]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
Automatic date update in version.in
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91 2
2571583a 3 Copyright (C) 1993-2017 Free Software Foundation, Inc.
252b5132 4
5e8d7549 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
5e8d7549
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
5e8d7549 10 (at your option) any later version.
252b5132 11
5e8d7549
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
5e8d7549 17 You should have received a copy of the GNU General Public License
b34976b6 18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132 22
1b74d094
BW
23/*
24SECTION
252b5132
RH
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
661a3fd4 33 haven't bothered yet. */
252b5132 34
7ee38065
MS
35/* For sparc64-cross-sparc32. */
36#define _SYSCALL32
252b5132 37#include "sysdep.h"
3db64b00 38#include "bfd.h"
252b5132
RH
39#include "bfdlink.h"
40#include "libbfd.h"
41#define ARCH_SIZE 0
42#include "elf-bfd.h"
e0e8c97f 43#include "libiberty.h"
ff59fc36 44#include "safe-ctype.h"
de64ce13 45#include "elf-linux-core.h"
252b5132 46
8bc7f138
L
47#ifdef CORE_HEADER
48#include CORE_HEADER
49#endif
50
217aa764 51static int elf_sort_sections (const void *, const void *);
c84fca4d 52static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764 53static bfd_boolean prep_headers (bfd *);
ef10c3ac 54static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int) ;
718175fa
JK
55static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
56static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
57 file_ptr offset);
50b2bdb7 58
252b5132
RH
59/* Swap version information in and out. The version information is
60 currently size independent. If that ever changes, this code will
61 need to move into elfcode.h. */
62
63/* Swap in a Verdef structure. */
64
65void
217aa764
AM
66_bfd_elf_swap_verdef_in (bfd *abfd,
67 const Elf_External_Verdef *src,
68 Elf_Internal_Verdef *dst)
252b5132 69{
dc810e39
AM
70 dst->vd_version = H_GET_16 (abfd, src->vd_version);
71 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
72 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
73 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
74 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
75 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
76 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
77}
78
79/* Swap out a Verdef structure. */
80
81void
217aa764
AM
82_bfd_elf_swap_verdef_out (bfd *abfd,
83 const Elf_Internal_Verdef *src,
84 Elf_External_Verdef *dst)
252b5132 85{
dc810e39
AM
86 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
87 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
88 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
89 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
90 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
91 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
92 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
93}
94
95/* Swap in a Verdaux structure. */
96
97void
217aa764
AM
98_bfd_elf_swap_verdaux_in (bfd *abfd,
99 const Elf_External_Verdaux *src,
100 Elf_Internal_Verdaux *dst)
252b5132 101{
dc810e39
AM
102 dst->vda_name = H_GET_32 (abfd, src->vda_name);
103 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
104}
105
106/* Swap out a Verdaux structure. */
107
108void
217aa764
AM
109_bfd_elf_swap_verdaux_out (bfd *abfd,
110 const Elf_Internal_Verdaux *src,
111 Elf_External_Verdaux *dst)
252b5132 112{
dc810e39
AM
113 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
114 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
115}
116
117/* Swap in a Verneed structure. */
118
119void
217aa764
AM
120_bfd_elf_swap_verneed_in (bfd *abfd,
121 const Elf_External_Verneed *src,
122 Elf_Internal_Verneed *dst)
252b5132 123{
dc810e39
AM
124 dst->vn_version = H_GET_16 (abfd, src->vn_version);
125 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
126 dst->vn_file = H_GET_32 (abfd, src->vn_file);
127 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
128 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
129}
130
131/* Swap out a Verneed structure. */
132
133void
217aa764
AM
134_bfd_elf_swap_verneed_out (bfd *abfd,
135 const Elf_Internal_Verneed *src,
136 Elf_External_Verneed *dst)
252b5132 137{
dc810e39
AM
138 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
139 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
140 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
141 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
142 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
143}
144
145/* Swap in a Vernaux structure. */
146
147void
217aa764
AM
148_bfd_elf_swap_vernaux_in (bfd *abfd,
149 const Elf_External_Vernaux *src,
150 Elf_Internal_Vernaux *dst)
252b5132 151{
dc810e39
AM
152 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
153 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
154 dst->vna_other = H_GET_16 (abfd, src->vna_other);
155 dst->vna_name = H_GET_32 (abfd, src->vna_name);
156 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
157}
158
159/* Swap out a Vernaux structure. */
160
161void
217aa764
AM
162_bfd_elf_swap_vernaux_out (bfd *abfd,
163 const Elf_Internal_Vernaux *src,
164 Elf_External_Vernaux *dst)
252b5132 165{
dc810e39
AM
166 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
167 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
168 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
169 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
170 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
171}
172
173/* Swap in a Versym structure. */
174
175void
217aa764
AM
176_bfd_elf_swap_versym_in (bfd *abfd,
177 const Elf_External_Versym *src,
178 Elf_Internal_Versym *dst)
252b5132 179{
dc810e39 180 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
181}
182
183/* Swap out a Versym structure. */
184
185void
217aa764
AM
186_bfd_elf_swap_versym_out (bfd *abfd,
187 const Elf_Internal_Versym *src,
188 Elf_External_Versym *dst)
252b5132 189{
dc810e39 190 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
191}
192
193/* Standard ELF hash function. Do not change this function; you will
194 cause invalid hash tables to be generated. */
3a99b017 195
252b5132 196unsigned long
217aa764 197bfd_elf_hash (const char *namearg)
252b5132 198{
3a99b017 199 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
200 unsigned long h = 0;
201 unsigned long g;
202 int ch;
203
204 while ((ch = *name++) != '\0')
205 {
206 h = (h << 4) + ch;
207 if ((g = (h & 0xf0000000)) != 0)
208 {
209 h ^= g >> 24;
210 /* The ELF ABI says `h &= ~g', but this is equivalent in
211 this case and on some machines one insn instead of two. */
212 h ^= g;
213 }
214 }
32dfa85d 215 return h & 0xffffffff;
252b5132
RH
216}
217
fdc90cb4
JJ
218/* DT_GNU_HASH hash function. Do not change this function; you will
219 cause invalid hash tables to be generated. */
220
221unsigned long
222bfd_elf_gnu_hash (const char *namearg)
223{
224 const unsigned char *name = (const unsigned char *) namearg;
225 unsigned long h = 5381;
226 unsigned char ch;
227
228 while ((ch = *name++) != '\0')
229 h = (h << 5) + h + ch;
230 return h & 0xffffffff;
231}
232
0c8d6e5c
AM
233/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
234 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 235bfd_boolean
0c8d6e5c 236bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 237 size_t object_size,
4dfe6ac6 238 enum elf_target_id object_id)
252b5132 239{
0ffa91dd
NC
240 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
241 abfd->tdata.any = bfd_zalloc (abfd, object_size);
242 if (abfd->tdata.any == NULL)
243 return FALSE;
252b5132 244
0ffa91dd 245 elf_object_id (abfd) = object_id;
c0355132
AM
246 if (abfd->direction != read_direction)
247 {
248 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
249 if (o == NULL)
250 return FALSE;
251 elf_tdata (abfd)->o = o;
252 elf_program_header_size (abfd) = (bfd_size_type) -1;
253 }
b34976b6 254 return TRUE;
252b5132
RH
255}
256
0ffa91dd
NC
257
258bfd_boolean
ae95ffa6 259bfd_elf_make_object (bfd *abfd)
0ffa91dd 260{
ae95ffa6 261 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 262 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 263 bed->target_id);
0ffa91dd
NC
264}
265
b34976b6 266bfd_boolean
217aa764 267bfd_elf_mkcorefile (bfd *abfd)
252b5132 268{
c044fabd 269 /* I think this can be done just like an object file. */
228e534f
AM
270 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
271 return FALSE;
272 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
273 return elf_tdata (abfd)->core != NULL;
252b5132
RH
274}
275
72a80a16 276static char *
217aa764 277bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
278{
279 Elf_Internal_Shdr **i_shdrp;
f075ee0c 280 bfd_byte *shstrtab = NULL;
dc810e39
AM
281 file_ptr offset;
282 bfd_size_type shstrtabsize;
252b5132
RH
283
284 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
285 if (i_shdrp == 0
286 || shindex >= elf_numsections (abfd)
287 || i_shdrp[shindex] == 0)
f075ee0c 288 return NULL;
252b5132 289
f075ee0c 290 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
291 if (shstrtab == NULL)
292 {
c044fabd 293 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
294 offset = i_shdrp[shindex]->sh_offset;
295 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
296
297 /* Allocate and clear an extra byte at the end, to prevent crashes
298 in case the string table is not terminated. */
3471d59d 299 if (shstrtabsize + 1 <= 1
06614111
NC
300 || bfd_seek (abfd, offset, SEEK_SET) != 0
301 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL)
c6c60d09
JJ
302 shstrtab = NULL;
303 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
304 {
305 if (bfd_get_error () != bfd_error_system_call)
306 bfd_set_error (bfd_error_file_truncated);
06614111 307 bfd_release (abfd, shstrtab);
c6c60d09 308 shstrtab = NULL;
3471d59d
CC
309 /* Once we've failed to read it, make sure we don't keep
310 trying. Otherwise, we'll keep allocating space for
311 the string table over and over. */
312 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
313 }
314 else
315 shstrtab[shstrtabsize] = '\0';
217aa764 316 i_shdrp[shindex]->contents = shstrtab;
252b5132 317 }
f075ee0c 318 return (char *) shstrtab;
252b5132
RH
319}
320
321char *
217aa764
AM
322bfd_elf_string_from_elf_section (bfd *abfd,
323 unsigned int shindex,
324 unsigned int strindex)
252b5132
RH
325{
326 Elf_Internal_Shdr *hdr;
327
328 if (strindex == 0)
329 return "";
330
74f2e02b
AM
331 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
332 return NULL;
333
252b5132
RH
334 hdr = elf_elfsections (abfd)[shindex];
335
06614111
NC
336 if (hdr->contents == NULL)
337 {
338 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
339 {
340 /* PR 17512: file: f057ec89. */
695344c0 341 /* xgettext:c-format */
63a5468a
AM
342 _bfd_error_handler (_("%B: attempt to load strings from"
343 " a non-string section (number %d)"),
06614111
NC
344 abfd, shindex);
345 return NULL;
346 }
b1fa9dd6 347
06614111
NC
348 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
349 return NULL;
350 }
252b5132
RH
351
352 if (strindex >= hdr->sh_size)
353 {
1b3a8575 354 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
4eca0228 355 _bfd_error_handler
695344c0 356 /* xgettext:c-format */
d003868e
AM
357 (_("%B: invalid string offset %u >= %lu for section `%s'"),
358 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 359 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 360 ? ".shstrtab"
1b3a8575 361 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 362 return NULL;
252b5132
RH
363 }
364
365 return ((char *) hdr->contents) + strindex;
366}
367
6cdc0ccc
AM
368/* Read and convert symbols to internal format.
369 SYMCOUNT specifies the number of symbols to read, starting from
370 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
371 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
372 symbols, and symbol section index extensions, respectively.
373 Returns a pointer to the internal symbol buffer (malloced if necessary)
374 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
375
376Elf_Internal_Sym *
217aa764
AM
377bfd_elf_get_elf_syms (bfd *ibfd,
378 Elf_Internal_Shdr *symtab_hdr,
379 size_t symcount,
380 size_t symoffset,
381 Elf_Internal_Sym *intsym_buf,
382 void *extsym_buf,
383 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
384{
385 Elf_Internal_Shdr *shndx_hdr;
217aa764 386 void *alloc_ext;
df622259 387 const bfd_byte *esym;
6cdc0ccc
AM
388 Elf_External_Sym_Shndx *alloc_extshndx;
389 Elf_External_Sym_Shndx *shndx;
4dd07732 390 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
391 Elf_Internal_Sym *isym;
392 Elf_Internal_Sym *isymend;
9c5bfbb7 393 const struct elf_backend_data *bed;
6cdc0ccc
AM
394 size_t extsym_size;
395 bfd_size_type amt;
396 file_ptr pos;
397
e44a2c9c
AM
398 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
399 abort ();
400
6cdc0ccc
AM
401 if (symcount == 0)
402 return intsym_buf;
403
404 /* Normal syms might have section extension entries. */
405 shndx_hdr = NULL;
6a40cf0c
NC
406 if (elf_symtab_shndx_list (ibfd) != NULL)
407 {
408 elf_section_list * entry;
409 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
410
411 /* Find an index section that is linked to this symtab section. */
412 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
315350be
NC
413 {
414 /* PR 20063. */
415 if (entry->hdr.sh_link >= elf_numsections (ibfd))
416 continue;
417
418 if (sections[entry->hdr.sh_link] == symtab_hdr)
419 {
420 shndx_hdr = & entry->hdr;
421 break;
422 };
423 }
6a40cf0c
NC
424
425 if (shndx_hdr == NULL)
426 {
427 if (symtab_hdr == & elf_symtab_hdr (ibfd))
428 /* Not really accurate, but this was how the old code used to work. */
429 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
430 /* Otherwise we do nothing. The assumption is that
431 the index table will not be needed. */
432 }
433 }
6cdc0ccc
AM
434
435 /* Read the symbols. */
436 alloc_ext = NULL;
437 alloc_extshndx = NULL;
4dd07732 438 alloc_intsym = NULL;
6cdc0ccc
AM
439 bed = get_elf_backend_data (ibfd);
440 extsym_size = bed->s->sizeof_sym;
ef53be89 441 amt = (bfd_size_type) symcount * extsym_size;
6cdc0ccc
AM
442 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
443 if (extsym_buf == NULL)
444 {
d0fb9a8d 445 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
446 extsym_buf = alloc_ext;
447 }
448 if (extsym_buf == NULL
449 || bfd_seek (ibfd, pos, SEEK_SET) != 0
450 || bfd_bread (extsym_buf, amt, ibfd) != amt)
451 {
452 intsym_buf = NULL;
453 goto out;
454 }
455
456 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
457 extshndx_buf = NULL;
458 else
459 {
ef53be89 460 amt = (bfd_size_type) symcount * sizeof (Elf_External_Sym_Shndx);
6cdc0ccc
AM
461 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
462 if (extshndx_buf == NULL)
463 {
a50b1753
NC
464 alloc_extshndx = (Elf_External_Sym_Shndx *)
465 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
466 extshndx_buf = alloc_extshndx;
467 }
468 if (extshndx_buf == NULL
469 || bfd_seek (ibfd, pos, SEEK_SET) != 0
470 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
471 {
472 intsym_buf = NULL;
473 goto out;
474 }
475 }
476
477 if (intsym_buf == NULL)
478 {
a50b1753
NC
479 alloc_intsym = (Elf_Internal_Sym *)
480 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 481 intsym_buf = alloc_intsym;
6cdc0ccc
AM
482 if (intsym_buf == NULL)
483 goto out;
484 }
485
486 /* Convert the symbols to internal form. */
487 isymend = intsym_buf + symcount;
a50b1753
NC
488 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
489 shndx = extshndx_buf;
6cdc0ccc
AM
490 isym < isymend;
491 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
492 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
493 {
494 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
695344c0 495 /* xgettext:c-format */
63a5468a
AM
496 _bfd_error_handler (_("%B symbol number %lu references"
497 " nonexistent SHT_SYMTAB_SHNDX section"),
4eca0228 498 ibfd, (unsigned long) symoffset);
4dd07732
AM
499 if (alloc_intsym != NULL)
500 free (alloc_intsym);
8384fb8f
AM
501 intsym_buf = NULL;
502 goto out;
503 }
6cdc0ccc
AM
504
505 out:
506 if (alloc_ext != NULL)
507 free (alloc_ext);
508 if (alloc_extshndx != NULL)
509 free (alloc_extshndx);
510
511 return intsym_buf;
512}
513
5cab59f6
AM
514/* Look up a symbol name. */
515const char *
be8dd2ca
AM
516bfd_elf_sym_name (bfd *abfd,
517 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
518 Elf_Internal_Sym *isym,
519 asection *sym_sec)
5cab59f6 520{
26c61ae5 521 const char *name;
5cab59f6 522 unsigned int iname = isym->st_name;
be8dd2ca 523 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 524
138f35cc
JJ
525 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
526 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 527 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
528 {
529 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
530 shindex = elf_elfheader (abfd)->e_shstrndx;
531 }
532
26c61ae5
L
533 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
534 if (name == NULL)
535 name = "(null)";
536 else if (sym_sec && *name == '\0')
537 name = bfd_section_name (abfd, sym_sec);
538
539 return name;
5cab59f6
AM
540}
541
dbb410c3
AM
542/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
543 sections. The first element is the flags, the rest are section
544 pointers. */
545
546typedef union elf_internal_group {
547 Elf_Internal_Shdr *shdr;
548 unsigned int flags;
549} Elf_Internal_Group;
550
b885599b
AM
551/* Return the name of the group signature symbol. Why isn't the
552 signature just a string? */
553
554static const char *
217aa764 555group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 556{
9dce4196 557 Elf_Internal_Shdr *hdr;
9dce4196
AM
558 unsigned char esym[sizeof (Elf64_External_Sym)];
559 Elf_External_Sym_Shndx eshndx;
560 Elf_Internal_Sym isym;
b885599b 561
13792e9d
L
562 /* First we need to ensure the symbol table is available. Make sure
563 that it is a symbol table section. */
4fbb74a6
AM
564 if (ghdr->sh_link >= elf_numsections (abfd))
565 return NULL;
13792e9d
L
566 hdr = elf_elfsections (abfd) [ghdr->sh_link];
567 if (hdr->sh_type != SHT_SYMTAB
568 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
569 return NULL;
570
9dce4196
AM
571 /* Go read the symbol. */
572 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
573 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
574 &isym, esym, &eshndx) == NULL)
b885599b 575 return NULL;
9dce4196 576
26c61ae5 577 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
578}
579
dbb410c3
AM
580/* Set next_in_group list pointer, and group name for NEWSECT. */
581
b34976b6 582static bfd_boolean
217aa764 583setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
584{
585 unsigned int num_group = elf_tdata (abfd)->num_group;
586
587 /* If num_group is zero, read in all SHT_GROUP sections. The count
588 is set to -1 if there are no SHT_GROUP sections. */
589 if (num_group == 0)
590 {
591 unsigned int i, shnum;
592
593 /* First count the number of groups. If we have a SHT_GROUP
594 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 595 shnum = elf_numsections (abfd);
dbb410c3 596 num_group = 0;
08a40648 597
44534af3 598#define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
1783205a 599 ( (shdr)->sh_type == SHT_GROUP \
44534af3 600 && (shdr)->sh_size >= minsize \
1783205a
NC
601 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
602 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 603
dbb410c3
AM
604 for (i = 0; i < shnum; i++)
605 {
606 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 607
44534af3 608 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3
AM
609 num_group += 1;
610 }
611
612 if (num_group == 0)
20dbb49d
L
613 {
614 num_group = (unsigned) -1;
615 elf_tdata (abfd)->num_group = num_group;
ce497010 616 elf_tdata (abfd)->group_sect_ptr = NULL;
20dbb49d
L
617 }
618 else
dbb410c3
AM
619 {
620 /* We keep a list of elf section headers for group sections,
621 so we can find them quickly. */
20dbb49d 622 bfd_size_type amt;
d0fb9a8d 623
20dbb49d 624 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
625 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
626 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 627 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 628 return FALSE;
ce497010 629 memset (elf_tdata (abfd)->group_sect_ptr, 0, num_group * sizeof (Elf_Internal_Shdr *));
dbb410c3 630 num_group = 0;
ce497010 631
dbb410c3
AM
632 for (i = 0; i < shnum; i++)
633 {
634 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 635
44534af3 636 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3 637 {
973ffd63 638 unsigned char *src;
dbb410c3
AM
639 Elf_Internal_Group *dest;
640
78e8a2ff
JM
641 /* Make sure the group section has a BFD section
642 attached to it. */
643 if (!bfd_section_from_shdr (abfd, i))
644 return FALSE;
645
dbb410c3
AM
646 /* Add to list of sections. */
647 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
648 num_group += 1;
649
650 /* Read the raw contents. */
651 BFD_ASSERT (sizeof (*dest) >= 4);
652 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
653 shdr->contents = (unsigned char *)
654 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
655 /* PR binutils/4110: Handle corrupt group headers. */
656 if (shdr->contents == NULL)
657 {
658 _bfd_error_handler
695344c0 659 /* xgettext:c-format */
63a5468a
AM
660 (_("%B: corrupt size field in group section"
661 " header: 0x%lx"), abfd, shdr->sh_size);
1783205a 662 bfd_set_error (bfd_error_bad_value);
493a3386
NC
663 -- num_group;
664 continue;
1783205a
NC
665 }
666
667 memset (shdr->contents, 0, amt);
668
669 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
670 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
671 != shdr->sh_size))
493a3386
NC
672 {
673 _bfd_error_handler
695344c0 674 /* xgettext:c-format */
63a5468a
AM
675 (_("%B: invalid size field in group section"
676 " header: 0x%lx"), abfd, shdr->sh_size);
493a3386
NC
677 bfd_set_error (bfd_error_bad_value);
678 -- num_group;
63a5468a
AM
679 /* PR 17510: If the group contents are even
680 partially corrupt, do not allow any of the
681 contents to be used. */
493a3386
NC
682 memset (shdr->contents, 0, amt);
683 continue;
684 }
708d7d0d 685
dbb410c3
AM
686 /* Translate raw contents, a flag word followed by an
687 array of elf section indices all in target byte order,
688 to the flag word followed by an array of elf section
689 pointers. */
690 src = shdr->contents + shdr->sh_size;
691 dest = (Elf_Internal_Group *) (shdr->contents + amt);
06614111 692
dbb410c3
AM
693 while (1)
694 {
695 unsigned int idx;
696
697 src -= 4;
698 --dest;
699 idx = H_GET_32 (abfd, src);
700 if (src == shdr->contents)
701 {
702 dest->flags = idx;
b885599b
AM
703 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
704 shdr->bfd_section->flags
705 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
706 break;
707 }
708 if (idx >= shnum)
709 {
4eca0228
AM
710 _bfd_error_handler
711 (_("%B: invalid SHT_GROUP entry"), abfd);
dbb410c3
AM
712 idx = 0;
713 }
714 dest->shdr = elf_elfsections (abfd)[idx];
715 }
716 }
717 }
493a3386
NC
718
719 /* PR 17510: Corrupt binaries might contain invalid groups. */
720 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
721 {
722 elf_tdata (abfd)->num_group = num_group;
723
724 /* If all groups are invalid then fail. */
725 if (num_group == 0)
726 {
727 elf_tdata (abfd)->group_sect_ptr = NULL;
728 elf_tdata (abfd)->num_group = num_group = -1;
4eca0228
AM
729 _bfd_error_handler
730 (_("%B: no valid group sections found"), abfd);
493a3386
NC
731 bfd_set_error (bfd_error_bad_value);
732 }
733 }
dbb410c3
AM
734 }
735 }
736
737 if (num_group != (unsigned) -1)
738 {
739 unsigned int i;
740
741 for (i = 0; i < num_group; i++)
742 {
743 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
ce497010
NC
744 Elf_Internal_Group *idx;
745 unsigned int n_elt;
746
747 if (shdr == NULL)
748 continue;
749
750 idx = (Elf_Internal_Group *) shdr->contents;
751 n_elt = shdr->sh_size / 4;
dbb410c3
AM
752
753 /* Look through this group's sections to see if current
754 section is a member. */
755 while (--n_elt != 0)
756 if ((++idx)->shdr == hdr)
757 {
e0e8c97f 758 asection *s = NULL;
dbb410c3
AM
759
760 /* We are a member of this group. Go looking through
761 other members to see if any others are linked via
762 next_in_group. */
763 idx = (Elf_Internal_Group *) shdr->contents;
764 n_elt = shdr->sh_size / 4;
765 while (--n_elt != 0)
766 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 767 && elf_next_in_group (s) != NULL)
dbb410c3
AM
768 break;
769 if (n_elt != 0)
770 {
dbb410c3
AM
771 /* Snarf the group name from other member, and
772 insert current section in circular list. */
945906ff
AM
773 elf_group_name (newsect) = elf_group_name (s);
774 elf_next_in_group (newsect) = elf_next_in_group (s);
775 elf_next_in_group (s) = newsect;
dbb410c3
AM
776 }
777 else
778 {
dbb410c3
AM
779 const char *gname;
780
b885599b
AM
781 gname = group_signature (abfd, shdr);
782 if (gname == NULL)
b34976b6 783 return FALSE;
945906ff 784 elf_group_name (newsect) = gname;
dbb410c3
AM
785
786 /* Start a circular list with one element. */
945906ff 787 elf_next_in_group (newsect) = newsect;
dbb410c3 788 }
b885599b 789
9dce4196
AM
790 /* If the group section has been created, point to the
791 new member. */
dbb410c3 792 if (shdr->bfd_section != NULL)
945906ff 793 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 794
dbb410c3
AM
795 i = num_group - 1;
796 break;
797 }
798 }
799 }
800
945906ff 801 if (elf_group_name (newsect) == NULL)
dbb410c3 802 {
695344c0 803 /* xgettext:c-format */
4eca0228
AM
804 _bfd_error_handler (_("%B: no group info for section %A"),
805 abfd, newsect);
493a3386 806 return FALSE;
dbb410c3 807 }
b34976b6 808 return TRUE;
dbb410c3
AM
809}
810
3d7f7666 811bfd_boolean
dd863624 812_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
813{
814 unsigned int i;
815 unsigned int num_group = elf_tdata (abfd)->num_group;
816 bfd_boolean result = TRUE;
dd863624
L
817 asection *s;
818
819 /* Process SHF_LINK_ORDER. */
820 for (s = abfd->sections; s != NULL; s = s->next)
821 {
822 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
823 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
824 {
825 unsigned int elfsec = this_hdr->sh_link;
826 /* FIXME: The old Intel compiler and old strip/objcopy may
827 not set the sh_link or sh_info fields. Hence we could
828 get the situation where elfsec is 0. */
829 if (elfsec == 0)
830 {
4fbb74a6 831 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
832 if (bed->link_order_error_handler)
833 bed->link_order_error_handler
695344c0 834 /* xgettext:c-format */
dd863624
L
835 (_("%B: warning: sh_link not set for section `%A'"),
836 abfd, s);
837 }
838 else
839 {
91d6fa6a 840 asection *linksec = NULL;
25bbc984 841
4fbb74a6
AM
842 if (elfsec < elf_numsections (abfd))
843 {
844 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 845 linksec = this_hdr->bfd_section;
4fbb74a6 846 }
25bbc984
L
847
848 /* PR 1991, 2008:
849 Some strip/objcopy may leave an incorrect value in
850 sh_link. We don't want to proceed. */
91d6fa6a 851 if (linksec == NULL)
25bbc984 852 {
4eca0228 853 _bfd_error_handler
695344c0 854 /* xgettext:c-format */
25bbc984 855 (_("%B: sh_link [%d] in section `%A' is incorrect"),
c08bb8dd 856 s->owner, elfsec, s);
25bbc984
L
857 result = FALSE;
858 }
859
91d6fa6a 860 elf_linked_to_section (s) = linksec;
dd863624
L
861 }
862 }
53720c49
AM
863 else if (this_hdr->sh_type == SHT_GROUP
864 && elf_next_in_group (s) == NULL)
865 {
4eca0228 866 _bfd_error_handler
695344c0 867 /* xgettext:c-format */
53720c49
AM
868 (_("%B: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
869 abfd, elf_section_data (s)->this_idx);
870 result = FALSE;
871 }
dd863624 872 }
3d7f7666 873
dd863624 874 /* Process section groups. */
3d7f7666
L
875 if (num_group == (unsigned) -1)
876 return result;
877
878 for (i = 0; i < num_group; i++)
879 {
880 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
4b0e8a5f
NC
881 Elf_Internal_Group *idx;
882 unsigned int n_elt;
3d7f7666 883
4b0e8a5f
NC
884 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
885 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
886 {
4eca0228 887 _bfd_error_handler
695344c0 888 /* xgettext:c-format */
4b0e8a5f
NC
889 (_("%B: section group entry number %u is corrupt"),
890 abfd, i);
891 result = FALSE;
892 continue;
893 }
894
895 idx = (Elf_Internal_Group *) shdr->contents;
896 n_elt = shdr->sh_size / 4;
1b786873 897
3d7f7666
L
898 while (--n_elt != 0)
899 if ((++idx)->shdr->bfd_section)
900 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
901 else if (idx->shdr->sh_type == SHT_RELA
902 || idx->shdr->sh_type == SHT_REL)
903 /* We won't include relocation sections in section groups in
904 output object files. We adjust the group section size here
905 so that relocatable link will work correctly when
906 relocation sections are in section group in input object
907 files. */
908 shdr->bfd_section->size -= 4;
909 else
910 {
911 /* There are some unknown sections in the group. */
4eca0228 912 _bfd_error_handler
695344c0 913 /* xgettext:c-format */
dae82561 914 (_("%B: unknown [%d] section `%s' in group [%A]"),
d003868e 915 abfd,
3d7f7666 916 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
917 bfd_elf_string_from_elf_section (abfd,
918 (elf_elfheader (abfd)
919 ->e_shstrndx),
920 idx->shdr->sh_name),
dae82561 921 shdr->bfd_section);
3d7f7666
L
922 result = FALSE;
923 }
924 }
925 return result;
926}
927
72adc230
AM
928bfd_boolean
929bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
930{
931 return elf_next_in_group (sec) != NULL;
932}
933
f6fe1ccd
L
934static char *
935convert_debug_to_zdebug (bfd *abfd, const char *name)
936{
937 unsigned int len = strlen (name);
938 char *new_name = bfd_alloc (abfd, len + 2);
939 if (new_name == NULL)
940 return NULL;
941 new_name[0] = '.';
942 new_name[1] = 'z';
943 memcpy (new_name + 2, name + 1, len);
944 return new_name;
945}
946
947static char *
948convert_zdebug_to_debug (bfd *abfd, const char *name)
949{
950 unsigned int len = strlen (name);
951 char *new_name = bfd_alloc (abfd, len);
952 if (new_name == NULL)
953 return NULL;
954 new_name[0] = '.';
955 memcpy (new_name + 1, name + 2, len - 1);
956 return new_name;
957}
958
252b5132
RH
959/* Make a BFD section from an ELF section. We store a pointer to the
960 BFD section in the bfd_section field of the header. */
961
b34976b6 962bfd_boolean
217aa764
AM
963_bfd_elf_make_section_from_shdr (bfd *abfd,
964 Elf_Internal_Shdr *hdr,
6dc132d9
L
965 const char *name,
966 int shindex)
252b5132
RH
967{
968 asection *newsect;
969 flagword flags;
9c5bfbb7 970 const struct elf_backend_data *bed;
252b5132
RH
971
972 if (hdr->bfd_section != NULL)
4e011fb5 973 return TRUE;
252b5132
RH
974
975 newsect = bfd_make_section_anyway (abfd, name);
976 if (newsect == NULL)
b34976b6 977 return FALSE;
252b5132 978
1829f4b2
AM
979 hdr->bfd_section = newsect;
980 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 981 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 982
2f89ff8d
L
983 /* Always use the real type/flags. */
984 elf_section_type (newsect) = hdr->sh_type;
985 elf_section_flags (newsect) = hdr->sh_flags;
986
252b5132
RH
987 newsect->filepos = hdr->sh_offset;
988
989 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
990 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
991 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 992 bfd_log2 (hdr->sh_addralign)))
b34976b6 993 return FALSE;
252b5132
RH
994
995 flags = SEC_NO_FLAGS;
996 if (hdr->sh_type != SHT_NOBITS)
997 flags |= SEC_HAS_CONTENTS;
dbb410c3 998 if (hdr->sh_type == SHT_GROUP)
7bdf4127 999 flags |= SEC_GROUP;
252b5132
RH
1000 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1001 {
1002 flags |= SEC_ALLOC;
1003 if (hdr->sh_type != SHT_NOBITS)
1004 flags |= SEC_LOAD;
1005 }
1006 if ((hdr->sh_flags & SHF_WRITE) == 0)
1007 flags |= SEC_READONLY;
1008 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
1009 flags |= SEC_CODE;
1010 else if ((flags & SEC_LOAD) != 0)
1011 flags |= SEC_DATA;
f5fa8ca2
JJ
1012 if ((hdr->sh_flags & SHF_MERGE) != 0)
1013 {
1014 flags |= SEC_MERGE;
1015 newsect->entsize = hdr->sh_entsize;
f5fa8ca2 1016 }
84865015
NC
1017 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1018 flags |= SEC_STRINGS;
dbb410c3
AM
1019 if (hdr->sh_flags & SHF_GROUP)
1020 if (!setup_group (abfd, hdr, newsect))
b34976b6 1021 return FALSE;
13ae64f3
JJ
1022 if ((hdr->sh_flags & SHF_TLS) != 0)
1023 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
1024 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1025 flags |= SEC_EXCLUDE;
252b5132 1026
3d2b39cf 1027 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 1028 {
3d2b39cf
L
1029 /* The debugging sections appear to be recognized only by name,
1030 not any sort of flag. Their SEC_ALLOC bits are cleared. */
3d2b39cf
L
1031 if (name [0] == '.')
