct value. */
6790 phdr_adjust_num = iehdr->e_phnum;
6791 phdr_adjust_seg = map;
6792 }
6793 else
6794 map->includes_phdrs = FALSE;
bc67d8a6 6795 }
252b5132
RH
6796 }
6797
6798 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 6799 those that fit to the current segment and removing them from the
252b5132
RH
6800 sections array; but making sure not to leave large gaps. Once all
6801 possible sections have been assigned to the current segment it is
6802 added to the list of built segments and if sections still remain
6803 to be assigned, a new segment is constructed before repeating
6804 the loop. */
6805 isec = 0;
6806 do
6807 {
bc67d8a6 6808 map->count = 0;
252b5132 6809 suggested_lma = 0;
0067a569 6810 first_suggested_lma = TRUE;
252b5132
RH
6811
6812 /* Fill the current segment with sections that fit. */
bc67d8a6 6813 for (j = 0; j < section_count; j++)
252b5132 6814 {
bc67d8a6 6815 section = sections[j];
252b5132 6816
bc67d8a6 6817 if (section == NULL)
252b5132
RH
6818 continue;
6819
bc67d8a6 6820 output_section = section->output_section;
252b5132 6821
bc67d8a6 6822 BFD_ASSERT (output_section != NULL);
c044fabd 6823
bc67d8a6
NC
6824 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
6825 || IS_COREFILE_NOTE (segment, section))
252b5132 6826 {
bc67d8a6 6827 if (map->count == 0)
252b5132
RH
6828 {
6829 /* If the first section in a segment does not start at
bc67d8a6
NC
6830 the beginning of the segment, then something is
6831 wrong. */
0067a569
AM
6832 if (output_section->lma
6833 != (map->p_paddr
6834 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
6835 + (map->includes_phdrs
6836 ? iehdr->e_phnum * iehdr->e_phentsize
6837 : 0)))
252b5132
RH
6838 abort ();
6839 }
6840 else
6841 {
0067a569 6842 asection *prev_sec;
252b5132 6843
bc67d8a6 6844 prev_sec = map->sections[map->count - 1];
252b5132
RH
6845
6846 /* If the gap between the end of the previous section
bc67d8a6
NC
6847 and the start of this section is more than
6848 maxpagesize then we need to start a new segment. */
eea6121a 6849 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 6850 maxpagesize)
caf47ea6 6851 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 6852 || (prev_sec->lma + prev_sec->size
079e9a2f 6853 > output_section->lma))
252b5132 6854 {
0067a569
AM
6855 if (first_suggested_lma)
6856 {
6857 suggested_lma = output_section->lma;
6858 first_suggested_lma = FALSE;
6859 }
252b5132
RH
6860
6861 continue;
6862 }
6863 }
6864
bc67d8a6 6865 map->sections[map->count++] = output_section;
252b5132
RH
6866 ++isec;
6867 sections[j] = NULL;
b34976b6 6868 section->segment_mark = TRUE;
252b5132 6869 }
0067a569
AM
6870 else if (first_suggested_lma)
6871 {
6872 suggested_lma = output_section->lma;
6873 first_suggested_lma = FALSE;
6874 }
252b5132
RH
6875 }
6876
bc67d8a6 6877 BFD_ASSERT (map->count > 0);
252b5132
RH
6878
6879 /* Add the current segment to the list of built segments. */
c044fabd
KH
6880 *pointer_to_map = map;
6881 pointer_to_map = &map->next;
252b5132 6882
bc67d8a6 6883 if (isec < section_count)
252b5132
RH
6884 {
6885 /* We still have not allocated all of the sections to
6886 segments. Create a new segment here, initialise it
6887 and carry on looping. */
dc810e39
AM
6888 amt = sizeof (struct elf_segment_map);
6889 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
5964fc3a 6890 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 6891 if (map == NULL)
5ed6aba4
NC
6892 {
6893 free (sections);
6894 return FALSE;
6895 }
252b5132
RH
6896
6897 /* Initialise the fields of the segment map. Set the physical
6898 physical address to the LMA of the first section that has
6899 not yet been assigned. */
0067a569
AM
6900 map->next = NULL;
6901 map->p_type = segment->p_type;
6902 map->p_flags = segment->p_flags;
6903 map->p_flags_valid = 1;
6904 map->p_paddr = suggested_lma;
5c44b38e 6905 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 6906 map->includes_filehdr = 0;
0067a569 6907 map->includes_phdrs = 0;
252b5132
RH
6908 }
6909 }
bc67d8a6 6910 while (isec < section_count);
252b5132
RH
6911
6912 free (sections);
6913 }
6914
12bd6957 6915 elf_seg_map (obfd) = map_first;
bc67d8a6
NC
6916
6917 /* If we had to estimate the number of program headers that were
9ad5cbcf 6918 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
6919 the offset if necessary. */
6920 if (phdr_adjust_seg != NULL)
6921 {
6922 unsigned int count;
c044fabd 6923
bc67d8a6 6924 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 6925 count++;
252b5132 6926
bc67d8a6
NC
6927 if (count > phdr_adjust_num)
6928 phdr_adjust_seg->p_paddr
6929 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
6930 }
c044fabd 6931
bc67d8a6 6932#undef SEGMENT_END
eecdbe52 6933#undef SECTION_SIZE
bc67d8a6
NC
6934#undef IS_CONTAINED_BY_VMA
6935#undef IS_CONTAINED_BY_LMA
0efc80c8 6936#undef IS_NOTE
252b5132 6937#undef IS_COREFILE_NOTE
bc67d8a6 6938#undef IS_SOLARIS_PT_INTERP
9f17e2a6 6939#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
6940#undef INCLUDE_SECTION_IN_SEGMENT
6941#undef SEGMENT_AFTER_SEGMENT
6942#undef SEGMENT_OVERLAPS
b34976b6 6943 return TRUE;
252b5132
RH
6944}
6945
84d1d650
L
6946/* Copy ELF program header information. */
6947
6948static bfd_boolean
6949copy_elf_program_header (bfd *ibfd, bfd *obfd)
6950{
6951 Elf_Internal_Ehdr *iehdr;
6952 struct elf_segment_map *map;
6953 struct elf_segment_map *map_first;
6954 struct elf_segment_map **pointer_to_map;
6955 Elf_Internal_Phdr *segment;
6956 unsigned int i;
6957 unsigned int num_segments;
6958 bfd_boolean phdr_included = FALSE;
88967714 6959 bfd_boolean p_paddr_valid;
84d1d650
L
6960
6961 iehdr = elf_elfheader (ibfd);
6962
6963 map_first = NULL;
6964 pointer_to_map = &map_first;
6965
88967714
AM
6966 /* If all the segment p_paddr fields are zero, don't set
6967 map->p_paddr_valid. */
6968 p_paddr_valid = FALSE;
84d1d650 6969 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
6970 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6971 i < num_segments;
6972 i++, segment++)
6973 if (segment->p_paddr != 0)
6974 {
6975 p_paddr_valid = TRUE;
6976 break;
6977 }
6978
84d1d650
L
6979 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6980 i < num_segments;
6981 i++, segment++)
6982 {
6983 asection *section;
6984 unsigned int section_count;
6985 bfd_size_type amt;
6986 Elf_Internal_Shdr *this_hdr;
53020534 6987 asection *first_section = NULL;
a76e6f2f 6988 asection *lowest_section;
84d1d650 6989
84d1d650
L
6990 /* Compute how many sections are in this segment. */
6991 for (section = ibfd->sections, section_count = 0;
6992 section != NULL;
6993 section = section->next)
6994 {
6995 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6996 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 6997 {
a76e6f2f
AM
6998 if (first_section == NULL)
6999 first_section = section;
3271a814
NS
7000 section_count++;
7001 }
84d1d650
L
7002 }
7003
7004 /* Allocate a segment map big enough to contain
7005 all of the sections we have selected. */
7006 amt = sizeof (struct elf_segment_map);
7007 if (section_count != 0)
7008 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 7009 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
7010 if (map == NULL)
7011 return FALSE;
7012
7013 /* Initialize the fields of the output segment map with the
7014 input segment. */
7015 map->next = NULL;
7016 map->p_type = segment->p_type;
7017 map->p_flags = segment->p_flags;
7018 map->p_flags_valid = 1;
7019 map->p_paddr = segment->p_paddr;
88967714 7020 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
7021 map->p_align = segment->p_align;
7022 map->p_align_valid = 1;
3271a814 7023 map->p_vaddr_offset = 0;
84d1d650 7024
04c3a755
NS
7025 if (map->p_type == PT_GNU_RELRO
7026 || map->p_type == PT_GNU_STACK)
b10a8ae0
L
7027 {
7028 /* The PT_GNU_RELRO segment may contain the first a few
7029 bytes in the .got.plt section even if the whole .got.plt
7030 section isn't in the PT_GNU_RELRO segment. We won't
04c3a755
NS
7031 change the size of the PT_GNU_RELRO segment.
7032 Similarly, PT_GNU_STACK size is significant on uclinux
7033 systems. */
9433b9b1 7034 map->p_size = segment->p_memsz;
b10a8ae0
L
7035 map->p_size_valid = 1;
7036 }
7037
84d1d650
L
7038 /* Determine if this segment contains the ELF file header
7039 and if it contains the program headers themselves. */
7040 map->includes_filehdr = (segment->p_offset == 0
7041 && segment->p_filesz >= iehdr->e_ehsize);
7042
7043 map->includes_phdrs = 0;
7044 if (! phdr_included || segment->p_type != PT_LOAD)
7045 {
7046 map->includes_phdrs =
7047 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7048 && (segment->p_offset + segment->p_filesz
7049 >= ((bfd_vma) iehdr->e_phoff
7050 + iehdr->e_phnum * iehdr->e_phentsize)));
7051
7052 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7053 phdr_included = TRUE;
7054 }
7055
bbefd0a9 7056 lowest_section = NULL;
84d1d650
L
7057 if (section_count != 0)
7058 {
7059 unsigned int isec = 0;
7060
53020534 7061 for (section = first_section;
84d1d650
L
7062 section != NULL;
7063 section = section->next)
7064 {
7065 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7066 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
7067 {
7068 map->sections[isec++] = section->output_section;
a76e6f2f
AM
7069 if ((section->flags & SEC_ALLOC) != 0)
7070 {
7071 bfd_vma seg_off;
7072
bbefd0a9
AM
7073 if (lowest_section == NULL
7074 || section->lma < lowest_section->lma)
fb8a5684
AM
7075 lowest_section = section;
7076
a76e6f2f
AM
7077 /* Section lmas are set up from PT_LOAD header
7078 p_paddr in _bfd_elf_make_section_from_shdr.
7079 If this header has a p_paddr that disagrees
7080 with the section lma, flag the p_paddr as
7081 invalid. */
7082 if ((section->flags & SEC_LOAD) != 0)
7083 seg_off = this_hdr->sh_offset - segment->p_offset;
7084 else
7085 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7086 if (section->lma - segment->p_paddr != seg_off)
7087 map->p_paddr_valid = FALSE;
7088 }
53020534
L
7089 if (isec == section_count)
7090 break;
7091 }
84d1d650
L
7092 }
7093 }
7094
a76e6f2f
AM
7095 if (map->includes_filehdr && lowest_section != NULL)
7096 /* We need to keep the space used by the headers fixed. */
7097 map->header_size = lowest_section->vma - segment->p_vaddr;
d324f6d6 7098
a76e6f2f
AM
7099 if (!map->includes_phdrs
7100 && !map->includes_filehdr
7101 && map->p_paddr_valid)
7102 /* There is some other padding before the first section. */
7103 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
7104 - segment->p_paddr);
7105
84d1d650
L
7106 map->count = section_count;
7107 *pointer_to_map = map;
7108 pointer_to_map = &map->next;
7109 }
7110
12bd6957 7111 elf_seg_map (obfd) = map_first;
84d1d650
L
7112 return TRUE;
7113}
7114
7115/* Copy private BFD data. This copies or rewrites ELF program header
7116 information. */
7117
7118static bfd_boolean
7119copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7120{
84d1d650
L
7121 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7122 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7123 return TRUE;
7124
7125 if (elf_tdata (ibfd)->phdr == NULL)
7126 return TRUE;
7127
7128 if (ibfd->xvec == obfd->xvec)
7129 {
cb3ff1e5
NC
7130 /* Check to see if any sections in the input BFD
7131 covered by ELF program header have changed. */
d55ce4e2 7132 Elf_Internal_Phdr *segment;
84d1d650
L
7133 asection *section, *osec;
7134 unsigned int i, num_segments;
7135 Elf_Internal_Shdr *this_hdr;
147d51c2
L
7136 const struct elf_backend_data *bed;
7137
7138 bed = get_elf_backend_data (ibfd);
7139
7140 /* Regenerate the segment map if p_paddr is set to 0. */
7141 if (bed->want_p_paddr_set_to_zero)
7142 goto rewrite;
84d1d650
L
7143
7144 /* Initialize the segment mark field. */
7145 for (section = obfd->sections; section != NULL;
7146 section = section->next)
7147 section->segment_mark = FALSE;
7148
7149 num_segments = elf_elfheader (ibfd)->e_phnum;
7150 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7151 i < num_segments;
7152 i++, segment++)
7153 {
5f6999aa
NC
7154 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7155 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7156 which severly confuses things, so always regenerate the segment
7157 map in this case. */
7158 if (segment->p_paddr == 0
7159 && segment->p_memsz == 0
7160 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 7161 goto rewrite;
5f6999aa 7162
84d1d650
L
7163 for (section = ibfd->sections;
7164 section != NULL; section = section->next)
7165 {
7166 /* We mark the output section so that we know it comes
7167 from the input BFD. */
7168 osec = section->output_section;
7169 if (osec)
7170 osec->segment_mark = TRUE;
7171
7172 /* Check if this section is covered by the segment. */
7173 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7174 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
7175 {
7176 /* FIXME: Check if its output section is changed or
7177 removed. What else do we need to check? */
7178 if (osec == NULL
7179 || section->flags != osec->flags
7180 || section->lma != osec->lma
7181 || section->vma != osec->vma
7182 || section->size != osec->size
7183 || section->rawsize != osec->rawsize
7184 || section->alignment_power != osec->alignment_power)
7185 goto rewrite;
7186 }
7187 }
7188 }
7189
cb3ff1e5 7190 /* Check to see if any output section do not come from the
84d1d650
L
7191 input BFD. */
7192 for (section = obfd->sections; section != NULL;
7193 section = section->next)
7194 {
7195 if (section->segment_mark == FALSE)
7196 goto rewrite;
7197 else
7198 section->segment_mark = FALSE;
7199 }
7200
7201 return copy_elf_program_header (ibfd, obfd);
7202 }
7203
7204rewrite:
f1d85785
L
7205 if (ibfd->xvec == obfd->xvec)
7206 {
7207 /* When rewriting program header, set the output maxpagesize to
7208 the maximum alignment of input PT_LOAD segments. */
7209 Elf_Internal_Phdr *segment;
7210 unsigned int i;
7211 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7212 bfd_vma maxpagesize = 0;
7213
7214 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7215 i < num_segments;
7216 i++, segment++)
7217 if (segment->p_type == PT_LOAD
7218 && maxpagesize < segment->p_align)
c86934ce
NC
7219 {
7220 /* PR 17512: file: f17299af. */
7221 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
695344c0 7222 /* xgettext:c-format */
4eca0228 7223 _bfd_error_handler (_("\
c86934ce 7224%B: warning: segment alignment of 0x%llx is too large"),
4eca0228 7225 ibfd, (long long) segment->p_align);
c86934ce
NC
7226 else
7227 maxpagesize = segment->p_align;
7228 }
f1d85785
L
7229
7230 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
7231 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
7232 }
7233
84d1d650
L
7234 return rewrite_elf_program_header (ibfd, obfd);
7235}
7236
ccd2ec6a
L
7237/* Initialize private output section information from input section. */
7238
7239bfd_boolean
7240_bfd_elf_init_private_section_data (bfd *ibfd,
7241 asection *isec,
7242 bfd *obfd,
7243 asection *osec,
7244 struct bfd_link_info *link_info)
7245
7246{
7247 Elf_Internal_Shdr *ihdr, *ohdr;
0e1862bb
L
7248 bfd_boolean final_link = (link_info != NULL
7249 && !bfd_link_relocatable (link_info));
ccd2ec6a
L
7250
7251 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7252 || obfd->xvec->flavour != bfd_target_elf_flavour)
7253 return TRUE;
7254
ba85c43e
NC
7255 BFD_ASSERT (elf_section_data (osec) != NULL);
7256
dfa7b0b8
AM
7257 /* For objcopy and relocatable link, don't copy the output ELF
7258 section type from input if the output BFD section flags have been
7259 set to something different. For a final link allow some flags
7260 that the linker clears to differ. */
42bb2e33 7261 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
7262 && (osec->flags == isec->flags
7263 || (final_link
7264 && ((osec->flags ^ isec->flags)
0814be7d 7265 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 7266 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
7267
7268 /* FIXME: Is this correct for all OS/PROC specific flags? */
7269 elf_section_flags (osec) |= (elf_section_flags (isec)
7270 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
7271
7272 /* Set things up for objcopy and relocatable link. The output
7273 SHT_GROUP section will have its elf_next_in_group pointing back
7274 to the input group members. Ignore linker created group section.
7275 See elfNN_ia64_object_p in elfxx-ia64.c. */
dfa7b0b8 7276 if (!final_link)
ccd2ec6a
L
7277 {
7278 if (elf_sec_group (isec) == NULL
7279 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
7280 {
7281 if (elf_section_flags (isec) & SHF_GROUP)
7282 elf_section_flags (osec) |= SHF_GROUP;
7283 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 7284 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a 7285 }
68f5ff89
L
7286
7287 /* If not decompress, preserve SHF_COMPRESSED. */
7288 if ((ibfd->flags & BFD_DECOMPRESS) == 0)
7289 elf_section_flags (osec) |= (elf_section_flags (isec)
7290 & SHF_COMPRESSED);
ccd2ec6a
L
7291 }
7292
7293 ihdr = &elf_section_data (isec)->this_hdr;
7294
7295 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7296 don't use the output section of the linked-to section since it
7297 may be NULL at this point. */
7298 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7299 {
7300 ohdr = &elf_section_data (osec)->this_hdr;
7301 ohdr->sh_flags |= SHF_LINK_ORDER;
7302 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7303 }
7304
7305 osec->use_rela_p = isec->use_rela_p;
7306
7307 return TRUE;
7308}
7309
252b5132
RH
7310/* Copy private section information. This copies over the entsize
7311 field, and sometimes the info field. */
7312
b34976b6 7313bfd_boolean
217aa764
AM
7314_bfd_elf_copy_private_section_data (bfd *ibfd,
7315 asection *isec,
7316 bfd *obfd,
7317 asection *osec)
252b5132
RH
7318{
7319 Elf_Internal_Shdr *ihdr, *ohdr;
7320
7321 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7322 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 7323 return TRUE;
252b5132 7324
252b5132
RH
7325 ihdr = &elf_section_data (isec)->this_hdr;
7326 ohdr = &elf_section_data (osec)->this_hdr;
7327
7328 ohdr->sh_entsize = ihdr->sh_entsize;
7329
7330 if (ihdr->sh_type == SHT_SYMTAB
7331 || ihdr->sh_type == SHT_DYNSYM
7332 || ihdr->sh_type == SHT_GNU_verneed
7333 || ihdr->sh_type == SHT_GNU_verdef)
7334 ohdr->sh_info = ihdr->sh_info;
7335
ccd2ec6a
L
7336 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7337 NULL);
252b5132
RH
7338}
7339
d0bf826b
AM
7340/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7341 necessary if we are removing either the SHT_GROUP section or any of
7342 the group member sections. DISCARDED is the value that a section's
7343 output_section has if the section will be discarded, NULL when this
7344 function is called from objcopy, bfd_abs_section_ptr when called
7345 from the linker. */
80fccad2
BW
7346
7347bfd_boolean
d0bf826b 7348_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 7349{
30288845
AM
7350 asection *isec;
7351
30288845 7352 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 7353 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
7354 {
7355 asection *first = elf_next_in_group (isec);
7356 asection *s = first;
d0bf826b
AM
7357 bfd_size_type removed = 0;
7358
30288845
AM
7359 while (s != NULL)
7360 {
415f38a6
AM
7361 /* If this member section is being output but the
7362 SHT_GROUP section is not, then clear the group info
7363 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
7364 if (s->output_section != discarded
7365 && isec->output_section == discarded)
30288845
AM
7366 {
7367 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7368 elf_group_name (s->output_section) = NULL;
7369 }
415f38a6
AM
7370 /* Conversely, if the member section is not being output
7371 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
7372 else if (s->output_section == discarded
7373 && isec->output_section != discarded)
7374 removed += 4;
30288845
AM
7375 s = elf_next_in_group (s);
7376 if (s == first)
7377 break;
7378 }
d0bf826b
AM
7379 if (removed != 0)
7380 {
7381 if (discarded != NULL)
7382 {
7383 /* If we've been called for ld -r, then we need to
7384 adjust the input section size. This function may
7385 be called multiple times, so save the original
7386 size. */
7387 if (isec->rawsize == 0)
7388 isec->rawsize = isec->size;
7389 isec->size = isec->rawsize - removed;
7390 }
7391 else
7392 {
7393 /* Adjust the output section size when called from
7394 objcopy. */
7395 isec->output_section->size -= removed;
7396 }
7397 }
30288845
AM
7398 }
7399
80fccad2
BW
7400 return TRUE;
7401}
7402
d0bf826b
AM
7403/* Copy private header information. */
7404
7405bfd_boolean
7406_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
7407{
7408 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7409 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7410 return TRUE;
7411
7412 /* Copy over private BFD data if it has not already been copied.
7413 This must be done here, rather than in the copy_private_bfd_data
7414 entry point, because the latter is called after the section
7415 contents have been set, which means that the program headers have
7416 already been worked out. */
12bd6957 7417 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
d0bf826b
AM
7418 {
7419 if (! copy_private_bfd_data (ibfd, obfd))
7420 return FALSE;
7421 }
7422
7423 return _bfd_elf_fixup_group_sections (ibfd, NULL);
7424}
7425
252b5132
RH
7426/* Copy private symbol information. If this symbol is in a section
7427 which we did not map into a BFD section, try to map the section
7428 index correctly. We use special macro definitions for the mapped
7429 section indices; these definitions are interpreted by the
7430 swap_out_syms function. */
7431
9ad5cbcf
AM
7432#define MAP_ONESYMTAB (SHN_HIOS + 1)
7433#define MAP_DYNSYMTAB (SHN_HIOS + 2)
7434#define MAP_STRTAB (SHN_HIOS + 3)
7435#define MAP_SHSTRTAB (SHN_HIOS + 4)
7436#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 7437
b34976b6 7438bfd_boolean
217aa764
AM
7439_bfd_elf_copy_private_symbol_data (bfd *ibfd,
7440 asymbol *isymarg,
7441 bfd *obfd,
7442 asymbol *osymarg)
252b5132
RH
7443{
7444 elf_symbol_type *isym, *osym;
7445
7446 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7447 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 7448 return TRUE;
252b5132
RH
7449
7450 isym = elf_symbol_from (ibfd, isymarg);
7451 osym = elf_symbol_from (obfd, osymarg);
7452
7453 if (isym != NULL
8424d8f5 7454 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
7455 && osym != NULL
7456 && bfd_is_abs_section (isym->symbol.section))
7457 {
7458 unsigned int shndx;
7459
7460 shndx = isym->internal_elf_sym.st_shndx;
7461 if (shndx == elf_onesymtab (ibfd))
7462 shndx = MAP_ONESYMTAB;
7463 else if (shndx == elf_dynsymtab (ibfd))
7464 shndx = MAP_DYNSYMTAB;
12bd6957 7465 else if (shndx == elf_strtab_sec (ibfd))
252b5132 7466 shndx = MAP_STRTAB;
12bd6957 7467 else if (shndx == elf_shstrtab_sec (ibfd))
252b5132 7468 shndx = MAP_SHSTRTAB;
6a40cf0c 7469 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
9ad5cbcf 7470 shndx = MAP_SYM_SHNDX;
252b5132
RH
7471 osym->internal_elf_sym.st_shndx = shndx;
7472 }
7473
b34976b6 7474 return TRUE;
252b5132
RH
7475}
7476
7477/* Swap out the symbols. */
7478
b34976b6 7479static bfd_boolean
217aa764 7480swap_out_syms (bfd *abfd,
ef10c3ac 7481 struct elf_strtab_hash **sttp,
217aa764 7482 int relocatable_p)
252b5132 7483{
9c5bfbb7 7484 const struct elf_backend_data *bed;
079e9a2f
AM
7485 int symcount;
7486 asymbol **syms;
ef10c3ac 7487 struct elf_strtab_hash *stt;
079e9a2f 7488 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 7489 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 7490 Elf_Internal_Shdr *symstrtab_hdr;
ef10c3ac 7491 struct elf_sym_strtab *symstrtab;
f075ee0c
AM
7492 bfd_byte *outbound_syms;
7493 bfd_byte *outbound_shndx;
ef10c3ac
L
7494 unsigned long outbound_syms_index;
7495 unsigned long outbound_shndx_index;
079e9a2f 7496 int idx;
12bd6957 7497 unsigned int num_locals;
079e9a2f 7498 bfd_size_type amt;
174fd7f9 7499 bfd_boolean name_local_sections;
252b5132 7500
12bd6957 7501 if (!elf_map_symbols (abfd, &num_locals))
b34976b6 7502 return FALSE;
252b5132 7503
c044fabd 7504 /* Dump out the symtabs. */
ef10c3ac 7505 stt = _bfd_elf_strtab_init ();
079e9a2f 7506 if (stt == NULL)
b34976b6 7507 return FALSE;
252b5132 7508
079e9a2f
AM
7509 bed = get_elf_backend_data (abfd);
7510 symcount = bfd_get_symcount (abfd);
7511 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
7512 symtab_hdr->sh_type = SHT_SYMTAB;
7513 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
7514 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
12bd6957 7515 symtab_hdr->sh_info = num_locals + 1;
72de5009 7516 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
7517
7518 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
7519 symstrtab_hdr->sh_type = SHT_STRTAB;
7520
ef10c3ac
L
7521 /* Allocate buffer to swap out the .strtab section. */
7522 symstrtab = (struct elf_sym_strtab *) bfd_malloc ((symcount + 1)
7523 * sizeof (*symstrtab));
7524 if (symstrtab == NULL)
7525 {
7526 _bfd_elf_strtab_free (stt);
7527 return FALSE;
7528 }
7529
a50b1753
NC
7530 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
7531 bed->s->sizeof_sym);
079e9a2f 7532 if (outbound_syms == NULL)
5ed6aba4 7533 {
ef10c3ac
L
7534error_return:
7535 _bfd_elf_strtab_free (stt);
7536 free (symstrtab);
5ed6aba4
NC
7537 return FALSE;
7538 }
217aa764 7539 symtab_hdr->contents = outbound_syms;
ef10c3ac 7540 outbound_syms_index = 0;
252b5132 7541
9ad5cbcf 7542 outbound_shndx = NULL;
ef10c3ac 7543 outbound_shndx_index = 0;
6a40cf0c
NC
7544
7545 if (elf_symtab_shndx_list (abfd))
9ad5cbcf 7546 {
6a40cf0c
NC
7547 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
7548 if (symtab_shndx_hdr->sh_name != 0)
7549 {
7550 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
7551 outbound_shndx = (bfd_byte *)
7552 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
7553 if (outbound_shndx == NULL)
7554 goto error_return;
5ed6aba4 7555
6a40cf0c
NC
7556 symtab_shndx_hdr->contents = outbound_shndx;
7557 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
7558 symtab_shndx_hdr->sh_size = amt;
7559 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
7560 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
7561 }
7562 /* FIXME: What about any other headers in the list ? */
9ad5cbcf
AM
7563 }
7564
589e6347 7565 /* Now generate the data (for "contents"). */
079e9a2f
AM
7566 {
7567 /* Fill in zeroth symbol and swap it out. */
7568 Elf_Internal_Sym sym;
7569 sym.st_name = 0;
7570 sym.st_value = 0;
7571 sym.st_size = 0;
7572 sym.st_info = 0;
7573 sym.st_other = 0;
7574 sym.st_shndx = SHN_UNDEF;
35fc36a8 7575 sym.st_target_internal = 0;
ef10c3ac
L
7576 symstrtab[0].sym = sym;
7577 symstrtab[0].dest_index = outbound_syms_index;
7578 symstrtab[0].destshndx_index = outbound_shndx_index;
7579 outbound_syms_index++;
9ad5cbcf 7580 if (outbound_shndx != NULL)
ef10c3ac 7581 outbound_shndx_index++;
079e9a2f 7582 }
252b5132 7583
174fd7f9
RS
7584 name_local_sections
7585 = (bed->elf_backend_name_local_section_symbols
7586 && bed->elf_backend_name_local_section_symbols (abfd));
7587
079e9a2f 7588 syms = bfd_get_outsymbols (abfd);
ef10c3ac 7589 for (idx = 0; idx < symcount;)
252b5132 7590 {
252b5132 7591 Elf_Internal_Sym sym;
079e9a2f
AM
7592 bfd_vma value = syms[idx]->value;
7593 elf_symbol_type *type_ptr;
7594 flagword flags = syms[idx]->flags;
7595 int type;
252b5132 7596
174fd7f9
RS
7597 if (!name_local_sections
7598 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
7599 {
7600 /* Local section symbols have no name. */
ef10c3ac 7601 sym.st_name = (unsigned long) -1;
079e9a2f
AM
7602 }
7603 else
7604 {
ef10c3ac
L
7605 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
7606 to get the final offset for st_name. */
7607 sym.st_name
7608 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
7609 FALSE);
079e9a2f 7610 if (sym.st_name == (unsigned long) -1)
ef10c3ac 7611 goto error_return;
079e9a2f 7612 }
252b5132 7613
079e9a2f 7614 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 7615
079e9a2f
AM
7616 if ((flags & BSF_SECTION_SYM) == 0
7617 && bfd_is_com_section (syms[idx]->section))
7618 {
7619 /* ELF common symbols put the alignment into the `value' field,
7620 and the size into the `size' field. This is backwards from
7621 how BFD handles it, so reverse it here. */
7622 sym.st_size = value;
7623 if (type_ptr == NULL
7624 || type_ptr->internal_elf_sym.st_value == 0)
7625 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
7626 else
7627 sym.st_value = type_ptr->internal_elf_sym.st_value;
7628 sym.st_shndx = _bfd_elf_section_from_bfd_section
7629 (abfd, syms[idx]->section);
7630 }
7631 else
7632 {
7633 asection *sec = syms[idx]->section;
cb33740c 7634 unsigned int shndx;
252b5132 7635
079e9a2f
AM
7636 if (sec->output_section)
7637 {
7638 value += sec->output_offset;
7639 sec = sec->output_section;
7640 }
589e6347 7641
079e9a2f
AM
7642 /* Don't add in the section vma for relocatable output. */
7643 if (! relocatable_p)
7644 value += sec->vma;
7645 sym.st_value = value;
7646 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
7647
7648 if (bfd_is_abs_section (sec)
7649 && type_ptr != NULL
7650 && type_ptr->internal_elf_sym.st_shndx != 0)
7651 {
7652 /* This symbol is in a real ELF section which we did
7653 not create as a BFD section. Undo the mapping done
7654 by copy_private_symbol_data. */
7655 shndx = type_ptr->internal_elf_sym.st_shndx;
7656 switch (shndx)
7657 {
7658 case MAP_ONESYMTAB:
7659 shndx = elf_onesymtab (abfd);
7660 break;
7661 case MAP_DYNSYMTAB:
7662 shndx = elf_dynsymtab (abfd);
7663 break;
7664 case MAP_STRTAB:
12bd6957 7665 shndx = elf_strtab_sec (abfd);
079e9a2f
AM
7666 break;
7667 case MAP_SHSTRTAB:
12bd6957 7668 shndx = elf_shstrtab_sec (abfd);
079e9a2f 7669 break;
9ad5cbcf 7670 case MAP_SYM_SHNDX:
6a40cf0c
NC
7671 if (elf_symtab_shndx_list (abfd))
7672 shndx = elf_symtab_shndx_list (abfd)->ndx;
9ad5cbcf 7673 break;
079e9a2f 7674 default:
15bc576a 7675 shndx = SHN_ABS;
079e9a2f
AM
7676 break;
7677 }
7678 }
7679 else
7680 {
7681 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 7682
cb33740c 7683 if (shndx == SHN_BAD)
079e9a2f
AM
7684 {
7685 asection *sec2;
7686
7687 /* Writing this would be a hell of a lot easier if
7688 we had some decent documentation on bfd, and
7689 knew what to expect of the library, and what to
7690 demand of applications. For example, it
7691 appears that `objcopy' might not set the
7692 section of a symbol to be a section that is
7693 actually in the output file. */
7694 sec2 = bfd_get_section_by_name (abfd, sec->name);
5df1bc57
AM
7695 if (sec2 != NULL)
7696 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
7697 if (shndx == SHN_BAD)
589e6347 7698 {
695344c0 7699 /* xgettext:c-format */
589e6347
NC
7700 _bfd_error_handler (_("\
7701Unable to find equivalent output section for symbol '%s' from section '%s'"),
7702 syms[idx]->name ? syms[idx]->name : "<Local sym>",
7703 sec->name);
811072d8 7704 bfd_set_error (bfd_error_invalid_operation);
ef10c3ac 7705 goto error_return;
589e6347 7706 }
079e9a2f
AM
7707 }
7708 }
252b5132 7709
079e9a2f
AM
7710 sym.st_shndx = shndx;
7711 }
252b5132 7712
13ae64f3
JJ
7713 if ((flags & BSF_THREAD_LOCAL) != 0)
7714 type = STT_TLS;
d8045f23
NC
7715 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
7716 type = STT_GNU_IFUNC;
13ae64f3 7717 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
7718 type = STT_FUNC;
7719 else if ((flags & BSF_OBJECT) != 0)
7720 type = STT_OBJECT;
d9352518
DB
7721 else if ((flags & BSF_RELC) != 0)
7722 type = STT_RELC;
7723 else if ((flags & BSF_SRELC) != 0)
7724 type = STT_SRELC;
079e9a2f
AM
7725 else
7726 type = STT_NOTYPE;
252b5132 7727
13ae64f3
JJ
7728 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
7729 type = STT_TLS;
7730
589e6347 7731 /* Processor-specific types. */
079e9a2f
AM
7732 if (type_ptr != NULL
7733 && bed->elf_backend_get_symbol_type)
7734 type = ((*bed->elf_backend_get_symbol_type)
7735 (&type_ptr->internal_elf_sym, type));
252b5132 7736
079e9a2f
AM
7737 if (flags & BSF_SECTION_SYM)
7738 {
7739 if (flags & BSF_GLOBAL)
7740 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
7741 else
7742 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
7743 }
7744 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 7745 {
b8871f35
L
7746 if (type != STT_TLS)
7747 {
7748 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
7749 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
7750 ? STT_COMMON : STT_OBJECT);
7751 else
7752 type = ((flags & BSF_ELF_COMMON) != 0
7753 ? STT_COMMON : STT_OBJECT);
7754 }
7755 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 7756 }
079e9a2f
AM
7757 else if (bfd_is_und_section (syms[idx]->section))
7758 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
7759 ? STB_WEAK
7760 : STB_GLOBAL),
7761 type);
7762 else if (flags & BSF_FILE)
7763 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
7764 else
7765 {
7766 int bind = STB_LOCAL;
252b5132 7767
079e9a2f
AM
7768 if (flags & BSF_LOCAL)
7769 bind = STB_LOCAL;
3e7a7d11
NC
7770 else if (flags & BSF_GNU_UNIQUE)
7771 bind = STB_GNU_UNIQUE;
079e9a2f
AM
7772 else if (flags & BSF_WEAK)
7773 bind = STB_WEAK;
7774 else if (flags & BSF_GLOBAL)
7775 bind = STB_GLOBAL;
252b5132 7776
079e9a2f
AM
7777 sym.st_info = ELF_ST_INFO (bind, type);
7778 }
252b5132 7779
079e9a2f 7780 if (type_ptr != NULL)
35fc36a8
RS
7781 {
7782 sym.st_other = type_ptr->internal_elf_sym.st_other;
7783 sym.st_target_internal
7784 = type_ptr->internal_elf_sym.st_target_internal;
7785 }
079e9a2f 7786 else
35fc36a8
RS
7787 {
7788 sym.st_other = 0;
7789 sym.st_target_internal = 0;
7790 }
252b5132 7791
ef10c3ac
L
7792 idx++;
7793 symstrtab[idx].sym = sym;
7794 symstrtab[idx].dest_index = outbound_syms_index;
7795 symstrtab[idx].destshndx_index = outbound_shndx_index;
7796
7797 outbound_syms_index++;
9ad5cbcf 7798 if (outbound_shndx != NULL)
ef10c3ac
L
7799 outbound_shndx_index++;
7800 }
7801
7802 /* Finalize the .strtab section. */
7803 _bfd_elf_strtab_finalize (stt);
7804
7805 /* Swap out the .strtab section. */
7806 for (idx = 0; idx <= symcount; idx++)
7807 {
7808 struct elf_sym_strtab *elfsym = &symstrtab[idx];
7809 if (elfsym->sym.st_name == (unsigned long) -1)
7810 elfsym->sym.st_name = 0;
7811 else
7812 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
7813 elfsym->sym.st_name);
7814 bed->s->swap_symbol_out (abfd, &elfsym->sym,
7815 (outbound_syms
7816 + (elfsym->dest_index
7817 * bed->s->sizeof_sym)),
7818 (outbound_shndx
7819 + (elfsym->destshndx_index
7820 * sizeof (Elf_External_Sym_Shndx))));
079e9a2f 7821 }
ef10c3ac 7822 free (symstrtab);
252b5132 7823
079e9a2f 7824 *sttp = stt;
ef10c3ac 7825 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
079e9a2f 7826 symstrtab_hdr->sh_type = SHT_STRTAB;
84865015 7827 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
079e9a2f
AM
7828 symstrtab_hdr->sh_addr = 0;
7829 symstrtab_hdr->sh_entsize = 0;
7830 symstrtab_hdr->sh_link = 0;
7831 symstrtab_hdr->sh_info = 0;
7832 symstrtab_hdr->sh_addralign = 1;
252b5132 7833
b34976b6 7834 return TRUE;
252b5132
RH
7835}
7836
7837/* Return the number of bytes required to hold the symtab vector.