1032 {
f073ced3
AM
1033 const char *p;
1034 int n;
1035 if (name[1] == 'd')
1036 p = ".debug", n = 6;
1037 else if (name[1] == 'g' && name[2] == 'n')
1038 p = ".gnu.linkonce.wi.", n = 17;
1039 else if (name[1] == 'g' && name[2] == 'd')
1040 p = ".gdb_index", n = 11; /* yes we really do mean 11. */
1041 else if (name[1] == 'l')
1042 p = ".line", n = 5;
1043 else if (name[1] == 's')
1044 p = ".stab", n = 5;
1045 else if (name[1] == 'z')
1046 p = ".zdebug", n = 7;
1047 else
1048 p = NULL, n = 0;
1049 if (p != NULL && strncmp (name, p, n) == 0)
3d2b39cf
L
1050 flags |= SEC_DEBUGGING;
1051 }
1052 }
252b5132
RH
1053
1054 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1055 only link a single copy of the section. This is used to support
1056 g++. g++ will emit each template expansion in its own section.
1057 The symbols will be defined as weak, so that multiple definitions
1058 are permitted. The GNU linker extension is to actually discard
1059 all but one of the sections. */
0112cd26 1060 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 1061 && elf_next_in_group (newsect) == NULL)
252b5132
RH
1062 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1063
fa152c49
JW
1064 bed = get_elf_backend_data (abfd);
1065 if (bed->elf_backend_section_flags)
1066 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 1067 return FALSE;
fa152c49 1068
252b5132 1069 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 1070 return FALSE;
252b5132 1071
718175fa
JK
1072 /* We do not parse the PT_NOTE segments as we are interested even in the
1073 separate debug info files which may have the segments offsets corrupted.
1074 PT_NOTEs from the core files are currently not parsed using BFD. */
1075 if (hdr->sh_type == SHT_NOTE)
1076 {
baea7ef1 1077 bfd_byte *contents;
718175fa 1078
baea7ef1 1079 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
1080 return FALSE;
1081
08698b7b 1082 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, hdr->sh_offset);
718175fa
JK
1083 free (contents);
1084 }
1085
252b5132
RH
1086 if ((flags & SEC_ALLOC) != 0)
1087 {
1088 Elf_Internal_Phdr *phdr;
6ffd7900
AM
1089 unsigned int i, nload;
1090
1091 /* Some ELF linkers produce binaries with all the program header
1092 p_paddr fields zero. If we have such a binary with more than
1093 one PT_LOAD header, then leave the section lma equal to vma
1094 so that we don't create sections with overlapping lma. */
1095 phdr = elf_tdata (abfd)->phdr;
1096 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1097 if (phdr->p_paddr != 0)
1098 break;
1099 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1100 ++nload;
1101 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1102 return TRUE;
252b5132 1103
252b5132
RH
1104 phdr = elf_tdata (abfd)->phdr;
1105 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1106 {
86b2281f
AM
1107 if (((phdr->p_type == PT_LOAD
1108 && (hdr->sh_flags & SHF_TLS) == 0)
1109 || phdr->p_type == PT_TLS)
9a83a553 1110 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 1111 {
88967714
AM
1112 if ((flags & SEC_LOAD) == 0)
1113 newsect->lma = (phdr->p_paddr
1114 + hdr->sh_addr - phdr->p_vaddr);
1115 else
1116 /* We used to use the same adjustment for SEC_LOAD
1117 sections, but that doesn't work if the segment
1118 is packed with code from multiple VMAs.
1119 Instead we calculate the section LMA based on
1120 the segment LMA. It is assumed that the
1121 segment will contain sections with contiguous
1122 LMAs, even if the VMAs are not. */
1123 newsect->lma = (phdr->p_paddr
1124 + hdr->sh_offset - phdr->p_offset);
1125
1126 /* With contiguous segments, we can't tell from file
1127 offsets whether a section with zero size should
1128 be placed at the end of one segment or the
1129 beginning of the next. Decide based on vaddr. */
1130 if (hdr->sh_addr >= phdr->p_vaddr
1131 && (hdr->sh_addr + hdr->sh_size
1132 <= phdr->p_vaddr + phdr->p_memsz))
1133 break;
252b5132
RH
1134 }
1135 }
1136 }
1137
4a114e3e
L
1138 /* Compress/decompress DWARF debug sections with names: .debug_* and
1139 .zdebug_*, after the section flags is set. */
1140 if ((flags & SEC_DEBUGGING)
1141 && ((name[1] == 'd' && name[6] == '_')
1142 || (name[1] == 'z' && name[7] == '_')))
1143 {
1144 enum { nothing, compress, decompress } action = nothing;
151411f8 1145 int compression_header_size;
dab394de 1146 bfd_size_type uncompressed_size;
151411f8
L
1147 bfd_boolean compressed
1148 = bfd_is_section_compressed_with_header (abfd, newsect,
dab394de
L
1149 &compression_header_size,
1150 &uncompressed_size);
4a114e3e 1151
151411f8 1152 if (compressed)
4a114e3e
L
1153 {
1154 /* Compressed section. Check if we should decompress. */
1155 if ((abfd->flags & BFD_DECOMPRESS))
1156 action = decompress;
1157 }
151411f8
L
1158
1159 /* Compress the uncompressed section or convert from/to .zdebug*
1160 section. Check if we should compress. */
1161 if (action == nothing)
4a114e3e 1162 {
151411f8
L
1163 if (newsect->size != 0
1164 && (abfd->flags & BFD_COMPRESS)
1165 && compression_header_size >= 0
dab394de 1166 && uncompressed_size > 0
151411f8
L
1167 && (!compressed
1168 || ((compression_header_size > 0)
1169 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
4a114e3e 1170 action = compress;
151411f8
L
1171 else
1172 return TRUE;
4a114e3e
L
1173 }
1174
151411f8 1175 if (action == compress)
4a114e3e 1176 {
4a114e3e
L
1177 if (!bfd_init_section_compress_status (abfd, newsect))
1178 {
4eca0228 1179 _bfd_error_handler
695344c0 1180 /* xgettext:c-format */
bc823199 1181 (_("%B: unable to initialize compress status for section %s"),
4a114e3e
L
1182 abfd, name);
1183 return FALSE;
1184 }
151411f8
L
1185 }
1186 else
1187 {
4a114e3e
L
1188 if (!bfd_init_section_decompress_status (abfd, newsect))
1189 {
4eca0228 1190 _bfd_error_handler
695344c0 1191 /* xgettext:c-format */
bc823199 1192 (_("%B: unable to initialize decompress status for section %s"),
4a114e3e
L
1193 abfd, name);
1194 return FALSE;
1195 }
151411f8
L
1196 }
1197
f6fe1ccd 1198 if (abfd->is_linker_input)
151411f8 1199 {
f6fe1ccd
L
1200 if (name[1] == 'z'
1201 && (action == decompress
1202 || (action == compress
1203 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
4e011fb5 1204 {
f6fe1ccd
L
1205 /* Convert section name from .zdebug_* to .debug_* so
1206 that linker will consider this section as a debug
1207 section. */
1208 char *new_name = convert_zdebug_to_debug (abfd, name);
151411f8
L
1209 if (new_name == NULL)
1210 return FALSE;
f6fe1ccd 1211 bfd_rename_section (abfd, newsect, new_name);
151411f8 1212 }
4a114e3e 1213 }
f6fe1ccd
L
1214 else
1215 /* For objdump, don't rename the section. For objcopy, delay
1216 section rename to elf_fake_sections. */
1217 newsect->flags |= SEC_ELF_RENAME;
4a114e3e
L
1218 }
1219
b34976b6 1220 return TRUE;
252b5132
RH
1221}
1222
84865015
NC
1223const char *const bfd_elf_section_type_names[] =
1224{
252b5132
RH
1225 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1226 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1227 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1228};
1229
1049f94e 1230/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1231 output, and the reloc is against an external symbol, and nothing
1232 has given us any additional addend, the resulting reloc will also
1233 be against the same symbol. In such a case, we don't want to
1234 change anything about the way the reloc is handled, since it will
1235 all be done at final link time. Rather than put special case code
1236 into bfd_perform_relocation, all the reloc types use this howto
1237 function. It just short circuits the reloc if producing
1049f94e 1238 relocatable output against an external symbol. */
252b5132 1239
252b5132 1240bfd_reloc_status_type
217aa764
AM
1241bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1242 arelent *reloc_entry,
1243 asymbol *symbol,
1244 void *data ATTRIBUTE_UNUSED,
1245 asection *input_section,
1246 bfd *output_bfd,
1247 char **error_message ATTRIBUTE_UNUSED)
1248{
1249 if (output_bfd != NULL
252b5132
RH
1250 && (symbol->flags & BSF_SECTION_SYM) == 0
1251 && (! reloc_entry->howto->partial_inplace
1252 || reloc_entry->addend == 0))
1253 {
1254 reloc_entry->address += input_section->output_offset;
1255 return bfd_reloc_ok;
1256 }
1257
1258 return bfd_reloc_continue;
1259}
1260\f
84865015
NC
1261/* Returns TRUE if section A matches section B.
1262 Names, addresses and links may be different, but everything else
1263 should be the same. */
1264
1265static bfd_boolean
5522f910
NC
1266section_match (const Elf_Internal_Shdr * a,
1267 const Elf_Internal_Shdr * b)
84865015
NC
1268{
1269 return
1270 a->sh_type == b->sh_type
5522f910
NC
1271 && (a->sh_flags & ~ SHF_INFO_LINK)
1272 == (b->sh_flags & ~ SHF_INFO_LINK)
84865015
NC
1273 && a->sh_addralign == b->sh_addralign
1274 && a->sh_size == b->sh_size
1275 && a->sh_entsize == b->sh_entsize
1276 /* FIXME: Check sh_addr ? */
1277 ;
1278}
1279
1280/* Find a section in OBFD that has the same characteristics
1281 as IHEADER. Return the index of this section or SHN_UNDEF if
1282 none can be found. Check's section HINT first, as this is likely
1283 to be the correct section. */
1284
1285static unsigned int
5cc4ca83
ST
1286find_link (const bfd *obfd, const Elf_Internal_Shdr *iheader,
1287 const unsigned int hint)
84865015
NC
1288{
1289 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1290 unsigned int i;
1291
a55c9876
NC
1292 BFD_ASSERT (iheader != NULL);
1293
1294 /* See PR 20922 for a reproducer of the NULL test. */
5cc4ca83
ST
1295 if (hint < elf_numsections (obfd)
1296 && oheaders[hint] != NULL
a55c9876 1297 && section_match (oheaders[hint], iheader))
84865015
NC
1298 return hint;
1299
1300 for (i = 1; i < elf_numsections (obfd); i++)
1301 {
1302 Elf_Internal_Shdr * oheader = oheaders[i];
1303
a55c9876
NC
1304 if (oheader == NULL)
1305 continue;
84865015
NC
1306 if (section_match (oheader, iheader))
1307 /* FIXME: Do we care if there is a potential for
1308 multiple matches ? */
1309 return i;
1310 }
1311
1312 return SHN_UNDEF;
1313}
1314
5522f910
NC
1315/* PR 19938: Attempt to set the ELF section header fields of an OS or
1316 Processor specific section, based upon a matching input section.
1317 Returns TRUE upon success, FALSE otherwise. */
1318
1319static bfd_boolean
1320copy_special_section_fields (const bfd *ibfd,
1321 bfd *obfd,
1322 const Elf_Internal_Shdr *iheader,
1323 Elf_Internal_Shdr *oheader,
1324 const unsigned int secnum)
1325{
1326 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1327 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1328 bfd_boolean changed = FALSE;
1329 unsigned int sh_link;
1330
1331 if (oheader->sh_type == SHT_NOBITS)
1332 {
1333 /* This is a feature for objcopy --only-keep-debug:
1334 When a section's type is changed to NOBITS, we preserve
1335 the sh_link and sh_info fields so that they can be
1336 matched up with the original.
1337
1338 Note: Strictly speaking these assignments are wrong.
1339 The sh_link and sh_info fields should point to the
1340 relevent sections in the output BFD, which may not be in
1341 the same location as they were in the input BFD. But
1342 the whole point of this action is to preserve the
1343 original values of the sh_link and sh_info fields, so
1344 that they can be matched up with the section headers in
1345 the original file. So strictly speaking we may be
1346 creating an invalid ELF file, but it is only for a file
1347 that just contains debug info and only for sections
1348 without any contents. */
1349 if (oheader->sh_link == 0)
1350 oheader->sh_link = iheader->sh_link;
1351 if (oheader->sh_info == 0)
1352 oheader->sh_info = iheader->sh_info;
1353 return TRUE;
1354 }
1355
1356 /* Allow the target a chance to decide how these fields should be set. */
1357 if (bed->elf_backend_copy_special_section_fields != NULL
1358 && bed->elf_backend_copy_special_section_fields
1359 (ibfd, obfd, iheader, oheader))
1360 return TRUE;
1361
1362 /* We have an iheader which might match oheader, and which has non-zero
1363 sh_info and/or sh_link fields. Attempt to follow those links and find
1364 the section in the output bfd which corresponds to the linked section
1365 in the input bfd. */
1366 if (iheader->sh_link != SHN_UNDEF)
1367 {
4f3ca05b
NC
1368 /* See PR 20931 for a reproducer. */
1369 if (iheader->sh_link >= elf_numsections (ibfd))
1370 {
1371 (* _bfd_error_handler)
1372 /* xgettext:c-format */
1373 (_("%B: Invalid sh_link field (%d) in section number %d"),
1374 ibfd, iheader->sh_link, secnum);
1375 return FALSE;
1376 }
1377
5522f910
NC
1378 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1379 if (sh_link != SHN_UNDEF)
1380 {
1381 oheader->sh_link = sh_link;
1382 changed = TRUE;
1383 }
1384 else
1385 /* FIXME: Should we install iheader->sh_link
1386 if we could not find a match ? */
1387 (* _bfd_error_handler)
695344c0 1388 /* xgettext:c-format */
5522f910
NC
1389 (_("%B: Failed to find link section for section %d"), obfd, secnum);
1390 }
1391
1392 if (iheader->sh_info)
1393 {
1394 /* The sh_info field can hold arbitrary information, but if the
1395 SHF_LINK_INFO flag is set then it should be interpreted as a
1396 section index. */
1397 if (iheader->sh_flags & SHF_INFO_LINK)
1398 {
1399 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1400 iheader->sh_info);
1401 if (sh_link != SHN_UNDEF)
1402 oheader->sh_flags |= SHF_INFO_LINK;
1403 }
1404 else
1405 /* No idea what it means - just copy it. */
1406 sh_link = iheader->sh_info;
1407
1408 if (sh_link != SHN_UNDEF)
1409 {
1410 oheader->sh_info = sh_link;
1411 changed = TRUE;
1412 }
1413 else
1414 (* _bfd_error_handler)
695344c0 1415 /* xgettext:c-format */
5522f910
NC
1416 (_("%B: Failed to find info section for section %d"), obfd, secnum);
1417 }
1418
1419 return changed;
1420}
1421
0ac4564e
L
1422/* Copy the program header and other data from one object module to
1423 another. */
252b5132 1424
b34976b6 1425bfd_boolean
217aa764 1426_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050 1427{
5522f910
NC
1428 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1429 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1430 const struct elf_backend_data *bed;
84865015
NC
1431 unsigned int i;
1432
2d502050 1433 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
84865015 1434 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1435 return TRUE;
2d502050 1436
57b828ef
L
1437 if (!elf_flags_init (obfd))
1438 {
1439 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1440 elf_flags_init (obfd) = TRUE;
1441 }
2d502050 1442
0ac4564e 1443 elf_gp (obfd) = elf_gp (ibfd);
57b828ef
L
1444
1445 /* Also copy the EI_OSABI field. */
1446 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1447 elf_elfheader (ibfd)->e_ident[EI_OSABI];
104d59d1 1448
5522f910
NC
1449 /* If set, copy the EI_ABIVERSION field. */
1450 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1451 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1452 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
1453
104d59d1
JM
1454 /* Copy object attributes. */
1455 _bfd_elf_copy_obj_attributes (ibfd, obfd);
63b9bbb7 1456
84865015
NC
1457 if (iheaders == NULL || oheaders == NULL)
1458 return TRUE;
63b9bbb7 1459
5522f910
NC
1460 bed = get_elf_backend_data (obfd);
1461
1462 /* Possibly copy other fields in the section header. */
84865015 1463 for (i = 1; i < elf_numsections (obfd); i++)
63b9bbb7 1464 {
84865015
NC
1465 unsigned int j;
1466 Elf_Internal_Shdr * oheader = oheaders[i];
63b9bbb7 1467
5522f910
NC
1468 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1469 because of a special case need for generating separate debug info
1470 files. See below for more details. */
84865015
NC
1471 if (oheader == NULL
1472 || (oheader->sh_type != SHT_NOBITS
5522f910
NC
1473 && oheader->sh_type < SHT_LOOS))
1474 continue;
1475
1476 /* Ignore empty sections, and sections whose
1477 fields have already been initialised. */
1478 if (oheader->sh_size == 0
84865015
NC
1479 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1480 continue;
63b9bbb7 1481
84865015 1482 /* Scan for the matching section in the input bfd.
5522f910
NC
1483 First we try for a direct mapping between the input and output sections. */
1484 for (j = 1; j < elf_numsections (ibfd); j++)
1485 {
1486 const Elf_Internal_Shdr * iheader = iheaders[j];
1487
1488 if (iheader == NULL)
1489 continue;
1490
1491 if (oheader->bfd_section != NULL
1492 && iheader->bfd_section != NULL
1493 && iheader->bfd_section->output_section != NULL
1494 && iheader->bfd_section->output_section == oheader->bfd_section)
1495 {
1496 /* We have found a connection from the input section to the
1497 output section. Attempt to copy the header fields. If
1498 this fails then do not try any further sections - there
1499 should only be a one-to-one mapping between input and output. */
1500 if (! copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1501 j = elf_numsections (ibfd);
1502 break;
1503 }
1504 }
1505
1506 if (j < elf_numsections (ibfd))
1507 continue;
1508
1509 /* That failed. So try to deduce the corresponding input section.
84865015
NC
1510 Unfortunately we cannot compare names as the output string table
1511 is empty, so instead we check size, address and type. */
1512 for (j = 1; j < elf_numsections (ibfd); j++)
1513 {
5522f910 1514 const Elf_Internal_Shdr * iheader = iheaders[j];
84865015 1515
5522f910
NC
1516 if (iheader == NULL)
1517 continue;
1518
1519 /* Try matching fields in the input section's header.
1520 Since --only-keep-debug turns all non-debug sections into
84865015
NC
1521 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1522 input type. */
1523 if ((oheader->sh_type == SHT_NOBITS
1524 || iheader->sh_type == oheader->sh_type)
5522f910
NC
1525 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1526 == (oheader->sh_flags & ~ SHF_INFO_LINK)
84865015
NC
1527 && iheader->sh_addralign == oheader->sh_addralign
1528 && iheader->sh_entsize == oheader->sh_entsize
1529 && iheader->sh_size == oheader->sh_size
1530 && iheader->sh_addr == oheader->sh_addr
1531 && (iheader->sh_info != oheader->sh_info
1532 || iheader->sh_link != oheader->sh_link))
63b9bbb7 1533 {
5522f910
NC
1534 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1535 break;
63b9bbb7
NC
1536 }
1537 }
5522f910
NC
1538
1539 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1540 {
1541 /* Final attempt. Call the backend copy function
1542 with a NULL input section. */
1543 if (bed->elf_backend_copy_special_section_fields != NULL)
1544 bed->elf_backend_copy_special_section_fields (ibfd, obfd, NULL, oheader);
1545 }
63b9bbb7
NC
1546 }
1547
b34976b6 1548 return TRUE;
2d502050
L
1549}
1550
cedc298e
L
1551static const char *
1552get_segment_type (unsigned int p_type)
1553{
1554 const char *pt;
1555 switch (p_type)
1556 {
1557 case PT_NULL: pt = "NULL"; break;
1558 case PT_LOAD: pt = "LOAD"; break;
1559 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1560 case PT_INTERP: pt = "INTERP"; break;
1561 case PT_NOTE: pt = "NOTE"; break;
1562 case PT_SHLIB: pt = "SHLIB"; break;
1563 case PT_PHDR: pt = "PHDR"; break;
1564 case PT_TLS: pt = "TLS"; break;
1565 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1566 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1567 case PT_GNU_RELRO: pt = "RELRO"; break;
1568 default: pt = NULL; break;
1569 }
1570 return pt;
1571}
1572
f0b79d91
L
1573/* Print out the program headers. */
1574
b34976b6 1575bfd_boolean
217aa764 1576_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1577{
a50b1753 1578 FILE *f = (FILE *) farg;
252b5132
RH
1579 Elf_Internal_Phdr *p;
1580 asection *s;
1581 bfd_byte *dynbuf = NULL;
1582
1583 p = elf_tdata (abfd)->phdr;
1584 if (p != NULL)
1585 {
1586 unsigned int i, c;
1587
1588 fprintf (f, _("\nProgram Header:\n"));
1589 c = elf_elfheader (abfd)->e_phnum;
1590 for (i = 0; i < c; i++, p++)
1591 {
cedc298e 1592 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1593 char buf[20];
1594
cedc298e 1595 if (pt == NULL)
252b5132 1596 {
cedc298e
L
1597 sprintf (buf, "0x%lx", p->p_type);
1598 pt = buf;
252b5132 1599 }
dc810e39 1600 fprintf (f, "%8s off 0x", pt);
60b89a18 1601 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1602 fprintf (f, " vaddr 0x");
60b89a18 1603 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1604 fprintf (f, " paddr 0x");
60b89a18 1605 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1606 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1607 fprintf (f, " filesz 0x");
60b89a18 1608 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1609 fprintf (f, " memsz 0x");
60b89a18 1610 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1611 fprintf (f, " flags %c%c%c",
1612 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1613 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1614 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1615 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1616 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1617 fprintf (f, "\n");
1618 }
1619 }
1620
1621 s = bfd_get_section_by_name (abfd, ".dynamic");
1622 if (s != NULL)
1623 {
cb33740c 1624 unsigned int elfsec;
dc810e39 1625 unsigned long shlink;
252b5132
RH
1626 bfd_byte *extdyn, *extdynend;
1627 size_t extdynsize;
217aa764 1628 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1629
1630 fprintf (f, _("\nDynamic Section:\n"));
1631
eea6121a 1632 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1633 goto error_return;
1634
1635 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1636 if (elfsec == SHN_BAD)
252b5132 1637 goto error_return;
dc810e39 1638 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1639
1640 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1641 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1642
1643 extdyn = dynbuf;
06614111
NC
1644 /* PR 17512: file: 6f427532. */
1645 if (s->size < extdynsize)
1646 goto error_return;
eea6121a 1647 extdynend = extdyn + s->size;
1036838a
NC
1648 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1649 Fix range check. */
1650 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
252b5132
RH
1651 {
1652 Elf_Internal_Dyn dyn;
ad9563d6 1653 const char *name = "";
252b5132 1654 char ab[20];
b34976b6 1655 bfd_boolean stringp;
ad9563d6 1656 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1657
217aa764 1658 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1659
1660 if (dyn.d_tag == DT_NULL)
1661 break;
1662
b34976b6 1663 stringp = FALSE;
252b5132
RH
1664 switch (dyn.d_tag)
1665 {
1666 default:
ad9563d6
CM
1667 if (bed->elf_backend_get_target_dtag)
1668 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1669
1670 if (!strcmp (name, ""))
1671 {
1672 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1673 name = ab;
1674 }
252b5132
RH
1675 break;
1676
b34976b6 1677 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1678 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1679 case DT_PLTGOT: name = "PLTGOT"; break;
1680 case DT_HASH: name = "HASH"; break;
1681 case DT_STRTAB: name = "STRTAB"; break;
1682 case DT_SYMTAB: name = "SYMTAB"; break;
1683 case DT_RELA: name = "RELA"; break;
1684 case DT_RELASZ: name = "RELASZ"; break;
1685 case DT_RELAENT: name = "RELAENT"; break;
1686 case DT_STRSZ: name = "STRSZ"; break;
1687 case DT_SYMENT: name = "SYMENT"; break;
1688 case DT_INIT: name = "INIT"; break;
1689 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1690 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1691 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1692 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1693 case DT_REL: name = "REL"; break;
1694 case DT_RELSZ: name = "RELSZ"; break;
1695 case DT_RELENT: name = "RELENT"; break;
1696 case DT_PLTREL: name = "PLTREL"; break;
1697 case DT_DEBUG: name = "DEBUG"; break;
1698 case DT_TEXTREL: name = "TEXTREL"; break;
1699 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1700 case DT_BIND_NOW: name = "BIND_NOW"; break;
1701 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1702 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1703 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1704 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1705 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1706 case DT_FLAGS: name = "FLAGS"; break;
1707 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1708 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1709 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1710 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1711 case DT_MOVEENT: name = "MOVEENT"; break;
1712 case DT_MOVESZ: name = "MOVESZ"; break;
1713 case DT_FEATURE: name = "FEATURE"; break;
1714 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1715 case DT_SYMINSZ: name = "SYMINSZ"; break;
1716 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1717 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1718 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1719 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1720 case DT_PLTPAD: name = "PLTPAD"; break;
1721 case DT_MOVETAB: name = "MOVETAB"; break;
1722 case DT_SYMINFO: name = "SYMINFO"; break;
1723 case DT_RELACOUNT: name = "RELACOUNT"; break;
1724 case DT_RELCOUNT: name = "RELCOUNT"; break;
1725 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1726 case DT_VERSYM: name = "VERSYM"; break;
1727 case DT_VERDEF: name = "VERDEF"; break;
1728 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1729 case DT_VERNEED: name = "VERNEED"; break;
1730 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1731 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1732 case DT_USED: name = "USED"; break;
b34976b6 1733 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1734 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1735 }
1736
ad9563d6 1737 fprintf (f, " %-20s ", name);
252b5132 1738 if (! stringp)
a1f3c56e
AN
1739 {
1740 fprintf (f, "0x");
1741 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1742 }
252b5132
RH
1743 else
1744 {
1745 const char *string;
dc810e39 1746 unsigned int tagv = dyn.d_un.d_val;
252b5132 1747
dc810e39 1748 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1749 if (string == NULL)
1750 goto error_return;
1751 fprintf (f, "%s", string);
1752 }
1753 fprintf (f, "\n");
1754 }
1755
1756 free (dynbuf);
1757 dynbuf = NULL;
1758 }
1759
1760 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1761 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1762 {
fc0e6df6 1763 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1764 return FALSE;
252b5132
RH
1765 }
1766
1767 if (elf_dynverdef (abfd) != 0)
1768 {
1769 Elf_Internal_Verdef *t;
1770
1771 fprintf (f, _("\nVersion definitions:\n"));
1772 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1773 {
1774 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1775 t->vd_flags, t->vd_hash,
1776 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1777 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1778 {
1779 Elf_Internal_Verdaux *a;
1780
1781 fprintf (f, "\t");
1782 for (a = t->vd_auxptr->vda_nextptr;
1783 a != NULL;
1784 a = a->vda_nextptr)
d0fb9a8d
JJ
1785 fprintf (f, "%s ",
1786 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1787 fprintf (f, "\n");
1788 }
1789 }
1790 }
1791
1792 if (elf_dynverref (abfd) != 0)
1793 {
1794 Elf_Internal_Verneed *t;
1795
1796 fprintf (f, _("\nVersion References:\n"));
1797 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1798 {
1799 Elf_Internal_Vernaux *a;
1800
d0fb9a8d
JJ
1801 fprintf (f, _(" required from %s:\n"),
1802 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1803 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1804 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1805 a->vna_flags, a->vna_other,
1806 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1807 }
1808 }
1809
b34976b6 1810 return TRUE;
252b5132
RH
1811
1812 error_return:
1813 if (dynbuf != NULL)
1814 free (dynbuf);
b34976b6 1815 return FALSE;
252b5132
RH
1816}
1817
bb4d2ac2
L
1818/* Get version string. */
1819
1820const char *
60bb06bc
L
1821_bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1822 bfd_boolean *hidden)
bb4d2ac2
L
1823{
1824 const char *version_string = NULL;
1825 if (elf_dynversym (abfd) != 0
1826 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1827 {
1828 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1829
1830 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1831 vernum &= VERSYM_VERSION;
1832
1833 if (vernum == 0)
1834 version_string = "";
1835 else if (vernum == 1)
1836 version_string = "Base";
1837 else if (vernum <= elf_tdata (abfd)->cverdefs)
1838 version_string =
1839 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1840 else
1841 {
1842 Elf_Internal_Verneed *t;
1843
1844 version_string = "";
1845 for (t = elf_tdata (abfd)->verref;
1846 t != NULL;
1847 t = t->vn_nextref)
1848 {
1849 Elf_Internal_Vernaux *a;
1850
1851 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1852 {
1853 if (a->vna_other == vernum)
1854 {
1855 version_string = a->vna_nodename;
1856 break;
1857 }
1858 }
1859 }
1860 }
1861 }
1862 return version_string;
1863}
1864
252b5132
RH
1865/* Display ELF-specific fields of a symbol. */
1866
1867void
217aa764
AM
1868bfd_elf_print_symbol (bfd *abfd,
1869 void *filep,
1870 asymbol *symbol,
1871 bfd_print_symbol_type how)
252b5132 1872{
a50b1753 1873 FILE *file = (FILE *) filep;
252b5132
RH
1874 switch (how)
1875 {
1876 case bfd_print_symbol_name:
1877 fprintf (file, "%s", symbol->name);
1878 break;
1879 case bfd_print_symbol_more:
1880 fprintf (file, "elf ");
60b89a18 1881 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1882 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1883 break;
1884 case bfd_print_symbol_all:
1885 {
4e8a9624
AM
1886 const char *section_name;
1887 const char *name = NULL;
9c5bfbb7 1888 const struct elf_backend_data *bed;
7a13edea 1889 unsigned char st_other;
dbb410c3 1890 bfd_vma val;
bb4d2ac2
L
1891 const char *version_string;
1892 bfd_boolean hidden;
c044fabd 1893
252b5132 1894 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1895
1896 bed = get_elf_backend_data (abfd);
1897 if (bed->elf_backend_print_symbol_all)
c044fabd 1898 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1899
1900 if (name == NULL)
1901 {
7ee38065 1902 name = symbol->name;
217aa764 1903 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1904 }
1905
252b5132
RH
1906 fprintf (file, " %s\t", section_name);
1907 /* Print the "other" value for a symbol. For common symbols,
1908 we've already printed the size; now print the alignment.
1909 For other symbols, we have no specified alignment, and
1910 we've printed the address; now print the size. */
dcf6c779 1911 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1912 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1913 else
1914 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1915 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1916
1917 /* If we have version information, print it. */
60bb06bc
L
1918 version_string = _bfd_elf_get_symbol_version_string (abfd,
1919 symbol,
1920 &hidden);
bb4d2ac2 1921 if (version_string)
252b5132 1922 {
bb4d2ac2 1923 if (!hidden)
252b5132
RH
1924 fprintf (file, " %-11s", version_string);
1925 else
1926 {
1927 int i;
1928
1929 fprintf (file, " (%s)", version_string);
1930 for (i = 10 - strlen (version_string); i > 0; --i)
1931 putc (' ', file);
1932 }
1933 }
1934
1935 /* If the st_other field is not zero, print it. */
7a13edea 1936 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1937
7a13edea
NC
1938 switch (st_other)
1939 {
1940 case 0: break;
1941 case STV_INTERNAL: fprintf (file, " .internal"); break;
1942 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1943 case STV_PROTECTED: fprintf (file, " .protected"); break;
1944 default:
1945 /* Some other non-defined flags are also present, so print
1946 everything hex. */
1947 fprintf (file, " 0x%02x", (unsigned int) st_other);
1948 }
252b5132 1949
587ff49e 1950 fprintf (file, " %s", name);
252b5132
RH
1951 }
1952 break;
1953 }
1954}
252b5132
RH
1955\f
1956/* ELF .o/exec file reading */
1957
c044fabd 1958/* Create a new bfd section from an ELF section header. */
252b5132 1959
b34976b6 1960bfd_boolean
217aa764 1961bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1962{
4fbb74a6
AM
1963 Elf_Internal_Shdr *hdr;
1964 Elf_Internal_Ehdr *ehdr;
1965 const struct elf_backend_data *bed;
90937f86 1966 const char *name;
bf67003b
NC
1967 bfd_boolean ret = TRUE;
1968 static bfd_boolean * sections_being_created = NULL;
5a4b0ccc 1969 static bfd * sections_being_created_abfd = NULL;
bf67003b 1970 static unsigned int nesting = 0;
252b5132 1971
4fbb74a6
AM
1972 if (shindex >= elf_numsections (abfd))
1973 return FALSE;
1974
bf67003b
NC
1975 if (++ nesting > 3)
1976 {
1977 /* PR17512: A corrupt ELF binary might contain a recursive group of
06614111 1978 sections, with each the string indicies pointing to the next in the
bf67003b
NC
1979 loop. Detect this here, by refusing to load a section that we are
1980 already in the process of loading. We only trigger this test if
1981 we have nested at least three sections deep as normal ELF binaries
5a4b0ccc
NC
1982 can expect to recurse at least once.
1983
1984 FIXME: It would be better if this array was attached to the bfd,
1985 rather than being held in a static pointer. */
1986
1987 if (sections_being_created_abfd != abfd)
1988 sections_being_created = NULL;
bf67003b
NC
1989 if (sections_being_created == NULL)
1990 {
1991 /* FIXME: It would be more efficient to attach this array to the bfd somehow. */
1992 sections_being_created = (bfd_boolean *)
1993 bfd_zalloc (abfd, elf_numsections (abfd) * sizeof (bfd_boolean));
5a4b0ccc 1994 sections_being_created_abfd = abfd;
bf67003b
NC
1995 }
1996 if (sections_being_created [shindex])
1997 {
4eca0228 1998 _bfd_error_handler
bf67003b
NC
1999 (_("%B: warning: loop in section dependencies detected"), abfd);
2000 return FALSE;
2001 }
2002 sections_being_created [shindex] = TRUE;
2003 }
2004
4fbb74a6
AM
2005 hdr = elf_elfsections (abfd)[shindex];
2006 ehdr = elf_elfheader (abfd);
2007 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 2008 hdr->sh_name);
933d961a 2009 if (name == NULL)
bf67003b 2010 goto fail;
252b5132 2011
4fbb74a6 2012 bed = get_elf_backend_data (abfd);
252b5132
RH
2013 switch (hdr->sh_type)
2014 {
2015 case SHT_NULL:
2016 /* Inactive section. Throw it away. */
bf67003b 2017 goto success;
252b5132 2018
bf67003b
NC
2019 case SHT_PROGBITS: /* Normal section with contents. */
2020 case SHT_NOBITS: /* .bss section. */
2021 case SHT_HASH: /* .hash section. */
2022 case SHT_NOTE: /* .note section. */
25e27870
L
2023 case SHT_INIT_ARRAY: /* .init_array section. */
2024 case SHT_FINI_ARRAY: /* .fini_array section. */
2025 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 2026 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 2027 case SHT_GNU_HASH: /* .gnu.hash section. */
bf67003b
NC
2028 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2029 goto success;
252b5132 2030
797fc050 2031 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 2032 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2033 goto fail;
2034
cfcac11d
NC
2035 if (hdr->sh_link > elf_numsections (abfd))
2036 {
caa83f8b 2037 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
2038 field set to SHN_BEFORE or SHN_AFTER. */
2039 switch (bfd_get_arch (abfd))
2040 {
caa83f8b 2041 case bfd_arch_i386:
cfcac11d
NC
2042 case bfd_arch_sparc:
2043 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
2044 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
2045 break;
2046 /* Otherwise fall through. */
2047 default:
bf67003b 2048 goto fail;
cfcac11d
NC
2049 }
2050 }
2051 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
bf67003b 2052 goto fail;
cfcac11d 2053 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
2054 {
2055 Elf_Internal_Shdr *dynsymhdr;
2056
2057 /* The shared libraries distributed with hpux11 have a bogus
2058 sh_link field for the ".dynamic" section. Find the
2059 string table for the ".dynsym" section instead. */
2060 if (elf_dynsymtab (abfd) != 0)
2061 {
2062 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2063 hdr->sh_link = dynsymhdr->sh_link;
2064 }
2065 else
2066 {
2067 unsigned int i, num_sec;
2068
2069 num_sec = elf_numsections (abfd);
2070 for (i = 1; i < num_sec; i++)
2071 {
2072 dynsymhdr = elf_elfsections (abfd)[i];
2073 if (dynsymhdr->sh_type == SHT_DYNSYM)
2074 {
2075 hdr->sh_link = dynsymhdr->sh_link;
2076 break;
2077 }
2078 }
2079 }
2080 }
bf67003b 2081 goto success;
797fc050 2082
bf67003b 2083 case SHT_SYMTAB: /* A symbol table. */
252b5132 2084 if (elf_onesymtab (abfd) == shindex)
bf67003b 2085 goto success;
252b5132 2086
a50b2160 2087 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2088 goto fail;
2089
3337c1e5 2090 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
eee3b786
AM
2091 {
2092 if (hdr->sh_size != 0)
bf67003b 2093 goto fail;
eee3b786
AM
2094 /* Some assemblers erroneously set sh_info to one with a
2095 zero sh_size. ld sees this as a global symbol count
2096 of (unsigned) -1. Fix it here. */
2097 hdr->sh_info = 0;
bf67003b 2098 goto success;
eee3b786 2099 }
bf67003b 2100
16ad13ec
NC
2101 /* PR 18854: A binary might contain more than one symbol table.
2102 Unusual, but possible. Warn, but continue. */
2103 if (elf_onesymtab (abfd) != 0)
2104 {
4eca0228 2105 _bfd_error_handler
695344c0 2106 /* xgettext:c-format */
63a5468a
AM
2107 (_("%B: warning: multiple symbol tables detected"
2108 " - ignoring the table in section %u"),
16ad13ec
NC
2109 abfd, shindex);
2110 goto success;
2111 }
252b5132 2112 elf_onesymtab (abfd) = shindex;
6a40cf0c
NC
2113 elf_symtab_hdr (abfd) = *hdr;
2114 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
252b5132
RH
2115 abfd->flags |= HAS_SYMS;
2116
2117 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
2118 SHF_ALLOC is set, and this is a shared object, then we also
2119 treat this section as a BFD section. We can not base the
2120 decision purely on SHF_ALLOC, because that flag is sometimes
2121 set in a relocatable object file, which would confuse the
2122 linker. */
252b5132
RH
2123 if ((hdr->sh_flags & SHF_ALLOC) != 0
2124 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
2125 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2126 shindex))
bf67003b 2127 goto fail;
252b5132 2128
1b3a8575
AM
2129 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2130 can't read symbols without that section loaded as well. It
2131 is most likely specified by the next section header. */
6a40cf0c
NC
2132 {
2133 elf_section_list * entry;
2134 unsigned int i, num_sec;
1b3a8575 2135
6a40cf0c
NC
2136 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2137 if (entry->hdr.sh_link == shindex)
2138 goto success;
2139
2140 num_sec = elf_numsections (abfd);
2141 for (i = shindex + 1; i < num_sec; i++)
2142 {
2143 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2144
2145 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2146 && hdr2->sh_link == shindex)
2147 break;
2148 }
2149
2150 if (i == num_sec)
2151 for (i = 1; i < shindex; i++)
1b3a8575
AM
2152 {
2153 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
6a40cf0c 2154
1b3a8575
AM
2155 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2156 && hdr2->sh_link == shindex)
2157 break;
2158 }
6a40cf0c
NC
2159
2160 if (i != shindex)
2161 ret = bfd_section_from_shdr (abfd, i);
2162 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2163 goto success;
2164 }
252b5132 2165
bf67003b 2166 case SHT_DYNSYM: /* A dynamic symbol table. */
252b5132 2167 if (elf_dynsymtab (abfd) == shindex)
bf67003b 2168 goto success;
252b5132 2169
a50b2160 2170 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2171 goto fail;
2172
eee3b786
AM
2173 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2174 {
2175 if (hdr->sh_size != 0)
bf67003b
NC
2176 goto fail;
2177
eee3b786
AM
2178 /* Some linkers erroneously set sh_info to one with a
2179 zero sh_size. ld sees this as a global symbol count
2180 of (unsigned) -1. Fix it here. */
2181 hdr->sh_info = 0;
bf67003b 2182 goto success;
eee3b786 2183 }
bf67003b 2184
16ad13ec
NC
2185 /* PR 18854: A binary might contain more than one dynamic symbol table.
2186 Unusual, but possible. Warn, but continue. */
2187 if (elf_dynsymtab (abfd) != 0)
2188 {
4eca0228 2189 _bfd_error_handler
695344c0 2190 /* xgettext:c-format */
63a5468a
AM
2191 (_("%B: warning: multiple dynamic symbol tables detected"
2192 " - ignoring the table in section %u"),
16ad13ec
NC
2193 abfd, shindex);
2194 goto success;
2195 }
252b5132
RH
2196 elf_dynsymtab (abfd) = shindex;
2197 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2198 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2199 abfd->flags |= HAS_SYMS;
2200
2201 /* Besides being a symbol table, we also treat this as a regular
2202 section, so that objcopy can handle it. */
bf67003b
NC
2203 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2204 goto success;
252b5132 2205
bf67003b 2206 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
6a40cf0c
NC
2207 {
2208 elf_section_list * entry;
9ad5cbcf 2209
6a40cf0c
NC
2210 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2211 if (entry->ndx == shindex)
2212 goto success;
2213
2214 entry = bfd_alloc (abfd, sizeof * entry);
2215 if (entry == NULL)
2216 goto fail;
2217 entry->ndx = shindex;
2218 entry->hdr = * hdr;
2219 entry->next = elf_symtab_shndx_list (abfd);
2220 elf_symtab_shndx_list (abfd) = entry;
2221 elf_elfsections (abfd)[shindex] = & entry->hdr;
2222 goto success;
2223 }
9ad5cbcf 2224
bf67003b 2225 case SHT_STRTAB: /* A string table. */
252b5132 2226 if (hdr->bfd_section != NULL)
bf67003b
NC
2227 goto success;
2228
252b5132
RH
2229 if (ehdr->e_shstrndx == shindex)
2230 {
2231 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2232 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
bf67003b 2233 goto success;
252b5132 2234 }
bf67003b 2235
1b3a8575
AM
2236 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2237 {
2238 symtab_strtab:
2239 elf_tdata (abfd)->strtab_hdr = *hdr;
2240 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
bf67003b 2241 goto success;
1b3a8575 2242 }
bf67003b 2243
1b3a8575
AM
2244 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2245 {
2246 dynsymtab_strtab:
2247 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2248 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2249 elf_elfsections (abfd)[shindex] = hdr;
2250 /* We also treat this as a regular section, so that objcopy
2251 can handle it. */
bf67003b
NC
2252 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2253 shindex);
2254 goto success;
1b3a8575 2255 }
252b5132 2256
1b3a8575
AM
2257 /* If the string table isn't one of the above, then treat it as a
2258 regular section. We need to scan all the headers to be sure,
2259 just in case this strtab section appeared before the above. */
2260 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2261 {
2262 unsigned int i, num_sec;
252b5132 2263
1b3a8575
AM
2264 num_sec = elf_numsections (abfd);
2265 for (i = 1; i < num_sec; i++)
2266 {
2267 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2268 if (hdr2->sh_link == shindex)
2269 {
933d961a
JJ
2270 /* Prevent endless recursion on broken objects. */
2271 if (i == shindex)
bf67003b 2272 goto fail;
1b3a8575 2273 if (! bfd_section_from_shdr (abfd, i))
bf67003b 2274 goto fail;
1b3a8575
AM
2275 if (elf_onesymtab (abfd) == i)
2276 goto symtab_strtab;
2277 if (elf_dynsymtab (abfd) == i)
2278 goto dynsymtab_strtab;
2279 }
2280 }
2281 }
bf67003b
NC
2282 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2283 goto success;
252b5132
RH
2284
2285 case SHT_REL:
2286 case SHT_RELA:
2287 /* *These* do a lot of work -- but build no sections! */
2288 {
2289 asection *target_sect;
d4730f92 2290 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 2291 unsigned int num_sec = elf_numsections (abfd);
d4730f92 2292 struct bfd_elf_section_data *esdt;
252b5132 2293
aa2ca951
JJ
2294 if (hdr->sh_entsize
2295 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160 2296 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
bf67003b 2297 goto fail;
a50b2160 2298
03ae5f59 2299 /* Check for a bogus link to avoid crashing. */
4fbb74a6 2300 if (hdr->sh_link >= num_sec)
03ae5f59 2301 {
4eca0228 2302 _bfd_error_handler
695344c0 2303 /* xgettext:c-format */
4eca0228
AM
2304 (_("%B: invalid link %lu for reloc section %s (index %u)"),
2305 abfd, hdr->sh_link, name, shindex);
bf67003b
NC
2306 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2307 shindex);
2308 goto success;
03ae5f59
ILT
2309 }
2310
252b5132
RH
2311 /* For some incomprehensible reason Oracle distributes
2312 libraries for Solaris in which some of the objects have
2313 bogus sh_link fields. It would be nice if we could just
2314 reject them, but, unfortunately, some people need to use
2315 them. We scan through the section headers; if we find only
2316 one suitable symbol table, we clobber the sh_link to point
83b89087
L
2317 to it. I hope this doesn't break anything.
2318
2319 Don't do it on executable nor shared library. */
2320 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2321 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
2322 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2323 {
9ad5cbcf 2324 unsigned int scan;
252b5132
RH
2325 int found;
2326
2327 found = 0;
9ad5cbcf 2328 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2329 {
2330 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2331 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2332 {
2333 if (found != 0)
2334 {
2335 found = 0;
2336 break;
2337 }
2338 found = scan;
2339 }
2340 }
2341 if (found != 0)
2342 hdr->sh_link = found;
2343 }
2344
2345 /* Get the symbol table. */
1b3a8575
AM
2346 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2347 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2348 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
bf67003b 2349 goto fail;
252b5132
RH
2350
2351 /* If this reloc section does not use the main symbol table we
2352 don't treat it as a reloc section. BFD can't adequately
2353 represent such a section, so at least for now, we don't
c044fabd 2354 try. We just present it as a normal section. We also
60bcf0fa 2355 can't use it as a reloc section if it points to the null
83b89087
L
2356 section, an invalid section, another reloc section, or its
2357 sh_link points to the null section. */
185ef66d 2358 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 2359 || hdr->sh_link == SHN_UNDEF
185ef66d 2360 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
2361 || hdr->sh_info >= num_sec
2362 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2363 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
bf67003b
NC
2364 {
2365 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2366 shindex);
2367 goto success;
2368 }
252b5132
RH
2369
2370 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
bf67003b
NC
2371 goto fail;
2372
252b5132
RH
2373 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2374 if (target_sect == NULL)
bf67003b 2375 goto fail;
252b5132 2376
d4730f92
BS
2377 esdt = elf_section_data (target_sect);
2378 if (hdr->sh_type == SHT_RELA)
2379 p_hdr = &esdt->rela.hdr;
252b5132 2380 else
d4730f92
BS
2381 p_hdr = &esdt->rel.hdr;
2382
06614111
NC
2383 /* PR 17512: file: 0b4f81b7. */
2384 if (*p_hdr != NULL)
2385 goto fail;
ef53be89 2386 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
d4730f92 2387 if (hdr2 == NULL)
bf67003b 2388 goto fail;
252b5132 2389 *hdr2 = *hdr;
d4730f92 2390 *p_hdr = hdr2;
252b5132 2391 elf_elfsections (abfd)[shindex] = hdr2;
056bafd4
MR
2392 target_sect->reloc_count += (NUM_SHDR_ENTRIES (hdr)
2393 * bed->s->int_rels_per_ext_rel);
252b5132
RH
2394 target_sect->flags |= SEC_RELOC;
2395 target_sect->relocation = NULL;
2396 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2397 /* In the section to which the relocations apply, mark whether
2398 its relocations are of the REL or RELA variety. */
72730e0c 2399 if (hdr->sh_size != 0)
d4730f92
BS
2400 {
2401 if (hdr->sh_type == SHT_RELA)
2402 target_sect->use_rela_p = 1;
2403 }
252b5132 2404 abfd->flags |= HAS_RELOC;
bf67003b 2405 goto success;
252b5132 2406 }
252b5132
RH
2407
2408 case SHT_GNU_verdef:
2409 elf_dynverdef (abfd) = shindex;
2410 elf_tdata (abfd)->dynverdef_hdr = *hdr;
bf67003b
NC
2411 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2412 goto success;
252b5132
RH
2413
2414 case SHT_GNU_versym:
a50b2160 2415 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
bf67003b
NC
2416 goto fail;
2417
252b5132
RH
2418 elf_dynversym (abfd) = shindex;
2419 elf_tdata (abfd)->dynversym_hdr = *hdr;
bf67003b
NC
2420 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2421 goto success;
252b5132
RH
2422
2423 case SHT_GNU_verneed:
2424 elf_dynverref (abfd) = shindex;
2425 elf_tdata (abfd)->dynverref_hdr = *hdr;
bf67003b
NC
2426 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2427 goto success;
252b5132
RH
2428
2429 case SHT_SHLIB:
bf67003b 2430 goto success;
252b5132 2431
dbb410c3 2432 case SHT_GROUP:
44534af3 2433 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
bf67003b
NC
2434 goto fail;
2435
6dc132d9 2436 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2437 goto fail;
2438
bf67003b 2439 goto success;
dbb410c3 2440
252b5132 2441 default:
104d59d1
JM
2442 /* Possibly an attributes section. */
2443 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2444 || hdr->sh_type == bed->obj_attrs_section_type)
2445 {
2446 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2447 goto fail;
104d59d1 2448 _bfd_elf_parse_attributes (abfd, hdr);
bf67003b 2449 goto success;
104d59d1
JM
2450 }
2451
252b5132 2452 /* Check for any processor-specific section types. */
3eb70a79 2453 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2454 goto success;
3eb70a79
L
2455
2456 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2457 {
2458 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2459 /* FIXME: How to properly handle allocated section reserved
2460 for applications? */
4eca0228 2461 _bfd_error_handler
695344c0 2462 /* xgettext:c-format */
3eb70a79
L
2463 (_("%B: don't know how to handle allocated, application "
2464 "specific section `%s' [0x%8x]"),
2465 abfd, name, hdr->sh_type);
2466 else
bf67003b
NC
2467 {
2468 /* Allow sections reserved for applications. */
2469 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2470 shindex);
2471 goto success;
2472 }
3eb70a79
L
2473 }
2474 else if (hdr->sh_type >= SHT_LOPROC
2475 && hdr->sh_type <= SHT_HIPROC)
2476 /* FIXME: We should handle this section. */
4eca0228 2477 _bfd_error_handler
695344c0 2478 /* xgettext:c-format */
3eb70a79
L
2479 (_("%B: don't know how to handle processor specific section "
2480 "`%s' [0x%8x]"),
2481 abfd, name, hdr->sh_type);
2482 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
2483 {
2484 /* Unrecognised OS-specific sections. */
2485 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2486 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 2487 required to correctly process the section and the file should
ff15b240 2488 be rejected with an error message. */
4eca0228 2489 _bfd_error_handler
695344c0 2490 /* xgettext:c-format */
ff15b240
NC
2491 (_("%B: don't know how to handle OS specific section "
2492 "`%s' [0x%8x]"),
2493 abfd, name, hdr->sh_type);
2494 else
bf67003b
NC
2495 {
2496 /* Otherwise it should be processed. */
2497 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2498 goto success;
2499 }
ff15b240 2500 }
3eb70a79
L
2501 else
2502 /* FIXME: We should handle this section. */
4eca0228 2503 _bfd_error_handler
695344c0 2504 /* xgettext:c-format */
3eb70a79
L
2505 (_("%B: don't know how to handle section `%s' [0x%8x]"),
2506 abfd, name, hdr->sh_type);
2507
bf67003b 2508 goto fail;
252b5132
RH
2509 }
2510
bf67003b
NC
2511 fail:
2512 ret = FALSE;
2513 success:
e5b470e2 2514 if (sections_being_created && sections_being_created_abfd == abfd)
bf67003b
NC
2515 sections_being_created [shindex] = FALSE;
2516 if (-- nesting == 0)
5a4b0ccc
NC
2517 {
2518 sections_being_created = NULL;
2519 sections_being_created_abfd = abfd;
2520 }
bf67003b 2521 return ret;
252b5132
RH
2522}
2523
87d72d41 2524/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2525
87d72d41
AM
2526Elf_Internal_Sym *
2527bfd_sym_from_r_symndx (struct sym_cache *cache,
2528 bfd *abfd,
2529 unsigned long r_symndx)
ec338859 2530{
ec338859
AM
2531 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2532
a5d1b3b5
AM
2533 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2534 {
2535 Elf_Internal_Shdr *symtab_hdr;
2536 unsigned char esym[sizeof (Elf64_External_Sym)];
2537 Elf_External_Sym_Shndx eshndx;
ec338859 2538
a5d1b3b5
AM
2539 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2540 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2541 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2542 return NULL;
9ad5cbcf 2543
a5d1b3b5
AM
2544 if (cache->abfd != abfd)
2545 {
2546 memset (cache->indx, -1, sizeof (cache->indx));
2547 cache->abfd = abfd;
2548 }
2549 cache->indx[ent] = r_symndx;
ec338859 2550 }
a5d1b3b5 2551
87d72d41 2552 return &cache->sym[ent];
ec338859
AM
2553}
2554
252b5132
RH
2555/* Given an ELF section number, retrieve the corresponding BFD
2556 section. */
2557
2558asection *
91d6fa6a 2559bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2560{
91d6fa6a 2561 if (sec_index >= elf_numsections (abfd))
252b5132 2562 return NULL;
91d6fa6a 2563 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2564}
2565
b35d266b 2566static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2567{
0112cd26
NC
2568 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2569 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2570};
2571
b35d266b 2572static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2573{
0112cd26
NC
2574 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2575 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2576};
2577
b35d266b 2578static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2579{
0112cd26
NC
2580 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2581 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
a9a72a65
DE
2582 /* There are more DWARF sections than these, but they needn't be added here
2583 unless you have to cope with broken compilers that don't emit section
2584 attributes or you want to help the user writing assembler. */
0112cd26
NC
2585 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2586 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2587 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2588 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2589 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2590 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2591 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2592 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2593 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2594};
2595
b35d266b 2596static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2597{
6f9dbcd4
AM
2598 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2599 { STRING_COMMA_LEN (".fini_array"), -2, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2600 { NULL, 0 , 0, 0, 0 }
7f4d3958
L
2601};
2602
b35d266b 2603static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2604{
0112cd26 2605 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
68efed41 2606 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
0112cd26
NC
2607 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2608 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2609 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2610 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2611 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2612 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2613 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2614 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2615};
2616
b35d266b 2617static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2618{
0112cd26
NC
2619 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2620 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2621};
2622
b35d266b 2623static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2624{
6f9dbcd4
AM
2625 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2626 { STRING_COMMA_LEN (".init_array"), -2, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2627 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2628 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2629};
2630
b35d266b 2631static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2632{
0112cd26
NC
2633 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2634 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2635};
2636
b35d266b 2637static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2638{
0112cd26
NC
2639 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2640 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2641 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2642};
2643
b35d266b 2644static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2645{
6f9dbcd4
AM
2646 { STRING_COMMA_LEN (".preinit_array"), -2, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2647 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2648 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2649};
2650
b35d266b 2651static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2652{
0112cd26
NC
2653 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2654 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2655 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2656 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2657 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2658};
2659
b35d266b 2660static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2661{
0112cd26
NC
2662 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2663 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2664 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2665 /* See struct bfd_elf_special_section declaration for the semantics of
2666 this special case where .prefix_length != strlen (.prefix). */
2667 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2668 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2669};
2670
b35d266b 2671static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2672{
0112cd26
NC
2673 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2674 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2675 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2676 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2677};
2678
1b315056
CS
2679static const struct bfd_elf_special_section special_sections_z[] =
2680{
2681 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2682 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2683 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2684 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2685 { NULL, 0, 0, 0, 0 }
2686};
2687
e4c93b56 2688static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2689{
7f4d3958 2690 special_sections_b, /* 'b' */
98ece1b3 2691 special_sections_c, /* 'c' */
7f4d3958
L
2692 special_sections_d, /* 'd' */
2693 NULL, /* 'e' */
2694 special_sections_f, /* 'f' */
2695 special_sections_g, /* 'g' */
2696 special_sections_h, /* 'h' */
2697 special_sections_i, /* 'i' */
2698 NULL, /* 'j' */
2699 NULL, /* 'k' */
2700 special_sections_l, /* 'l' */
2701 NULL, /* 'm' */
2702 special_sections_n, /* 'n' */
2703 NULL, /* 'o' */
2704 special_sections_p, /* 'p' */
2705 NULL, /* 'q' */
2706 special_sections_r, /* 'r' */
2707 special_sections_s, /* 's' */
2708 special_sections_t, /* 't' */
1b315056
CS
2709 NULL, /* 'u' */
2710 NULL, /* 'v' */
2711 NULL, /* 'w' */
2712 NULL, /* 'x' */
2713 NULL, /* 'y' */
2714 special_sections_z /* 'z' */
7f4d3958
L
2715};
2716
551b43fd
AM
2717const struct bfd_elf_special_section *
2718_bfd_elf_get_special_section (const char *name,
2719 const struct bfd_elf_special_section *spec,
2720 unsigned int rela)
2f89ff8d
L
2721{
2722 int i;
7f4d3958 2723 int len;
7f4d3958 2724
551b43fd 2725 len = strlen (name);
7f4d3958 2726
551b43fd 2727 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2728 {
2729 int suffix_len;
551b43fd 2730 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2731
2732 if (len < prefix_len)
2733 continue;
551b43fd 2734 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2735 continue;
2736
551b43fd 2737 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2738 if (suffix_len <= 0)
2739 {
2740 if (name[prefix_len] != 0)
2741 {
2742 if (suffix_len == 0)
2743 continue;
2744 if (name[prefix_len] != '.'