7838
7839 Note that we base it on the count plus 1, since we will null terminate
7840 the vector allocated based on this size. However, the ELF symbol table
7841 always has a dummy entry as symbol #0, so it ends up even. */
7842
7843long
217aa764 7844_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
7845{
7846 long symcount;
7847 long symtab_size;
7848 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
7849
7850 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
7851 symtab_size = (symcount + 1) * (sizeof (asymbol *));
7852 if (symcount > 0)
7853 symtab_size -= sizeof (asymbol *);
252b5132
RH
7854
7855 return symtab_size;
7856}
7857
7858long
217aa764 7859_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
7860{
7861 long symcount;
7862 long symtab_size;
7863 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
7864
7865 if (elf_dynsymtab (abfd) == 0)
7866 {
7867 bfd_set_error (bfd_error_invalid_operation);
7868 return -1;
7869 }
7870
7871 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
7872 symtab_size = (symcount + 1) * (sizeof (asymbol *));
7873 if (symcount > 0)
7874 symtab_size -= sizeof (asymbol *);
252b5132
RH
7875
7876 return symtab_size;
7877}
7878
7879long
217aa764
AM
7880_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
7881 sec_ptr asect)
252b5132
RH
7882{
7883 return (asect->reloc_count + 1) * sizeof (arelent *);
7884}
7885
7886/* Canonicalize the relocs. */
7887
7888long
217aa764
AM
7889_bfd_elf_canonicalize_reloc (bfd *abfd,
7890 sec_ptr section,
7891 arelent **relptr,
7892 asymbol **symbols)
252b5132
RH
7893{
7894 arelent *tblptr;
7895 unsigned int i;
9c5bfbb7 7896 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 7897
b34976b6 7898 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
7899 return -1;
7900
7901 tblptr = section->relocation;
7902 for (i = 0; i < section->reloc_count; i++)
7903 *relptr++ = tblptr++;
7904
7905 *relptr = NULL;
7906
7907 return section->reloc_count;
7908}
7909
7910long
6cee3f79 7911_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 7912{
9c5bfbb7 7913 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 7914 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
7915
7916 if (symcount >= 0)
7917 bfd_get_symcount (abfd) = symcount;
7918 return symcount;
7919}
7920
7921long
217aa764
AM
7922_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
7923 asymbol **allocation)
252b5132 7924{
9c5bfbb7 7925 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 7926 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
7927
7928 if (symcount >= 0)
7929 bfd_get_dynamic_symcount (abfd) = symcount;
7930 return symcount;
252b5132
RH
7931}
7932
8615f3f2
AM
7933/* Return the size required for the dynamic reloc entries. Any loadable
7934 section that was actually installed in the BFD, and has type SHT_REL
7935 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
7936 dynamic reloc section. */
252b5132
RH
7937
7938long
217aa764 7939_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
7940{
7941 long ret;
7942 asection *s;
7943
7944 if (elf_dynsymtab (abfd) == 0)
7945 {
7946 bfd_set_error (bfd_error_invalid_operation);
7947 return -1;
7948 }
7949
7950 ret = sizeof (arelent *);
7951 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 7952 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
7953 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
7954 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 7955 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
7956 * sizeof (arelent *));
7957
7958 return ret;
7959}
7960
8615f3f2
AM
7961/* Canonicalize the dynamic relocation entries. Note that we return the
7962 dynamic relocations as a single block, although they are actually
7963 associated with particular sections; the interface, which was
7964 designed for SunOS style shared libraries, expects that there is only
7965 one set of dynamic relocs. Any loadable section that was actually
7966 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
7967 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
7968
7969long
217aa764
AM
7970_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
7971 arelent **storage,
7972 asymbol **syms)
252b5132 7973{
217aa764 7974 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
7975 asection *s;
7976 long ret;
7977
7978 if (elf_dynsymtab (abfd) == 0)
7979 {
7980 bfd_set_error (bfd_error_invalid_operation);
7981 return -1;
7982 }
7983
7984 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
7985 ret = 0;
7986 for (s = abfd->sections; s != NULL; s = s->next)
7987 {
266b05cf 7988 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
7989 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
7990 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
7991 {
7992 arelent *p;
7993 long count, i;
7994
b34976b6 7995 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 7996 return -1;
eea6121a 7997 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
7998 p = s->relocation;
7999 for (i = 0; i < count; i++)
8000 *storage++ = p++;
8001 ret += count;
8002 }
8003 }
8004
8005 *storage = NULL;
8006
8007 return ret;
8008}
8009\f
8010/* Read in the version information. */
8011
b34976b6 8012bfd_boolean
fc0e6df6 8013_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
8014{
8015 bfd_byte *contents = NULL;
fc0e6df6
PB
8016 unsigned int freeidx = 0;
8017
8018 if (elf_dynverref (abfd) != 0)
8019 {
8020 Elf_Internal_Shdr *hdr;
8021 Elf_External_Verneed *everneed;
8022 Elf_Internal_Verneed *iverneed;
8023 unsigned int i;
d0fb9a8d 8024 bfd_byte *contents_end;
fc0e6df6
PB
8025
8026 hdr = &elf_tdata (abfd)->dynverref_hdr;
8027
601a03ba 8028 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verneed))
d0fb9a8d 8029 {
601a03ba 8030error_return_bad_verref:
4eca0228 8031 _bfd_error_handler
601a03ba
AM
8032 (_("%B: .gnu.version_r invalid entry"), abfd);
8033 bfd_set_error (bfd_error_bad_value);
d0fb9a8d
JJ
8034error_return_verref:
8035 elf_tdata (abfd)->verref = NULL;
8036 elf_tdata (abfd)->cverrefs = 0;
8037 goto error_return;
8038 }
601a03ba
AM
8039
8040 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
8041 if (contents == NULL)
8042 goto error_return_verref;
8043
fc0e6df6
PB
8044 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
8045 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 8046 goto error_return_verref;
fc0e6df6 8047
601a03ba
AM
8048 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
8049 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
8050
8051 if (elf_tdata (abfd)->verref == NULL)
d0fb9a8d
JJ
8052 goto error_return_verref;
8053
8054 BFD_ASSERT (sizeof (Elf_External_Verneed)
8055 == sizeof (Elf_External_Vernaux));
8056 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
8057 everneed = (Elf_External_Verneed *) contents;
8058 iverneed = elf_tdata (abfd)->verref;
8059 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8060 {
8061 Elf_External_Vernaux *evernaux;
8062 Elf_Internal_Vernaux *ivernaux;
8063 unsigned int j;
8064
8065 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8066
8067 iverneed->vn_bfd = abfd;
8068
8069 iverneed->vn_filename =
8070 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8071 iverneed->vn_file);
8072 if (iverneed->vn_filename == NULL)
601a03ba 8073 goto error_return_bad_verref;
fc0e6df6 8074
d0fb9a8d
JJ
8075 if (iverneed->vn_cnt == 0)
8076 iverneed->vn_auxptr = NULL;
8077 else
8078 {
a50b1753
NC
8079 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
8080 bfd_alloc2 (abfd, iverneed->vn_cnt,
8081 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
8082 if (iverneed->vn_auxptr == NULL)
8083 goto error_return_verref;
8084 }
8085
8086 if (iverneed->vn_aux
8087 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8088 goto error_return_bad_verref;
fc0e6df6
PB
8089
8090 evernaux = ((Elf_External_Vernaux *)
8091 ((bfd_byte *) everneed + iverneed->vn_aux));
8092 ivernaux = iverneed->vn_auxptr;
8093 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8094 {
8095 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8096
8097 ivernaux->vna_nodename =
8098 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8099 ivernaux->vna_name);
8100 if (ivernaux->vna_nodename == NULL)
601a03ba 8101 goto error_return_bad_verref;
fc0e6df6 8102
25ff461f
AM
8103 if (ivernaux->vna_other > freeidx)
8104 freeidx = ivernaux->vna_other;
8105
8106 ivernaux->vna_nextptr = NULL;
8107 if (ivernaux->vna_next == 0)
8108 {
8109 iverneed->vn_cnt = j + 1;
8110 break;
8111 }
fc0e6df6
PB
8112 if (j + 1 < iverneed->vn_cnt)
8113 ivernaux->vna_nextptr = ivernaux + 1;
fc0e6df6 8114
d0fb9a8d
JJ
8115 if (ivernaux->vna_next
8116 > (size_t) (contents_end - (bfd_byte *) evernaux))
601a03ba 8117 goto error_return_bad_verref;
d0fb9a8d 8118
fc0e6df6
PB
8119 evernaux = ((Elf_External_Vernaux *)
8120 ((bfd_byte *) evernaux + ivernaux->vna_next));
fc0e6df6
PB
8121 }
8122
25ff461f
AM
8123 iverneed->vn_nextref = NULL;
8124 if (iverneed->vn_next == 0)
8125 break;
fc0e6df6
PB
8126 if (i + 1 < hdr->sh_info)
8127 iverneed->vn_nextref = iverneed + 1;
fc0e6df6 8128
d0fb9a8d
JJ
8129 if (iverneed->vn_next
8130 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8131 goto error_return_bad_verref;
d0fb9a8d 8132
fc0e6df6
PB
8133 everneed = ((Elf_External_Verneed *)
8134 ((bfd_byte *) everneed + iverneed->vn_next));
8135 }
25ff461f 8136 elf_tdata (abfd)->cverrefs = i;
fc0e6df6
PB
8137
8138 free (contents);
8139 contents = NULL;
8140 }
252b5132
RH
8141
8142 if (elf_dynverdef (abfd) != 0)
8143 {
8144 Elf_Internal_Shdr *hdr;
8145 Elf_External_Verdef *everdef;
8146 Elf_Internal_Verdef *iverdef;
f631889e
UD
8147 Elf_Internal_Verdef *iverdefarr;
8148 Elf_Internal_Verdef iverdefmem;
252b5132 8149 unsigned int i;
062e2358 8150 unsigned int maxidx;
d0fb9a8d 8151 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
8152
8153 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8154
601a03ba
AM
8155 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
8156 {
8157 error_return_bad_verdef:
4eca0228 8158 _bfd_error_handler
601a03ba
AM
8159 (_("%B: .gnu.version_d invalid entry"), abfd);
8160 bfd_set_error (bfd_error_bad_value);
8161 error_return_verdef:
8162 elf_tdata (abfd)->verdef = NULL;
8163 elf_tdata (abfd)->cverdefs = 0;
8164 goto error_return;
8165 }
8166
a50b1753 8167 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132 8168 if (contents == NULL)
601a03ba 8169 goto error_return_verdef;
252b5132 8170 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 8171 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
601a03ba 8172 goto error_return_verdef;
d0fb9a8d
JJ
8173
8174 BFD_ASSERT (sizeof (Elf_External_Verdef)
8175 >= sizeof (Elf_External_Verdaux));
8176 contents_end_def = contents + hdr->sh_size
8177 - sizeof (Elf_External_Verdef);
8178 contents_end_aux = contents + hdr->sh_size
8179 - sizeof (Elf_External_Verdaux);
8180
f631889e
UD
8181 /* We know the number of entries in the section but not the maximum
8182 index. Therefore we have to run through all entries and find
8183 the maximum. */
252b5132 8184 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
8185 maxidx = 0;
8186 for (i = 0; i < hdr->sh_info; ++i)
8187 {
8188 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8189
601a03ba
AM
8190 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
8191 goto error_return_bad_verdef;
062e2358
AM
8192 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
8193 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 8194
25ff461f
AM
8195 if (iverdefmem.vd_next == 0)
8196 break;
8197
d0fb9a8d
JJ
8198 if (iverdefmem.vd_next
8199 > (size_t) (contents_end_def - (bfd_byte *) everdef))
601a03ba 8200 goto error_return_bad_verdef;
d0fb9a8d 8201
f631889e
UD
8202 everdef = ((Elf_External_Verdef *)
8203 ((bfd_byte *) everdef + iverdefmem.vd_next));
8204 }
8205
fc0e6df6
PB
8206 if (default_imported_symver)
8207 {
8208 if (freeidx > maxidx)
8209 maxidx = ++freeidx;
8210 else
8211 freeidx = ++maxidx;
8212 }
201159ec 8213
601a03ba
AM
8214 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
8215 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e 8216 if (elf_tdata (abfd)->verdef == NULL)
601a03ba 8217 goto error_return_verdef;
f631889e
UD
8218
8219 elf_tdata (abfd)->cverdefs = maxidx;
8220
8221 everdef = (Elf_External_Verdef *) contents;
8222 iverdefarr = elf_tdata (abfd)->verdef;
8223 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
8224 {
8225 Elf_External_Verdaux *everdaux;
8226 Elf_Internal_Verdaux *iverdaux;
8227 unsigned int j;
8228
f631889e
UD
8229 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8230
d0fb9a8d 8231 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
601a03ba 8232 goto error_return_bad_verdef;
d0fb9a8d 8233
f631889e 8234 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
595bce75 8235 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
252b5132
RH
8236
8237 iverdef->vd_bfd = abfd;
8238
d0fb9a8d
JJ
8239 if (iverdef->vd_cnt == 0)
8240 iverdef->vd_auxptr = NULL;
8241 else
8242 {
a50b1753
NC
8243 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
8244 bfd_alloc2 (abfd, iverdef->vd_cnt,
8245 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
8246 if (iverdef->vd_auxptr == NULL)
8247 goto error_return_verdef;
8248 }
8249
8250 if (iverdef->vd_aux
8251 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
601a03ba 8252 goto error_return_bad_verdef;
252b5132
RH
8253
8254 everdaux = ((Elf_External_Verdaux *)
8255 ((bfd_byte *) everdef + iverdef->vd_aux));
8256 iverdaux = iverdef->vd_auxptr;
8257 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
8258 {
8259 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
8260
8261 iverdaux->vda_nodename =
8262 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8263 iverdaux->vda_name);
8264 if (iverdaux->vda_nodename == NULL)
601a03ba 8265 goto error_return_bad_verdef;
252b5132 8266
25ff461f
AM
8267 iverdaux->vda_nextptr = NULL;
8268 if (iverdaux->vda_next == 0)
8269 {
8270 iverdef->vd_cnt = j + 1;
8271 break;
8272 }
252b5132
RH
8273 if (j + 1 < iverdef->vd_cnt)
8274 iverdaux->vda_nextptr = iverdaux + 1;
252b5132 8275
d0fb9a8d
JJ
8276 if (iverdaux->vda_next
8277 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
601a03ba 8278 goto error_return_bad_verdef;
d0fb9a8d 8279
252b5132
RH
8280 everdaux = ((Elf_External_Verdaux *)
8281 ((bfd_byte *) everdaux + iverdaux->vda_next));
8282 }
8283
595bce75 8284 iverdef->vd_nodename = NULL;
d0fb9a8d
JJ
8285 if (iverdef->vd_cnt)
8286 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 8287
25ff461f
AM
8288 iverdef->vd_nextdef = NULL;
8289 if (iverdef->vd_next == 0)
8290 break;
d0fb9a8d 8291 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132 8292 iverdef->vd_nextdef = iverdef + 1;
252b5132
RH
8293
8294 everdef = ((Elf_External_Verdef *)
8295 ((bfd_byte *) everdef + iverdef->vd_next));
8296 }
8297
8298 free (contents);
8299 contents = NULL;
8300 }
fc0e6df6 8301 else if (default_imported_symver)
252b5132 8302 {
fc0e6df6
PB
8303 if (freeidx < 3)
8304 freeidx = 3;
8305 else
8306 freeidx++;
252b5132 8307
a50b1753
NC
8308 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
8309 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 8310 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
8311 goto error_return;
8312
fc0e6df6
PB
8313 elf_tdata (abfd)->cverdefs = freeidx;
8314 }
252b5132 8315
fc0e6df6
PB
8316 /* Create a default version based on the soname. */
8317 if (default_imported_symver)
8318 {
8319 Elf_Internal_Verdef *iverdef;
8320 Elf_Internal_Verdaux *iverdaux;
252b5132 8321
5bb3703f 8322 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
252b5132 8323
fc0e6df6
PB
8324 iverdef->vd_version = VER_DEF_CURRENT;
8325 iverdef->vd_flags = 0;
8326 iverdef->vd_ndx = freeidx;
8327 iverdef->vd_cnt = 1;
252b5132 8328
fc0e6df6 8329 iverdef->vd_bfd = abfd;
252b5132 8330
fc0e6df6
PB
8331 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
8332 if (iverdef->vd_nodename == NULL)
d0fb9a8d 8333 goto error_return_verdef;
fc0e6df6 8334 iverdef->vd_nextdef = NULL;
601a03ba
AM
8335 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
8336 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
d0fb9a8d
JJ
8337 if (iverdef->vd_auxptr == NULL)
8338 goto error_return_verdef;
252b5132 8339
fc0e6df6
PB
8340 iverdaux = iverdef->vd_auxptr;
8341 iverdaux->vda_nodename = iverdef->vd_nodename;
252b5132
RH
8342 }
8343
b34976b6 8344 return TRUE;
252b5132
RH
8345
8346 error_return:
5ed6aba4 8347 if (contents != NULL)
252b5132 8348 free (contents);
b34976b6 8349 return FALSE;
252b5132
RH
8350}
8351\f
8352asymbol *
217aa764 8353_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
8354{
8355 elf_symbol_type *newsym;
8356
201159ec 8357 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof * newsym);
252b5132
RH
8358 if (!newsym)
8359 return NULL;
201159ec
NC
8360 newsym->symbol.the_bfd = abfd;
8361 return &newsym->symbol;
252b5132
RH
8362}
8363
8364void
217aa764
AM
8365_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
8366 asymbol *symbol,
8367 symbol_info *ret)
252b5132
RH
8368{
8369 bfd_symbol_info (symbol, ret);
8370}
8371
8372/* Return whether a symbol name implies a local symbol. Most targets
8373 use this function for the is_local_label_name entry point, but some
8374 override it. */
8375
b34976b6 8376bfd_boolean
217aa764
AM
8377_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
8378 const char *name)
252b5132
RH
8379{
8380 /* Normal local symbols start with ``.L''. */
8381 if (name[0] == '.' && name[1] == 'L')
b34976b6 8382 return TRUE;
252b5132
RH
8383
8384 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
8385 DWARF debugging symbols starting with ``..''. */
8386 if (name[0] == '.' && name[1] == '.')