2745 && (suffix_len == -2
551b43fd 2746 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2747 continue;
2748 }
2749 }
2750 else
2751 {
2752 if (len < prefix_len + suffix_len)
2753 continue;
2754 if (memcmp (name + len - suffix_len,
551b43fd 2755 spec[i].prefix + prefix_len,
7dcb9820
AM
2756 suffix_len) != 0)
2757 continue;
2758 }
551b43fd 2759 return &spec[i];
7dcb9820 2760 }
2f89ff8d
L
2761
2762 return NULL;
2763}
2764
7dcb9820 2765const struct bfd_elf_special_section *
29ef7005 2766_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2767{
551b43fd
AM
2768 int i;
2769 const struct bfd_elf_special_section *spec;
29ef7005 2770 const struct elf_backend_data *bed;
2f89ff8d
L
2771
2772 /* See if this is one of the special sections. */
551b43fd
AM
2773 if (sec->name == NULL)
2774 return NULL;
2f89ff8d 2775
29ef7005
L
2776 bed = get_elf_backend_data (abfd);
2777 spec = bed->special_sections;
2778 if (spec)
2779 {
2780 spec = _bfd_elf_get_special_section (sec->name,
2781 bed->special_sections,
2782 sec->use_rela_p);
2783 if (spec != NULL)
2784 return spec;
2785 }
2786
551b43fd
AM
2787 if (sec->name[0] != '.')
2788 return NULL;
2f89ff8d 2789
551b43fd 2790 i = sec->name[1] - 'b';
1b315056 2791 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2792 return NULL;
2793
2794 spec = special_sections[i];
2f89ff8d 2795
551b43fd
AM
2796 if (spec == NULL)
2797 return NULL;
2798
2799 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2800}
2801
b34976b6 2802bfd_boolean
217aa764 2803_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2804{
2805 struct bfd_elf_section_data *sdata;
551b43fd 2806 const struct elf_backend_data *bed;
7dcb9820 2807 const struct bfd_elf_special_section *ssect;
252b5132 2808
f0abc2a1
AM
2809 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2810 if (sdata == NULL)
2811 {
a50b1753
NC
2812 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2813 sizeof (*sdata));
f0abc2a1
AM
2814 if (sdata == NULL)
2815 return FALSE;
217aa764 2816 sec->used_by_bfd = sdata;
f0abc2a1 2817 }
bf572ba0 2818
551b43fd
AM
2819 /* Indicate whether or not this section should use RELA relocations. */
2820 bed = get_elf_backend_data (abfd);
2821 sec->use_rela_p = bed->default_use_rela_p;
2822
e843e0f8
L
2823 /* When we read a file, we don't need to set ELF section type and
2824 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2825 anyway. We will set ELF section type and flags for all linker
2826 created sections. If user specifies BFD section flags, we will
2827 set ELF section type and flags based on BFD section flags in
02ecc8e9
L
2828 elf_fake_sections. Special handling for .init_array/.fini_array
2829 output sections since they may contain .ctors/.dtors input
2830 sections. We don't want _bfd_elf_init_private_section_data to
2831 copy ELF section type from .ctors/.dtors input sections. */
2832 if (abfd->direction != read_direction
3496cb2a 2833 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2834 {
551b43fd 2835 ssect = (*bed->get_sec_type_attr) (abfd, sec);
02ecc8e9
L
2836 if (ssect != NULL
2837 && (!sec->flags
2838 || (sec->flags & SEC_LINKER_CREATED) != 0
2839 || ssect->type == SHT_INIT_ARRAY
2840 || ssect->type == SHT_FINI_ARRAY))
a31501e9
L
2841 {
2842 elf_section_type (sec) = ssect->type;
2843 elf_section_flags (sec) = ssect->attr;
2844 }
2f89ff8d
L
2845 }
2846
f592407e 2847 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2848}
2849
2850/* Create a new bfd section from an ELF program header.
2851
2852 Since program segments have no names, we generate a synthetic name
2853 of the form segment<NUM>, where NUM is generally the index in the
2854 program header table. For segments that are split (see below) we
2855 generate the names segment<NUM>a and segment<NUM>b.
2856
2857 Note that some program segments may have a file size that is different than
2858 (less than) the memory size. All this means is that at execution the
2859 system must allocate the amount of memory specified by the memory size,
2860 but only initialize it with the first "file size" bytes read from the
2861 file. This would occur for example, with program segments consisting
2862 of combined data+bss.
2863
2864 To handle the above situation, this routine generates TWO bfd sections
2865 for the single program segment. The first has the length specified by
2866 the file size of the segment, and the second has the length specified
2867 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2868 into its initialized and uninitialized parts.
252b5132
RH
2869
2870 */
2871
b34976b6 2872bfd_boolean
217aa764
AM
2873_bfd_elf_make_section_from_phdr (bfd *abfd,
2874 Elf_Internal_Phdr *hdr,
91d6fa6a 2875 int hdr_index,
a50b1753 2876 const char *type_name)
252b5132
RH
2877{
2878 asection *newsect;
2879 char *name;
2880 char namebuf[64];
d4c88bbb 2881 size_t len;
252b5132
RH
2882 int split;
2883
2884 split = ((hdr->p_memsz > 0)
2885 && (hdr->p_filesz > 0)
2886 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2887
2888 if (hdr->p_filesz > 0)
252b5132 2889 {
91d6fa6a 2890 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2891 len = strlen (namebuf) + 1;
a50b1753 2892 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2893 if (!name)
2894 return FALSE;
2895 memcpy (name, namebuf, len);
2896 newsect = bfd_make_section (abfd, name);
2897 if (newsect == NULL)
2898 return FALSE;
2899 newsect->vma = hdr->p_vaddr;
2900 newsect->lma = hdr->p_paddr;
2901 newsect->size = hdr->p_filesz;
2902 newsect->filepos = hdr->p_offset;
2903 newsect->flags |= SEC_HAS_CONTENTS;
2904 newsect->alignment_power = bfd_log2 (hdr->p_align);
2905 if (hdr->p_type == PT_LOAD)
252b5132 2906 {
d5191d0c
AM
2907 newsect->flags |= SEC_ALLOC;
2908 newsect->flags |= SEC_LOAD;
2909 if (hdr->p_flags & PF_X)
2910 {
2911 /* FIXME: all we known is that it has execute PERMISSION,
2912 may be data. */
2913 newsect->flags |= SEC_CODE;
2914 }
2915 }
2916 if (!(hdr->p_flags & PF_W))
2917 {
2918 newsect->flags |= SEC_READONLY;
252b5132 2919 }
252b5132
RH
2920 }
2921
d5191d0c 2922 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2923 {
d5191d0c
AM
2924 bfd_vma align;
2925
91d6fa6a 2926 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2927 len = strlen (namebuf) + 1;
a50b1753 2928 name = (char *) bfd_alloc (abfd, len);
252b5132 2929 if (!name)
b34976b6 2930 return FALSE;
d4c88bbb 2931 memcpy (name, namebuf, len);
252b5132
RH
2932 newsect = bfd_make_section (abfd, name);
2933 if (newsect == NULL)
b34976b6 2934 return FALSE;
252b5132
RH
2935 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2936 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2937 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2938 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2939 align = newsect->vma & -newsect->vma;
2940 if (align == 0 || align > hdr->p_align)
2941 align = hdr->p_align;
2942 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2943 if (hdr->p_type == PT_LOAD)
2944 {
d5191d0c
AM
2945 /* Hack for gdb. Segments that have not been modified do
2946 not have their contents written to a core file, on the
2947 assumption that a debugger can find the contents in the
2948 executable. We flag this case by setting the fake
2949 section size to zero. Note that "real" bss sections will
2950 always have their contents dumped to the core file. */
2951 if (bfd_get_format (abfd) == bfd_core)
2952 newsect->size = 0;
252b5132
RH
2953 newsect->flags |= SEC_ALLOC;
2954 if (hdr->p_flags & PF_X)
2955 newsect->flags |= SEC_CODE;
2956 }
2957 if (!(hdr->p_flags & PF_W))
2958 newsect->flags |= SEC_READONLY;
2959 }
2960
b34976b6 2961 return TRUE;
252b5132
RH
2962}
2963
b34976b6 2964bfd_boolean
91d6fa6a 2965bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2966{
9c5bfbb7 2967 const struct elf_backend_data *bed;
20cfcaae
NC
2968
2969 switch (hdr->p_type)
2970 {
2971 case PT_NULL:
91d6fa6a 2972 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2973
2974 case PT_LOAD:
91d6fa6a 2975 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2976
2977 case PT_DYNAMIC:
91d6fa6a 2978 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2979
2980 case PT_INTERP:
91d6fa6a 2981 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2982
2983 case PT_NOTE:
91d6fa6a 2984 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2985 return FALSE;
718175fa 2986 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2987 return FALSE;
2988 return TRUE;
20cfcaae
NC
2989
2990 case PT_SHLIB:
91d6fa6a 2991 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
2992
2993 case PT_PHDR:
91d6fa6a 2994 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 2995
811072d8 2996 case PT_GNU_EH_FRAME:
91d6fa6a 2997 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
2998 "eh_frame_hdr");
2999
2b05f1b7 3000 case PT_GNU_STACK:
91d6fa6a 3001 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 3002
8c37241b 3003 case PT_GNU_RELRO:
91d6fa6a 3004 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 3005
20cfcaae 3006 default:
8c1acd09 3007 /* Check for any processor-specific program segment types. */
20cfcaae 3008 bed = get_elf_backend_data (abfd);
91d6fa6a 3009 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
3010 }
3011}
3012
d4730f92
BS
3013/* Return the REL_HDR for SEC, assuming there is only a single one, either
3014 REL or RELA. */
3015
3016Elf_Internal_Shdr *
3017_bfd_elf_single_rel_hdr (asection *sec)
3018{
3019 if (elf_section_data (sec)->rel.hdr)
3020 {
3021 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3022 return elf_section_data (sec)->rel.hdr;
3023 }
3024 else
3025 return elf_section_data (sec)->rela.hdr;
3026}
3027
3e19fb8f
L
3028static bfd_boolean
3029_bfd_elf_set_reloc_sh_name (bfd *abfd,
3030 Elf_Internal_Shdr *rel_hdr,
3031 const char *sec_name,
3032 bfd_boolean use_rela_p)
3033{
3034 char *name = (char *) bfd_alloc (abfd,
3035 sizeof ".rela" + strlen (sec_name));
3036 if (name == NULL)
3037 return FALSE;
3038
3039 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3040 rel_hdr->sh_name =
3041 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3042 FALSE);
3043 if (rel_hdr->sh_name == (unsigned int) -1)
3044 return FALSE;
3045
3046 return TRUE;
3047}
3048
d4730f92
BS
3049/* Allocate and initialize a section-header for a new reloc section,
3050 containing relocations against ASECT. It is stored in RELDATA. If
3051 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3052 relocations. */
23bc299b 3053
5d13b3b3 3054static bfd_boolean
217aa764 3055_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 3056 struct bfd_elf_section_reloc_data *reldata,
f6fe1ccd 3057 const char *sec_name,
3e19fb8f
L
3058 bfd_boolean use_rela_p,
3059 bfd_boolean delay_st_name_p)
23bc299b 3060{
d4730f92 3061 Elf_Internal_Shdr *rel_hdr;
9c5bfbb7 3062 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3063
d4730f92 3064 BFD_ASSERT (reldata->hdr == NULL);
ef53be89 3065 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
d4730f92 3066 reldata->hdr = rel_hdr;
23bc299b 3067
3e19fb8f
L
3068 if (delay_st_name_p)
3069 rel_hdr->sh_name = (unsigned int) -1;
3070 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3071 use_rela_p))
b34976b6 3072 return FALSE;
23bc299b
MM
3073 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3074 rel_hdr->sh_entsize = (use_rela_p
3075 ? bed->s->sizeof_rela
3076 : bed->s->sizeof_rel);
72de5009 3077 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
3078 rel_hdr->sh_flags = 0;
3079 rel_hdr->sh_addr = 0;
3080 rel_hdr->sh_size = 0;
3081 rel_hdr->sh_offset = 0;
3082
b34976b6 3083 return TRUE;
23bc299b
MM
3084}
3085
94be91de
JB
3086/* Return the default section type based on the passed in section flags. */
3087
3088int
3089bfd_elf_get_default_section_type (flagword flags)
3090{
3091 if ((flags & SEC_ALLOC) != 0
2e76e85a 3092 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
3093 return SHT_NOBITS;
3094 return SHT_PROGBITS;
3095}
3096
d4730f92
BS
3097struct fake_section_arg
3098{
3099 struct bfd_link_info *link_info;
3100 bfd_boolean failed;
3101};
3102
252b5132
RH
3103/* Set up an ELF internal section header for a section. */
3104
252b5132 3105static void
d4730f92 3106elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 3107{
d4730f92 3108 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 3109 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3110 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 3111 Elf_Internal_Shdr *this_hdr;
0414f35b 3112 unsigned int sh_type;
0ce398f1 3113 const char *name = asect->name;
3e19fb8f 3114 bfd_boolean delay_st_name_p = FALSE;
252b5132 3115
d4730f92 3116 if (arg->failed)
252b5132
RH
3117 {
3118 /* We already failed; just get out of the bfd_map_over_sections
08a40648 3119 loop. */
252b5132
RH
3120 return;
3121 }
3122
d4730f92 3123 this_hdr = &esd->this_hdr;
252b5132 3124
f6fe1ccd 3125 if (arg->link_info)
0ce398f1 3126 {
f6fe1ccd
L
3127 /* ld: compress DWARF debug sections with names: .debug_*. */
3128 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
3129 && (asect->flags & SEC_DEBUGGING)
3130 && name[1] == 'd'
3131 && name[6] == '_')
3132 {
3133 /* Set SEC_ELF_COMPRESS to indicate this section should be
3134 compressed. */
3135 asect->flags |= SEC_ELF_COMPRESS;
0ce398f1 3136
dd905818 3137 /* If this section will be compressed, delay adding section
3e19fb8f
L
3138 name to section name section after it is compressed in
3139 _bfd_elf_assign_file_positions_for_non_load. */
3140 delay_st_name_p = TRUE;
f6fe1ccd
L
3141 }
3142 }
3143 else if ((asect->flags & SEC_ELF_RENAME))
3144 {
3145 /* objcopy: rename output DWARF debug section. */
3146 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
3147 {
3148 /* When we decompress or compress with SHF_COMPRESSED,
3149 convert section name from .zdebug_* to .debug_* if
3150 needed. */
3151 if (name[1] == 'z')
3152 {
3153 char *new_name = convert_zdebug_to_debug (abfd, name);
3154 if (new_name == NULL)
3155 {
3156 arg->failed = TRUE;
3157 return;
3158 }
3159 name = new_name;
3160 }
3161 }
3162 else if (asect->compress_status == COMPRESS_SECTION_DONE)
0ce398f1 3163 {
f6fe1ccd
L
3164 /* PR binutils/18087: Compression does not always make a
3165 section smaller. So only rename the section when
3166 compression has actually taken place. If input section
3167 name is .zdebug_*, we should never compress it again. */
3168 char *new_name = convert_debug_to_zdebug (abfd, name);
0ce398f1
L
3169 if (new_name == NULL)
3170 {
3171 arg->failed = TRUE;
3172 return;
3173 }
f6fe1ccd
L
3174 BFD_ASSERT (name[1] != 'z');
3175 name = new_name;
0ce398f1
L
3176 }
3177 }
3178
3e19fb8f
L
3179 if (delay_st_name_p)
3180 this_hdr->sh_name = (unsigned int) -1;
3181 else
252b5132 3182 {
3e19fb8f
L
3183 this_hdr->sh_name
3184 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3185 name, FALSE);
3186 if (this_hdr->sh_name == (unsigned int) -1)
3187 {
3188 arg->failed = TRUE;
3189 return;
3190 }
252b5132
RH
3191 }
3192
a4d8e49b 3193 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
3194
3195 if ((asect->flags & SEC_ALLOC) != 0
3196 || asect->user_set_vma)
3197 this_hdr->sh_addr = asect->vma;
3198 else
3199 this_hdr->sh_addr = 0;
3200
3201 this_hdr->sh_offset = 0;
eea6121a 3202 this_hdr->sh_size = asect->size;
252b5132 3203 this_hdr->sh_link = 0;
c86934ce
NC
3204 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3205 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3206 {
4eca0228 3207 _bfd_error_handler
695344c0 3208 /* xgettext:c-format */
c86934ce 3209 (_("%B: error: Alignment power %d of section `%A' is too big"),
c08bb8dd 3210 abfd, asect->alignment_power, asect);
c86934ce
NC
3211 arg->failed = TRUE;
3212 return;
3213 }
72de5009 3214 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
3215 /* The sh_entsize and sh_info fields may have been set already by
3216 copy_private_section_data. */
3217
3218 this_hdr->bfd_section = asect;
3219 this_hdr->contents = NULL;
3220
3cddba1e
L
3221 /* If the section type is unspecified, we set it based on
3222 asect->flags. */
98ece1b3
AM
3223 if ((asect->flags & SEC_GROUP) != 0)
3224 sh_type = SHT_GROUP;
98ece1b3 3225 else
94be91de 3226 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 3227
3cddba1e 3228 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
3229 this_hdr->sh_type = sh_type;
3230 else if (this_hdr->sh_type == SHT_NOBITS
3231 && sh_type == SHT_PROGBITS
3232 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 3233 {
98ece1b3
AM
3234 /* Warn if we are changing a NOBITS section to PROGBITS, but
3235 allow the link to proceed. This can happen when users link
3236 non-bss input sections to bss output sections, or emit data
3237 to a bss output section via a linker script. */
4eca0228 3238 _bfd_error_handler
58f0869b 3239 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 3240 this_hdr->sh_type = sh_type;
3cddba1e
L
3241 }
3242
2f89ff8d 3243 switch (this_hdr->sh_type)
252b5132 3244 {
2f89ff8d 3245 default:
2f89ff8d
L
3246 break;
3247
3248 case SHT_STRTAB:
2f89ff8d
L
3249 case SHT_NOTE:
3250 case SHT_NOBITS:
3251 case SHT_PROGBITS:
3252 break;
606851fb
AM
3253
3254 case SHT_INIT_ARRAY:
3255 case SHT_FINI_ARRAY:
3256 case SHT_PREINIT_ARRAY:
3257 this_hdr->sh_entsize = bed->s->arch_size / 8;
3258 break;
2f89ff8d
L
3259
3260 case SHT_HASH:
c7ac6ff8 3261 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 3262 break;
5de3bf90 3263
2f89ff8d 3264 case SHT_DYNSYM:
252b5132 3265 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
3266 break;
3267
3268 case SHT_DYNAMIC:
252b5132 3269 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
3270 break;
3271
3272 case SHT_RELA:
3273 if (get_elf_backend_data (abfd)->may_use_rela_p)
3274 this_hdr->sh_entsize = bed->s->sizeof_rela;
3275 break;
3276
3277 case SHT_REL:
3278 if (get_elf_backend_data (abfd)->may_use_rel_p)
3279 this_hdr->sh_entsize = bed->s->sizeof_rel;
3280 break;
3281
3282 case SHT_GNU_versym:
252b5132 3283 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
3284 break;
3285
3286 case SHT_GNU_verdef:
252b5132
RH
3287 this_hdr->sh_entsize = 0;
3288 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3289 cverdefs. The linker will set cverdefs, but sh_info will be
3290 zero. */
252b5132
RH
3291 if (this_hdr->sh_info == 0)
3292 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3293 else
3294 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3295 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
3296 break;
3297
3298 case SHT_GNU_verneed:
252b5132
RH
3299 this_hdr->sh_entsize = 0;
3300 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3301 cverrefs. The linker will set cverrefs, but sh_info will be
3302 zero. */
252b5132
RH
3303 if (this_hdr->sh_info == 0)
3304 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3305 else
3306 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3307 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
3308 break;
3309
3310 case SHT_GROUP:
1783205a 3311 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 3312 break;
fdc90cb4
JJ
3313
3314 case SHT_GNU_HASH:
3315 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3316 break;
dbb410c3 3317 }
252b5132
RH
3318
3319 if ((asect->flags & SEC_ALLOC) != 0)
3320 this_hdr->sh_flags |= SHF_ALLOC;
3321 if ((asect->flags & SEC_READONLY) == 0)
3322 this_hdr->sh_flags |= SHF_WRITE;
3323 if ((asect->flags & SEC_CODE) != 0)
3324 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
3325 if ((asect->flags & SEC_MERGE) != 0)
3326 {
3327 this_hdr->sh_flags |= SHF_MERGE;
3328 this_hdr->sh_entsize = asect->entsize;
f5fa8ca2 3329 }
84865015
NC
3330 if ((asect->flags & SEC_STRINGS) != 0)
3331 this_hdr->sh_flags |= SHF_STRINGS;
1126897b 3332 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 3333 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 3334 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
3335 {
3336 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
3337 if (asect->size == 0
3338 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 3339 {
3a800eb9 3340 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 3341
704afa60 3342 this_hdr->sh_size = 0;
3a800eb9
AM
3343 if (o != NULL)
3344 {
704afa60 3345 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
3346 if (this_hdr->sh_size != 0)
3347 this_hdr->sh_type = SHT_NOBITS;
3348 }
704afa60
JJ
3349 }
3350 }
18ae9cc1
L
3351 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3352 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 3353
d4730f92
BS
3354 /* If the section has relocs, set up a section header for the
3355 SHT_REL[A] section. If two relocation sections are required for
3356 this section, it is up to the processor-specific back-end to
3357 create the other. */
3358 if ((asect->flags & SEC_RELOC) != 0)
3359 {
3360 /* When doing a relocatable link, create both REL and RELA sections if
3361 needed. */
3362 if (arg->link_info
3363 /* Do the normal setup if we wouldn't create any sections here. */
3364 && esd->rel.count + esd->rela.count > 0
0e1862bb
L
3365 && (bfd_link_relocatable (arg->link_info)
3366 || arg->link_info->emitrelocations))
d4730f92
BS
3367 {
3368 if (esd->rel.count && esd->rel.hdr == NULL
3e19fb8f
L
3369 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name, FALSE,
3370 delay_st_name_p))
d4730f92
BS
3371 {
3372 arg->failed = TRUE;
3373 return;
3374 }
3375 if (esd->rela.count && esd->rela.hdr == NULL
3e19fb8f
L
3376 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name, TRUE,
3377 delay_st_name_p))
d4730f92
BS
3378 {
3379 arg->failed = TRUE;
3380 return;
3381 }
3382 }
3383 else if (!_bfd_elf_init_reloc_shdr (abfd,
3384 (asect->use_rela_p
3385 ? &esd->rela : &esd->rel),
f6fe1ccd 3386 name,
3e19fb8f
L
3387 asect->use_rela_p,
3388 delay_st_name_p))
d4730f92
BS
3389 arg->failed = TRUE;
3390 }
3391
252b5132 3392 /* Check for processor-specific section types. */
0414f35b 3393 sh_type = this_hdr->sh_type;
e1fddb6b
AO
3394 if (bed->elf_backend_fake_sections
3395 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
d4730f92 3396 arg->failed = TRUE;
252b5132 3397
42bb2e33 3398 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
3399 {
3400 /* Don't change the header type from NOBITS if we are being
42bb2e33 3401 called for objcopy --only-keep-debug. */
0414f35b
AM
3402 this_hdr->sh_type = sh_type;
3403 }
252b5132
RH
3404}
3405
bcacc0f5
AM
3406/* Fill in the contents of a SHT_GROUP section. Called from
3407 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3408 when ELF targets use the generic linker, ld. Called for ld -r
3409 from bfd_elf_final_link. */
dbb410c3 3410
1126897b 3411void
217aa764 3412bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 3413{
a50b1753 3414 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 3415 asection *elt, *first;
dbb410c3 3416 unsigned char *loc;
b34976b6 3417 bfd_boolean gas;
dbb410c3 3418
7e4111ad
L
3419 /* Ignore linker created group section. See elfNN_ia64_object_p in
3420 elfxx-ia64.c. */
3421 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
3422 || *failedptr)
3423 return;
3424
bcacc0f5
AM
3425 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3426 {
3427 unsigned long symindx = 0;
3428
3429 /* elf_group_id will have been set up by objcopy and the
3430 generic linker. */
3431 if (elf_group_id (sec) != NULL)
3432 symindx = elf_group_id (sec)->udata.i;
1126897b 3433
bcacc0f5
AM
3434 if (symindx == 0)
3435 {
3436 /* If called from the assembler, swap_out_syms will have set up
3437 elf_section_syms. */
3438 BFD_ASSERT (elf_section_syms (abfd) != NULL);
3439 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3440 }
3441 elf_section_data (sec)->this_hdr.sh_info = symindx;
3442 }
3443 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 3444 {
bcacc0f5
AM
3445 /* The ELF backend linker sets sh_info to -2 when the group
3446 signature symbol is global, and thus the index can't be
3447 set until all local symbols are output. */
53720c49
AM
3448 asection *igroup;
3449 struct bfd_elf_section_data *sec_data;
3450 unsigned long symndx;
3451 unsigned long extsymoff;
bcacc0f5
AM
3452 struct elf_link_hash_entry *h;
3453
53720c49
AM
3454 /* The point of this little dance to the first SHF_GROUP section
3455 then back to the SHT_GROUP section is that this gets us to
3456 the SHT_GROUP in the input object. */
3457 igroup = elf_sec_group (elf_next_in_group (sec));
3458 sec_data = elf_section_data (igroup);
3459 symndx = sec_data->this_hdr.sh_info;
3460 extsymoff = 0;
bcacc0f5
AM
3461 if (!elf_bad_symtab (igroup->owner))
3462 {
3463 Elf_Internal_Shdr *symtab_hdr;
3464
3465 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3466 extsymoff = symtab_hdr->sh_info;
3467 }
3468 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3469 while (h->root.type == bfd_link_hash_indirect
3470 || h->root.type == bfd_link_hash_warning)
3471 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3472
3473 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 3474 }
dbb410c3 3475
1126897b 3476 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 3477 gas = TRUE;
dbb410c3
AM
3478 if (sec->contents == NULL)
3479 {
b34976b6 3480 gas = FALSE;
a50b1753 3481 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
3482
3483 /* Arrange for the section to be written out. */
3484 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
3485 if (sec->contents == NULL)
3486 {
b34976b6 3487 *failedptr = TRUE;
dbb410c3
AM
3488 return;
3489 }
3490 }
3491
eea6121a 3492 loc = sec->contents + sec->size;
dbb410c3 3493
9dce4196
AM
3494 /* Get the pointer to the first section in the group that gas
3495 squirreled away here. objcopy arranges for this to be set to the
3496 start of the input section group. */
3497 first = elt = elf_next_in_group (sec);
dbb410c3
AM
3498
3499 /* First element is a flag word. Rest of section is elf section
3500 indices for all the sections of the group. Write them backwards
3501 just to keep the group in the same order as given in .section
3502 directives, not that it matters. */
3503 while (elt != NULL)
3504 {
9dce4196 3505 asection *s;
9dce4196 3506
9dce4196 3507 s = elt;
415f38a6
AM
3508 if (!gas)
3509 s = s->output_section;
3510 if (s != NULL
3511 && !bfd_is_abs_section (s))
01e1a5bc 3512 {
415f38a6
AM
3513 unsigned int idx = elf_section_data (s)->this_idx;
3514
01e1a5bc 3515 loc -= 4;
01e1a5bc
NC
3516 H_PUT_32 (abfd, idx, loc);
3517 }
945906ff 3518 elt = elf_next_in_group (elt);
9dce4196
AM
3519 if (elt == first)
3520 break;
dbb410c3
AM
3521 }
3522
7bdf4127
AB
3523 loc -= 4;
3524 BFD_ASSERT (loc == sec->contents);
dbb410c3 3525
9dce4196 3526 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
3527}
3528
bce964aa
AM
3529/* Given NAME, the name of a relocation section stripped of its
3530 .rel/.rela prefix, return the section in ABFD to which the
3531 relocations apply. */
bd53a53a
L
3532
3533asection *
bce964aa
AM
3534_bfd_elf_plt_get_reloc_section (bfd *abfd, const char *name)
3535{
3536 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3537 section likely apply to .got.plt or .got section. */
3538 if (get_elf_backend_data (abfd)->want_got_plt
3539 && strcmp (name, ".plt") == 0)
3540 {
3541 asection *sec;
3542
3543 name = ".got.plt";
3544 sec = bfd_get_section_by_name (abfd, name);
3545 if (sec != NULL)
3546 return sec;
3547 name = ".got";
3548 }
3549
3550 return bfd_get_section_by_name (abfd, name);
3551}
3552
3553/* Return the section to which RELOC_SEC applies. */
3554
3555static asection *
3556elf_get_reloc_section (asection *reloc_sec)
bd53a53a
L
3557{
3558 const char *name;
3559 unsigned int type;
3560 bfd *abfd;
bce964aa 3561 const struct elf_backend_data *bed;
bd53a53a
L
3562
3563 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3564 if (type != SHT_REL && type != SHT_RELA)
3565 return NULL;
3566
3567 /* We look up the section the relocs apply to by name. */
3568 name = reloc_sec->name;
bce964aa
AM
3569 if (strncmp (name, ".rel", 4) != 0)
3570 return NULL;
3571 name += 4;
3572 if (type == SHT_RELA && *name++ != 'a')
3573 return NULL;
bd53a53a 3574
bd53a53a 3575 abfd = reloc_sec->owner;
bce964aa
AM
3576 bed = get_elf_backend_data (abfd);
3577 return bed->get_reloc_section (abfd, name);
bd53a53a
L
3578}
3579
252b5132
RH
3580/* Assign all ELF section numbers. The dummy first section is handled here
3581 too. The link/info pointers for the standard section types are filled
3582 in here too, while we're at it. */
3583
b34976b6 3584static bfd_boolean
da9f89d4 3585assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
3586{
3587 struct elf_obj_tdata *t = elf_tdata (abfd);
3588 asection *sec;
3e19fb8f 3589 unsigned int section_number;
252b5132 3590 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 3591 struct bfd_elf_section_data *d;
3516e984 3592 bfd_boolean need_symtab;
252b5132
RH
3593
3594 section_number = 1;
3595
2b0f7ef9
JJ
3596 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3597
da9f89d4 3598 /* SHT_GROUP sections are in relocatable files only. */
7bdf4127 3599 if (link_info == NULL || !link_info->resolve_section_groups)
252b5132 3600 {
ef53be89 3601 size_t reloc_count = 0;
14f2c699 3602
da9f89d4 3603 /* Put SHT_GROUP sections first. */
04dd1667 3604 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 3605 {
5daa8fe7 3606 d = elf_section_data (sec);
da9f89d4
L
3607
3608 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 3609 {
5daa8fe7 3610 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
3611 {
3612 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 3613 bfd_section_list_remove (abfd, sec);
da9f89d4 3614 abfd->section_count--;
da9f89d4 3615 }
08a40648 3616 else
4fbb74a6 3617 d->this_idx = section_number++;
da9f89d4 3618 }
14f2c699
L
3619
3620 /* Count relocations. */
3621 reloc_count += sec->reloc_count;
47cc2cf5 3622 }
14f2c699
L
3623
3624 /* Clear HAS_RELOC if there are no relocations. */
3625 if (reloc_count == 0)
3626 abfd->flags &= ~HAS_RELOC;
47cc2cf5
PB
3627 }
3628
3629 for (sec = abfd->sections; sec; sec = sec->next)
3630 {
3631 d = elf_section_data (sec);
3632
3633 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 3634 d->this_idx = section_number++;
3e19fb8f
L
3635 if (d->this_hdr.sh_name != (unsigned int) -1)
3636 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 3637 if (d->rel.hdr)
2b0f7ef9 3638 {
d4730f92 3639 d->rel.idx = section_number++;
3e19fb8f
L
3640 if (d->rel.hdr->sh_name != (unsigned int) -1)
3641 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 3642 }
d4730f92
BS
3643 else
3644 d->rel.idx = 0;
23bc299b 3645
d4730f92 3646 if (d->rela.hdr)
2b0f7ef9 3647 {
d4730f92 3648 d->rela.idx = section_number++;
3e19fb8f
L
3649 if (d->rela.hdr->sh_name != (unsigned int) -1)
3650 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 3651 }
23bc299b 3652 else
d4730f92 3653 d->rela.idx = 0;
252b5132
RH
3654 }
3655
3516e984
L
3656 need_symtab = (bfd_get_symcount (abfd) > 0
3657 || (link_info == NULL
3658 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3659 == HAS_RELOC)));
3660 if (need_symtab)
252b5132 3661 {
12bd6957 3662 elf_onesymtab (abfd) = section_number++;
2b0f7ef9 3663 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 3664 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 3665 {
6a40cf0c
NC
3666 elf_section_list * entry;
3667
3668 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3669
3670 entry = bfd_zalloc (abfd, sizeof * entry);
3671 entry->ndx = section_number++;
3672 elf_symtab_shndx_list (abfd) = entry;
3673 entry->hdr.sh_name
9ad5cbcf 3674 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3675 ".symtab_shndx", FALSE);
6a40cf0c 3676 if (entry->hdr.sh_name == (unsigned int) -1)
b34976b6 3677 return FALSE;
9ad5cbcf 3678 }
12bd6957 3679 elf_strtab_sec (abfd) = section_number++;
2b0f7ef9 3680 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3681 }
3682
dd905818
NC
3683 elf_shstrtab_sec (abfd) = section_number++;
3684 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3685 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3686
1c52a645
L
3687 if (section_number >= SHN_LORESERVE)
3688 {
695344c0 3689 /* xgettext:c-format */
1c52a645
L
3690 _bfd_error_handler (_("%B: too many sections: %u"),
3691 abfd, section_number);
3692 return FALSE;
3693 }
3694
9ad5cbcf 3695 elf_numsections (abfd) = section_number;
252b5132
RH
3696 elf_elfheader (abfd)->e_shnum = section_number;
3697
3698 /* Set up the list of section header pointers, in agreement with the
3699 indices. */
a50b1753
NC
3700 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
3701 sizeof (Elf_Internal_Shdr *));
252b5132 3702 if (i_shdrp == NULL)
b34976b6 3703 return FALSE;
252b5132 3704
a50b1753
NC
3705 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3706 sizeof (Elf_Internal_Shdr));
252b5132
RH
3707 if (i_shdrp[0] == NULL)
3708 {
3709 bfd_release (abfd, i_shdrp);
b34976b6 3710 return FALSE;
252b5132 3711 }
252b5132
RH
3712
3713 elf_elfsections (abfd) = i_shdrp;
3714
12bd6957 3715 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3516e984 3716 if (need_symtab)
252b5132 3717 {
12bd6957 3718 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
4fbb74a6 3719 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf 3720 {
6a40cf0c
NC
3721 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3722 BFD_ASSERT (entry != NULL);
3723 i_shdrp[entry->ndx] = & entry->hdr;
3724 entry->hdr.sh_link = elf_onesymtab (abfd);
9ad5cbcf 3725 }
12bd6957
AM
3726 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3727 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
252b5132 3728 }
38ce5b11 3729
252b5132
RH
3730 for (sec = abfd->sections; sec; sec = sec->next)
3731 {
252b5132 3732 asection *s;
252b5132 3733
91d6fa6a
NC
3734 d = elf_section_data (sec);
3735
252b5132 3736 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3737 if (d->rel.idx != 0)
3738 i_shdrp[d->rel.idx] = d->rel.hdr;
3739 if (d->rela.idx != 0)
3740 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3741
3742 /* Fill in the sh_link and sh_info fields while we're at it. */
3743
3744 /* sh_link of a reloc section is the section index of the symbol
3745 table. sh_info is the section index of the section to which
3746 the relocation entries apply. */
d4730f92 3747 if (d->rel.idx != 0)
252b5132 3748 {
12bd6957 3749 d->rel.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3750 d->rel.hdr->sh_info = d->this_idx;
9ef5d938 3751 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
252b5132 3752 }
d4730f92 3753 if (d->rela.idx != 0)
23bc299b 3754 {
12bd6957 3755 d->rela.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3756 d->rela.hdr->sh_info = d->this_idx;
9ef5d938 3757 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
23bc299b 3758 }
252b5132 3759
38ce5b11
L
3760 /* We need to set up sh_link for SHF_LINK_ORDER. */
3761 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3762 {
3763 s = elf_linked_to_section (sec);
3764 if (s)
38ce5b11 3765 {
f2876037 3766 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3767 if (link_info != NULL)
38ce5b11 3768 {
f2876037 3769 /* Check discarded linkonce section. */
dbaa2011 3770 if (discarded_section (s))
38ce5b11 3771 {
ccd2ec6a 3772 asection *kept;
4eca0228 3773 _bfd_error_handler
695344c0 3774 /* xgettext:c-format */
63a5468a
AM
3775 (_("%B: sh_link of section `%A' points to"
3776 " discarded section `%A' of `%B'"),
ccd2ec6a
L
3777 abfd, d->this_hdr.bfd_section,
3778 s, s->owner);
3779 /* Point to the kept section if it has the same
3780 size as the discarded one. */
c0f00686 3781 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3782 if (kept == NULL)
185d09ad 3783 {
ccd2ec6a
L
3784 bfd_set_error (bfd_error_bad_value);
3785 return FALSE;
185d09ad 3786 }
ccd2ec6a 3787 s = kept;
38ce5b11 3788 }
e424ecc8 3789
ccd2ec6a
L
3790 s = s->output_section;
3791 BFD_ASSERT (s != NULL);
38ce5b11 3792 }
f2876037
L
3793 else
3794 {
3795 /* Handle objcopy. */
3796 if (s->output_section == NULL)
3797 {
4eca0228 3798 _bfd_error_handler
695344c0 3799 /* xgettext:c-format */
63a5468a
AM
3800 (_("%B: sh_link of section `%A' points to"
3801 " removed section `%A' of `%B'"),
f2876037
L
3802 abfd, d->this_hdr.bfd_section, s, s->owner);
3803 bfd_set_error (bfd_error_bad_value);
3804 return FALSE;
3805 }
3806 s = s->output_section;
3807 }
ccd2ec6a
L
3808 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3809 }
3810 else
3811 {
3812 /* PR 290:
3813 The Intel C compiler generates SHT_IA_64_UNWIND with
3814 SHF_LINK_ORDER. But it doesn't set the sh_link or
3815 sh_info fields. Hence we could get the situation
08a40648 3816 where s is NULL. */
ccd2ec6a
L
3817 const struct elf_backend_data *bed
3818 = get_elf_backend_data (abfd);
3819 if (bed->link_order_error_handler)
3820 bed->link_order_error_handler
695344c0 3821 /* xgettext:c-format */
ccd2ec6a
L
3822 (_("%B: warning: sh_link not set for section `%A'"),
3823 abfd, sec);
38ce5b11
L
3824 }
3825 }
3826
252b5132
RH
3827 switch (d->this_hdr.sh_type)
3828 {
3829 case SHT_REL:
3830 case SHT_RELA:
3831 /* A reloc section which we are treating as a normal BFD
3832 section. sh_link is the section index of the symbol
3833 table. sh_info is the section index of the section to
3834 which the relocation entries apply. We assume that an
3835 allocated reloc section uses the dynamic symbol table.
3836 FIXME: How can we be sure? */
3837 s = bfd_get_section_by_name (abfd, ".dynsym");
3838 if (s != NULL)
3839 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3840
bce964aa 3841 s = elf_get_reloc_section (sec);
252b5132 3842 if (s != NULL)
9ef5d938
L
3843 {
3844 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3845 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3846 }
252b5132
RH
3847 break;
3848
3849 case SHT_STRTAB:
3850 /* We assume that a section named .stab*str is a stabs
3851 string section. We look for a section with the same name
3852 but without the trailing ``str'', and set its sh_link
3853 field to point to this section. */
0112cd26 3854 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3855 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3856 {
3857 size_t len;
3858 char *alc;
3859
3860 len = strlen (sec->name);
a50b1753 3861 alc = (char *) bfd_malloc (len - 2);
252b5132 3862 if (alc == NULL)
b34976b6 3863 return FALSE;
d4c88bbb 3864 memcpy (alc, sec->name, len - 3);
252b5132
RH
3865 alc[len - 3] = '\0';
3866 s = bfd_get_section_by_name (abfd, alc);
3867 free (alc);
3868 if (s != NULL)
3869 {
3870 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3871
3872 /* This is a .stab section. */
0594c12d
AM
3873 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3874 elf_section_data (s)->this_hdr.sh_entsize
3875 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3876 }
3877 }
3878 break;
3879
3880 case SHT_DYNAMIC:
3881 case SHT_DYNSYM:
3882 case SHT_GNU_verneed:
3883 case SHT_GNU_verdef:
3884 /* sh_link is the section header index of the string table
3885 used for the dynamic entries, or the symbol table, or the
3886 version strings. */
3887 s = bfd_get_section_by_name (abfd, ".dynstr");
3888 if (s != NULL)
3889 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3890 break;
3891
7f1204bb
JJ
3892 case SHT_GNU_LIBLIST:
3893 /* sh_link is the section header index of the prelink library
08a40648
AM
3894 list used for the dynamic entries, or the symbol table, or
3895 the version strings. */
7f1204bb
JJ
3896 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3897 ? ".dynstr" : ".gnu.libstr");
3898 if (s != NULL)
3899 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3900 break;
3901
252b5132 3902 case SHT_HASH:
fdc90cb4 3903 case SHT_GNU_HASH:
252b5132
RH
3904 case SHT_GNU_versym:
3905 /* sh_link is the section header index of the symbol table
3906 this hash table or version table is for. */
3907 s = bfd_get_section_by_name (abfd, ".dynsym");
3908 if (s != NULL)
3909 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3910 break;
dbb410c3
AM
3911
3912 case SHT_GROUP:
12bd6957 3913 d->this_hdr.sh_link = elf_onesymtab (abfd);
252b5132
RH
3914 }
3915 }
3916
3e19fb8f
L
3917 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
3918 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
3919 debug section name from .debug_* to .zdebug_* if needed. */
3920
b34976b6 3921 return TRUE;
252b5132
RH
3922}
3923
5372391b 3924static bfd_boolean
217aa764 3925sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3926{
3927 /* If the backend has a special mapping, use it. */
9c5bfbb7 3928 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3929 if (bed->elf_backend_sym_is_global)
3930 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3931
e47bf690 3932 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3933 || bfd_is_und_section (bfd_get_section (sym))
3934 || bfd_is_com_section (bfd_get_section (sym)));
3935}
3936
76359541
TP
3937/* Filter global symbols of ABFD to include in the import library. All
3938 SYMCOUNT symbols of ABFD can be examined from their pointers in
3939 SYMS. Pointers of symbols to keep should be stored contiguously at
3940 the beginning of that array.
3941
3942 Returns the number of symbols to keep. */
3943
3944unsigned int
3945_bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
3946 asymbol **syms, long symcount)
3947{
3948 long src_count, dst_count = 0;
3949
3950 for (src_count = 0; src_count < symcount; src_count++)
3951 {
3952 asymbol *sym = syms[src_count];
3953 char *name = (char *) bfd_asymbol_name (sym);
3954 struct bfd_link_hash_entry *h;
3955
3956 if (!sym_is_global (abfd, sym))
3957 continue;
3958
3959 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, FALSE);
5df1bc57
AM
3960 if (h == NULL)
3961 continue;
76359541
TP
3962 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
3963 continue;
76359541
TP
3964 if (h->linker_def || h->ldscript_def)
3965 continue;
3966
3967 syms[dst_count++] = sym;
3968 }
3969
3970 syms[dst_count] = NULL;
3971
3972 return dst_count;
3973}
3974
5372391b 3975/* Don't output section symbols for sections that are not going to be
c6d8cab4 3976 output, that are duplicates or there is no BFD section. */
5372391b
AM
3977
3978static bfd_boolean
3979ignore_section_sym (bfd *abfd, asymbol *sym)
3980{
c6d8cab4
L
3981 elf_symbol_type *type_ptr;
3982
3983 if ((sym->flags & BSF_SECTION_SYM) == 0)
3984 return FALSE;
3985
3986 type_ptr = elf_symbol_from (abfd, sym);
3987 return ((type_ptr != NULL
3988 && type_ptr->internal_elf_sym.st_shndx != 0
3989 && bfd_is_abs_section (sym->section))
3990 || !(sym->section->owner == abfd
0f0a5e58 3991 || (sym->section->output_section->owner == abfd
2633a79c
AM
3992 && sym->section->output_offset == 0)
3993 || bfd_is_abs_section (sym->section)));
5372391b
AM
3994}
3995
2633a79c
AM
3996/* Map symbol from it's internal number to the external number, moving
3997 all local symbols to be at the head of the list. */
3998
b34976b6 3999static bfd_boolean
12bd6957 4000elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
252b5132 4001{
dc810e39 4002 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
4003 asymbol **syms = bfd_get_outsymbols (abfd);
4004 asymbol **sect_syms;
dc810e39
AM
4005 unsigned int num_locals = 0;
4006 unsigned int num_globals = 0;
4007 unsigned int num_locals2 = 0;
4008 unsigned int num_globals2 = 0;
7292b3ac 4009 unsigned int max_index = 0;
dc810e39 4010 unsigned int idx;
252b5132
RH
4011 asection *asect;
4012 asymbol **new_syms;
252b5132
RH
4013
4014#ifdef DEBUG
4015 fprintf (stderr, "elf_map_symbols\n");
4016 fflush (stderr);
4017#endif
4018
252b5132
RH
4019 for (asect = abfd->sections; asect; asect = asect->next)
4020 {
4021 if (max_index < asect->index)
4022 max_index = asect->index;
4023 }
4024
4025 max_index++;
a50b1753 4026 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 4027 if (sect_syms == NULL)
b34976b6 4028 return FALSE;
252b5132 4029 elf_section_syms (abfd) = sect_syms;
4e89ac30 4030 elf_num_section_syms (abfd) = max_index;
252b5132 4031
079e9a2f
AM
4032 /* Init sect_syms entries for any section symbols we have already
4033 decided to output. */
252b5132
RH
4034 for (idx = 0; idx < symcount; idx++)
4035 {
dc810e39 4036 asymbol *sym = syms[idx];
c044fabd 4037
252b5132 4038 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 4039 && sym->value == 0
2633a79c
AM
4040 && !ignore_section_sym (abfd, sym)
4041 && !bfd_is_abs_section (sym->section))
252b5132 4042 {
5372391b 4043 asection *sec = sym->section;
252b5132 4044
5372391b
AM
4045 if (sec->owner != abfd)
4046 sec = sec->output_section;
252b5132 4047
5372391b 4048 sect_syms[sec->index] = syms[idx];
252b5132
RH
4049 }
4050 }
4051
252b5132
RH
4052 /* Classify all of the symbols. */
4053 for (idx = 0; idx < symcount; idx++)
4054 {
2633a79c 4055 if (sym_is_global (abfd, syms[idx]))
252b5132 4056 num_globals++;
2633a79c
AM
4057 else if (!ignore_section_sym (abfd, syms[idx]))
4058 num_locals++;
252b5132 4059 }
079e9a2f 4060
5372391b 4061 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
4062 sections will already have a section symbol in outsymbols, but
4063 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4064 at least in that case. */
252b5132
RH
4065 for (asect = abfd->sections; asect; asect = asect->next)
4066 {
079e9a2f 4067 if (sect_syms[asect->index] == NULL)
252b5132 4068 {
079e9a2f 4069 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
4070 num_locals++;
4071 else
4072 num_globals++;
252b5132
RH
4073 }
4074 }
4075
4076 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
4077 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
4078 sizeof (asymbol *));
dc810e39 4079
252b5132 4080 if (new_syms == NULL)
b34976b6 4081 return FALSE;
252b5132
RH
4082
4083 for (idx = 0; idx < symcount; idx++)
4084 {
4085 asymbol *sym = syms[idx];
dc810e39 4086 unsigned int i;
252b5132 4087
2633a79c
AM
4088 if (sym_is_global (abfd, sym))
4089 i = num_locals + num_globals2++;
4090 else if (!ignore_section_sym (abfd, sym))
252b5132
RH
4091 i = num_locals2++;
4092 else
2633a79c 4093 continue;
252b5132
RH
4094 new_syms[i] = sym;
4095 sym->udata.i = i + 1;
4096 }
4097 for (asect = abfd->sections; asect; asect = asect->next)
4098 {
079e9a2f 4099 if (sect_syms[asect->index] == NULL)
252b5132 4100 {
079e9a2f 4101 asymbol *sym = asect->symbol;
dc810e39 4102 unsigned int i;
252b5132 4103
079e9a2f 4104 sect_syms[asect->index] = sym;
252b5132
RH
4105 if (!sym_is_global (abfd, sym))
4106 i = num_locals2++;
4107 else
4108 i = num_locals + num_globals2++;
4109 new_syms[i] = sym;
4110 sym->udata.i = i + 1;
4111 }
4112 }
4113
4114 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4115
12bd6957 4116 *pnum_locals = num_locals;
b34976b6 4117 return TRUE;
252b5132
RH
4118}
4119
4120/* Align to the maximum file alignment that could be required for any
4121 ELF data structure. */
4122
268b6b39 4123static inline file_ptr
217aa764 4124align_file_position (file_ptr off, int align)
252b5132
RH
4125{
4126 return (off + align - 1) & ~(align - 1);
4127}
4128
4129/* Assign a file position to a section, optionally aligning to the
4130 required section alignment. */
4131
217aa764
AM
4132file_ptr
4133_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4134 file_ptr offset,
4135 bfd_boolean align)
252b5132 4136{
72de5009
AM
4137 if (align && i_shdrp->sh_addralign > 1)
4138 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
4139 i_shdrp->sh_offset = offset;
4140 if (i_shdrp->bfd_section != NULL)
4141 i_shdrp->bfd_section->filepos = offset;
4142 if (i_shdrp->sh_type != SHT_NOBITS)
4143 offset += i_shdrp->sh_size;
4144 return offset;
4145}
4146
4147/* Compute the file positions we are going to put the sections at, and
4148 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4149 is not NULL, this is being called by the ELF backend linker. */
4150
b34976b6 4151bfd_boolean
217aa764
AM
4152_bfd_elf_compute_section_file_positions (bfd *abfd,
4153 struct bfd_link_info *link_info)
252b5132 4154{
9c5bfbb7 4155 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 4156 struct fake_section_arg fsargs;
b34976b6 4157 bfd_boolean failed;
ef10c3ac 4158 struct elf_strtab_hash *strtab = NULL;
252b5132 4159 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 4160 bfd_boolean need_symtab;
252b5132
RH
4161
4162 if (abfd->output_has_begun)
b34976b6 4163 return TRUE;
252b5132
RH
4164
4165 /* Do any elf backend specific processing first. */
4166 if (bed->elf_backend_begin_write_processing)
4167 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4168
4169 if (! prep_headers (abfd))
b34976b6 4170 return FALSE;
252b5132 4171
e6c51ed4 4172 /* Post process the headers if necessary. */
78245035 4173 (*bed->elf_backend_post_process_headers) (abfd, link_info);
e6c51ed4 4174
d4730f92
BS
4175 fsargs.failed = FALSE;
4176 fsargs.link_info = link_info;
4177 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4178 if (fsargs.failed)
b34976b6 4179 return FALSE;
252b5132 4180
da9f89d4 4181 if (!assign_section_numbers (abfd, link_info))
b34976b6 4182 return FALSE;
252b5132
RH
4183
4184 /* The backend linker builds symbol table information itself. */
3516e984
L
4185 need_symtab = (link_info == NULL
4186 && (bfd_get_symcount (abfd) > 0
4187 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4188 == HAS_RELOC)));
4189 if (need_symtab)
252b5132
RH
4190 {
4191 /* Non-zero if doing a relocatable link. */
4192 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4193
4194 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 4195 return FALSE;
252b5132
RH
4196 }
4197
d4730f92 4198 failed = FALSE;
1126897b 4199 if (link_info == NULL)
dbb410c3 4200 {
1126897b 4201 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 4202 if (failed)
b34976b6 4203 return FALSE;
dbb410c3
AM
4204 }
4205
252b5132
RH
4206 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
4207 /* sh_name was set in prep_headers. */
4208 shstrtab_hdr->sh_type = SHT_STRTAB;
84865015 4209 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
252b5132 4210 shstrtab_hdr->sh_addr = 0;
946748d5 4211 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4212 shstrtab_hdr->sh_entsize = 0;
4213 shstrtab_hdr->sh_link = 0;
4214 shstrtab_hdr->sh_info = 0;
3e19fb8f 4215 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4216 shstrtab_hdr->sh_addralign = 1;
4217
c84fca4d 4218 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 4219 return FALSE;
252b5132 4220
3516e984 4221 if (need_symtab)
252b5132
RH
4222 {
4223 file_ptr off;
4224 Elf_Internal_Shdr *hdr;
4225
12bd6957 4226 off = elf_next_file_pos (abfd);
252b5132 4227
6a40cf0c 4228 hdr = & elf_symtab_hdr (abfd);
b34976b6 4229 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4230
6a40cf0c
NC
4231 if (elf_symtab_shndx_list (abfd) != NULL)
4232 {
4233 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4234 if (hdr->sh_size != 0)
4235 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4236 /* FIXME: What about other symtab_shndx sections in the list ? */
4237 }
9ad5cbcf 4238
252b5132 4239 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 4240 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4241
12bd6957 4242 elf_next_file_pos (abfd) = off;
252b5132
RH
4243
4244 /* Now that we know where the .strtab section goes, write it
08a40648 4245 out. */
252b5132 4246 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
ef10c3ac 4247 || ! _bfd_elf_strtab_emit (abfd, strtab))
b34976b6 4248 return FALSE;
ef10c3ac 4249 _bfd_elf_strtab_free (strtab);
252b5132
RH
4250 }
4251
b34976b6 4252 abfd->output_has_begun = TRUE;
252b5132 4253
b34976b6 4254 return TRUE;
252b5132
RH
4255}
4256
8ded5a0f
AM
4257/* Make an initial estimate of the size of the program header. If we
4258 get the number wrong here, we'll redo section placement. */
4259
4260static bfd_size_type
4261get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4262{
4263 size_t segs;
4264 asection *s;
2b05f1b7 4265 const struct elf_backend_data *bed;
8ded5a0f
AM
4266
4267 /* Assume we will need exactly two PT_LOAD segments: one for text
4268 and one for data. */
4269 segs = 2;
4270
4271 s = bfd_get_section_by_name (abfd, ".interp");
4272 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4273 {
4274 /* If we have a loadable interpreter section, we need a
4275 PT_INTERP segment. In this case, assume we also need a
4276 PT_PHDR segment, although that may not be true for all
4277 targets. */
e9a38e0f 4278 segs += 2;
8ded5a0f
AM
4279 }
4280
4281 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4282 {
4283 /* We need a PT_DYNAMIC segment. */
4284 ++segs;
f210dcff 4285 }
08a40648 4286
ceae84aa 4287 if (info != NULL && info->relro)
f210dcff
L
4288 {
4289 /* We need a PT_GNU_RELRO segment. */
4290 ++segs;
8ded5a0f
AM
4291 }
4292
12bd6957 4293 if (elf_eh_frame_hdr (abfd))
8ded5a0f
AM
4294 {
4295 /* We need a PT_GNU_EH_FRAME segment. */
4296 ++segs;
4297 }
4298
12bd6957 4299 if (elf_stack_flags (abfd))
8ded5a0f 4300 {
2b05f1b7
L
4301 /* We need a PT_GNU_STACK segment. */
4302 ++segs;
4303 }
94b11780 4304
2b05f1b7
L
4305 for (s = abfd->sections; s != NULL; s = s->next)
4306 {
8ded5a0f 4307 if ((s->flags & SEC_LOAD) != 0
0112cd26 4308 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
4309 {
4310 /* We need a PT_NOTE segment. */
4311 ++segs;
1c5265b5
JJ
4312 /* Try to create just one PT_NOTE segment
4313 for all adjacent loadable .note* sections.