b34976b6 8387 return TRUE;
252b5132
RH
8388
8389 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
8390 emitting DWARF debugging output. I suspect this is actually a
8391 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
8392 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
8393 underscore to be emitted on some ELF targets). For ease of use,
8394 we treat such symbols as local. */
8395 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 8396 return TRUE;
252b5132 8397
b1fa9dd6
NC
8398 /* Treat assembler generated fake symbols, dollar local labels and
8399 forward-backward labels (aka local labels) as locals.
8400 These labels have the form:
8401
8402 L0^A.* (fake symbols)
8403
8404 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
8405
8406 Versions which start with .L will have already been matched above,
8407 so we only need to match the rest. */
8408 if (name[0] == 'L' && ISDIGIT (name[1]))
8409 {
8410 bfd_boolean ret = FALSE;
8411 const char * p;
8412 char c;
8413
8414 for (p = name + 2; (c = *p); p++)
8415 {
8416 if (c == 1 || c == 2)
8417 {
8418 if (c == 1 && p == name + 2)
8419 /* A fake symbol. */
8420 return TRUE;
8421
8422 /* FIXME: We are being paranoid here and treating symbols like
8423 L0^Bfoo as if there were non-local, on the grounds that the
8424 assembler will never generate them. But can any symbol
8425 containing an ASCII value in the range 1-31 ever be anything
8426 other than some kind of local ? */
8427 ret = TRUE;
8428 }
8429
8430 if (! ISDIGIT (c))
8431 {
8432 ret = FALSE;
8433 break;
8434 }
8435 }
8436 return ret;
8437 }
ffa54770 8438
b34976b6 8439 return FALSE;
252b5132
RH
8440}
8441
8442alent *
217aa764
AM
8443_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
8444 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
8445{
8446 abort ();
8447 return NULL;
8448}
8449
b34976b6 8450bfd_boolean
217aa764
AM
8451_bfd_elf_set_arch_mach (bfd *abfd,
8452 enum bfd_architecture arch,
8453 unsigned long machine)
252b5132
RH
8454{
8455 /* If this isn't the right architecture for this backend, and this
8456 isn't the generic backend, fail. */
8457 if (arch != get_elf_backend_data (abfd)->arch
8458 && arch != bfd_arch_unknown
8459 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 8460 return FALSE;
252b5132
RH
8461
8462 return bfd_default_set_arch_mach (abfd, arch, machine);
8463}
8464
d1fad7c6
NC
8465/* Find the nearest line to a particular section and offset,
8466 for error reporting. */
8467
b34976b6 8468bfd_boolean
217aa764 8469_bfd_elf_find_nearest_line (bfd *abfd,
217aa764 8470 asymbol **symbols,
fb167eb2 8471 asection *section,
217aa764
AM
8472 bfd_vma offset,
8473 const char **filename_ptr,
8474 const char **functionname_ptr,
fb167eb2
AM
8475 unsigned int *line_ptr,
8476 unsigned int *discriminator_ptr)
d1fad7c6 8477{
b34976b6 8478 bfd_boolean found;
d1fad7c6 8479
fb167eb2 8480 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
4e8a9624 8481 filename_ptr, functionname_ptr,
fb167eb2
AM
8482 line_ptr, discriminator_ptr,
8483 dwarf_debug_sections, 0,
e00e8198
AM
8484 &elf_tdata (abfd)->dwarf2_find_line_info)
8485 || _bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
8486 filename_ptr, functionname_ptr,
8487 line_ptr))
d1fad7c6
NC
8488 {
8489 if (!*functionname_ptr)
e00e8198
AM
8490 _bfd_elf_find_function (abfd, symbols, section, offset,
8491 *filename_ptr ? NULL : filename_ptr,
8492 functionname_ptr);
b34976b6 8493 return TRUE;
d1fad7c6
NC
8494 }
8495
8496 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
8497 &found, filename_ptr,
8498 functionname_ptr, line_ptr,
8499 &elf_tdata (abfd)->line_info))
b34976b6 8500 return FALSE;
dc43ada5 8501 if (found && (*functionname_ptr || *line_ptr))
b34976b6 8502 return TRUE;
d1fad7c6
NC
8503
8504 if (symbols == NULL)
b34976b6 8505 return FALSE;
d1fad7c6 8506
e00e8198
AM
8507 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
8508 filename_ptr, functionname_ptr))
b34976b6 8509 return FALSE;
d1fad7c6 8510
252b5132 8511 *line_ptr = 0;
b34976b6 8512 return TRUE;
252b5132
RH
8513}
8514
5420f73d
L
8515/* Find the line for a symbol. */
8516
8517bfd_boolean
8518_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
8519 const char **filename_ptr, unsigned int *line_ptr)
9b8d1a36 8520{
fb167eb2
AM
8521 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
8522 filename_ptr, NULL, line_ptr, NULL,
8523 dwarf_debug_sections, 0,
8524 &elf_tdata (abfd)->dwarf2_find_line_info);
5420f73d
L
8525}
8526
4ab527b0
FF
8527/* After a call to bfd_find_nearest_line, successive calls to
8528 bfd_find_inliner_info can be used to get source information about
8529 each level of function inlining that terminated at the address
8530 passed to bfd_find_nearest_line. Currently this is only supported
8531 for DWARF2 with appropriate DWARF3 extensions. */
8532
8533bfd_boolean
8534_bfd_elf_find_inliner_info (bfd *abfd,
8535 const char **filename_ptr,
8536 const char **functionname_ptr,
8537 unsigned int *line_ptr)
8538{
8539 bfd_boolean found;
8540 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
8541 functionname_ptr, line_ptr,
8542 & elf_tdata (abfd)->dwarf2_find_line_info);
8543 return found;
8544}
8545
252b5132 8546int
a6b96beb 8547_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 8548{
8ded5a0f
AM
8549 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8550 int ret = bed->s->sizeof_ehdr;
252b5132 8551
0e1862bb 8552 if (!bfd_link_relocatable (info))
8ded5a0f 8553 {
12bd6957 8554 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 8555
62d7a5f6
AM
8556 if (phdr_size == (bfd_size_type) -1)
8557 {
8558 struct elf_segment_map *m;
8559
8560 phdr_size = 0;
12bd6957 8561 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62d7a5f6 8562 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 8563
62d7a5f6
AM
8564 if (phdr_size == 0)
8565 phdr_size = get_program_header_size (abfd, info);
8566 }
8ded5a0f 8567
12bd6957 8568 elf_program_header_size (abfd) = phdr_size;
8ded5a0f
AM
8569 ret += phdr_size;
8570 }
8571
252b5132
RH
8572 return ret;
8573}
8574
b34976b6 8575bfd_boolean
217aa764
AM
8576_bfd_elf_set_section_contents (bfd *abfd,
8577 sec_ptr section,
0f867abe 8578 const void *location,
217aa764
AM
8579 file_ptr offset,
8580 bfd_size_type count)
252b5132
RH
8581{
8582 Elf_Internal_Shdr *hdr;
1b6aeedb 8583 file_ptr pos;
252b5132
RH
8584
8585 if (! abfd->output_has_begun
217aa764 8586 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 8587 return FALSE;
252b5132 8588
0ce398f1
L
8589 if (!count)
8590 return TRUE;
8591
252b5132 8592 hdr = &elf_section_data (section)->this_hdr;
0ce398f1
L
8593 if (hdr->sh_offset == (file_ptr) -1)
8594 {
8595 /* We must compress this section. Write output to the buffer. */
8596 unsigned char *contents = hdr->contents;
8597 if ((offset + count) > hdr->sh_size
8598 || (section->flags & SEC_ELF_COMPRESS) == 0
8599 || contents == NULL)
8600 abort ();
8601 memcpy (contents + offset, location, count);
8602 return TRUE;
8603 }
dc810e39
AM
8604 pos = hdr->sh_offset + offset;
8605 if (bfd_seek (abfd, pos, SEEK_SET) != 0
8606 || bfd_bwrite (location, count, abfd) != count)
b34976b6 8607 return FALSE;
252b5132 8608
b34976b6 8609 return TRUE;
252b5132
RH
8610}
8611
8612void
217aa764
AM
8613_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
8614 arelent *cache_ptr ATTRIBUTE_UNUSED,
8615 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
8616{
8617 abort ();
8618}
8619
252b5132
RH
8620/* Try to convert a non-ELF reloc into an ELF one. */
8621
b34976b6 8622bfd_boolean
217aa764 8623_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 8624{
c044fabd 8625 /* Check whether we really have an ELF howto. */
252b5132
RH
8626
8627 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
8628 {
8629 bfd_reloc_code_real_type code;
8630 reloc_howto_type *howto;
8631
8632 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 8633 equivalent ELF reloc. */
252b5132
RH
8634
8635 if (areloc->howto->pc_relative)
8636 {
8637 switch (areloc->howto->bitsize)
8638 {
8639 case 8:
8640 code = BFD_RELOC_8_PCREL;
8641 break;
8642 case 12:
8643 code = BFD_RELOC_12_PCREL;
8644 break;
8645 case 16:
8646 code = BFD_RELOC_16_PCREL;
8647 break;
8648 case 24:
8649 code = BFD_RELOC_24_PCREL;
8650 break;
8651 case 32:
8652 code = BFD_RELOC_32_PCREL;
8653 break;
8654 case 64:
8655 code = BFD_RELOC_64_PCREL;
8656 break;
8657 default:
8658 goto fail;
8659 }
8660
8661 howto = bfd_reloc_type_lookup (abfd, code);
8662
8663 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
8664 {
8665 if (howto->pcrel_offset)
8666 areloc->addend += areloc->address;
8667 else
8668 areloc->addend -= areloc->address; /* addend is unsigned!! */
8669 }
8670 }
8671 else
8672 {
8673 switch (areloc->howto->bitsize)
8674 {
8675 case 8:
8676 code = BFD_RELOC_8;
8677 break;
8678 case 14:
8679 code = BFD_RELOC_14;
8680 break;
8681 case 16:
8682 code = BFD_RELOC_16;
8683 break;
8684 case 26:
8685 code = BFD_RELOC_26;
8686 break;
8687 case 32:
8688 code = BFD_RELOC_32;
8689 break;
8690 case 64:
8691 code = BFD_RELOC_64;
8692 break;
8693 default:
8694 goto fail;
8695 }
8696
8697 howto = bfd_reloc_type_lookup (abfd, code);
8698 }
8699
8700 if (howto)
8701 areloc->howto = howto;
8702 else
8703 goto fail;
8704 }
8705
b34976b6 8706 return TRUE;
252b5132
RH
8707
8708 fail:
4eca0228 8709 _bfd_error_handler
695344c0 8710 /* xgettext:c-format */
d003868e
AM
8711 (_("%B: unsupported relocation type %s"),
8712 abfd, areloc->howto->name);
252b5132 8713 bfd_set_error (bfd_error_bad_value);
b34976b6 8714 return FALSE;
252b5132
RH
8715}
8716
b34976b6 8717bfd_boolean
217aa764 8718_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132 8719{
d9071b0c
TG
8720 struct elf_obj_tdata *tdata = elf_tdata (abfd);
8721 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
252b5132 8722 {
c0355132 8723 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 8724 _bfd_elf_strtab_free (elf_shstrtab (abfd));
d9071b0c 8725 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
252b5132
RH
8726 }
8727
8728 return _bfd_generic_close_and_cleanup (abfd);
8729}
8730
8731/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
8732 in the relocation's offset. Thus we cannot allow any sort of sanity
8733 range-checking to interfere. There is nothing else to do in processing
8734 this reloc. */
8735
8736bfd_reloc_status_type
217aa764
AM
8737_bfd_elf_rel_vtable_reloc_fn
8738 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 8739 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
8740 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
8741 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
8742{
8743 return bfd_reloc_ok;
8744}
252b5132
RH
8745\f
8746/* Elf core file support. Much of this only works on native
8747 toolchains, since we rely on knowing the
8748 machine-dependent procfs structure in order to pick
c044fabd 8749 out details about the corefile. */
252b5132
RH
8750
8751#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
8752/* Needed for new procfs interface on sparc-solaris. */
8753# define _STRUCTURED_PROC 1
252b5132
RH
8754# include <sys/procfs.h>
8755#endif
8756
261b8d08
PA
8757/* Return a PID that identifies a "thread" for threaded cores, or the
8758 PID of the main process for non-threaded cores. */
252b5132
RH
8759
8760static int
217aa764 8761elfcore_make_pid (bfd *abfd)
252b5132 8762{
261b8d08
PA
8763 int pid;
8764
228e534f 8765 pid = elf_tdata (abfd)->core->lwpid;
261b8d08 8766 if (pid == 0)
228e534f 8767 pid = elf_tdata (abfd)->core->pid;
261b8d08
PA
8768
8769 return pid;
252b5132
RH
8770}
8771
252b5132
RH
8772/* If there isn't a section called NAME, make one, using
8773 data from SECT. Note, this function will generate a
8774 reference to NAME, so you shouldn't deallocate or
c044fabd 8775 overwrite it. */
252b5132 8776
b34976b6 8777static bfd_boolean
217aa764 8778elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 8779{
c044fabd 8780 asection *sect2;
252b5132
RH
8781
8782 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 8783 return TRUE;
252b5132 8784
117ed4f8 8785 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 8786 if (sect2 == NULL)
b34976b6 8787 return FALSE;
252b5132 8788
eea6121a 8789 sect2->size = sect->size;
252b5132 8790 sect2->filepos = sect->filepos;
252b5132 8791 sect2->alignment_power = sect->alignment_power;
b34976b6 8792 return TRUE;
252b5132
RH
8793}
8794
bb0082d6
AM
8795/* Create a pseudosection containing SIZE bytes at FILEPOS. This
8796 actually creates up to two pseudosections:
8797 - For the single-threaded case, a section named NAME, unless
8798 such a section already exists.
8799 - For the multi-threaded case, a section named "NAME/PID", where
8800 PID is elfcore_make_pid (abfd).
8801 Both pseudosections have identical contents. */
b34976b6 8802bfd_boolean
217aa764
AM
8803_bfd_elfcore_make_pseudosection (bfd *abfd,
8804 char *name,
8805 size_t size,
8806 ufile_ptr filepos)
bb0082d6
AM
8807{
8808 char buf[100];
8809 char *threaded_name;
d4c88bbb 8810 size_t len;
bb0082d6
AM
8811 asection *sect;
8812
8813 /* Build the section name. */
8814
8815 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 8816 len = strlen (buf) + 1;
a50b1753 8817 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 8818 if (threaded_name == NULL)
b34976b6 8819 return FALSE;
d4c88bbb 8820 memcpy (threaded_name, buf, len);
bb0082d6 8821
117ed4f8
AM
8822 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
8823 SEC_HAS_CONTENTS);
bb0082d6 8824 if (sect == NULL)
b34976b6 8825 return FALSE;
eea6121a 8826 sect->size = size;
bb0082d6 8827 sect->filepos = filepos;
bb0082d6
AM
8828 sect->alignment_power = 2;
8829
936e320b 8830 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
8831}
8832
252b5132 8833/* prstatus_t exists on:
4a938328 8834 solaris 2.5+
252b5132
RH
8835 linux 2.[01] + glibc
8836 unixware 4.2
8837*/
8838
8839#if defined (HAVE_PRSTATUS_T)
a7b97311 8840
b34976b6 8841static bfd_boolean
217aa764 8842elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 8843{
eea6121a 8844 size_t size;
7ee38065 8845 int offset;
252b5132 8846
4a938328
MS
8847 if (note->descsz == sizeof (prstatus_t))
8848 {
8849 prstatus_t prstat;
252b5132 8850
eea6121a 8851 size = sizeof (prstat.pr_reg);
7ee38065 8852 offset = offsetof (prstatus_t, pr_reg);
4a938328 8853 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 8854
fa49d224
NC
8855 /* Do not overwrite the core signal if it
8856 has already been set by another thread. */
228e534f
AM
8857 if (elf_tdata (abfd)->core->signal == 0)
8858 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
8859 if (elf_tdata (abfd)->core->pid == 0)
8860 elf_tdata (abfd)->core->pid = prstat.pr_pid;
252b5132 8861
4a938328
MS
8862 /* pr_who exists on:
8863 solaris 2.5+
8864 unixware 4.2
8865 pr_who doesn't exist on:
8866 linux 2.[01]
8867 */
252b5132 8868#if defined (HAVE_PRSTATUS_T_PR_WHO)
228e534f 8869 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 8870#else
228e534f 8871 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
252b5132 8872#endif
4a938328 8873 }
7ee38065 8874#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
8875 else if (note->descsz == sizeof (prstatus32_t))
8876 {
8877 /* 64-bit host, 32-bit corefile */
8878 prstatus32_t prstat;
8879
eea6121a 8880 size = sizeof (prstat.pr_reg);
7ee38065 8881 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
8882 memcpy (&prstat, note->descdata, sizeof (prstat));
8883
fa49d224
NC
8884 /* Do not overwrite the core signal if it
8885 has already been set by another thread. */
228e534f
AM
8886 if (elf_tdata (abfd)->core->signal == 0)
8887 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
8888 if (elf_tdata (abfd)->core->pid == 0)
8889 elf_tdata (abfd)->core->pid = prstat.pr_pid;
4a938328
MS
8890
8891 /* pr_who exists on:
8892 solaris 2.5+
8893 unixware 4.2
8894 pr_who doesn't exist on:
8895 linux 2.[01]
8896 */
7ee38065 8897#if defined (HAVE_PRSTATUS32_T_PR_WHO)
228e534f 8898 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 8899#else
228e534f 8900 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
4a938328
MS
8901#endif
8902 }
7ee38065 8903#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
8904 else
8905 {
8906 /* Fail - we don't know how to handle any other
8907 note size (ie. data object type). */
b34976b6 8908 return TRUE;
4a938328 8909 }
252b5132 8910
bb0082d6 8911 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 8912 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 8913 size, note->descpos + offset);
252b5132
RH
8914}
8915#endif /* defined (HAVE_PRSTATUS_T) */
8916
bb0082d6 8917/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 8918static bfd_boolean
217aa764
AM
8919elfcore_make_note_pseudosection (bfd *abfd,
8920 char *name,
8921 Elf_Internal_Note *note)
252b5132 8922{
936e320b
AM
8923 return _bfd_elfcore_make_pseudosection (abfd, name,
8924 note->descsz, note->descpos);
252b5132
RH
8925}
8926
ff08c6bb
JB
8927/* There isn't a consistent prfpregset_t across platforms,
8928 but it doesn't matter, because we don't have to pick this
c044fabd
KH
8929 data structure apart. */
8930
b34976b6 8931static bfd_boolean
217aa764 8932elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8933{
8934 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8935}
8936
ff08c6bb 8937/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 8938 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 8939 literally. */
c044fabd 8940
b34976b6 8941static bfd_boolean
217aa764 8942elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8943{
8944 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8945}
8946
4339cae0
L
8947/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
8948 with a note type of NT_X86_XSTATE. Just include the whole note's
8949 contents literally. */
8950
8951static bfd_boolean
8952elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
8953{
8954 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
8955}
8956
97753bd5
AM
8957static bfd_boolean
8958elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
8959{
8960 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
8961}
8962
89eeb0bc
LM
8963static bfd_boolean
8964elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
8965{
8966 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
8967}
97753bd5 8968
0675e188
UW
8969static bfd_boolean
8970elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
8971{
8972 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
8973}
8974
d7eeb400
MS
8975static bfd_boolean
8976elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
8977{
8978 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
8979}
8980
8981static bfd_boolean
8982elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
8983{
8984 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
8985}
8986
8987static bfd_boolean
8988elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
8989{
8990 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
8991}
8992
8993static bfd_boolean
8994elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
8995{
8996 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
8997}
8998
8999static bfd_boolean
9000elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9001{
9002 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9003}
9004
355b81d9
UW
9005static bfd_boolean
9006elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9007{
9008 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9009}
9010
9011static bfd_boolean
9012elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9013{
9014 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9015}
9016
abb3f6cc
NC
9017static bfd_boolean
9018elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9019{
9020 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9021}
9022
4ef9f41a
AA
9023static bfd_boolean
9024elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
9025{
9026 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
9027}
9028
9029static bfd_boolean
9030elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
9031{
9032 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
9033}
9034
faa9a424
UW
9035static bfd_boolean
9036elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
9037{
9038 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
9039}
9040
652451f8
YZ
9041static bfd_boolean
9042elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
9043{
9044 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
9045}
9046
9047static bfd_boolean
9048elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
9049{
9050 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
9051}
9052
9053static bfd_boolean
9054elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
9055{
9056 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
9057}
9058
252b5132 9059#if defined (HAVE_PRPSINFO_T)
4a938328 9060typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 9061#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9062typedef prpsinfo32_t elfcore_psinfo32_t;
9063#endif
252b5132
RH
9064#endif
9065
9066#if defined (HAVE_PSINFO_T)
4a938328 9067typedef psinfo_t elfcore_psinfo_t;
7ee38065 9068#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9069typedef psinfo32_t elfcore_psinfo32_t;
9070#endif
252b5132
RH
9071#endif
9072
252b5132
RH
9073/* return a malloc'ed copy of a string at START which is at
9074 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 9075 the copy will always have a terminating '\0'. */
252b5132 9076
936e320b 9077char *
217aa764 9078_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 9079{
dc810e39 9080 char *dups;
a50b1753 9081 char *end = (char *) memchr (start, '\0', max);
dc810e39 9082 size_t len;
252b5132
RH
9083
9084 if (end == NULL)
9085 len = max;
9086 else
9087 len = end - start;
9088
a50b1753 9089 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 9090 if (dups == NULL)
252b5132
RH
9091 return NULL;
9092
dc810e39
AM
9093 memcpy (dups, start, len);
9094 dups[len] = '\0';
252b5132 9095
dc810e39 9096 return dups;
252b5132
RH
9097}
9098
bb0082d6 9099#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 9100static bfd_boolean
217aa764 9101elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 9102{
4a938328
MS
9103 if (note->descsz == sizeof (elfcore_psinfo_t))
9104 {
9105 elfcore_psinfo_t psinfo;
252b5132 9106
7ee38065 9107 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9108
335e41d4 9109#if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
228e534f 9110 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9111#endif
228e534f 9112 elf_tdata (abfd)->core->program
936e320b
AM
9113 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9114 sizeof (psinfo.pr_fname));
252b5132 9115
228e534f 9116 elf_tdata (abfd)->core->command
936e320b
AM
9117 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9118 sizeof (psinfo.pr_psargs));
4a938328 9119 }
7ee38065 9120#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
9121 else if (note->descsz == sizeof (elfcore_psinfo32_t))
9122 {
9123 /* 64-bit host, 32-bit corefile */
9124 elfcore_psinfo32_t psinfo;
9125
7ee38065 9126 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9127
335e41d4 9128#if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
228e534f 9129 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9130#endif
228e534f 9131 elf_tdata (abfd)->core->program
936e320b
AM
9132 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9133 sizeof (psinfo.pr_fname));
4a938328 9134
228e534f 9135 elf_tdata (abfd)->core->command
936e320b
AM
9136 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9137 sizeof (psinfo.pr_psargs));
4a938328
MS
9138 }
9139#endif
9140
9141 else
9142 {
9143 /* Fail - we don't know how to handle any other
9144 note size (ie. data object type). */
b34976b6 9145 return TRUE;
4a938328 9146 }
252b5132
RH
9147
9148 /* Note that for some reason, a spurious space is tacked
9149 onto the end of the args in some (at least one anyway)
c044fabd 9150 implementations, so strip it off if it exists. */
252b5132
RH
9151
9152 {
228e534f 9153 char *command = elf_tdata (abfd)->core->command;
252b5132
RH
9154 int n = strlen (command);
9155
9156 if (0 < n && command[n - 1] == ' ')
9157 command[n - 1] = '\0';
9158 }
9159
b34976b6 9160 return TRUE;
252b5132
RH
9161}
9162#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
9163
252b5132 9164#if defined (HAVE_PSTATUS_T)
b34976b6 9165static bfd_boolean
217aa764 9166elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 9167{
f572a39d
AM
9168 if (note->descsz == sizeof (pstatus_t)
9169#if defined (HAVE_PXSTATUS_T)
9170 || note->descsz == sizeof (pxstatus_t)
9171#endif
9172 )
4a938328
MS
9173 {
9174 pstatus_t pstat;
252b5132 9175
4a938328 9176 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9177
228e534f 9178 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328 9179 }
7ee38065 9180#if defined (HAVE_PSTATUS32_T)
4a938328
MS
9181 else if (note->descsz == sizeof (pstatus32_t))
9182 {
9183 /* 64-bit host, 32-bit corefile */
9184 pstatus32_t pstat;
252b5132 9185
4a938328 9186 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9187
228e534f 9188 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328
MS
9189 }
9190#endif
252b5132
RH
9191 /* Could grab some more details from the "representative"
9192 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 9193 NT_LWPSTATUS note, presumably. */
252b5132 9194
b34976b6 9195 return TRUE;
252b5132
RH
9196}
9197#endif /* defined (HAVE_PSTATUS_T) */
9198
252b5132 9199#if defined (HAVE_LWPSTATUS_T)
b34976b6 9200static bfd_boolean
217aa764 9201elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
9202{
9203 lwpstatus_t lwpstat;
9204 char buf[100];
c044fabd 9205 char *name;
d4c88bbb 9206 size_t len;
c044fabd 9207 asection *sect;
252b5132 9208
f572a39d
AM
9209 if (note->descsz != sizeof (lwpstat)
9210#if defined (HAVE_LWPXSTATUS_T)
9211 && note->descsz != sizeof (lwpxstatus_t)
9212#endif
9213 )
b34976b6 9214 return TRUE;
252b5132
RH
9215
9216 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
9217
228e534f 9218 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
a1504221
JB
9219 /* Do not overwrite the core signal if it has already been set by
9220 another thread. */
228e534f
AM
9221 if (elf_tdata (abfd)->core->signal == 0)
9222 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
252b5132 9223
c044fabd 9224 /* Make a ".reg/999" section. */
252b5132
RH
9225
9226 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 9227 len = strlen (buf) + 1;
217aa764 9228 name = bfd_alloc (abfd, len);
252b5132 9229 if (name == NULL)
b34976b6 9230 return FALSE;
d4c88bbb 9231 memcpy (name, buf, len);
252b5132 9232
117ed4f8 9233 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9234 if (sect == NULL)
b34976b6 9235 return FALSE;
252b5132
RH
9236
9237#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9238 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
9239 sect->filepos = note->descpos
9240 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
9241#endif
9242
9243#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 9244 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
9245 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
9246#endif
9247
252b5132
RH
9248 sect->alignment_power = 2;
9249
9250 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9251 return FALSE;
252b5132
RH
9252
9253 /* Make a ".reg2/999" section */
9254
9255 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 9256 len = strlen (buf) + 1;
217aa764 9257 name = bfd_alloc (abfd, len);
252b5132 9258 if (name == NULL)
b34976b6 9259 return FALSE;
d4c88bbb 9260 memcpy (name, buf, len);
252b5132 9261
117ed4f8 9262 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9263 if (sect == NULL)
b34976b6 9264 return FALSE;
252b5132
RH
9265
9266#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9267 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
9268 sect->filepos = note->descpos
9269 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
9270#endif
9271
9272#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 9273 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
9274 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
9275#endif
9276
252b5132
RH
9277 sect->alignment_power = 2;
9278
936e320b 9279 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
9280}
9281#endif /* defined (HAVE_LWPSTATUS_T) */
9282
b34976b6 9283static bfd_boolean
217aa764 9284elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
9285{
9286 char buf[30];
c044fabd 9287 char *name;
d4c88bbb 9288 size_t len;
c044fabd 9289 asection *sect;
4a6636fb
PA
9290 int type;
9291 int is_active_thread;
9292 bfd_vma base_addr;
16e9c715 9293
4a6636fb 9294 if (note->descsz < 728)
b34976b6 9295 return TRUE;
16e9c715 9296
4a6636fb
PA
9297 if (! CONST_STRNEQ (note->namedata, "win32"))
9298 return TRUE;
9299
9300 type = bfd_get_32 (abfd, note->descdata);
c044fabd 9301
4a6636fb 9302 switch (type)
16e9c715 9303 {
4a6636fb 9304 case 1 /* NOTE_INFO_PROCESS */:
228e534f 9305 /* FIXME: need to add ->core->command. */
4a6636fb 9306 /* process_info.pid */
228e534f 9307 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
4a6636fb 9308 /* process_info.signal */
228e534f 9309 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 9310 break;
16e9c715 9311
4a6636fb 9312 case 2 /* NOTE_INFO_THREAD */:
16e9c715 9313 /* Make a ".reg/999" section. */
4a6636fb
PA
9314 /* thread_info.tid */
9315 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 9316
d4c88bbb 9317 len = strlen (buf) + 1;
a50b1753 9318 name = (char *) bfd_alloc (abfd, len);
16e9c715 9319 if (name == NULL)
b34976b6 9320 return FALSE;
c044fabd 9321
d4c88bbb 9322 memcpy (name, buf, len);
16e9c715 9323
117ed4f8 9324 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 9325 if (sect == NULL)
b34976b6 9326 return FALSE;
c044fabd 9327
4a6636fb
PA
9328 /* sizeof (thread_info.thread_context) */
9329 sect->size = 716;
9330 /* offsetof (thread_info.thread_context) */
9331 sect->filepos = note->descpos + 12;
16e9c715
NC
9332 sect->alignment_power = 2;
9333
4a6636fb
PA
9334 /* thread_info.is_active_thread */
9335 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
9336
9337 if (is_active_thread)
16e9c715 9338 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9339 return FALSE;
16e9c715
NC
9340 break;
9341
4a6636fb 9342 case 3 /* NOTE_INFO_MODULE */:
16e9c715 9343 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
9344 /* module_info.base_address */
9345 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 9346 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 9347
d4c88bbb 9348 len = strlen (buf) + 1;
a50b1753 9349 name = (char *) bfd_alloc (abfd, len);
16e9c715 9350 if (name == NULL)
b34976b6 9351 return FALSE;
c044fabd 9352
d4c88bbb 9353 memcpy (name, buf, len);
252b5132 9354
117ed4f8 9355 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 9356
16e9c715 9357 if (sect == NULL)
b34976b6 9358 return FALSE;
c044fabd 9359
eea6121a 9360 sect->size = note->descsz;
16e9c715 9361 sect->filepos = note->descpos;
16e9c715
NC
9362 sect->alignment_power = 2;
9363 break;
9364
9365 default:
b34976b6 9366 return TRUE;
16e9c715
NC
9367 }
9368
b34976b6 9369 return TRUE;
16e9c715 9370}
252b5132 9371
b34976b6 9372static bfd_boolean
217aa764 9373elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 9374{
9c5bfbb7 9375 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 9376
252b5132
RH
9377 switch (note->type)
9378 {
9379 default:
b34976b6 9380 return TRUE;
252b5132 9381
252b5132 9382 case NT_PRSTATUS:
bb0082d6
AM
9383 if (bed->elf_backend_grok_prstatus)
9384 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 9385 return TRUE;
bb0082d6 9386#if defined (HAVE_PRSTATUS_T)
252b5132 9387 return elfcore_grok_prstatus (abfd, note);
bb0082d6 9388#else
b34976b6 9389 return TRUE;
252b5132
RH
9390#endif
9391
9392#if defined (HAVE_PSTATUS_T)
9393 case NT_PSTATUS:
9394 return elfcore_grok_pstatus (abfd, note);
9395#endif
9396
9397#if defined (HAVE_LWPSTATUS_T)
9398 case NT_LWPSTATUS:
9399 return elfcore_grok_lwpstatus (abfd, note);
9400#endif
9401
9402 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
9403 return elfcore_grok_prfpreg (abfd, note);
9404
c044fabd 9405 case NT_WIN32PSTATUS:
16e9c715 9406 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 9407
c044fabd 9408 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
9409 if (note->namesz == 6
9410 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
9411 return elfcore_grok_prxfpreg (abfd, note);
9412 else
b34976b6 9413 return TRUE;
ff08c6bb 9414
4339cae0
L
9415 case NT_X86_XSTATE: /* Linux XSAVE extension */