4314 gABI requires that within a PT_NOTE segment
4315 (and also inside of each SHT_NOTE section)
4316 each note is padded to a multiple of 4 size,
4317 so we check whether the sections are correctly
4318 aligned. */
4319 if (s->alignment_power == 2)
4320 while (s->next != NULL
4321 && s->next->alignment_power == 2
4322 && (s->next->flags & SEC_LOAD) != 0
4323 && CONST_STRNEQ (s->next->name, ".note"))
4324 s = s->next;
8ded5a0f
AM
4325 }
4326 }
4327
4328 for (s = abfd->sections; s != NULL; s = s->next)
4329 {
4330 if (s->flags & SEC_THREAD_LOCAL)
4331 {
4332 /* We need a PT_TLS segment. */
4333 ++segs;
4334 break;
4335 }
4336 }
4337
2b05f1b7 4338 bed = get_elf_backend_data (abfd);
a91e1603
L
4339
4340 if ((abfd->flags & D_PAGED) != 0)
4341 {
4342 /* Add a PT_GNU_MBIND segment for each mbind section. */
4343 unsigned int page_align_power = bfd_log2 (bed->commonpagesize);
4344 for (s = abfd->sections; s != NULL; s = s->next)
4345 if (elf_section_flags (s) & SHF_GNU_MBIND)
4346 {
4347 if (elf_section_data (s)->this_hdr.sh_info
4348 > PT_GNU_MBIND_NUM)
4349 {
4350 _bfd_error_handler
4351 /* xgettext:c-format */
4352 (_("%B: GNU_MBIN section `%A' has invalid sh_info field: %d"),
4353 abfd, s, elf_section_data (s)->this_hdr.sh_info);
4354 continue;
4355 }
4356 /* Align mbind section to page size. */
4357 if (s->alignment_power < page_align_power)
4358 s->alignment_power = page_align_power;
4359 segs ++;
4360 }
4361 }
4362
4363 /* Let the backend count up any program headers it might need. */
4364 if (bed->elf_backend_additional_program_headers)
8ded5a0f
AM
4365 {
4366 int a;
4367
4368 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4369 if (a == -1)
4370 abort ();
4371 segs += a;
4372 }
4373
4374 return segs * bed->s->sizeof_phdr;
4375}
4376
2ea37f1c
NC
4377/* Find the segment that contains the output_section of section. */
4378
4379Elf_Internal_Phdr *
4380_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4381{
4382 struct elf_segment_map *m;
4383 Elf_Internal_Phdr *p;
4384
12bd6957 4385 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
2ea37f1c
NC
4386 m != NULL;
4387 m = m->next, p++)
4388 {
4389 int i;
4390
4391 for (i = m->count - 1; i >= 0; i--)
4392 if (m->sections[i] == section)
4393 return p;
4394 }
4395
4396 return NULL;
4397}
4398
252b5132
RH
4399/* Create a mapping from a set of sections to a program segment. */
4400
217aa764
AM
4401static struct elf_segment_map *
4402make_mapping (bfd *abfd,
4403 asection **sections,
4404 unsigned int from,
4405 unsigned int to,
4406 bfd_boolean phdr)
252b5132
RH
4407{
4408 struct elf_segment_map *m;
4409 unsigned int i;
4410 asection **hdrpp;
dc810e39 4411 bfd_size_type amt;
252b5132 4412
dc810e39
AM
4413 amt = sizeof (struct elf_segment_map);
4414 amt += (to - from - 1) * sizeof (asection *);
a50b1753 4415 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4416 if (m == NULL)
4417 return NULL;
4418 m->next = NULL;
4419 m->p_type = PT_LOAD;
4420 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4421 m->sections[i - from] = *hdrpp;
4422 m->count = to - from;
4423
4424 if (from == 0 && phdr)
4425 {
4426 /* Include the headers in the first PT_LOAD segment. */
4427 m->includes_filehdr = 1;
4428 m->includes_phdrs = 1;
4429 }
4430
4431 return m;
4432}
4433
229fcec5
MM
4434/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4435 on failure. */
4436
4437struct elf_segment_map *
4438_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4439{
4440 struct elf_segment_map *m;
4441
a50b1753
NC
4442 m = (struct elf_segment_map *) bfd_zalloc (abfd,
4443 sizeof (struct elf_segment_map));
229fcec5
MM
4444 if (m == NULL)
4445 return NULL;
4446 m->next = NULL;
4447 m->p_type = PT_DYNAMIC;
4448 m->count = 1;
4449 m->sections[0] = dynsec;
08a40648 4450
229fcec5
MM
4451 return m;
4452}
4453
8ded5a0f 4454/* Possibly add or remove segments from the segment map. */
252b5132 4455
b34976b6 4456static bfd_boolean
3dea8fca
AM
4457elf_modify_segment_map (bfd *abfd,
4458 struct bfd_link_info *info,
4459 bfd_boolean remove_empty_load)
252b5132 4460{
252e386e 4461 struct elf_segment_map **m;
8ded5a0f 4462 const struct elf_backend_data *bed;
252b5132 4463
8ded5a0f
AM
4464 /* The placement algorithm assumes that non allocated sections are
4465 not in PT_LOAD segments. We ensure this here by removing such
4466 sections from the segment map. We also remove excluded
252e386e
AM
4467 sections. Finally, any PT_LOAD segment without sections is
4468 removed. */
12bd6957 4469 m = &elf_seg_map (abfd);
252e386e 4470 while (*m)
8ded5a0f
AM
4471 {
4472 unsigned int i, new_count;
252b5132 4473
252e386e 4474 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 4475 {
252e386e
AM
4476 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4477 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4478 || (*m)->p_type != PT_LOAD))
8ded5a0f 4479 {
252e386e
AM
4480 (*m)->sections[new_count] = (*m)->sections[i];
4481 new_count++;
8ded5a0f
AM
4482 }
4483 }
252e386e 4484 (*m)->count = new_count;
252b5132 4485
1a9ccd70
NC
4486 if (remove_empty_load
4487 && (*m)->p_type == PT_LOAD
4488 && (*m)->count == 0
4489 && !(*m)->includes_phdrs)
252e386e
AM
4490 *m = (*m)->next;
4491 else
4492 m = &(*m)->next;
8ded5a0f 4493 }
252b5132 4494
8ded5a0f
AM
4495 bed = get_elf_backend_data (abfd);
4496 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 4497 {
252e386e 4498 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 4499 return FALSE;
252b5132 4500 }
252b5132 4501
8ded5a0f
AM
4502 return TRUE;
4503}
252b5132 4504
8ded5a0f 4505/* Set up a mapping from BFD sections to program segments. */
252b5132 4506
8ded5a0f
AM
4507bfd_boolean
4508_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4509{
4510 unsigned int count;
4511 struct elf_segment_map *m;
4512 asection **sections = NULL;
4513 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 4514 bfd_boolean no_user_phdrs;
252b5132 4515
12bd6957 4516 no_user_phdrs = elf_seg_map (abfd) == NULL;
d324f6d6
RM
4517
4518 if (info != NULL)
4519 info->user_phdrs = !no_user_phdrs;
4520
3dea8fca 4521 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 4522 {
8ded5a0f
AM
4523 asection *s;
4524 unsigned int i;
4525 struct elf_segment_map *mfirst;
4526 struct elf_segment_map **pm;
4527 asection *last_hdr;
4528 bfd_vma last_size;
4529 unsigned int phdr_index;
4530 bfd_vma maxpagesize;
4531 asection **hdrpp;
4532 bfd_boolean phdr_in_segment = TRUE;
4533 bfd_boolean writable;
4534 int tls_count = 0;
4535 asection *first_tls = NULL;
a91e1603 4536 asection *first_mbind = NULL;
8ded5a0f
AM
4537 asection *dynsec, *eh_frame_hdr;
4538 bfd_size_type amt;
8d06853e 4539 bfd_vma addr_mask, wrap_to = 0;
1a9ccd70 4540 bfd_boolean linker_created_pt_phdr_segment = FALSE;
252b5132 4541
8ded5a0f 4542 /* Select the allocated sections, and sort them. */
252b5132 4543
a50b1753
NC
4544 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
4545 sizeof (asection *));
8ded5a0f 4546 if (sections == NULL)
252b5132 4547 goto error_return;
252b5132 4548
8d06853e
AM
4549 /* Calculate top address, avoiding undefined behaviour of shift
4550 left operator when shift count is equal to size of type
4551 being shifted. */
4552 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4553 addr_mask = (addr_mask << 1) + 1;
4554
8ded5a0f
AM
4555 i = 0;
4556 for (s = abfd->sections; s != NULL; s = s->next)
4557 {
4558 if ((s->flags & SEC_ALLOC) != 0)
4559 {
4560 sections[i] = s;
4561 ++i;
8d06853e
AM
4562 /* A wrapping section potentially clashes with header. */
4563 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
4564 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
4565 }
4566 }
4567 BFD_ASSERT (i <= bfd_count_sections (abfd));
4568 count = i;
252b5132 4569
8ded5a0f 4570 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 4571
8ded5a0f 4572 /* Build the mapping. */
252b5132 4573
8ded5a0f
AM
4574 mfirst = NULL;
4575 pm = &mfirst;
252b5132 4576
8ded5a0f
AM
4577 /* If we have a .interp section, then create a PT_PHDR segment for
4578 the program headers and a PT_INTERP segment for the .interp
4579 section. */
4580 s = bfd_get_section_by_name (abfd, ".interp");
4581 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4582 {
4583 amt = sizeof (struct elf_segment_map);
a50b1753 4584 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4585 if (m == NULL)
4586 goto error_return;
4587 m->next = NULL;
4588 m->p_type = PT_PHDR;
4589 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
4590 m->p_flags = PF_R | PF_X;
4591 m->p_flags_valid = 1;
4592 m->includes_phdrs = 1;
1a9ccd70 4593 linker_created_pt_phdr_segment = TRUE;
8ded5a0f
AM
4594 *pm = m;
4595 pm = &m->next;
252b5132 4596
8ded5a0f 4597 amt = sizeof (struct elf_segment_map);
a50b1753 4598 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4599 if (m == NULL)
4600 goto error_return;
4601 m->next = NULL;
4602 m->p_type = PT_INTERP;
4603 m->count = 1;
4604 m->sections[0] = s;
4605
4606 *pm = m;
4607 pm = &m->next;
252b5132 4608 }
8ded5a0f
AM
4609
4610 /* Look through the sections. We put sections in the same program
4611 segment when the start of the second section can be placed within
4612 a few bytes of the end of the first section. */
4613 last_hdr = NULL;
4614 last_size = 0;
4615 phdr_index = 0;
4616 maxpagesize = bed->maxpagesize;
063bb025
NC
4617 /* PR 17512: file: c8455299.
4618 Avoid divide-by-zero errors later on.
4619 FIXME: Should we abort if the maxpagesize is zero ? */
4620 if (maxpagesize == 0)
4621 maxpagesize = 1;
8ded5a0f
AM
4622 writable = FALSE;
4623 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4624 if (dynsec != NULL
4625 && (dynsec->flags & SEC_LOAD) == 0)
4626 dynsec = NULL;
4627
4628 /* Deal with -Ttext or something similar such that the first section
4629 is not adjacent to the program headers. This is an
4630 approximation, since at this point we don't know exactly how many
4631 program headers we will need. */
4632 if (count > 0)
252b5132 4633 {
12bd6957 4634 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 4635
62d7a5f6 4636 if (phdr_size == (bfd_size_type) -1)
8ded5a0f 4637 phdr_size = get_program_header_size (abfd, info);
d2bcb0d1 4638 phdr_size += bed->s->sizeof_ehdr;
8ded5a0f 4639 if ((abfd->flags & D_PAGED) == 0
8d06853e
AM
4640 || (sections[0]->lma & addr_mask) < phdr_size
4641 || ((sections[0]->lma & addr_mask) % maxpagesize
4642 < phdr_size % maxpagesize)
4643 || (sections[0]->lma & addr_mask & -maxpagesize) < wrap_to)
1a9ccd70
NC
4644 {
4645 /* PR 20815: The ELF standard says that a PT_PHDR segment, if
4646 present, must be included as part of the memory image of the
4647 program. Ie it must be part of a PT_LOAD segment as well.
4648 If we have had to create our own PT_PHDR segment, but it is
4649 not going to be covered by the first PT_LOAD segment, then
4650 force the inclusion if we can... */
4651 if ((abfd->flags & D_PAGED) != 0
4652 && linker_created_pt_phdr_segment)
4653 phdr_in_segment = TRUE;
4654 else
4655 phdr_in_segment = FALSE;
4656 }
252b5132
RH
4657 }
4658
8ded5a0f 4659 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 4660 {
8ded5a0f
AM
4661 asection *hdr;
4662 bfd_boolean new_segment;
4663
4664 hdr = *hdrpp;
4665
4666 /* See if this section and the last one will fit in the same
4667 segment. */
4668
4669 if (last_hdr == NULL)
4670 {
4671 /* If we don't have a segment yet, then we don't need a new
4672 one (we build the last one after this loop). */
4673 new_segment = FALSE;
4674 }
4675 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4676 {
4677 /* If this section has a different relation between the
4678 virtual address and the load address, then we need a new
4679 segment. */
4680 new_segment = TRUE;
4681 }
b5599592
AM
4682 else if (hdr->lma < last_hdr->lma + last_size
4683 || last_hdr->lma + last_size < last_hdr->lma)
4684 {
4685 /* If this section has a load address that makes it overlap
4686 the previous section, then we need a new segment. */
4687 new_segment = TRUE;
4688 }
39948a60
NC
4689 /* In the next test we have to be careful when last_hdr->lma is close
4690 to the end of the address space. If the aligned address wraps
4691 around to the start of the address space, then there are no more
4692 pages left in memory and it is OK to assume that the current
4693 section can be included in the current segment. */
4694 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4695 > last_hdr->lma)
4696 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 4697 <= hdr->lma))
8ded5a0f
AM
4698 {
4699 /* If putting this section in this segment would force us to
4700 skip a page in the segment, then we need a new segment. */
4701 new_segment = TRUE;
4702 }
4703 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
e5654c0f
AM
4704 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0
4705 && ((abfd->flags & D_PAGED) == 0
4706 || (((last_hdr->lma + last_size - 1) & -maxpagesize)
4707 != (hdr->lma & -maxpagesize))))
8ded5a0f 4708 {
e5654c0f
AM
4709 /* We don't want to put a loaded section after a
4710 nonloaded (ie. bss style) section in the same segment
4711 as that will force the non-loaded section to be loaded.
4712 Consider .tbss sections as loaded for this purpose.
4713 However, like the writable/non-writable case below,
4714 if they are on the same page then they must be put
4715 in the same segment. */
8ded5a0f
AM
4716 new_segment = TRUE;
4717 }
4718 else if ((abfd->flags & D_PAGED) == 0)
4719 {
4720 /* If the file is not demand paged, which means that we
4721 don't require the sections to be correctly aligned in the
4722 file, then there is no other reason for a new segment. */
4723 new_segment = FALSE;
4724 }
4725 else if (! writable
4726 && (hdr->flags & SEC_READONLY) == 0
8d06853e
AM
4727 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4728 != (hdr->lma & -maxpagesize)))
8ded5a0f
AM
4729 {
4730 /* We don't want to put a writable section in a read only
4731 segment, unless they are on the same page in memory
4732 anyhow. We already know that the last section does not
4733 bring us past the current section on the page, so the
4734 only case in which the new section is not on the same
4735 page as the previous section is when the previous section
4736 ends precisely on a page boundary. */
4737 new_segment = TRUE;
4738 }
4739 else
4740 {
4741 /* Otherwise, we can use the same segment. */
4742 new_segment = FALSE;
4743 }
4744
2889e75b 4745 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
4746 if (last_hdr != NULL
4747 && info != NULL
4748 && info->callbacks->override_segment_assignment != NULL)
4749 new_segment
4750 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4751 last_hdr,
4752 new_segment);
2889e75b 4753
8ded5a0f
AM
4754 if (! new_segment)
4755 {
4756 if ((hdr->flags & SEC_READONLY) == 0)
4757 writable = TRUE;
4758 last_hdr = hdr;
4759 /* .tbss sections effectively have zero size. */
4760 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4761 != SEC_THREAD_LOCAL)
4762 last_size = hdr->size;
4763 else
4764 last_size = 0;
4765 continue;
4766 }
4767
4768 /* We need a new program segment. We must create a new program
4769 header holding all the sections from phdr_index until hdr. */
4770
4771 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4772 if (m == NULL)
4773 goto error_return;
4774
4775 *pm = m;
4776 pm = &m->next;
4777
252b5132 4778 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 4779 writable = TRUE;
8ded5a0f
AM
4780 else
4781 writable = FALSE;
4782
baaff79e
JJ
4783 last_hdr = hdr;
4784 /* .tbss sections effectively have zero size. */
e5caec89 4785 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 4786 last_size = hdr->size;
baaff79e
JJ
4787 else
4788 last_size = 0;
8ded5a0f
AM
4789 phdr_index = i;
4790 phdr_in_segment = FALSE;
252b5132
RH
4791 }
4792
86b2281f
AM
4793 /* Create a final PT_LOAD program segment, but not if it's just
4794 for .tbss. */
4795 if (last_hdr != NULL
4796 && (i - phdr_index != 1
4797 || ((last_hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4798 != SEC_THREAD_LOCAL)))
8ded5a0f
AM
4799 {
4800 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4801 if (m == NULL)
4802 goto error_return;
252b5132 4803
8ded5a0f
AM
4804 *pm = m;
4805 pm = &m->next;
4806 }
252b5132 4807
8ded5a0f
AM
4808 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4809 if (dynsec != NULL)
4810 {
4811 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4812 if (m == NULL)
4813 goto error_return;
4814 *pm = m;
4815 pm = &m->next;
4816 }
252b5132 4817
1c5265b5
JJ
4818 /* For each batch of consecutive loadable .note sections,
4819 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4820 because if we link together nonloadable .note sections and
4821 loadable .note sections, we will generate two .note sections
4822 in the output file. FIXME: Using names for section types is
4823 bogus anyhow. */
8ded5a0f
AM
4824 for (s = abfd->sections; s != NULL; s = s->next)
4825 {
4826 if ((s->flags & SEC_LOAD) != 0
0112cd26 4827 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 4828 {
1c5265b5 4829 asection *s2;
91d6fa6a
NC
4830
4831 count = 1;
8ded5a0f 4832 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
4833 if (s->alignment_power == 2)
4834 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
4835 {
4836 if (s2->next->alignment_power == 2
4837 && (s2->next->flags & SEC_LOAD) != 0
4838 && CONST_STRNEQ (s2->next->name, ".note")
8d06853e
AM
4839 && align_power (s2->lma + s2->size, 2)
4840 == s2->next->lma)
55b581a6
JJ
4841 count++;
4842 else
4843 break;
4844 }
1c5265b5 4845 amt += (count - 1) * sizeof (asection *);
a50b1753 4846 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4847 if (m == NULL)
4848 goto error_return;
4849 m->next = NULL;
4850 m->p_type = PT_NOTE;
1c5265b5
JJ
4851 m->count = count;
4852 while (count > 1)
4853 {
4854 m->sections[m->count - count--] = s;
4855 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
4856 s = s->next;
4857 }
4858 m->sections[m->count - 1] = s;
4859 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
4860 *pm = m;
4861 pm = &m->next;
4862 }
4863 if (s->flags & SEC_THREAD_LOCAL)
4864 {
4865 if (! tls_count)
4866 first_tls = s;
4867 tls_count++;
4868 }
a91e1603
L
4869 if (first_mbind == NULL
4870 && (elf_section_flags (s) & SHF_GNU_MBIND) != 0)
4871 first_mbind = s;
8ded5a0f 4872 }
252b5132 4873
8ded5a0f
AM
4874 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
4875 if (tls_count > 0)
4876 {
8ded5a0f
AM
4877 amt = sizeof (struct elf_segment_map);
4878 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 4879 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4880 if (m == NULL)
4881 goto error_return;
4882 m->next = NULL;
4883 m->p_type = PT_TLS;
4884 m->count = tls_count;
4885 /* Mandated PF_R. */
4886 m->p_flags = PF_R;
4887 m->p_flags_valid = 1;
d923cae0 4888 s = first_tls;
91d6fa6a 4889 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f 4890 {
d923cae0
L
4891 if ((s->flags & SEC_THREAD_LOCAL) == 0)
4892 {
4893 _bfd_error_handler
4894 (_("%B: TLS sections are not adjacent:"), abfd);
4895 s = first_tls;
4896 i = 0;
4897 while (i < (unsigned int) tls_count)
4898 {
4899 if ((s->flags & SEC_THREAD_LOCAL) != 0)
4900 {
4901 _bfd_error_handler (_(" TLS: %A"), s);
4902 i++;
4903 }
4904 else
4905 _bfd_error_handler (_(" non-TLS: %A"), s);
4906 s = s->next;
4907 }
4908 bfd_set_error (bfd_error_bad_value);
4909 goto error_return;
4910 }
4911 m->sections[i] = s;
4912 s = s->next;
8ded5a0f 4913 }
252b5132 4914
8ded5a0f
AM
4915 *pm = m;
4916 pm = &m->next;
4917 }
252b5132 4918
a91e1603
L
4919 if (first_mbind && (abfd->flags & D_PAGED) != 0)
4920 for (s = first_mbind; s != NULL; s = s->next)
4921 if ((elf_section_flags (s) & SHF_GNU_MBIND) != 0
4922 && (elf_section_data (s)->this_hdr.sh_info
4923 <= PT_GNU_MBIND_NUM))
4924 {
4925 /* Mandated PF_R. */
4926 unsigned long p_flags = PF_R;
4927 if ((s->flags & SEC_READONLY) == 0)
4928 p_flags |= PF_W;
4929 if ((s->flags & SEC_CODE) != 0)
4930 p_flags |= PF_X;
4931
4932 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
4933 m = bfd_zalloc (abfd, amt);
4934 if (m == NULL)
4935 goto error_return;
4936 m->next = NULL;
4937 m->p_type = (PT_GNU_MBIND_LO
4938 + elf_section_data (s)->this_hdr.sh_info);
4939 m->count = 1;
4940 m->p_flags_valid = 1;
4941 m->sections[0] = s;
4942 m->p_flags = p_flags;
4943
4944 *pm = m;
4945 pm = &m->next;
4946 }
4947
8ded5a0f
AM
4948 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4949 segment. */
12bd6957 4950 eh_frame_hdr = elf_eh_frame_hdr (abfd);
8ded5a0f
AM
4951 if (eh_frame_hdr != NULL
4952 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 4953 {
dc810e39 4954 amt = sizeof (struct elf_segment_map);
a50b1753 4955 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4956 if (m == NULL)
4957 goto error_return;
4958 m->next = NULL;
8ded5a0f 4959 m->p_type = PT_GNU_EH_FRAME;
252b5132 4960 m->count = 1;
8ded5a0f 4961 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
4962
4963 *pm = m;
4964 pm = &m->next;
4965 }
13ae64f3 4966
12bd6957 4967 if (elf_stack_flags (abfd))
13ae64f3 4968 {
8ded5a0f 4969 amt = sizeof (struct elf_segment_map);
a50b1753 4970 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4971 if (m == NULL)
4972 goto error_return;
4973 m->next = NULL;
2b05f1b7 4974 m->p_type = PT_GNU_STACK;
12bd6957 4975 m->p_flags = elf_stack_flags (abfd);
04c3a755 4976 m->p_align = bed->stack_align;
8ded5a0f 4977 m->p_flags_valid = 1;
04c3a755
NS
4978 m->p_align_valid = m->p_align != 0;
4979 if (info->stacksize > 0)
4980 {
4981 m->p_size = info->stacksize;
4982 m->p_size_valid = 1;
4983 }
252b5132 4984
8ded5a0f
AM
4985 *pm = m;
4986 pm = &m->next;
4987 }
65765700 4988
ceae84aa 4989 if (info != NULL && info->relro)
8ded5a0f 4990 {
f210dcff
L
4991 for (m = mfirst; m != NULL; m = m->next)
4992 {
3832a4d8
AM
4993 if (m->p_type == PT_LOAD
4994 && m->count != 0
4995 && m->sections[0]->vma >= info->relro_start
4996 && m->sections[0]->vma < info->relro_end)
f210dcff 4997 {
3832a4d8
AM
4998 i = m->count;
4999 while (--i != (unsigned) -1)
5000 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
5001 == (SEC_LOAD | SEC_HAS_CONTENTS))
5002 break;
5003
43a8475c 5004 if (i != (unsigned) -1)
f210dcff
L
5005 break;
5006 }
be01b344 5007 }
f210dcff
L
5008
5009 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
5010 if (m != NULL)
5011 {
5012 amt = sizeof (struct elf_segment_map);
a50b1753 5013 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
5014 if (m == NULL)
5015 goto error_return;
5016 m->next = NULL;
5017 m->p_type = PT_GNU_RELRO;
f210dcff
L
5018 *pm = m;
5019 pm = &m->next;
5020 }
8ded5a0f 5021 }
9ee5e499 5022
8ded5a0f 5023 free (sections);
12bd6957 5024 elf_seg_map (abfd) = mfirst;
9ee5e499
JJ
5025 }
5026
3dea8fca 5027 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 5028 return FALSE;
8c37241b 5029
12bd6957 5030 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
8ded5a0f 5031 ++count;
12bd6957 5032 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
252b5132 5033
b34976b6 5034 return TRUE;
252b5132
RH
5035
5036 error_return:
5037 if (sections != NULL)
5038 free (sections);
b34976b6 5039 return FALSE;
252b5132
RH
5040}
5041
5042/* Sort sections by address. */
5043
5044static int
217aa764 5045elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
5046{
5047 const asection *sec1 = *(const asection **) arg1;
5048 const asection *sec2 = *(const asection **) arg2;
eecdbe52 5049 bfd_size_type size1, size2;
252b5132
RH
5050
5051 /* Sort by LMA first, since this is the address used to
5052 place the section into a segment. */
5053 if (sec1->lma < sec2->lma)
5054 return -1;
5055 else if (sec1->lma > sec2->lma)
5056 return 1;
5057
5058 /* Then sort by VMA. Normally the LMA and the VMA will be
5059 the same, and this will do nothing. */
5060 if (sec1->vma < sec2->vma)
5061 return -1;
5062 else if (sec1->vma > sec2->vma)
5063 return 1;
5064
5065 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
5066
07c6e936 5067#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
5068
5069 if (TOEND (sec1))
5070 {
5071 if (TOEND (sec2))
00a7cdc5
NC
5072 {
5073 /* If the indicies are the same, do not return 0
5074 here, but continue to try the next comparison. */
5075 if (sec1->target_index - sec2->target_index != 0)
5076 return sec1->target_index - sec2->target_index;
5077 }
252b5132
RH
5078 else
5079 return 1;
5080 }
00a7cdc5 5081 else if (TOEND (sec2))
252b5132
RH
5082 return -1;
5083
5084#undef TOEND
5085
00a7cdc5
NC
5086 /* Sort by size, to put zero sized sections
5087 before others at the same address. */
252b5132 5088
eea6121a
AM
5089 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
5090 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
5091
5092 if (size1 < size2)
252b5132 5093 return -1;
eecdbe52 5094 if (size1 > size2)
252b5132
RH
5095 return 1;
5096
5097 return sec1->target_index - sec2->target_index;
5098}
5099
340b6d91
AC
5100/* Ian Lance Taylor writes:
5101
5102 We shouldn't be using % with a negative signed number. That's just
5103 not good. We have to make sure either that the number is not
5104 negative, or that the number has an unsigned type. When the types
5105 are all the same size they wind up as unsigned. When file_ptr is a
5106 larger signed type, the arithmetic winds up as signed long long,
5107 which is wrong.
5108
5109 What we're trying to say here is something like ``increase OFF by
5110 the least amount that will cause it to be equal to the VMA modulo
5111 the page size.'' */
5112/* In other words, something like:
5113
5114 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5115 off_offset = off % bed->maxpagesize;
5116 if (vma_offset < off_offset)
5117 adjustment = vma_offset + bed->maxpagesize - off_offset;
5118 else
5119 adjustment = vma_offset - off_offset;
08a40648 5120
340b6d91
AC
5121 which can can be collapsed into the expression below. */
5122
5123static file_ptr
5124vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5125{
dc9155b2
NC
5126 /* PR binutils/16199: Handle an alignment of zero. */
5127 if (maxpagesize == 0)
5128 maxpagesize = 1;
340b6d91
AC
5129 return ((vma - off) % maxpagesize);
5130}
5131
6d33f217
L
5132static void
5133print_segment_map (const struct elf_segment_map *m)
5134{
5135 unsigned int j;
5136 const char *pt = get_segment_type (m->p_type);
5137 char buf[32];
5138
5139 if (pt == NULL)
5140 {
5141 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5142 sprintf (buf, "LOPROC+%7.7x",
5143 (unsigned int) (m->p_type - PT_LOPROC));
5144 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5145 sprintf (buf, "LOOS+%7.7x",
5146 (unsigned int) (m->p_type - PT_LOOS));
5147 else
5148 snprintf (buf, sizeof (buf), "%8.8x",
5149 (unsigned int) m->p_type);
5150 pt = buf;
5151 }
4a97a0e5 5152 fflush (stdout);
6d33f217
L
5153 fprintf (stderr, "%s:", pt);
5154 for (j = 0; j < m->count; j++)
5155 fprintf (stderr, " %s", m->sections [j]->name);
5156 putc ('\n',stderr);
4a97a0e5 5157 fflush (stderr);
6d33f217
L
5158}
5159
32812159
AM
5160static bfd_boolean
5161write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5162{
5163 void *buf;
5164 bfd_boolean ret;
5165
5166 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5167 return FALSE;
5168 buf = bfd_zmalloc (len);
5169 if (buf == NULL)
5170 return FALSE;
5171 ret = bfd_bwrite (buf, len, abfd) == len;
5172 free (buf);
5173 return ret;
5174}
5175
252b5132
RH
5176/* Assign file positions to the sections based on the mapping from
5177 sections to segments. This function also sets up some fields in
f3520d2f 5178 the file header. */
252b5132 5179
b34976b6 5180static bfd_boolean
f3520d2f
AM
5181assign_file_positions_for_load_sections (bfd *abfd,
5182 struct bfd_link_info *link_info)
252b5132
RH
5183{
5184 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5185 struct elf_segment_map *m;
252b5132 5186 Elf_Internal_Phdr *phdrs;
252b5132 5187 Elf_Internal_Phdr *p;
02bf8d82 5188 file_ptr off;
3f570048 5189 bfd_size_type maxpagesize;
a8c75b76 5190 unsigned int pt_load_count = 0;
f3520d2f 5191 unsigned int alloc;
0920dee7 5192 unsigned int i, j;
2b0bc088 5193 bfd_vma header_pad = 0;
252b5132 5194
e36284ab 5195 if (link_info == NULL
ceae84aa 5196 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 5197 return FALSE;
252b5132 5198
8ded5a0f 5199 alloc = 0;
12bd6957 5200 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
2b0bc088
NC
5201 {
5202 ++alloc;
5203 if (m->header_size)
5204 header_pad = m->header_size;
5205 }
252b5132 5206
82f2dbf7
NC
5207 if (alloc)
5208 {
5209 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5210 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5211 }
5212 else
5213 {
5214 /* PR binutils/12467. */
5215 elf_elfheader (abfd)->e_phoff = 0;
5216 elf_elfheader (abfd)->e_phentsize = 0;
5217 }
d324f6d6 5218
8ded5a0f 5219 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 5220
12bd6957
AM
5221 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
5222 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
8ded5a0f 5223 else
12bd6957 5224 BFD_ASSERT (elf_program_header_size (abfd)
59e0647f 5225 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
5226
5227 if (alloc == 0)
f3520d2f 5228 {
12bd6957 5229 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
8ded5a0f 5230 return TRUE;
f3520d2f 5231 }
252b5132 5232
12bd6957 5233 /* We're writing the size in elf_program_header_size (abfd),
57268894
HPN
5234 see assign_file_positions_except_relocs, so make sure we have
5235 that amount allocated, with trailing space cleared.