9416 if (note->namesz == 6
9417 && strcmp (note->namedata, "LINUX") == 0)
9418 return elfcore_grok_xstatereg (abfd, note);
9419 else
9420 return TRUE;
9421
97753bd5
AM
9422 case NT_PPC_VMX:
9423 if (note->namesz == 6
9424 && strcmp (note->namedata, "LINUX") == 0)
9425 return elfcore_grok_ppc_vmx (abfd, note);
9426 else
9427 return TRUE;
9428
89eeb0bc
LM
9429 case NT_PPC_VSX:
9430 if (note->namesz == 6
9431 && strcmp (note->namedata, "LINUX") == 0)
9432 return elfcore_grok_ppc_vsx (abfd, note);
9433 else
9434 return TRUE;
9435
0675e188
UW
9436 case NT_S390_HIGH_GPRS:
9437 if (note->namesz == 6
9438 && strcmp (note->namedata, "LINUX") == 0)
9439 return elfcore_grok_s390_high_gprs (abfd, note);
9440 else
9441 return TRUE;
9442
d7eeb400
MS
9443 case NT_S390_TIMER:
9444 if (note->namesz == 6
9445 && strcmp (note->namedata, "LINUX") == 0)
9446 return elfcore_grok_s390_timer (abfd, note);
9447 else
9448 return TRUE;
9449
9450 case NT_S390_TODCMP:
9451 if (note->namesz == 6
9452 && strcmp (note->namedata, "LINUX") == 0)
9453 return elfcore_grok_s390_todcmp (abfd, note);
9454 else
9455 return TRUE;
9456
9457 case NT_S390_TODPREG:
9458 if (note->namesz == 6
9459 && strcmp (note->namedata, "LINUX") == 0)
9460 return elfcore_grok_s390_todpreg (abfd, note);
9461 else
9462 return TRUE;
9463
9464 case NT_S390_CTRS:
9465 if (note->namesz == 6
9466 && strcmp (note->namedata, "LINUX") == 0)
9467 return elfcore_grok_s390_ctrs (abfd, note);
9468 else
9469 return TRUE;
9470
9471 case NT_S390_PREFIX:
9472 if (note->namesz == 6
9473 && strcmp (note->namedata, "LINUX") == 0)
9474 return elfcore_grok_s390_prefix (abfd, note);
9475 else
9476 return TRUE;
9477
355b81d9
UW
9478 case NT_S390_LAST_BREAK:
9479 if (note->namesz == 6
9480 && strcmp (note->namedata, "LINUX") == 0)
9481 return elfcore_grok_s390_last_break (abfd, note);
9482 else
9483 return TRUE;
9484
9485 case NT_S390_SYSTEM_CALL:
9486 if (note->namesz == 6
9487 && strcmp (note->namedata, "LINUX") == 0)
9488 return elfcore_grok_s390_system_call (abfd, note);
9489 else
9490 return TRUE;
9491
abb3f6cc
NC
9492 case NT_S390_TDB:
9493 if (note->namesz == 6
9494 && strcmp (note->namedata, "LINUX") == 0)
9495 return elfcore_grok_s390_tdb (abfd, note);
9496 else
9497 return TRUE;
9498
4ef9f41a
AA
9499 case NT_S390_VXRS_LOW:
9500 if (note->namesz == 6
9501 && strcmp (note->namedata, "LINUX") == 0)
9502 return elfcore_grok_s390_vxrs_low (abfd, note);
9503 else
9504 return TRUE;
9505
9506 case NT_S390_VXRS_HIGH:
9507 if (note->namesz == 6
9508 && strcmp (note->namedata, "LINUX") == 0)
9509 return elfcore_grok_s390_vxrs_high (abfd, note);
9510 else
9511 return TRUE;
9512
faa9a424
UW
9513 case NT_ARM_VFP:
9514 if (note->namesz == 6
9515 && strcmp (note->namedata, "LINUX") == 0)
9516 return elfcore_grok_arm_vfp (abfd, note);
9517 else
9518 return TRUE;
9519
652451f8
YZ
9520 case NT_ARM_TLS:
9521 if (note->namesz == 6
9522 && strcmp (note->namedata, "LINUX") == 0)
9523 return elfcore_grok_aarch_tls (abfd, note);
9524 else
9525 return TRUE;
9526
9527 case NT_ARM_HW_BREAK:
9528 if (note->namesz == 6
9529 && strcmp (note->namedata, "LINUX") == 0)
9530 return elfcore_grok_aarch_hw_break (abfd, note);
9531 else
9532 return TRUE;
9533
9534 case NT_ARM_HW_WATCH:
9535 if (note->namesz == 6
9536 && strcmp (note->namedata, "LINUX") == 0)
9537 return elfcore_grok_aarch_hw_watch (abfd, note);
9538 else
9539 return TRUE;
9540
252b5132
RH
9541 case NT_PRPSINFO:
9542 case NT_PSINFO:
bb0082d6
AM
9543 if (bed->elf_backend_grok_psinfo)
9544 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 9545 return TRUE;
bb0082d6 9546#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 9547 return elfcore_grok_psinfo (abfd, note);
bb0082d6 9548#else
b34976b6 9549 return TRUE;
252b5132 9550#endif
3333a7c3
RM
9551
9552 case NT_AUXV:
9553 {
117ed4f8
AM
9554 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9555 SEC_HAS_CONTENTS);
3333a7c3
RM
9556
9557 if (sect == NULL)
9558 return FALSE;
eea6121a 9559 sect->size = note->descsz;
3333a7c3 9560 sect->filepos = note->descpos;
3333a7c3
RM
9561 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9562
9563 return TRUE;
9564 }
9015683b 9565
451b7c33
TT
9566 case NT_FILE:
9567 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
9568 note);
9569
9015683b
TT
9570 case NT_SIGINFO:
9571 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
9572 note);
5b2c414d 9573
252b5132
RH
9574 }
9575}
9576
718175fa
JK
9577static bfd_boolean
9578elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
9579{
c74f7d1c 9580 struct bfd_build_id* build_id;
30e8ee25
AM
9581
9582 if (note->descsz == 0)
9583 return FALSE;
9584
c74f7d1c
JT
9585 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
9586 if (build_id == NULL)
718175fa
JK
9587 return FALSE;
9588
c74f7d1c
JT
9589 build_id->size = note->descsz;
9590 memcpy (build_id->data, note->descdata, note->descsz);
9591 abfd->build_id = build_id;
718175fa
JK
9592
9593 return TRUE;
9594}
9595
9596static bfd_boolean
9597elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
9598{
9599 switch (note->type)
9600 {
9601 default:
9602 return TRUE;
9603
9604 case NT_GNU_BUILD_ID:
9605 return elfobj_grok_gnu_build_id (abfd, note);
9606 }
9607}
9608
e21e5835
NC
9609static bfd_boolean
9610elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
9611{
9612 struct sdt_note *cur =
9613 (struct sdt_note *) bfd_alloc (abfd, sizeof (struct sdt_note)
9614 + note->descsz);
9615
9616 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
9617 cur->size = (bfd_size_type) note->descsz;
9618 memcpy (cur->data, note->descdata, note->descsz);
9619
9620 elf_tdata (abfd)->sdt_note_head = cur;
9621
9622 return TRUE;
9623}
9624
9625static bfd_boolean
9626elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
9627{
9628 switch (note->type)
9629 {
9630 case NT_STAPSDT:
9631 return elfobj_grok_stapsdt_note_1 (abfd, note);
9632
9633 default:
9634 return TRUE;
9635 }
9636}
9637
aa1ed4a9
JB
9638static bfd_boolean
9639elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
9640{
9641 size_t offset;
9642
aa1ed4a9
JB
9643 switch (abfd->arch_info->bits_per_word)
9644 {
9645 case 32:
0064d223
JB
9646 if (note->descsz < 108)
9647 return FALSE;
aa1ed4a9
JB
9648 break;
9649
9650 case 64:
0064d223
JB
9651 if (note->descsz < 120)
9652 return FALSE;
aa1ed4a9
JB
9653 break;
9654
9655 default:
9656 return FALSE;
9657 }
9658
0064d223
JB
9659 /* Check for version 1 in pr_version. */
9660 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
9661 return FALSE;
9662 offset = 4;
9663
9664 /* Skip over pr_psinfosz. */
9665 if (abfd->arch_info->bits_per_word == 32)
9666 offset += 4;
9667 else
9668 {
9669 offset += 4; /* Padding before pr_psinfosz. */
9670 offset += 8;
9671 }
9672
aa1ed4a9
JB
9673 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
9674 elf_tdata (abfd)->core->program
9675 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
9676 offset += 17;
9677
9678 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
9679 elf_tdata (abfd)->core->command
9680 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
0064d223
JB
9681 offset += 81;
9682
9683 /* Padding before pr_pid. */
9684 offset += 2;
9685
9686 /* The pr_pid field was added in version "1a". */
9687 if (note->descsz < offset + 4)
9688 return TRUE;
9689
9690 elf_tdata (abfd)->core->pid
9691 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
aa1ed4a9
JB
9692
9693 return TRUE;
9694}
9695
9696static bfd_boolean
9697elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
9698{
9699 size_t offset;
9700 size_t size;
9701
9702 /* Check for version 1 in pr_version. */
9703 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
9704 return FALSE;
9705 offset = 4;
9706
9707 /* Skip over pr_statussz. */
9708 switch (abfd->arch_info->bits_per_word)
9709 {
9710 case 32:
9711 offset += 4;
9712 break;
9713
9714 case 64:
9715 offset += 4; /* Padding before pr_statussz. */
9716 offset += 8;
9717 break;
9718
9719 default:
9720 return FALSE;
9721 }
9722
9723 /* Extract size of pr_reg from pr_gregsetsz. */
9724 if (abfd->arch_info->bits_per_word == 32)
9725 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
9726 else
9727 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
9728
9729 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
9730 offset += (abfd->arch_info->bits_per_word / 8) * 2;
9731
9732 /* Skip over pr_osreldate. */
9733 offset += 4;
9734
9735 /* Read signal from pr_cursig. */
9736 if (elf_tdata (abfd)->core->signal == 0)
9737 elf_tdata (abfd)->core->signal
9738 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
9739 offset += 4;
9740
9741 /* Read TID from pr_pid. */
9742 elf_tdata (abfd)->core->lwpid
9743 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
9744 offset += 4;
9745
9746 /* Padding before pr_reg. */
9747 if (abfd->arch_info->bits_per_word == 64)
9748 offset += 4;
9749
9750 /* Make a ".reg/999" section and a ".reg" section. */
9751 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
9752 size, note->descpos + offset);
9753}
9754
9755static bfd_boolean
9756elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
9757{
9758 switch (note->type)
9759 {
9760 case NT_PRSTATUS:
9761 return elfcore_grok_freebsd_prstatus (abfd, note);
9762
9763 case NT_FPREGSET:
9764 return elfcore_grok_prfpreg (abfd, note);
9765
9766 case NT_PRPSINFO:
9767 return elfcore_grok_freebsd_psinfo (abfd, note);
9768
9769 case NT_FREEBSD_THRMISC:
9770 if (note->namesz == 8)
9771 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
9772 else
9773 return TRUE;
9774
3350c5f5
JB
9775 case NT_FREEBSD_PROCSTAT_AUXV:
9776 {
9777 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9778 SEC_HAS_CONTENTS);
9779
9780 if (sect == NULL)
9781 return FALSE;
9782 sect->size = note->descsz - 4;
9783 sect->filepos = note->descpos + 4;
9784 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9785
9786 return TRUE;
9787 }
9788
aa1ed4a9
JB
9789 case NT_X86_XSTATE:
9790 if (note->namesz == 8)
9791 return elfcore_grok_xstatereg (abfd, note);
9792 else
9793 return TRUE;
9794
9795 default:
9796 return TRUE;
9797 }
9798}
9799
b34976b6 9800static bfd_boolean
217aa764 9801elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
9802{
9803 char *cp;
9804
9805 cp = strchr (note->namedata, '@');
9806 if (cp != NULL)
9807 {
d2b64500 9808 *lwpidp = atoi(cp + 1);
b34976b6 9809 return TRUE;
50b2bdb7 9810 }
b34976b6 9811 return FALSE;
50b2bdb7
AM
9812}
9813
b34976b6 9814static bfd_boolean
217aa764 9815elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 9816{
50b2bdb7 9817 /* Signal number at offset 0x08. */
228e534f 9818 elf_tdata (abfd)->core->signal
50b2bdb7
AM
9819 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
9820
9821 /* Process ID at offset 0x50. */
228e534f 9822 elf_tdata (abfd)->core->pid
50b2bdb7
AM
9823 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
9824
9825 /* Command name at 0x7c (max 32 bytes, including nul). */
228e534f 9826 elf_tdata (abfd)->core->command
50b2bdb7
AM
9827 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
9828
7720ba9f
MK
9829 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
9830 note);
50b2bdb7
AM
9831}
9832
b34976b6 9833static bfd_boolean
217aa764 9834elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
9835{
9836 int lwp;
9837
9838 if (elfcore_netbsd_get_lwpid (note, &lwp))
228e534f 9839 elf_tdata (abfd)->core->lwpid = lwp;
50b2bdb7 9840
b4db1224 9841 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
9842 {
9843 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
9844 find this note before any of the others, which is fine,
9845 since the kernel writes this note out first when it
9846 creates a core file. */
47d9a591 9847
50b2bdb7
AM
9848 return elfcore_grok_netbsd_procinfo (abfd, note);
9849 }
9850
b4db1224
JT
9851 /* As of Jan 2002 there are no other machine-independent notes
9852 defined for NetBSD core files. If the note type is less
9853 than the start of the machine-dependent note types, we don't
9854 understand it. */
47d9a591 9855
b4db1224 9856 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 9857 return TRUE;
50b2bdb7
AM
9858
9859
9860 switch (bfd_get_arch (abfd))
9861 {
08a40648
AM
9862 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
9863 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
9864
9865 case bfd_arch_alpha:
9866 case bfd_arch_sparc:
9867 switch (note->type)
08a40648
AM
9868 {
9869 case NT_NETBSDCORE_FIRSTMACH+0:
9870 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 9871
08a40648
AM
9872 case NT_NETBSDCORE_FIRSTMACH+2:
9873 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 9874
08a40648
AM
9875 default:
9876 return TRUE;
9877 }
50b2bdb7 9878
08a40648
AM
9879 /* On all other arch's, PT_GETREGS == mach+1 and
9880 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
9881
9882 default:
9883 switch (note->type)
08a40648
AM
9884 {
9885 case NT_NETBSDCORE_FIRSTMACH+1:
9886 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 9887
08a40648
AM
9888 case NT_NETBSDCORE_FIRSTMACH+3:
9889 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 9890
08a40648
AM
9891 default:
9892 return TRUE;
9893 }
50b2bdb7
AM
9894 }
9895 /* NOTREACHED */
9896}
9897
67cc5033
MK
9898static bfd_boolean
9899elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
9900{
9901 /* Signal number at offset 0x08. */
228e534f 9902 elf_tdata (abfd)->core->signal
67cc5033
MK
9903 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
9904
9905 /* Process ID at offset 0x20. */
228e534f 9906 elf_tdata (abfd)->core->pid
67cc5033
MK
9907 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
9908
9909 /* Command name at 0x48 (max 32 bytes, including nul). */
228e534f 9910 elf_tdata (abfd)->core->command
67cc5033
MK
9911 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
9912
9913 return TRUE;
9914}
9915
9916static bfd_boolean
9917elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
9918{
9919 if (note->type == NT_OPENBSD_PROCINFO)
9920 return elfcore_grok_openbsd_procinfo (abfd, note);
9921
9922 if (note->type == NT_OPENBSD_REGS)
9923 return elfcore_make_note_pseudosection (abfd, ".reg", note);
9924
9925 if (note->type == NT_OPENBSD_FPREGS)
9926 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9927
9928 if (note->type == NT_OPENBSD_XFPREGS)
9929 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9930
9931 if (note->type == NT_OPENBSD_AUXV)
9932 {
9933 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9934 SEC_HAS_CONTENTS);
9935
9936 if (sect == NULL)
9937 return FALSE;
9938 sect->size = note->descsz;
9939 sect->filepos = note->descpos;
9940 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9941
9942 return TRUE;
9943 }
9944
9945 if (note->type == NT_OPENBSD_WCOOKIE)
9946 {
9947 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
9948 SEC_HAS_CONTENTS);
9949
9950 if (sect == NULL)
9951 return FALSE;
9952 sect->size = note->descsz;
9953 sect->filepos = note->descpos;
9954 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9955
9956 return TRUE;
9957 }
9958
9959 return TRUE;
9960}
9961
07c6e936 9962static bfd_boolean
d3fd4074 9963elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
9964{
9965 void *ddata = note->descdata;
9966 char buf[100];
9967 char *name;
9968 asection *sect;
f8843e87
AM
9969 short sig;
9970 unsigned flags;
07c6e936
NC
9971
9972 /* nto_procfs_status 'pid' field is at offset 0. */
228e534f 9973 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
07c6e936 9974
f8843e87
AM
9975 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
9976 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
9977
9978 /* nto_procfs_status 'flags' field is at offset 8. */
9979 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
9980
9981 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
9982 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
9983 {
228e534f
AM
9984 elf_tdata (abfd)->core->signal = sig;
9985 elf_tdata (abfd)->core->lwpid = *tid;
f8843e87 9986 }
07c6e936 9987
f8843e87
AM
9988 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
9989 do not come from signals so we make sure we set the current
9990 thread just in case. */
9991 if (flags & 0x00000080)
228e534f 9992 elf_tdata (abfd)->core->lwpid = *tid;
07c6e936
NC
9993
9994 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 9995 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 9996
a50b1753 9997 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
9998 if (name == NULL)
9999 return FALSE;
10000 strcpy (name, buf);
10001
117ed4f8 10002 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10003 if (sect == NULL)
10004 return FALSE;
10005
eea6121a 10006 sect->size = note->descsz;
07c6e936 10007 sect->filepos = note->descpos;
07c6e936
NC
10008 sect->alignment_power = 2;
10009
10010 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
10011}
10012
10013static bfd_boolean
d69f560c
KW
10014elfcore_grok_nto_regs (bfd *abfd,
10015 Elf_Internal_Note *note,
d3fd4074 10016 long tid,
d69f560c 10017 char *base)
07c6e936
NC
10018{
10019 char buf[100];
10020 char *name;
10021 asection *sect;
10022
d69f560c 10023 /* Make a "(base)/%d" section. */
d3fd4074 10024 sprintf (buf, "%s/%ld", base, tid);
07c6e936 10025
a50b1753 10026 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10027 if (name == NULL)
10028 return FALSE;
10029 strcpy (name, buf);
10030
117ed4f8 10031 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10032 if (sect == NULL)
10033 return FALSE;
10034
eea6121a 10035 sect->size = note->descsz;
07c6e936 10036 sect->filepos = note->descpos;
07c6e936
NC
10037 sect->alignment_power = 2;
10038
f8843e87 10039 /* This is the current thread. */
228e534f 10040 if (elf_tdata (abfd)->core->lwpid == tid)
d69f560c 10041 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
10042
10043 return TRUE;
07c6e936
NC
10044}
10045
10046#define BFD_QNT_CORE_INFO 7
10047#define BFD_QNT_CORE_STATUS 8
10048#define BFD_QNT_CORE_GREG 9
10049#define BFD_QNT_CORE_FPREG 10
10050
10051static bfd_boolean
217aa764 10052elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
10053{
10054 /* Every GREG section has a STATUS section before it. Store the
811072d8 10055 tid from the previous call to pass down to the next gregs
07c6e936 10056 function. */
d3fd4074 10057 static long tid = 1;
07c6e936
NC
10058
10059 switch (note->type)
10060 {
d69f560c
KW
10061 case BFD_QNT_CORE_INFO:
10062 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
10063 case BFD_QNT_CORE_STATUS:
10064 return elfcore_grok_nto_status (abfd, note, &tid);
10065 case BFD_QNT_CORE_GREG:
10066 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
10067 case BFD_QNT_CORE_FPREG:
10068 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
10069 default:
10070 return TRUE;
07c6e936
NC
10071 }
10072}
10073
b15fa79e
AM
10074static bfd_boolean
10075elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
10076{
10077 char *name;
10078 asection *sect;
10079 size_t len;
10080
10081 /* Use note name as section name. */
10082 len = note->namesz;
a50b1753 10083 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
10084 if (name == NULL)
10085 return FALSE;
10086 memcpy (name, note->namedata, len);
10087 name[len - 1] = '\0';
10088
10089 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10090 if (sect == NULL)
10091 return FALSE;
10092
10093 sect->size = note->descsz;
10094 sect->filepos = note->descpos;
10095 sect->alignment_power = 1;
10096
10097 return TRUE;
10098}
10099
7c76fa91
MS
10100/* Function: elfcore_write_note
10101
47d9a591 10102 Inputs:
a39f3346 10103 buffer to hold note, and current size of buffer
7c76fa91
MS
10104 name of note
10105 type of note
10106 data for note
10107 size of data for note
10108
a39f3346
AM
10109 Writes note to end of buffer. ELF64 notes are written exactly as
10110 for ELF32, despite the current (as of 2006) ELF gabi specifying
10111 that they ought to have 8-byte namesz and descsz field, and have
10112 8-byte alignment. Other writers, eg. Linux kernel, do the same.