12bd6957
AM
5236 The variable alloc contains the computed need, while
5237 elf_program_header_size (abfd) contains the size used for the
57268894
HPN
5238 layout.
5239 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5240 where the layout is forced to according to a larger size in the
5241 last iterations for the testcase ld-elf/header. */
12bd6957 5242 BFD_ASSERT (elf_program_header_size (abfd) % bed->s->sizeof_phdr
57268894 5243 == 0);
a50b1753
NC
5244 phdrs = (Elf_Internal_Phdr *)
5245 bfd_zalloc2 (abfd,
12bd6957 5246 (elf_program_header_size (abfd) / bed->s->sizeof_phdr),
a50b1753 5247 sizeof (Elf_Internal_Phdr));
f3520d2f 5248 elf_tdata (abfd)->phdr = phdrs;
252b5132 5249 if (phdrs == NULL)
b34976b6 5250 return FALSE;
252b5132 5251
3f570048
AM
5252 maxpagesize = 1;
5253 if ((abfd->flags & D_PAGED) != 0)
5254 maxpagesize = bed->maxpagesize;
5255
252b5132
RH
5256 off = bed->s->sizeof_ehdr;
5257 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
5258 if (header_pad < (bfd_vma) off)
5259 header_pad = 0;
5260 else
5261 header_pad -= off;
5262 off += header_pad;
252b5132 5263
12bd6957 5264 for (m = elf_seg_map (abfd), p = phdrs, j = 0;
252b5132 5265 m != NULL;
0920dee7 5266 m = m->next, p++, j++)
252b5132 5267 {
252b5132 5268 asection **secpp;
bf988460
AM
5269 bfd_vma off_adjust;
5270 bfd_boolean no_contents;
252b5132
RH
5271
5272 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 5273 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
5274 not be done to the PT_NOTE section of a corefile, which may
5275 contain several pseudo-sections artificially created by bfd.
5276 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
5277 if (m->count > 1
5278 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 5279 && m->p_type == PT_NOTE))
252b5132
RH
5280 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5281 elf_sort_sections);
5282
b301b248
AM
5283 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5284 number of sections with contents contributing to both p_filesz
5285 and p_memsz, followed by a number of sections with no contents
5286 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 5287 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 5288 p->p_type = m->p_type;
28a7f3e7 5289 p->p_flags = m->p_flags;
252b5132 5290
3f570048
AM
5291 if (m->count == 0)
5292 p->p_vaddr = 0;
5293 else
3271a814 5294 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
5295
5296 if (m->p_paddr_valid)
5297 p->p_paddr = m->p_paddr;
5298 else if (m->count == 0)
5299 p->p_paddr = 0;
5300 else
08a40648 5301 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
5302
5303 if (p->p_type == PT_LOAD
5304 && (abfd->flags & D_PAGED) != 0)
5305 {
5306 /* p_align in demand paged PT_LOAD segments effectively stores
5307 the maximum page size. When copying an executable with
5308 objcopy, we set m->p_align from the input file. Use this
5309 value for maxpagesize rather than bed->maxpagesize, which
5310 may be different. Note that we use maxpagesize for PT_TLS
5311 segment alignment later in this function, so we are relying
5312 on at least one PT_LOAD segment appearing before a PT_TLS
5313 segment. */
5314 if (m->p_align_valid)
5315 maxpagesize = m->p_align;
5316
5317 p->p_align = maxpagesize;
a8c75b76 5318 pt_load_count += 1;
3f570048 5319 }
3271a814
NS
5320 else if (m->p_align_valid)
5321 p->p_align = m->p_align;
e970b90a
DJ
5322 else if (m->count == 0)
5323 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
5324 else
5325 p->p_align = 0;
5326
bf988460
AM
5327 no_contents = FALSE;
5328 off_adjust = 0;
252b5132 5329 if (p->p_type == PT_LOAD
b301b248 5330 && m->count > 0)
252b5132 5331 {
b301b248 5332 bfd_size_type align;
a49e53ed 5333 unsigned int align_power = 0;
b301b248 5334
3271a814
NS
5335 if (m->p_align_valid)
5336 align = p->p_align;
5337 else
252b5132 5338 {
3271a814
NS
5339 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5340 {
5341 unsigned int secalign;
08a40648 5342
3271a814
NS
5343 secalign = bfd_get_section_alignment (abfd, *secpp);
5344 if (secalign > align_power)
5345 align_power = secalign;
5346 }
5347 align = (bfd_size_type) 1 << align_power;
5348 if (align < maxpagesize)
5349 align = maxpagesize;
b301b248 5350 }
252b5132 5351
02bf8d82
AM
5352 for (i = 0; i < m->count; i++)
5353 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5354 /* If we aren't making room for this section, then
5355 it must be SHT_NOBITS regardless of what we've
5356 set via struct bfd_elf_special_section. */
5357 elf_section_type (m->sections[i]) = SHT_NOBITS;
5358
bf988460 5359 /* Find out whether this segment contains any loadable
aea274d3
AM
5360 sections. */
5361 no_contents = TRUE;
5362 for (i = 0; i < m->count; i++)
5363 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5364 {
5365 no_contents = FALSE;
5366 break;
5367 }
bf988460 5368
85cfcbfb 5369 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
a8c75b76
AM
5370
5371 /* Broken hardware and/or kernel require that files do not
5372 map the same page with different permissions on some hppa
5373 processors. */
5374 if (pt_load_count > 1
5375 && bed->no_page_alias
5376 && (off & (maxpagesize - 1)) != 0
5377 && (off & -maxpagesize) == ((off + off_adjust) & -maxpagesize))
5378 off_adjust += maxpagesize;
bf988460
AM
5379 off += off_adjust;
5380 if (no_contents)
5381 {
5382 /* We shouldn't need to align the segment on disk since
5383 the segment doesn't need file space, but the gABI
5384 arguably requires the alignment and glibc ld.so
5385 checks it. So to comply with the alignment
5386 requirement but not waste file space, we adjust
5387 p_offset for just this segment. (OFF_ADJUST is
5388 subtracted from OFF later.) This may put p_offset
5389 past the end of file, but that shouldn't matter. */
5390 }
5391 else
5392 off_adjust = 0;
252b5132 5393 }
b1a6d0b1
NC
5394 /* Make sure the .dynamic section is the first section in the
5395 PT_DYNAMIC segment. */
5396 else if (p->p_type == PT_DYNAMIC
5397 && m->count > 1
5398 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5399 {
5400 _bfd_error_handler
63a5468a
AM
5401 (_("%B: The first section in the PT_DYNAMIC segment"
5402 " is not the .dynamic section"),
b301b248 5403 abfd);
b1a6d0b1
NC
5404 bfd_set_error (bfd_error_bad_value);
5405 return FALSE;
5406 }
3f001e84
JK
5407 /* Set the note section type to SHT_NOTE. */
5408 else if (p->p_type == PT_NOTE)
5409 for (i = 0; i < m->count; i++)
5410 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 5411
252b5132
RH
5412 p->p_offset = 0;
5413 p->p_filesz = 0;
5414 p->p_memsz = 0;
5415
5416 if (m->includes_filehdr)
5417 {
bf988460 5418 if (!m->p_flags_valid)
252b5132 5419 p->p_flags |= PF_R;
252b5132
RH
5420 p->p_filesz = bed->s->sizeof_ehdr;
5421 p->p_memsz = bed->s->sizeof_ehdr;
5422 if (m->count > 0)
5423 {
9ab82472
L
5424 if (p->p_vaddr < (bfd_vma) off
5425 || (!m->p_paddr_valid
5426 && p->p_paddr < (bfd_vma) off))
252b5132 5427 {
4eca0228 5428 _bfd_error_handler
63a5468a
AM
5429 (_("%B: Not enough room for program headers,"
5430 " try linking with -N"),
b301b248 5431 abfd);
252b5132 5432 bfd_set_error (bfd_error_bad_value);
b34976b6 5433 return FALSE;
252b5132
RH
5434 }
5435
5436 p->p_vaddr -= off;
bf988460 5437 if (!m->p_paddr_valid)
252b5132
RH
5438 p->p_paddr -= off;
5439 }
252b5132
RH
5440 }
5441
5442 if (m->includes_phdrs)
5443 {
bf988460 5444 if (!m->p_flags_valid)
252b5132
RH
5445 p->p_flags |= PF_R;
5446
f3520d2f 5447 if (!m->includes_filehdr)
252b5132
RH
5448 {
5449 p->p_offset = bed->s->sizeof_ehdr;
5450
5451 if (m->count > 0)
5452 {
252b5132 5453 p->p_vaddr -= off - p->p_offset;
bf988460 5454 if (!m->p_paddr_valid)
252b5132
RH
5455 p->p_paddr -= off - p->p_offset;
5456 }
252b5132
RH
5457 }
5458
5459 p->p_filesz += alloc * bed->s->sizeof_phdr;
5460 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
5461 if (m->count)
5462 {
5463 p->p_filesz += header_pad;
5464 p->p_memsz += header_pad;
5465 }
252b5132
RH
5466 }
5467
5468 if (p->p_type == PT_LOAD
5469 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5470 {
bf988460 5471 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 5472 p->p_offset = off;
252b5132
RH
5473 else
5474 {
5475 file_ptr adjust;
5476
5477 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
5478 if (!no_contents)
5479 p->p_filesz += adjust;
252b5132
RH
5480 p->p_memsz += adjust;
5481 }
5482 }
5483
1ea63fd2
AM
5484 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5485 maps. Set filepos for sections in PT_LOAD segments, and in
5486 core files, for sections in PT_NOTE segments.
5487 assign_file_positions_for_non_load_sections will set filepos
5488 for other sections and update p_filesz for other segments. */
252b5132
RH
5489 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5490 {
5491 asection *sec;
252b5132 5492 bfd_size_type align;
627b32bc 5493 Elf_Internal_Shdr *this_hdr;
252b5132
RH
5494
5495 sec = *secpp;
02bf8d82 5496 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 5497 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 5498
88967714
AM
5499 if ((p->p_type == PT_LOAD
5500 || p->p_type == PT_TLS)
5501 && (this_hdr->sh_type != SHT_NOBITS
5502 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5503 && ((this_hdr->sh_flags & SHF_TLS) == 0
5504 || p->p_type == PT_TLS))))
252b5132 5505 {
b5599592
AM
5506 bfd_vma p_start = p->p_paddr;
5507 bfd_vma p_end = p_start + p->p_memsz;
5508 bfd_vma s_start = sec->lma;
5509 bfd_vma adjust = s_start - p_end;
252b5132 5510
a2d1e028
L
5511 if (adjust != 0
5512 && (s_start < p_end
5513 || p_end < p_start))
252b5132 5514 {
4eca0228 5515 _bfd_error_handler
695344c0 5516 /* xgettext:c-format */
b5599592
AM
5517 (_("%B: section %A lma %#lx adjusted to %#lx"), abfd, sec,
5518 (unsigned long) s_start, (unsigned long) p_end);
88967714 5519 adjust = 0;
b5599592 5520 sec->lma = p_end;
1cfb7d1e 5521 }
3ac9b6c9 5522 p->p_memsz += adjust;
1cfb7d1e 5523
88967714
AM
5524 if (this_hdr->sh_type != SHT_NOBITS)
5525 {
32812159
AM
5526 if (p->p_filesz + adjust < p->p_memsz)
5527 {
5528 /* We have a PROGBITS section following NOBITS ones.
5529 Allocate file space for the NOBITS section(s) and
5530 zero it. */
5531 adjust = p->p_memsz - p->p_filesz;
5532 if (!write_zeros (abfd, off, adjust))
5533 return FALSE;
5534 }
88967714
AM
5535 off += adjust;
5536 p->p_filesz += adjust;
252b5132 5537 }
252b5132
RH
5538 }
5539
5540 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5541 {
b301b248
AM
5542 /* The section at i == 0 is the one that actually contains
5543 everything. */
4a938328
MS
5544 if (i == 0)
5545 {
627b32bc 5546 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
5547 off += this_hdr->sh_size;
5548 p->p_filesz = this_hdr->sh_size;
b301b248
AM
5549 p->p_memsz = 0;
5550 p->p_align = 1;
252b5132 5551 }
4a938328 5552 else
252b5132 5553 {
b301b248 5554 /* The rest are fake sections that shouldn't be written. */
252b5132 5555 sec->filepos = 0;
eea6121a 5556 sec->size = 0;
b301b248
AM
5557 sec->flags = 0;
5558 continue;
252b5132 5559 }
252b5132
RH
5560 }
5561 else
5562 {
1e951488 5563 if (p->p_type == PT_LOAD)
b301b248 5564 {
1e951488
AM
5565 this_hdr->sh_offset = sec->filepos = off;
5566 if (this_hdr->sh_type != SHT_NOBITS)
5567 off += this_hdr->sh_size;
5568 }
5569 else if (this_hdr->sh_type == SHT_NOBITS
5570 && (this_hdr->sh_flags & SHF_TLS) != 0
5571 && this_hdr->sh_offset == 0)
5572 {
5573 /* This is a .tbss section that didn't get a PT_LOAD.
5574 (See _bfd_elf_map_sections_to_segments "Create a
5575 final PT_LOAD".) Set sh_offset to the value it
5576 would have if we had created a zero p_filesz and
5577 p_memsz PT_LOAD header for the section. This
5578 also makes the PT_TLS header have the same
5579 p_offset value. */
5580 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5581 off, align);
5582 this_hdr->sh_offset = sec->filepos = off + adjust;
b301b248 5583 }
252b5132 5584
02bf8d82 5585 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 5586 {
6a3cd2b4 5587 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
5588 /* A load section without SHF_ALLOC is something like
5589 a note section in a PT_NOTE segment. These take
5590 file space but are not loaded into memory. */
5591 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 5592 p->p_memsz += this_hdr->sh_size;
b301b248 5593 }
6a3cd2b4 5594 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 5595 {
6a3cd2b4
AM
5596 if (p->p_type == PT_TLS)
5597 p->p_memsz += this_hdr->sh_size;
5598
5599 /* .tbss is special. It doesn't contribute to p_memsz of
5600 normal segments. */
5601 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5602 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
5603 }
5604
b10a8ae0
L
5605 if (align > p->p_align
5606 && !m->p_align_valid
5607 && (p->p_type != PT_LOAD
5608 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
5609 p->p_align = align;
5610 }
5611
bf988460 5612 if (!m->p_flags_valid)
252b5132
RH
5613 {
5614 p->p_flags |= PF_R;
02bf8d82 5615 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 5616 p->p_flags |= PF_X;
02bf8d82 5617 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
5618 p->p_flags |= PF_W;
5619 }
5620 }
43a8475c 5621
bf988460 5622 off -= off_adjust;
0920dee7 5623
7c928300
AM
5624 /* Check that all sections are in a PT_LOAD segment.
5625 Don't check funky gdb generated core files. */
5626 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
5627 {
5628 bfd_boolean check_vma = TRUE;
5629
5630 for (i = 1; i < m->count; i++)
5631 if (m->sections[i]->vma == m->sections[i - 1]->vma
5632 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5633 ->this_hdr), p) != 0
5634 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5635 ->this_hdr), p) != 0)
0920dee7 5636 {
9a83a553
AM
5637 /* Looks like we have overlays packed into the segment. */
5638 check_vma = FALSE;
5639 break;
0920dee7 5640 }
9a83a553
AM
5641
5642 for (i = 0; i < m->count; i++)
5643 {
5644 Elf_Internal_Shdr *this_hdr;
5645 asection *sec;
5646
5647 sec = m->sections[i];
5648 this_hdr = &(elf_section_data(sec)->this_hdr);
86b2281f
AM
5649 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5650 && !ELF_TBSS_SPECIAL (this_hdr, p))
9a83a553 5651 {
4eca0228 5652 _bfd_error_handler
695344c0 5653 /* xgettext:c-format */
9a83a553
AM
5654 (_("%B: section `%A' can't be allocated in segment %d"),
5655 abfd, sec, j);
5656 print_segment_map (m);
5657 }
5658 }
5659 }
252b5132
RH
5660 }
5661
12bd6957 5662 elf_next_file_pos (abfd) = off;
f3520d2f
AM
5663 return TRUE;
5664}
5665
5666/* Assign file positions for the other sections. */
5667
5668static bfd_boolean
5669assign_file_positions_for_non_load_sections (bfd *abfd,
5670 struct bfd_link_info *link_info)
5671{
5672 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5673 Elf_Internal_Shdr **i_shdrpp;
e06efbf1 5674 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
f3520d2f
AM
5675 Elf_Internal_Phdr *phdrs;
5676 Elf_Internal_Phdr *p;
5677 struct elf_segment_map *m;
62655c7b 5678 struct elf_segment_map *hdrs_segment;
f3520d2f
AM
5679 bfd_vma filehdr_vaddr, filehdr_paddr;
5680 bfd_vma phdrs_vaddr, phdrs_paddr;
5681 file_ptr off;
f3520d2f
AM
5682 unsigned int count;
5683
5c182d5f 5684 i_shdrpp = elf_elfsections (abfd);
e06efbf1 5685 end_hdrpp = i_shdrpp + elf_numsections (abfd);
12bd6957 5686 off = elf_next_file_pos (abfd);
e06efbf1 5687 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
5c182d5f 5688 {
5c182d5f
AM
5689 Elf_Internal_Shdr *hdr;
5690
5691 hdr = *hdrpp;
5692 if (hdr->bfd_section != NULL
252e386e
AM
5693 && (hdr->bfd_section->filepos != 0
5694 || (hdr->sh_type == SHT_NOBITS
5695 && hdr->contents == NULL)))
627b32bc 5696 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
5697 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
5698 {
e8d2ba53 5699 if (hdr->sh_size != 0)
4eca0228 5700 _bfd_error_handler
695344c0 5701 /* xgettext:c-format */
e8d2ba53
AM
5702 (_("%B: warning: allocated section `%s' not in segment"),
5703 abfd,
5704 (hdr->bfd_section == NULL
5705 ? "*unknown*"
5706 : hdr->bfd_section->name));
3ba71138
L
5707 /* We don't need to page align empty sections. */
5708 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
5709 off += vma_page_aligned_bias (hdr->sh_addr, off,
5710 bed->maxpagesize);
5711 else
5712 off += vma_page_aligned_bias (hdr->sh_addr, off,
5713 hdr->sh_addralign);
5714 off = _bfd_elf_assign_file_position_for_section (hdr, off,
5715 FALSE);
5716 }
5717 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5718 && hdr->bfd_section == NULL)
0ce398f1
L
5719 || (hdr->bfd_section != NULL
5720 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS))
5721 /* Compress DWARF debug sections. */
12bd6957 5722 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6a40cf0c
NC
5723 || (elf_symtab_shndx_list (abfd) != NULL
5724 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
5725 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
5726 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
5c182d5f
AM
5727 hdr->sh_offset = -1;
5728 else
5729 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
5730 }
5731
252b5132
RH
5732 /* Now that we have set the section file positions, we can set up
5733 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
5734 count = 0;
5735 filehdr_vaddr = 0;
5736 filehdr_paddr = 0;
5737 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
5738 phdrs_paddr = 0;
62655c7b 5739 hdrs_segment = NULL;
f3520d2f 5740 phdrs = elf_tdata (abfd)->phdr;
12bd6957 5741 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
f3520d2f
AM
5742 {
5743 ++count;
5744 if (p->p_type != PT_LOAD)
5745 continue;
5746
5747 if (m->includes_filehdr)
5748 {
5749 filehdr_vaddr = p->p_vaddr;
5750 filehdr_paddr = p->p_paddr;
5751 }
5752 if (m->includes_phdrs)
5753 {
5754 phdrs_vaddr = p->p_vaddr;
5755 phdrs_paddr = p->p_paddr;
5756 if (m->includes_filehdr)
5757 {
62655c7b 5758 hdrs_segment = m;
f3520d2f
AM
5759 phdrs_vaddr += bed->s->sizeof_ehdr;
5760 phdrs_paddr += bed->s->sizeof_ehdr;
5761 }
5762 }
5763 }
5764
62655c7b
RM
5765 if (hdrs_segment != NULL && link_info != NULL)
5766 {
5767 /* There is a segment that contains both the file headers and the
5768 program headers, so provide a symbol __ehdr_start pointing there.
5769 A program can use this to examine itself robustly. */
5770
5771 struct elf_link_hash_entry *hash
5772 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5773 FALSE, FALSE, TRUE);
5774 /* If the symbol was referenced and not defined, define it. */
5775 if (hash != NULL
5776 && (hash->root.type == bfd_link_hash_new
5777 || hash->root.type == bfd_link_hash_undefined
5778 || hash->root.type == bfd_link_hash_undefweak
5779 || hash->root.type == bfd_link_hash_common))
5780 {
5781 asection *s = NULL;
5782 if (hdrs_segment->count != 0)
5783 /* The segment contains sections, so use the first one. */
5784 s = hdrs_segment->sections[0];
5785 else
5786 /* Use the first (i.e. lowest-addressed) section in any segment. */
12bd6957 5787 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62655c7b
RM
5788 if (m->count != 0)
5789 {
5790 s = m->sections[0];
5791 break;
5792 }
5793
5794 if (s != NULL)
5795 {
5796 hash->root.u.def.value = filehdr_vaddr - s->vma;
5797 hash->root.u.def.section = s;
5798 }
5799 else
5800 {
5801 hash->root.u.def.value = filehdr_vaddr;
5802 hash->root.u.def.section = bfd_abs_section_ptr;
5803 }
5804
5805 hash->root.type = bfd_link_hash_defined;
5806 hash->def_regular = 1;
5807 hash->non_elf = 0;
5808 }
5809 }
5810
12bd6957 5811 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
252b5132 5812 {
129af99f 5813 if (p->p_type == PT_GNU_RELRO)
252b5132 5814 {
b84a33b5 5815 const Elf_Internal_Phdr *lp;
3146fac4 5816 struct elf_segment_map *lm;
1ea63fd2 5817
129af99f 5818 if (link_info != NULL)
8c37241b 5819 {
129af99f
AS
5820 /* During linking the range of the RELRO segment is passed
5821 in link_info. */
12bd6957 5822 for (lm = elf_seg_map (abfd), lp = phdrs;
3146fac4
AM
5823 lm != NULL;
5824 lm = lm->next, lp++)
8c37241b
JJ
5825 {
5826 if (lp->p_type == PT_LOAD
b84a33b5 5827 && lp->p_vaddr < link_info->relro_end
3146fac4
AM
5828 && lm->count != 0
5829 && lm->sections[0]->vma >= link_info->relro_start)
8c37241b
JJ
5830 break;
5831 }
8981c88a 5832
3146fac4 5833 BFD_ASSERT (lm != NULL);
8c37241b 5834 }
129af99f
AS
5835 else
5836 {
5837 /* Otherwise we are copying an executable or shared
b84a33b5 5838 library, but we need to use the same linker logic. */
129af99f
AS
5839 for (lp = phdrs; lp < phdrs + count; ++lp)
5840 {
5841 if (lp->p_type == PT_LOAD
5842 && lp->p_paddr == p->p_paddr)
5843 break;
5844 }
b84a33b5
AM
5845 }
5846
5847 if (lp < phdrs + count)
5848 {
5849 p->p_vaddr = lp->p_vaddr;
5850 p->p_paddr = lp->p_paddr;
5851 p->p_offset = lp->p_offset;
5852 if (link_info != NULL)
5853 p->p_filesz = link_info->relro_end - lp->p_vaddr;
5854 else if (m->p_size_valid)
5855 p->p_filesz = m->p_size;
129af99f
AS
5856 else
5857 abort ();
b84a33b5 5858 p->p_memsz = p->p_filesz;
f3944f72
L
5859 /* Preserve the alignment and flags if they are valid. The
5860 gold linker generates RW/4 for the PT_GNU_RELRO section.
5861 It is better for objcopy/strip to honor these attributes
5862 otherwise gdb will choke when using separate debug files.
5863 */
5864 if (!m->p_align_valid)
5865 p->p_align = 1;
5866 if (!m->p_flags_valid)
341b8ee7 5867 p->p_flags = PF_R;
129af99f 5868 }
9433b9b1 5869 else
b84a33b5
AM
5870 {
5871 memset (p, 0, sizeof *p);
5872 p->p_type = PT_NULL;
5873 }
129af99f 5874 }
04c3a755
NS
5875 else if (p->p_type == PT_GNU_STACK)
5876 {
5877 if (m->p_size_valid)
5878 p->p_memsz = m->p_size;
5879 }
129af99f
AS
5880 else if (m->count != 0)
5881 {
e06efbf1 5882 unsigned int i;
1a9ccd70 5883
129af99f
AS
5884 if (p->p_type != PT_LOAD
5885 && (p->p_type != PT_NOTE
5886 || bfd_get_format (abfd) != bfd_core))
5887 {
1a9ccd70
NC
5888 /* A user specified segment layout may include a PHDR
5889 segment that overlaps with a LOAD segment... */
5890 if (p->p_type == PT_PHDR)
5891 {
5892 m->count = 0;
5893 continue;
5894 }
5895
c86934ce
NC
5896 if (m->includes_filehdr || m->includes_phdrs)
5897 {
b1fa9dd6 5898 /* PR 17512: file: 2195325e. */
4eca0228 5899 _bfd_error_handler
1a9ccd70
NC
5900 (_("%B: error: non-load segment %d includes file header and/or program header"),
5901 abfd, (int)(p - phdrs));
c86934ce
NC
5902 return FALSE;
5903 }
129af99f 5904
86b2281f 5905 p->p_filesz = 0;
129af99f 5906 p->p_offset = m->sections[0]->filepos;
86b2281f
AM
5907 for (i = m->count; i-- != 0;)
5908 {
5909 asection *sect = m->sections[i];
5910 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
5911 if (hdr->sh_type != SHT_NOBITS)
5912 {
5913 p->p_filesz = (sect->filepos - m->sections[0]->filepos
5914 + hdr->sh_size);
5915 break;
5916 }
5917 }
129af99f
AS
5918 }
5919 }
5920 else if (m->includes_filehdr)
5921 {
5922 p->p_vaddr = filehdr_vaddr;
5923 if (! m->p_paddr_valid)
5924 p->p_paddr = filehdr_paddr;
5925 }
5926 else if (m->includes_phdrs)
5927 {
5928 p->p_vaddr = phdrs_vaddr;
5929 if (! m->p_paddr_valid)
5930 p->p_paddr = phdrs_paddr;
252b5132
RH
5931 }
5932 }
5933
12bd6957 5934 elf_next_file_pos (abfd) = off;
252b5132 5935
b34976b6 5936 return TRUE;
252b5132
RH
5937}
5938
6a40cf0c
NC
5939static elf_section_list *
5940find_section_in_list (unsigned int i, elf_section_list * list)
5941{
5942 for (;list != NULL; list = list->next)
5943 if (list->ndx == i)
5944 break;
5945 return list;
5946}
5947
252b5132
RH
5948/* Work out the file positions of all the sections. This is called by
5949 _bfd_elf_compute_section_file_positions. All the section sizes and
5950 VMAs must be known before this is called.
5951
e0638f70
AM
5952 Reloc sections come in two flavours: Those processed specially as
5953 "side-channel" data attached to a section to which they apply, and
5954 those that bfd doesn't process as relocations. The latter sort are
5955 stored in a normal bfd section by bfd_section_from_shdr. We don't
5956 consider the former sort here, unless they form part of the loadable
5957 image. Reloc sections not assigned here will be handled later by
5958 assign_file_positions_for_relocs.