10113
7c76fa91 10114 Return:
a39f3346 10115 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
10116
10117char *
a39f3346 10118elfcore_write_note (bfd *abfd,
217aa764 10119 char *buf,
a39f3346 10120 int *bufsiz,
217aa764 10121 const char *name,
a39f3346 10122 int type,
217aa764 10123 const void *input,
a39f3346 10124 int size)
7c76fa91
MS
10125{
10126 Elf_External_Note *xnp;
d4c88bbb 10127 size_t namesz;
d4c88bbb 10128 size_t newspace;
a39f3346 10129 char *dest;
7c76fa91 10130
d4c88bbb 10131 namesz = 0;
d4c88bbb 10132 if (name != NULL)
a39f3346 10133 namesz = strlen (name) + 1;
d4c88bbb 10134
a39f3346 10135 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 10136
a50b1753 10137 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
10138 if (buf == NULL)
10139 return buf;
a39f3346 10140 dest = buf + *bufsiz;
7c76fa91
MS
10141 *bufsiz += newspace;
10142 xnp = (Elf_External_Note *) dest;
10143 H_PUT_32 (abfd, namesz, xnp->namesz);
10144 H_PUT_32 (abfd, size, xnp->descsz);
10145 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
10146 dest = xnp->name;
10147 if (name != NULL)
10148 {
10149 memcpy (dest, name, namesz);
10150 dest += namesz;
a39f3346 10151 while (namesz & 3)
d4c88bbb
AM
10152 {
10153 *dest++ = '\0';
a39f3346 10154 ++namesz;
d4c88bbb
AM
10155 }
10156 }
10157 memcpy (dest, input, size);
a39f3346
AM
10158 dest += size;
10159 while (size & 3)
10160 {
10161 *dest++ = '\0';
10162 ++size;
10163 }
10164 return buf;
7c76fa91
MS
10165}
10166
7c76fa91 10167char *
217aa764
AM
10168elfcore_write_prpsinfo (bfd *abfd,
10169 char *buf,
10170 int *bufsiz,
10171 const char *fname,
10172 const char *psargs)
7c76fa91 10173{
183e98be
AM
10174 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10175
10176 if (bed->elf_backend_write_core_note != NULL)
10177 {
10178 char *ret;
10179 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
10180 NT_PRPSINFO, fname, psargs);
10181 if (ret != NULL)
10182 return ret;
10183 }
7c76fa91 10184
1f20dca5 10185#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
183e98be
AM
10186#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
10187 if (bed->s->elfclass == ELFCLASS32)
10188 {
10189#if defined (HAVE_PSINFO32_T)
10190 psinfo32_t data;
10191 int note_type = NT_PSINFO;
10192#else
10193 prpsinfo32_t data;
10194 int note_type = NT_PRPSINFO;
10195#endif
10196
10197 memset (&data, 0, sizeof (data));
10198 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
10199 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
10200 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 10201 "CORE", note_type, &data, sizeof (data));
183e98be
AM
10202 }
10203 else
10204#endif
10205 {
7c76fa91 10206#if defined (HAVE_PSINFO_T)
183e98be
AM
10207 psinfo_t data;
10208 int note_type = NT_PSINFO;
7c76fa91 10209#else
183e98be
AM
10210 prpsinfo_t data;
10211 int note_type = NT_PRPSINFO;
7c76fa91
MS
10212#endif
10213
183e98be
AM
10214 memset (&data, 0, sizeof (data));
10215 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
10216 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
10217 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 10218 "CORE", note_type, &data, sizeof (data));
183e98be 10219 }
7c76fa91
MS
10220#endif /* PSINFO_T or PRPSINFO_T */
10221
1f20dca5
UW
10222 free (buf);
10223 return NULL;
10224}
10225
70a38d42
SDJ
10226char *
10227elfcore_write_linux_prpsinfo32
10228 (bfd *abfd, char *buf, int *bufsiz,
10229 const struct elf_internal_linux_prpsinfo *prpsinfo)
10230{
10231 struct elf_external_linux_prpsinfo32 data;
10232
aeb70569 10233 swap_linux_prpsinfo32_out (abfd, prpsinfo, &data);
70a38d42
SDJ
10234 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
10235 &data, sizeof (data));
10236}
10237
10238char *
10239elfcore_write_linux_prpsinfo64
10240 (bfd *abfd, char *buf, int *bufsiz,
10241 const struct elf_internal_linux_prpsinfo *prpsinfo)
10242{
10243 struct elf_external_linux_prpsinfo64 data;
10244
aeb70569 10245 swap_linux_prpsinfo64_out (abfd, prpsinfo, &data);
70a38d42
SDJ
10246 return elfcore_write_note (abfd, buf, bufsiz,
10247 "CORE", NT_PRPSINFO, &data, sizeof (data));
10248}
10249
7c76fa91 10250char *
217aa764
AM
10251elfcore_write_prstatus (bfd *abfd,
10252 char *buf,
10253 int *bufsiz,
10254 long pid,
10255 int cursig,
10256 const void *gregs)
7c76fa91 10257{
183e98be 10258 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 10259
183e98be
AM
10260 if (bed->elf_backend_write_core_note != NULL)
10261 {
10262 char *ret;
10263 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
10264 NT_PRSTATUS,
10265 pid, cursig, gregs);
10266 if (ret != NULL)
10267 return ret;
10268 }
10269
1f20dca5 10270#if defined (HAVE_PRSTATUS_T)
183e98be
AM
10271#if defined (HAVE_PRSTATUS32_T)
10272 if (bed->s->elfclass == ELFCLASS32)
10273 {
10274 prstatus32_t prstat;
10275
10276 memset (&prstat, 0, sizeof (prstat));
10277 prstat.pr_pid = pid;
10278 prstat.pr_cursig = cursig;
10279 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 10280 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
10281 NT_PRSTATUS, &prstat, sizeof (prstat));
10282 }
10283 else
10284#endif
10285 {
10286 prstatus_t prstat;
10287
10288 memset (&prstat, 0, sizeof (prstat));
10289 prstat.pr_pid = pid;
10290 prstat.pr_cursig = cursig;
10291 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 10292 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
10293 NT_PRSTATUS, &prstat, sizeof (prstat));
10294 }
7c76fa91
MS
10295#endif /* HAVE_PRSTATUS_T */
10296
1f20dca5
UW
10297 free (buf);
10298 return NULL;
10299}
10300
51316059
MS
10301#if defined (HAVE_LWPSTATUS_T)
10302char *
217aa764
AM
10303elfcore_write_lwpstatus (bfd *abfd,
10304 char *buf,
10305 int *bufsiz,
10306 long pid,
10307 int cursig,
10308 const void *gregs)
51316059
MS
10309{
10310 lwpstatus_t lwpstat;
183e98be 10311 const char *note_name = "CORE";
51316059
MS
10312
10313 memset (&lwpstat, 0, sizeof (lwpstat));
10314 lwpstat.pr_lwpid = pid >> 16;
10315 lwpstat.pr_cursig = cursig;
10316#if defined (HAVE_LWPSTATUS_T_PR_REG)
d1e8523e 10317 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
51316059
MS
10318#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10319#if !defined(gregs)
10320 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
10321 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
10322#else
10323 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
10324 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
10325#endif
10326#endif
47d9a591 10327 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
10328 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
10329}
10330#endif /* HAVE_LWPSTATUS_T */
10331
7c76fa91
MS
10332#if defined (HAVE_PSTATUS_T)
10333char *
217aa764
AM
10334elfcore_write_pstatus (bfd *abfd,
10335 char *buf,
10336 int *bufsiz,
10337 long pid,
6c10990d
NC
10338 int cursig ATTRIBUTE_UNUSED,
10339 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 10340{
183e98be
AM
10341 const char *note_name = "CORE";
10342#if defined (HAVE_PSTATUS32_T)
10343 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 10344
183e98be
AM
10345 if (bed->s->elfclass == ELFCLASS32)
10346 {
10347 pstatus32_t pstat;
10348
10349 memset (&pstat, 0, sizeof (pstat));
10350 pstat.pr_pid = pid & 0xffff;
10351 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
10352 NT_PSTATUS, &pstat, sizeof (pstat));
10353 return buf;
10354 }
10355 else
10356#endif
10357 {
10358 pstatus_t pstat;
10359
10360 memset (&pstat, 0, sizeof (pstat));
10361 pstat.pr_pid = pid & 0xffff;
10362 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
10363 NT_PSTATUS, &pstat, sizeof (pstat));
10364 return buf;
10365 }
7c76fa91
MS
10366}
10367#endif /* HAVE_PSTATUS_T */
10368
10369char *
217aa764
AM
10370elfcore_write_prfpreg (bfd *abfd,
10371 char *buf,
10372 int *bufsiz,
10373 const void *fpregs,
10374 int size)
7c76fa91 10375{
183e98be 10376 const char *note_name = "CORE";
47d9a591 10377 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
10378 note_name, NT_FPREGSET, fpregs, size);
10379}
10380
10381char *
217aa764
AM
10382elfcore_write_prxfpreg (bfd *abfd,
10383 char *buf,
10384 int *bufsiz,
10385 const void *xfpregs,
10386 int size)
7c76fa91
MS
10387{
10388 char *note_name = "LINUX";
47d9a591 10389 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
10390 note_name, NT_PRXFPREG, xfpregs, size);
10391}
10392
4339cae0
L
10393char *
10394elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
10395 const void *xfpregs, int size)
10396{
97de3545
JB
10397 char *note_name;
10398 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
10399 note_name = "FreeBSD";
10400 else
10401 note_name = "LINUX";
4339cae0
L
10402 return elfcore_write_note (abfd, buf, bufsiz,
10403 note_name, NT_X86_XSTATE, xfpregs, size);
10404}
10405
97753bd5
AM
10406char *
10407elfcore_write_ppc_vmx (bfd *abfd,
10408 char *buf,
10409 int *bufsiz,
10410 const void *ppc_vmx,
10411 int size)
10412{
10413 char *note_name = "LINUX";
10414 return elfcore_write_note (abfd, buf, bufsiz,
10415 note_name, NT_PPC_VMX, ppc_vmx, size);
10416}
10417
89eeb0bc
LM
10418char *
10419elfcore_write_ppc_vsx (bfd *abfd,
10420 char *buf,
10421 int *bufsiz,
10422 const void *ppc_vsx,
10423 int size)
10424{
10425 char *note_name = "LINUX";
10426 return elfcore_write_note (abfd, buf, bufsiz,
10427 note_name, NT_PPC_VSX, ppc_vsx, size);
10428}
10429
0675e188
UW
10430static char *
10431elfcore_write_s390_high_gprs (bfd *abfd,
10432 char *buf,
10433 int *bufsiz,
10434 const void *s390_high_gprs,
10435 int size)
10436{
10437 char *note_name = "LINUX";
10438 return elfcore_write_note (abfd, buf, bufsiz,
10439 note_name, NT_S390_HIGH_GPRS,
10440 s390_high_gprs, size);
10441}
10442
d7eeb400
MS
10443char *
10444elfcore_write_s390_timer (bfd *abfd,
10445 char *buf,
10446 int *bufsiz,
10447 const void *s390_timer,
10448 int size)
10449{
10450 char *note_name = "LINUX";
10451 return elfcore_write_note (abfd, buf, bufsiz,
10452 note_name, NT_S390_TIMER, s390_timer, size);
10453}
10454
10455char *
10456elfcore_write_s390_todcmp (bfd *abfd,
10457 char *buf,
10458 int *bufsiz,
10459 const void *s390_todcmp,
10460 int size)
10461{
10462 char *note_name = "LINUX";
10463 return elfcore_write_note (abfd, buf, bufsiz,
10464 note_name, NT_S390_TODCMP, s390_todcmp, size);
10465}
10466
10467char *
10468elfcore_write_s390_todpreg (bfd *abfd,
10469 char *buf,
10470 int *bufsiz,
10471 const void *s390_todpreg,
10472 int size)
10473{
10474 char *note_name = "LINUX";
10475 return elfcore_write_note (abfd, buf, bufsiz,
10476 note_name, NT_S390_TODPREG, s390_todpreg, size);
10477}
10478
10479char *
10480elfcore_write_s390_ctrs (bfd *abfd,
10481 char *buf,
10482 int *bufsiz,
10483 const void *s390_ctrs,
10484 int size)
10485{
10486 char *note_name = "LINUX";
10487 return elfcore_write_note (abfd, buf, bufsiz,
10488 note_name, NT_S390_CTRS, s390_ctrs, size);
10489}
10490
10491char *
10492elfcore_write_s390_prefix (bfd *abfd,
10493 char *buf,
10494 int *bufsiz,
10495 const void *s390_prefix,
10496 int size)
10497{
10498 char *note_name = "LINUX";
10499 return elfcore_write_note (abfd, buf, bufsiz,
10500 note_name, NT_S390_PREFIX, s390_prefix, size);
10501}
10502
355b81d9
UW
10503char *
10504elfcore_write_s390_last_break (bfd *abfd,
10505 char *buf,
10506 int *bufsiz,
10507 const void *s390_last_break,
10508 int size)
10509{
10510 char *note_name = "LINUX";
10511 return elfcore_write_note (abfd, buf, bufsiz,
10512 note_name, NT_S390_LAST_BREAK,
10513 s390_last_break, size);
10514}
10515
10516char *
10517elfcore_write_s390_system_call (bfd *abfd,
10518 char *buf,
10519 int *bufsiz,
10520 const void *s390_system_call,
10521 int size)
10522{
10523 char *note_name = "LINUX";
10524 return elfcore_write_note (abfd, buf, bufsiz,
10525 note_name, NT_S390_SYSTEM_CALL,
10526 s390_system_call, size);
10527}
10528
abb3f6cc
NC
10529char *
10530elfcore_write_s390_tdb (bfd *abfd,
10531 char *buf,
10532 int *bufsiz,
10533 const void *s390_tdb,
10534 int size)
10535{
10536 char *note_name = "LINUX";
10537 return elfcore_write_note (abfd, buf, bufsiz,
10538 note_name, NT_S390_TDB, s390_tdb, size);
10539}
10540
4ef9f41a
AA
10541char *
10542elfcore_write_s390_vxrs_low (bfd *abfd,
10543 char *buf,
10544 int *bufsiz,
10545 const void *s390_vxrs_low,
10546 int size)
10547{
10548 char *note_name = "LINUX";
10549 return elfcore_write_note (abfd, buf, bufsiz,
10550 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
10551}
10552
10553char *
10554elfcore_write_s390_vxrs_high (bfd *abfd,
10555 char *buf,
10556 int *bufsiz,
10557 const void *s390_vxrs_high,
10558 int size)
10559{
10560 char *note_name = "LINUX";
10561 return elfcore_write_note (abfd, buf, bufsiz,
10562 note_name, NT_S390_VXRS_HIGH,
10563 s390_vxrs_high, size);
10564}
10565
faa9a424
UW
10566char *
10567elfcore_write_arm_vfp (bfd *abfd,
10568 char *buf,
10569 int *bufsiz,
10570 const void *arm_vfp,
10571 int size)
10572{
10573 char *note_name = "LINUX";
10574 return elfcore_write_note (abfd, buf, bufsiz,
10575 note_name, NT_ARM_VFP, arm_vfp, size);
10576}
10577
652451f8
YZ
10578char *
10579elfcore_write_aarch_tls (bfd *abfd,
10580 char *buf,
10581 int *bufsiz,
10582 const void *aarch_tls,
10583 int size)
10584{
10585 char *note_name = "LINUX";
10586 return elfcore_write_note (abfd, buf, bufsiz,
10587 note_name, NT_ARM_TLS, aarch_tls, size);
10588}
10589
10590char *
10591elfcore_write_aarch_hw_break (bfd *abfd,
10592 char *buf,
10593 int *bufsiz,
10594 const void *aarch_hw_break,
10595 int size)
10596{
10597 char *note_name = "LINUX";
10598 return elfcore_write_note (abfd, buf, bufsiz,
10599 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
10600}
10601
10602char *
10603elfcore_write_aarch_hw_watch (bfd *abfd,
10604 char *buf,
10605 int *bufsiz,
10606 const void *aarch_hw_watch,
10607 int size)
10608{
10609 char *note_name = "LINUX";
10610 return elfcore_write_note (abfd, buf, bufsiz,
10611 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
10612}
10613
bb864ac1
CES
10614char *
10615elfcore_write_register_note (bfd *abfd,
10616 char *buf,
10617 int *bufsiz,
10618 const char *section,
10619 const void *data,
10620 int size)
10621{
10622 if (strcmp (section, ".reg2") == 0)
10623 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
10624 if (strcmp (section, ".reg-xfp") == 0)
10625 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
10626 if (strcmp (section, ".reg-xstate") == 0)
10627 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
10628 if (strcmp (section, ".reg-ppc-vmx") == 0)
10629 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
10630 if (strcmp (section, ".reg-ppc-vsx") == 0)
10631 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
10632 if (strcmp (section, ".reg-s390-high-gprs") == 0)
10633 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
10634 if (strcmp (section, ".reg-s390-timer") == 0)
10635 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
10636 if (strcmp (section, ".reg-s390-todcmp") == 0)
10637 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
10638 if (strcmp (section, ".reg-s390-todpreg") == 0)
10639 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
10640 if (strcmp (section, ".reg-s390-ctrs") == 0)
10641 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
10642 if (strcmp (section, ".reg-s390-prefix") == 0)
10643 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
355b81d9
UW
10644 if (strcmp (section, ".reg-s390-last-break") == 0)
10645 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
10646 if (strcmp (section, ".reg-s390-system-call") == 0)
10647 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
abb3f6cc
NC
10648 if (strcmp (section, ".reg-s390-tdb") == 0)
10649 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
4ef9f41a
AA
10650 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
10651 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
10652 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
10653 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
faa9a424
UW
10654 if (strcmp (section, ".reg-arm-vfp") == 0)
10655 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
652451f8
YZ
10656 if (strcmp (section, ".reg-aarch-tls") == 0)
10657 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
10658 if (strcmp (section, ".reg-aarch-hw-break") == 0)
10659 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
10660 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
10661 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
bb864ac1
CES
10662 return NULL;
10663}
10664
b34976b6 10665static bfd_boolean
718175fa 10666elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 10667{
c044fabd 10668 char *p;
252b5132 10669
252b5132
RH
10670 p = buf;
10671 while (p < buf + size)
10672 {
c044fabd
KH
10673 /* FIXME: bad alignment assumption. */
10674 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
10675 Elf_Internal_Note in;
10676
baea7ef1
AM
10677 if (offsetof (Elf_External_Note, name) > buf - p + size)
10678 return FALSE;
10679
dc810e39 10680 in.type = H_GET_32 (abfd, xnp->type);
252b5132 10681
dc810e39 10682 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 10683 in.namedata = xnp->name;
baea7ef1
AM
10684 if (in.namesz > buf - in.namedata + size)
10685 return FALSE;
252b5132 10686
dc810e39 10687 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
10688 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
10689 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
10690 if (in.descsz != 0
10691 && (in.descdata >= buf + size
10692 || in.descsz > buf - in.descdata + size))
10693 return FALSE;
252b5132 10694
718175fa
JK
10695 switch (bfd_get_format (abfd))
10696 {
10697 default:
10698 return TRUE;
10699
10700 case bfd_core:
f64e188b 10701 {
8acbedd6 10702#define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
f64e188b 10703 struct
718175fa 10704 {
f64e188b 10705 const char * string;
8acbedd6 10706 size_t len;
f64e188b 10707 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
718175fa 10708 }
f64e188b 10709 grokers[] =
b15fa79e 10710 {
8acbedd6 10711 GROKER_ELEMENT ("", elfcore_grok_note),
aa1ed4a9 10712 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
8acbedd6
KS
10713 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
10714 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
10715 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
10716 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note)
f64e188b 10717 };
8acbedd6 10718#undef GROKER_ELEMENT
f64e188b
NC
10719 int i;
10720
10721 for (i = ARRAY_SIZE (grokers); i--;)
8acbedd6
KS
10722 {
10723 if (in.namesz >= grokers[i].len
10724 && strncmp (in.namedata, grokers[i].string,
10725 grokers[i].len) == 0)
10726 {
10727 if (! grokers[i].func (abfd, & in))
10728 return FALSE;
10729 break;
10730 }
10731 }
f64e188b
NC
10732 break;
10733 }
718175fa
JK
10734
10735 case bfd_object:
10736 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
10737 {
10738 if (! elfobj_grok_gnu_note (abfd, &in))
10739 return FALSE;
10740 }
e21e5835
NC
10741 else if (in.namesz == sizeof "stapsdt"
10742 && strcmp (in.namedata, "stapsdt") == 0)
10743 {
10744 if (! elfobj_grok_stapsdt_note (abfd, &in))
10745 return FALSE;
10746 }
718175fa 10747 break;
08a40648 10748 }
252b5132
RH
10749
10750 p = in.descdata + BFD_ALIGN (in.descsz, 4);
10751 }
10752
718175fa
JK
10753 return TRUE;
10754}
10755
10756static bfd_boolean
10757elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
10758{
10759 char *buf;
10760
10761 if (size <= 0)
10762 return TRUE;
10763
10764 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
10765 return FALSE;
10766
f64e188b 10767 buf = (char *) bfd_malloc (size + 1);
718175fa
JK
10768 if (buf == NULL)
10769 return FALSE;
10770
f64e188b
NC
10771 /* PR 17512: file: ec08f814
10772 0-termintate the buffer so that string searches will not overflow. */
10773 buf[size] = 0;
10774
718175fa
JK
10775 if (bfd_bread (buf, size, abfd) != size
10776 || !elf_parse_notes (abfd, buf, size, offset))
10777 {
10778 free (buf);
10779 return FALSE;
10780 }
10781
252b5132 10782 free (buf);
b34976b6 10783 return TRUE;
252b5132 10784}
98d8431c
JB
10785\f
10786/* Providing external access to the ELF program header table. */
10787
10788/* Return an upper bound on the number of bytes required to store a
10789 copy of ABFD's program header table entries. Return -1 if an error
10790 occurs; bfd_get_error will return an appropriate code. */
c044fabd 10791
98d8431c 10792long
217aa764 10793bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
10794{
10795 if (abfd->xvec->flavour != bfd_target_elf_flavour)
10796 {
10797 bfd_set_error (bfd_error_wrong_format);
10798 return -1;
10799 }
10800
936e320b 10801 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
10802}
10803
98d8431c
JB
10804/* Copy ABFD's program header table entries to *PHDRS. The entries
10805 will be stored as an array of Elf_Internal_Phdr structures, as
10806 defined in include/elf/internal.h. To find out how large the
10807 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
10808
10809 Return the number of program header table entries read, or -1 if an
10810 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 10811
98d8431c 10812int
217aa764 10813bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
10814{
10815 int num_phdrs;
10816
10817 if (abfd->xvec->flavour != bfd_target_elf_flavour)
10818 {
10819 bfd_set_error (bfd_error_wrong_format);
10820 return -1;
10821 }
10822
10823 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 10824 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
10825 num_phdrs * sizeof (Elf_Internal_Phdr));
10826
10827 return num_phdrs;
10828}
ae4221d7 10829
db6751f2 10830enum elf_reloc_type_class
7e612e98
AM
10831_bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
10832 const asection *rel_sec ATTRIBUTE_UNUSED,
10833 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
10834{
10835 return reloc_class_normal;
10836}
f8df10f4 10837
47d9a591 10838/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
10839 relocation against a local symbol. */
10840
10841bfd_vma
217aa764
AM
10842_bfd_elf_rela_local_sym (bfd *abfd,
10843 Elf_Internal_Sym *sym,
8517fae7 10844 asection **psec,
217aa764 10845 Elf_Internal_Rela *rel)
f8df10f4 10846{
8517fae7 10847 asection *sec = *psec;
f8df10f4
JJ
10848 bfd_vma relocation;
10849
10850 relocation = (sec->output_section->vma
10851 + sec->output_offset
10852 + sym->st_value);
10853 if ((sec->flags & SEC_MERGE)
c629eae0 10854 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 10855 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
f8df10f4 10856 {
f8df10f4 10857 rel->r_addend =
8517fae7 10858 _bfd_merged_section_offset (abfd, psec,
65765700 10859 elf_section_data (sec)->sec_info,
753731ee
AM
10860 sym->st_value + rel->r_addend);
10861 if (sec != *psec)
10862 {
10863 /* If we have changed the section, and our original section is
10864 marked with SEC_EXCLUDE, it means that the original
10865 SEC_MERGE section has been completely subsumed in some
10866 other SEC_MERGE section. In this case, we need to leave
10867 some info around for --emit-relocs. */
10868 if ((sec->flags & SEC_EXCLUDE) != 0)
10869 sec->kept_section = *psec;
10870 sec = *psec;
10871 }
8517fae7
AM
10872 rel->r_addend -= relocation;
10873 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
10874 }
10875 return relocation;
10876}
c629eae0
JJ
10877
10878bfd_vma
217aa764
AM
10879_bfd_elf_rel_local_sym (bfd *abfd,
10880 Elf_Internal_Sym *sym,
10881 asection **psec,
10882 bfd_vma addend)
47d9a591 10883{
c629eae0
JJ
10884 asection *sec = *psec;
10885
dbaa2011 10886 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
c629eae0
JJ
10887 return sym->st_value + addend;
10888
10889 return _bfd_merged_section_offset (abfd, psec,
65765700 10890 elf_section_data (sec)->sec_info,
753731ee 10891 sym->st_value + addend);
c629eae0
JJ
10892}
10893
37b01f6a
DG
10894/* Adjust an address within a section. Given OFFSET within SEC, return
10895 the new offset within the section, based upon changes made to the
10896 section. Returns -1 if the offset is now invalid.
10897 The offset (in abnd out) is in target sized bytes, however big a
10898 byte may be. */
10899
c629eae0 10900bfd_vma
217aa764 10901_bfd_elf_section_offset (bfd *abfd,
92e4ec35 10902 struct bfd_link_info *info,
217aa764
AM
10903 asection *sec,
10904 bfd_vma offset)
c629eae0 10905{
68bfbfcc 10906 switch (sec->sec_info_type)
65765700 10907 {
dbaa2011 10908 case SEC_INFO_TYPE_STABS:
eea6121a
AM
10909 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
10910 offset);
dbaa2011 10911 case SEC_INFO_TYPE_EH_FRAME:
92e4ec35 10912 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
37b01f6a 10913
65765700 10914 default:
310fd250
L
10915 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
10916 {
37b01f6a 10917 /* Reverse the offset. */
310fd250
L
10918 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10919 bfd_size_type address_size = bed->s->arch_size / 8;
37b01f6a
DG
10920
10921 /* address_size and sec->size are in octets. Convert
10922 to bytes before subtracting the original offset. */
10923 offset = (sec->size - address_size) / bfd_octets_per_byte (abfd) - offset;
310fd250 10924 }
65765700
JJ
10925 return offset;
10926 }
c629eae0 10927}
3333a7c3
RM
10928\f
10929/* Create a new BFD as if by bfd_openr. Rather than opening a file,
10930 reconstruct an ELF file by reading the segments out of remote memory
10931 based on the ELF file header at EHDR_VMA and the ELF program headers it
10932 points to. If not null, *LOADBASEP is filled in with the difference
10933 between the VMAs from which the segments were read, and the VMAs the
10934 file headers (and hence BFD's idea of each section's VMA) put them at.
10935
10936 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
10937 remote memory at target address VMA into the local buffer at MYADDR; it
10938 should return zero on success or an `errno' code on failure. TEMPL must
10939 be a BFD for an ELF target with the word size and byte order found in
10940 the remote memory. */
10941
10942bfd *
217aa764
AM
10943bfd_elf_bfd_from_remote_memory
10944 (bfd *templ,
10945 bfd_vma ehdr_vma,
f0a5d95a 10946 bfd_size_type size,
217aa764 10947 bfd_vma *loadbasep,
fe78531d 10948 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
3333a7c3
RM
10949{
10950 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
5979d6b6 10951 (templ, ehdr_vma, size, loadbasep, target_read_memory);
3333a7c3 10952}
4c45e5c9
JJ
10953\f
10954long
c9727e01
AM
10955_bfd_elf_get_synthetic_symtab (bfd *abfd,
10956 long symcount ATTRIBUTE_UNUSED,
10957 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 10958 long dynsymcount,
c9727e01
AM
10959 asymbol **dynsyms,
10960 asymbol **ret)
4c45e5c9
JJ
10961{
10962 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10963 asection *relplt;
10964 asymbol *s;
10965 const char *relplt_name;
10966 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
10967 arelent *p;
10968 long count, i, n;
10969 size_t size;
10970 Elf_Internal_Shdr *hdr;
10971 char *names;
10972 asection *plt;
10973
8615f3f2
AM
10974 *ret = NULL;
10975
90e3cdf2
JJ
10976 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
10977 return 0;
10978
8615f3f2
AM
10979 if (dynsymcount <= 0)
10980 return 0;
10981
4c45e5c9
JJ
10982 if (!bed->plt_sym_val)
10983 return 0;
10984
10985 relplt_name = bed->relplt_name;
10986 if (relplt_name == NULL)
d35fd659 10987 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
10988 relplt = bfd_get_section_by_name (abfd, relplt_name);
10989 if (relplt == NULL)
10990 return 0;
10991
10992 hdr = &elf_section_data (relplt)->this_hdr;
10993 if (hdr->sh_link != elf_dynsymtab (abfd)
10994 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
10995 return 0;
10996
10997 plt = bfd_get_section_by_name (abfd, ".plt");
10998 if (plt == NULL)
10999 return 0;
11000
11001 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 11002 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
11003 return -1;
11004
eea6121a 11005 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
11006 size = count * sizeof (asymbol);
11007 p = relplt->relocation;
cb53bf42 11008 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
11009 {
11010 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
11011 if (p->addend != 0)
11012 {
11013#ifdef BFD64
11014 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
11015#else
11016 size += sizeof ("+0x") - 1 + 8;
11017#endif
11018 }
11019 }
4c45e5c9 11020
a50b1753 11021 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
11022 if (s == NULL)
11023 return -1;
11024
11025 names = (char *) (s + count);
11026 p = relplt->relocation;
11027 n = 0;
cb53bf42 11028 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
11029 {
11030 size_t len;
11031 bfd_vma addr;
11032
11033 addr = bed->plt_sym_val (i, plt, p);
11034 if (addr == (bfd_vma) -1)
11035 continue;
11036
11037 *s = **p->sym_ptr_ptr;
65a7a66f
AM
11038 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
11039 we are defining a symbol, ensure one of them is set. */
11040 if ((s->flags & BSF_LOCAL) == 0)
11041 s->flags |= BSF_GLOBAL;
6ba2a415 11042 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
11043 s->section = plt;
11044 s->value = addr - plt->vma;
11045 s->name = names;
8f39ba8e 11046 s->udata.p = NULL;
4c45e5c9
JJ
11047 len = strlen ((*p->sym_ptr_ptr)->name);
11048 memcpy (names, (*p->sym_ptr_ptr)->name, len);
11049 names += len;
041de40d
AM
11050 if (p->addend != 0)
11051 {
1d770845 11052 char buf[30], *a;
d324f6d6 11053
041de40d
AM
11054 memcpy (names, "+0x", sizeof ("+0x") - 1);
11055 names += sizeof ("+0x") - 1;
1d770845
L
11056 bfd_sprintf_vma (abfd, buf, p->addend);
11057 for (a = buf; *a == '0'; ++a)
11058 ;
11059 len = strlen (a);
11060 memcpy (names, a, len);
11061 names += len;
041de40d 11062 }
4c45e5c9
JJ
11063 memcpy (names, "@plt", sizeof ("@plt"));
11064 names += sizeof ("@plt");
8f39ba8e 11065 ++s, ++n;
4c45e5c9
JJ
11066 }
11067
11068 return n;
11069}
3d7f7666 11070
821e6ff6
AM
11071/* It is only used by x86-64 so far.
11072 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
11073 but current usage would allow all of _bfd_std_section to be zero. t*/
3b22753a 11074asection _bfd_elf_large_com_section
821e6ff6
AM
11075 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, NULL,
11076 "LARGE_COMMON", 0, SEC_IS_COMMON);
ecca9871 11077
d1036acb 11078void
78245035
L
11079_bfd_elf_post_process_headers (bfd * abfd,
11080 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
d1036acb
L
11081{
11082 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
11083
11084 i_ehdrp = elf_elfheader (abfd);
11085
11086 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
11087
11088 /* To make things simpler for the loader on Linux systems we set the
9c55345c 11089 osabi field to ELFOSABI_GNU if the binary contains symbols of
f64b2e8d 11090 the STT_GNU_IFUNC type or STB_GNU_UNIQUE binding. */
d8045f23 11091 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
f64b2e8d 11092 && elf_tdata (abfd)->has_gnu_symbols)
9c55345c 11093 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
d1036acb 11094}
fcb93ecf
PB
11095
11096
11097/* Return TRUE for ELF symbol types that represent functions.
11098 This is the default version of this function, which is sufficient for
d8045f23 11099 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
11100
11101bfd_boolean
11102_bfd_elf_is_function_type (unsigned int type)
11103{
d8045f23
NC
11104 return (type == STT_FUNC
11105 || type == STT_GNU_IFUNC);
fcb93ecf 11106}
9f296da3 11107
aef36ac1
AM
11108/* If the ELF symbol SYM might be a function in SEC, return the
11109 function size and set *CODE_OFF to the function's entry point,
11110 otherwise return zero. */
9f296da3 11111
aef36ac1
AM
11112bfd_size_type
11113_bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
11114 bfd_vma *code_off)
9f296da3 11115{
aef36ac1
AM
11116 bfd_size_type size;
11117
ff9e0f5b 11118 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
aef36ac1
AM
11119 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
11120 || sym->section != sec)
11121 return 0;
ff9e0f5b 11122
ff9e0f5b 11123 *code_off = sym->value;
aef36ac1
AM
11124 size = 0;
11125 if (!(sym->flags & BSF_SYNTHETIC))
11126 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
11127 if (size == 0)
11128 size = 1;
11129 return size;
9f296da3 11130}