252b5132
RH
5959
5960 We also don't set the positions of the .symtab and .strtab here. */
5961
b34976b6 5962static bfd_boolean
c84fca4d
AO
5963assign_file_positions_except_relocs (bfd *abfd,
5964 struct bfd_link_info *link_info)
252b5132 5965{
5c182d5f
AM
5966 struct elf_obj_tdata *tdata = elf_tdata (abfd);
5967 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
9c5bfbb7 5968 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5969
5970 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
5971 && bfd_get_format (abfd) != bfd_core)
5972 {
5c182d5f
AM
5973 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
5974 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
5975 Elf_Internal_Shdr **hdrpp;
5976 unsigned int i;
a485e98e 5977 file_ptr off;
252b5132
RH
5978
5979 /* Start after the ELF header. */
5980 off = i_ehdrp->e_ehsize;
5981
5982 /* We are not creating an executable, which means that we are
5983 not creating a program header, and that the actual order of
5984 the sections in the file is unimportant. */
9ad5cbcf 5985 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
5986 {
5987 Elf_Internal_Shdr *hdr;
5988
5989 hdr = *hdrpp;
e0638f70
AM
5990 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5991 && hdr->bfd_section == NULL)
0ce398f1
L
5992 || (hdr->bfd_section != NULL
5993 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS))
5994 /* Compress DWARF debug sections. */
12bd6957 5995 || i == elf_onesymtab (abfd)
6a40cf0c
NC
5996 || (elf_symtab_shndx_list (abfd) != NULL
5997 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
5998 || i == elf_strtab_sec (abfd)
5999 || i == elf_shstrtab_sec (abfd))
252b5132
RH
6000 {
6001 hdr->sh_offset = -1;
252b5132 6002 }
9ad5cbcf 6003 else
b34976b6 6004 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 6005 }
a485e98e
AM
6006
6007 elf_next_file_pos (abfd) = off;
252b5132
RH
6008 }
6009 else
6010 {
f3520d2f
AM
6011 unsigned int alloc;
6012
252b5132 6013 /* Assign file positions for the loaded sections based on the
08a40648 6014 assignment of sections to segments. */
f3520d2f
AM
6015 if (!assign_file_positions_for_load_sections (abfd, link_info))
6016 return FALSE;
6017
6018 /* And for non-load sections. */
6019 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
6020 return FALSE;
6021
e36284ab
AM
6022 if (bed->elf_backend_modify_program_headers != NULL)
6023 {
6024 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
6025 return FALSE;
6026 }
6027
58e7ebac 6028 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=. */
0e1862bb 6029 if (link_info != NULL && bfd_link_pie (link_info))
58e7ebac
L
6030 {
6031 unsigned int num_segments = elf_elfheader (abfd)->e_phnum;
6032 Elf_Internal_Phdr *segment = elf_tdata (abfd)->phdr;
6033 Elf_Internal_Phdr *end_segment = &segment[num_segments];
6034
6035 /* Find the lowest p_vaddr in PT_LOAD segments. */
6036 bfd_vma p_vaddr = (bfd_vma) -1;
6037 for (; segment < end_segment; segment++)
6038 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
6039 p_vaddr = segment->p_vaddr;
6040
6041 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
6042 segments is non-zero. */
6043 if (p_vaddr)
6044 i_ehdrp->e_type = ET_EXEC;
6045 }
6046
f3520d2f 6047 /* Write out the program headers. */
12bd6957 6048 alloc = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
1a9ccd70
NC
6049
6050 /* Sort the program headers into the ordering required by the ELF standard. */
6051 if (alloc == 0)
6052 return TRUE;
6053
1a9ccd70
NC
6054 /* PR ld/20815 - Check that the program header segment, if present, will
6055 be loaded into memory. FIXME: The check below is not sufficient as
6056 really all PT_LOAD segments should be checked before issuing an error
6057 message. Plus the PHDR segment does not have to be the first segment
6058 in the program header table. But this version of the check should
cd584857
NC
6059 catch all real world use cases.
6060
6061 FIXME: We used to have code here to sort the PT_LOAD segments into
6062 ascending order, as per the ELF spec. But this breaks some programs,
6063 including the Linux kernel. But really either the spec should be
6064 changed or the programs updated. */
1a9ccd70 6065 if (alloc > 1
cd584857
NC
6066 && tdata->phdr[0].p_type == PT_PHDR
6067 && ! bed->elf_backend_allow_non_load_phdr (abfd, tdata->phdr, alloc)
6068 && tdata->phdr[1].p_type == PT_LOAD
6069 && (tdata->phdr[1].p_vaddr > tdata->phdr[0].p_vaddr
6070 || (tdata->phdr[1].p_vaddr + tdata->phdr[1].p_memsz)
6071 < (tdata->phdr[0].p_vaddr + tdata->phdr[0].p_memsz)))
1a9ccd70
NC
6072 {
6073 /* The fix for this error is usually to edit the linker script being
6074 used and set up the program headers manually. Either that or
6075 leave room for the headers at the start of the SECTIONS. */
6076 _bfd_error_handler (_("\
6077%B: error: PHDR segment not covered by LOAD segment"),
6078 abfd);
1a9ccd70
NC
6079 return FALSE;
6080 }
6081
f3520d2f 6082 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
cd584857
NC
6083 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
6084 return FALSE;
252b5132
RH
6085 }
6086
b34976b6 6087 return TRUE;
252b5132
RH
6088}
6089
b34976b6 6090static bfd_boolean
217aa764 6091prep_headers (bfd *abfd)
252b5132 6092{
3d540e93 6093 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 6094 struct elf_strtab_hash *shstrtab;
9c5bfbb7 6095 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
6096
6097 i_ehdrp = elf_elfheader (abfd);
252b5132 6098
2b0f7ef9 6099 shstrtab = _bfd_elf_strtab_init ();
252b5132 6100 if (shstrtab == NULL)
b34976b6 6101 return FALSE;
252b5132
RH
6102
6103 elf_shstrtab (abfd) = shstrtab;
6104
6105 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
6106 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
6107 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
6108 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
6109
6110 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
6111 i_ehdrp->e_ident[EI_DATA] =
6112 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
6113 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
6114
252b5132
RH
6115 if ((abfd->flags & DYNAMIC) != 0)
6116 i_ehdrp->e_type = ET_DYN;
6117 else if ((abfd->flags & EXEC_P) != 0)
6118 i_ehdrp->e_type = ET_EXEC;
6119 else if (bfd_get_format (abfd) == bfd_core)
6120 i_ehdrp->e_type = ET_CORE;
6121 else
6122 i_ehdrp->e_type = ET_REL;
6123
6124 switch (bfd_get_arch (abfd))
6125 {
6126 case bfd_arch_unknown:
6127 i_ehdrp->e_machine = EM_NONE;
6128 break;
aa4f99bb
AO
6129
6130 /* There used to be a long list of cases here, each one setting
6131 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6132 in the corresponding bfd definition. To avoid duplication,
6133 the switch was removed. Machines that need special handling
6134 can generally do it in elf_backend_final_write_processing(),
6135 unless they need the information earlier than the final write.
6136 Such need can generally be supplied by replacing the tests for
6137 e_machine with the conditions used to determine it. */
252b5132 6138 default:
9c5bfbb7
AM
6139 i_ehdrp->e_machine = bed->elf_machine_code;
6140 }
aa4f99bb 6141
252b5132
RH
6142 i_ehdrp->e_version = bed->s->ev_current;
6143 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
6144
c044fabd 6145 /* No program header, for now. */
252b5132
RH
6146 i_ehdrp->e_phoff = 0;
6147 i_ehdrp->e_phentsize = 0;
6148 i_ehdrp->e_phnum = 0;
6149
c044fabd 6150 /* Each bfd section is section header entry. */
252b5132
RH
6151 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6152 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6153
c044fabd 6154 /* If we're building an executable, we'll need a program header table. */
252b5132 6155 if (abfd->flags & EXEC_P)
0e71e495
BE
6156 /* It all happens later. */
6157 ;
252b5132
RH
6158 else
6159 {
6160 i_ehdrp->e_phentsize = 0;
252b5132
RH
6161 i_ehdrp->e_phoff = 0;
6162 }
6163
6164 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 6165 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 6166 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 6167 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 6168 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 6169 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132 6170 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
17ca87fc 6171 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
252b5132 6172 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 6173 return FALSE;
252b5132 6174
b34976b6 6175 return TRUE;
252b5132
RH
6176}
6177
6178/* Assign file positions for all the reloc sections which are not part
a485e98e 6179 of the loadable file image, and the file position of section headers. */
252b5132 6180
0ce398f1
L
6181static bfd_boolean
6182_bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
252b5132
RH
6183{
6184 file_ptr off;
e06efbf1 6185 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
3e19fb8f 6186 Elf_Internal_Shdr *shdrp;
a485e98e
AM
6187 Elf_Internal_Ehdr *i_ehdrp;
6188 const struct elf_backend_data *bed;
252b5132 6189
12bd6957 6190 off = elf_next_file_pos (abfd);
252b5132 6191
e06efbf1
L
6192 shdrpp = elf_elfsections (abfd);
6193 end_shdrpp = shdrpp + elf_numsections (abfd);
6194 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
252b5132 6195 {
252b5132 6196 shdrp = *shdrpp;
0ce398f1
L
6197 if (shdrp->sh_offset == -1)
6198 {
3e19fb8f 6199 asection *sec = shdrp->bfd_section;
0ce398f1
L
6200 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
6201 || shdrp->sh_type == SHT_RELA);
6202 if (is_rel
3e19fb8f 6203 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
0ce398f1
L
6204 {
6205 if (!is_rel)
6206 {
3e19fb8f
L
6207 const char *name = sec->name;
6208 struct bfd_elf_section_data *d;
6209
0ce398f1 6210 /* Compress DWARF debug sections. */
3e19fb8f 6211 if (!bfd_compress_section (abfd, sec,
0ce398f1
L
6212 shdrp->contents))
6213 return FALSE;
3e19fb8f
L
6214
6215 if (sec->compress_status == COMPRESS_SECTION_DONE
6216 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
6217 {
6218 /* If section is compressed with zlib-gnu, convert
6219 section name from .debug_* to .zdebug_*. */
6220 char *new_name
6221 = convert_debug_to_zdebug (abfd, name);
6222 if (new_name == NULL)
6223 return FALSE;
6224 name = new_name;
6225 }
dd905818 6226 /* Add section name to section name section. */
3e19fb8f
L
6227 if (shdrp->sh_name != (unsigned int) -1)
6228 abort ();
6229 shdrp->sh_name
6230 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6231 name, FALSE);
6232 d = elf_section_data (sec);
6233
dd905818 6234 /* Add reloc section name to section name section. */
3e19fb8f
L
6235 if (d->rel.hdr
6236 && !_bfd_elf_set_reloc_sh_name (abfd,
6237 d->rel.hdr,
6238 name, FALSE))
6239 return FALSE;
6240 if (d->rela.hdr
6241 && !_bfd_elf_set_reloc_sh_name (abfd,
6242 d->rela.hdr,
91cb26da 6243 name, TRUE))
3e19fb8f
L
6244 return FALSE;
6245
0ce398f1 6246 /* Update section size and contents. */
3e19fb8f
L
6247 shdrp->sh_size = sec->size;
6248 shdrp->contents = sec->contents;
0ce398f1
L
6249 shdrp->bfd_section->contents = NULL;
6250 }
6251 off = _bfd_elf_assign_file_position_for_section (shdrp,
6252 off,
6253 TRUE);
6254 }
6255 }
252b5132
RH
6256 }
6257
3e19fb8f
L
6258 /* Place section name section after DWARF debug sections have been
6259 compressed. */
6260 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6261 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6262 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6263 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
6264
6265 /* Place the section headers. */
a485e98e
AM
6266 i_ehdrp = elf_elfheader (abfd);
6267 bed = get_elf_backend_data (abfd);
6268 off = align_file_position (off, 1 << bed->s->log_file_align);
6269 i_ehdrp->e_shoff = off;
6270 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
12bd6957 6271 elf_next_file_pos (abfd) = off;
0ce398f1
L
6272
6273 return TRUE;
252b5132
RH
6274}
6275
b34976b6 6276bfd_boolean
217aa764 6277_bfd_elf_write_object_contents (bfd *abfd)
252b5132 6278{
9c5bfbb7 6279 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6280 Elf_Internal_Shdr **i_shdrp;
b34976b6 6281 bfd_boolean failed;
9ad5cbcf 6282 unsigned int count, num_sec;
30e8ee25 6283 struct elf_obj_tdata *t;
252b5132
RH
6284
6285 if (! abfd->output_has_begun
217aa764 6286 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6287 return FALSE;
252b5132
RH
6288
6289 i_shdrp = elf_elfsections (abfd);
252b5132 6290
b34976b6 6291 failed = FALSE;
252b5132
RH
6292 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6293 if (failed)
b34976b6 6294 return FALSE;
252b5132 6295
0ce398f1
L
6296 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6297 return FALSE;
252b5132 6298
c044fabd 6299 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
6300 num_sec = elf_numsections (abfd);
6301 for (count = 1; count < num_sec; count++)
252b5132 6302 {
3e19fb8f
L
6303 i_shdrp[count]->sh_name
6304 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6305 i_shdrp[count]->sh_name);
252b5132
RH
6306 if (bed->elf_backend_section_processing)
6307 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
6308 if (i_shdrp[count]->contents)
6309 {
dc810e39
AM
6310 bfd_size_type amt = i_shdrp[count]->sh_size;
6311
252b5132 6312 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 6313 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 6314 return FALSE;
252b5132
RH
6315 }
6316 }
6317
6318 /* Write out the section header names. */
30e8ee25 6319 t = elf_tdata (abfd);
26ae6d5e 6320 if (elf_shstrtab (abfd) != NULL
30e8ee25 6321 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 6322 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 6323 return FALSE;
252b5132
RH
6324
6325 if (bed->elf_backend_final_write_processing)
12bd6957 6326 (*bed->elf_backend_final_write_processing) (abfd, elf_linker (abfd));
252b5132 6327
ff59fc36
RM
6328 if (!bed->s->write_shdrs_and_ehdr (abfd))
6329 return FALSE;
6330
6331 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
c0355132
AM
6332 if (t->o->build_id.after_write_object_contents != NULL)
6333 return (*t->o->build_id.after_write_object_contents) (abfd);
ff59fc36
RM
6334
6335 return TRUE;
252b5132
RH
6336}
6337
b34976b6 6338bfd_boolean
217aa764 6339_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 6340{
c044fabd 6341 /* Hopefully this can be done just like an object file. */
252b5132
RH
6342 return _bfd_elf_write_object_contents (abfd);
6343}
c044fabd
KH
6344
6345/* Given a section, search the header to find them. */
6346
cb33740c 6347unsigned int
198beae2 6348_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 6349{
9c5bfbb7 6350 const struct elf_backend_data *bed;
91d6fa6a 6351 unsigned int sec_index;
252b5132 6352
9ad5cbcf
AM
6353 if (elf_section_data (asect) != NULL
6354 && elf_section_data (asect)->this_idx != 0)
6355 return elf_section_data (asect)->this_idx;
6356
6357 if (bfd_is_abs_section (asect))
91d6fa6a 6358 sec_index = SHN_ABS;
af746e92 6359 else if (bfd_is_com_section (asect))
91d6fa6a 6360 sec_index = SHN_COMMON;
af746e92 6361 else if (bfd_is_und_section (asect))
91d6fa6a 6362 sec_index = SHN_UNDEF;
af746e92 6363 else
91d6fa6a 6364 sec_index = SHN_BAD;
252b5132 6365
af746e92 6366 bed = get_elf_backend_data (abfd);
252b5132
RH
6367 if (bed->elf_backend_section_from_bfd_section)
6368 {
91d6fa6a 6369 int retval = sec_index;
9ad5cbcf 6370
af746e92
AM
6371 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6372 return retval;
252b5132
RH
6373 }
6374
91d6fa6a 6375 if (sec_index == SHN_BAD)
af746e92 6376 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 6377
91d6fa6a 6378 return sec_index;
252b5132
RH
6379}
6380
6381/* Given a BFD symbol, return the index in the ELF symbol table, or -1
6382 on error. */
6383
6384int
217aa764 6385_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
6386{
6387 asymbol *asym_ptr = *asym_ptr_ptr;
6388 int idx;
6389 flagword flags = asym_ptr->flags;
6390
6391 /* When gas creates relocations against local labels, it creates its
6392 own symbol for the section, but does put the symbol into the
6393 symbol chain, so udata is 0. When the linker is generating
6394 relocatable output, this section symbol may be for one of the
6395 input sections rather than the output section. */
6396 if (asym_ptr->udata.i == 0
6397 && (flags & BSF_SECTION_SYM)
6398 && asym_ptr->section)
6399 {
5372391b 6400 asection *sec;
252b5132
RH
6401 int indx;
6402
5372391b
AM
6403 sec = asym_ptr->section;
6404 if (sec->owner != abfd && sec->output_section != NULL)
6405 sec = sec->output_section;
6406 if (sec->owner == abfd
6407 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 6408 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
6409 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
6410 }
6411
6412 idx = asym_ptr->udata.i;
6413
6414 if (idx == 0)
6415 {
6416 /* This case can occur when using --strip-symbol on a symbol
08a40648 6417 which is used in a relocation entry. */
4eca0228 6418 _bfd_error_handler
695344c0 6419 /* xgettext:c-format */
d003868e
AM
6420 (_("%B: symbol `%s' required but not present"),
6421 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
6422 bfd_set_error (bfd_error_no_symbols);
6423 return -1;
6424 }
6425
6426#if DEBUG & 4
6427 {
6428 fprintf (stderr,
9ccb8af9
AM
6429 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx\n",
6430 (long) asym_ptr, asym_ptr->name, idx, (long) flags);
252b5132
RH
6431 fflush (stderr);
6432 }
6433#endif
6434
6435 return idx;
6436}
6437
84d1d650 6438/* Rewrite program header information. */
252b5132 6439
b34976b6 6440static bfd_boolean
84d1d650 6441rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 6442{
b34976b6
AM
6443 Elf_Internal_Ehdr *iehdr;
6444 struct elf_segment_map *map;
6445 struct elf_segment_map *map_first;
6446 struct elf_segment_map **pointer_to_map;
6447 Elf_Internal_Phdr *segment;
6448 asection *section;
6449 unsigned int i;
6450 unsigned int num_segments;
6451 bfd_boolean phdr_included = FALSE;
5c44b38e 6452 bfd_boolean p_paddr_valid;
b34976b6
AM
6453 bfd_vma maxpagesize;
6454 struct elf_segment_map *phdr_adjust_seg = NULL;
6455 unsigned int phdr_adjust_num = 0;
9c5bfbb7 6456 const struct elf_backend_data *bed;
bc67d8a6 6457
caf47ea6 6458 bed = get_elf_backend_data (ibfd);
252b5132
RH
6459 iehdr = elf_elfheader (ibfd);
6460
bc67d8a6 6461 map_first = NULL;
c044fabd 6462 pointer_to_map = &map_first;
252b5132
RH
6463
6464 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
6465 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6466
6467 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
6468#define SEGMENT_END(segment, start) \
6469 (start + (segment->p_memsz > segment->p_filesz \
6470 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 6471
eecdbe52
JJ
6472#define SECTION_SIZE(section, segment) \
6473 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6474 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 6475 ? section->size : 0)
eecdbe52 6476
b34976b6 6477 /* Returns TRUE if the given section is contained within
bc67d8a6 6478 the given segment. VMA addresses are compared. */
aecc8f8a
AM
6479#define IS_CONTAINED_BY_VMA(section, segment) \
6480 (section->vma >= segment->p_vaddr \
eecdbe52 6481 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 6482 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 6483
b34976b6 6484 /* Returns TRUE if the given section is contained within
bc67d8a6 6485 the given segment. LMA addresses are compared. */
aecc8f8a
AM
6486#define IS_CONTAINED_BY_LMA(section, segment, base) \
6487 (section->lma >= base \
eecdbe52 6488 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 6489 <= SEGMENT_END (segment, base)))
252b5132 6490
0efc80c8
L
6491 /* Handle PT_NOTE segment. */
6492#define IS_NOTE(p, s) \
aecc8f8a 6493 (p->p_type == PT_NOTE \
0efc80c8 6494 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 6495 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6496 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6497 <= p->p_offset + p->p_filesz))
252b5132 6498
0efc80c8
L
6499 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6500 etc. */
6501#define IS_COREFILE_NOTE(p, s) \
6502 (IS_NOTE (p, s) \
6503 && bfd_get_format (ibfd) == bfd_core \
6504 && s->vma == 0 \
6505 && s->lma == 0)
6506
252b5132
RH
6507 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6508 linker, which generates a PT_INTERP section with p_vaddr and
6509 p_memsz set to 0. */
aecc8f8a
AM
6510#define IS_SOLARIS_PT_INTERP(p, s) \
6511 (p->p_vaddr == 0 \
6512 && p->p_paddr == 0 \
6513 && p->p_memsz == 0 \
6514 && p->p_filesz > 0 \
6515 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 6516 && s->size > 0 \
aecc8f8a 6517 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6518 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6519 <= p->p_offset + p->p_filesz))
5c440b1e 6520
bc67d8a6
NC
6521 /* Decide if the given section should be included in the given segment.
6522 A section will be included if:
f5ffc919 6523 1. It is within the address space of the segment -- we use the LMA
08a40648 6524 if that is set for the segment and the VMA otherwise,
0efc80c8 6525 2. It is an allocated section or a NOTE section in a PT_NOTE
d324f6d6 6526 segment.
bc67d8a6 6527 3. There is an output section associated with it,
eecdbe52 6528 4. The section has not already been allocated to a previous segment.
2b05f1b7 6529 5. PT_GNU_STACK segments do not include any sections.
03394ac9 6530 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
6531 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6532 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 6533 (with the possible exception of .dynamic). */
9f17e2a6 6534#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
6535 ((((segment->p_paddr \
6536 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
6537 : IS_CONTAINED_BY_VMA (section, segment)) \
6538 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 6539 || IS_NOTE (segment, section)) \
2b05f1b7
L
6540 && segment->p_type != PT_GNU_STACK \
6541 && (segment->p_type != PT_TLS \
6542 || (section->flags & SEC_THREAD_LOCAL)) \
6543 && (segment->p_type == PT_LOAD \
6544 || segment->p_type == PT_TLS \
6545 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6546 && (segment->p_type != PT_DYNAMIC \
6547 || SECTION_SIZE (section, segment) > 0 \
6548 || (segment->p_paddr \
6549 ? segment->p_paddr != section->lma \
6550 : segment->p_vaddr != section->vma) \
6551 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
6552 == 0)) \
0067a569 6553 && !section->segment_mark)
bc67d8a6 6554
9f17e2a6
L
6555/* If the output section of a section in the input segment is NULL,
6556 it is removed from the corresponding output segment. */
6557#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
6558 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
6559 && section->output_section != NULL)
6560
b34976b6 6561 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
6562#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6563 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6564
6565 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6566 their VMA address ranges and their LMA address ranges overlap.
6567 It is possible to have overlapping VMA ranges without overlapping LMA
6568 ranges. RedBoot images for example can have both .data and .bss mapped
6569 to the same VMA range, but with the .data section mapped to a different
6570 LMA. */
aecc8f8a 6571#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 6572 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 6573 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 6574 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 6575 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
6576
6577 /* Initialise the segment mark field. */
6578 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 6579 section->segment_mark = FALSE;
bc67d8a6 6580
5c44b38e
AM
6581 /* The Solaris linker creates program headers in which all the
6582 p_paddr fields are zero. When we try to objcopy or strip such a
6583 file, we get confused. Check for this case, and if we find it
6584 don't set the p_paddr_valid fields. */
6585 p_paddr_valid = FALSE;
6586 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6587 i < num_segments;
6588 i++, segment++)
6589 if (segment->p_paddr != 0)
6590 {
6591 p_paddr_valid = TRUE;
6592 break;
6593 }
6594
252b5132 6595 /* Scan through the segments specified in the program header
bc67d8a6 6596 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 6597 in the loadable segments. These can be created by weird
aecc8f8a 6598 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
6599 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6600 i < num_segments;
c044fabd 6601 i++, segment++)
252b5132 6602 {
252b5132 6603 unsigned int j;
c044fabd 6604 Elf_Internal_Phdr *segment2;
252b5132 6605
aecc8f8a
AM
6606 if (segment->p_type == PT_INTERP)
6607 for (section = ibfd->sections; section; section = section->next)
6608 if (IS_SOLARIS_PT_INTERP (segment, section))
6609 {
6610 /* Mininal change so that the normal section to segment
4cc11e76 6611 assignment code will work. */
aecc8f8a
AM
6612 segment->p_vaddr = section->vma;
6613 break;
6614 }
6615
bc67d8a6 6616 if (segment->p_type != PT_LOAD)
b10a8ae0
L
6617 {
6618 /* Remove PT_GNU_RELRO segment. */
6619 if (segment->p_type == PT_GNU_RELRO)
6620 segment->p_type = PT_NULL;
6621 continue;
6622 }
c044fabd 6623
bc67d8a6 6624 /* Determine if this segment overlaps any previous segments. */
0067a569 6625 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
6626 {
6627 bfd_signed_vma extra_length;
c044fabd 6628
bc67d8a6 6629 if (segment2->p_type != PT_LOAD
0067a569 6630 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 6631 continue;
c044fabd 6632
bc67d8a6
NC
6633 /* Merge the two segments together. */
6634 if (segment2->p_vaddr < segment->p_vaddr)
6635 {
c044fabd 6636 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 6637 SEGMENT. */
0067a569
AM
6638 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
6639 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 6640
bc67d8a6
NC
6641 if (extra_length > 0)
6642 {
0067a569 6643 segment2->p_memsz += extra_length;
bc67d8a6
NC
6644 segment2->p_filesz += extra_length;
6645 }
c044fabd 6646
bc67d8a6 6647 segment->p_type = PT_NULL;
c044fabd 6648
bc67d8a6
NC
6649 /* Since we have deleted P we must restart the outer loop. */
6650 i = 0;
6651 segment = elf_tdata (ibfd)->phdr;
6652 break;
6653 }
6654 else
6655 {
c044fabd 6656 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 6657 SEGMENT2. */
0067a569
AM
6658 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
6659 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 6660
bc67d8a6
NC
6661 if (extra_length > 0)
6662 {
0067a569 6663 segment->p_memsz += extra_length;
bc67d8a6
NC
6664 segment->p_filesz += extra_length;
6665 }
c044fabd 6666
bc67d8a6
NC
6667 segment2->p_type = PT_NULL;
6668 }
6669 }
6670 }
c044fabd 6671
bc67d8a6
NC
6672 /* The second scan attempts to assign sections to segments. */
6673 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6674 i < num_segments;
0067a569 6675 i++, segment++)
bc67d8a6 6676 {
0067a569
AM
6677 unsigned int section_count;
6678 asection **sections;
6679 asection *output_section;
6680 unsigned int isec;
6681 bfd_vma matching_lma;
6682 bfd_vma suggested_lma;
6683 unsigned int j;
dc810e39 6684 bfd_size_type amt;
0067a569
AM
6685 asection *first_section;
6686 bfd_boolean first_matching_lma;
6687 bfd_boolean first_suggested_lma;
bc67d8a6
NC
6688
6689 if (segment->p_type == PT_NULL)
6690 continue;
c044fabd 6691
9f17e2a6 6692 first_section = NULL;
bc67d8a6 6693 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
6694 for (section = ibfd->sections, section_count = 0;
6695 section != NULL;
6696 section = section->next)
9f17e2a6
L
6697 {
6698 /* Find the first section in the input segment, which may be
6699 removed from the corresponding output segment. */
6700 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
6701 {
6702 if (first_section == NULL)
6703 first_section = section;
6704 if (section->output_section != NULL)
6705 ++section_count;
6706 }
6707 }
811072d8 6708
b5f852ea
NC
6709 /* Allocate a segment map big enough to contain
6710 all of the sections we have selected. */
dc810e39
AM
6711 amt = sizeof (struct elf_segment_map);
6712 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6713 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 6714 if (map == NULL)
b34976b6 6715 return FALSE;
252b5132
RH
6716
6717 /* Initialise the fields of the segment map. Default to
6718 using the physical address of the segment in the input BFD. */
0067a569
AM
6719 map->next = NULL;
6720 map->p_type = segment->p_type;
6721 map->p_flags = segment->p_flags;
bc67d8a6 6722 map->p_flags_valid = 1;
55d55ac7 6723
9f17e2a6
L
6724 /* If the first section in the input segment is removed, there is
6725 no need to preserve segment physical address in the corresponding
6726 output segment. */
945c025a 6727 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
6728 {
6729 map->p_paddr = segment->p_paddr;
5c44b38e 6730 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 6731 }
252b5132
RH
6732
6733 /* Determine if this segment contains the ELF file header
6734 and if it contains the program headers themselves. */
bc67d8a6
NC
6735 map->includes_filehdr = (segment->p_offset == 0
6736 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 6737 map->includes_phdrs = 0;
252b5132 6738
0067a569 6739 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 6740 {
bc67d8a6
NC
6741 map->includes_phdrs =
6742 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6743 && (segment->p_offset + segment->p_filesz
252b5132
RH
6744 >= ((bfd_vma) iehdr->e_phoff
6745 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 6746
bc67d8a6 6747 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 6748 phdr_included = TRUE;
252b5132
RH
6749 }
6750
bc67d8a6 6751 if (section_count == 0)
252b5132
RH
6752 {
6753 /* Special segments, such as the PT_PHDR segment, may contain
6754 no sections, but ordinary, loadable segments should contain
1ed89aa9 6755 something. They are allowed by the ELF spec however, so only
f98450c6
NC
6756 a warning is produced.
6757 There is however the valid use case of embedded systems which
6758 have segments with p_filesz of 0 and a p_memsz > 0 to initialize
6759 flash memory with zeros. No warning is shown for that case. */
6760 if (segment->p_type == PT_LOAD
6761 && (segment->p_filesz > 0 || segment->p_memsz == 0))
6762 /* xgettext:c-format */
4eca0228 6763 _bfd_error_handler (_("\
f98450c6
NC
6764%B: warning: Empty loadable segment detected at vaddr=0x%.8x, is this intentional ?"),
6765 ibfd, segment->p_vaddr);
252b5132 6766
bc67d8a6 6767 map->count = 0;
c044fabd
KH
6768 *pointer_to_map = map;
6769 pointer_to_map = &map->next;
252b5132
RH
6770
6771 continue;
6772 }
6773
6774 /* Now scan the sections in the input BFD again and attempt
6775 to add their corresponding output sections to the segment map.
6776 The problem here is how to handle an output section which has
6777 been moved (ie had its LMA changed). There are four possibilities:
6778
6779 1. None of the sections have been moved.
6780 In this case we can continue to use the segment LMA from the
6781 input BFD.
6782
6783 2. All of the sections have been moved by the same amount.
6784 In this case we can change the segment's LMA to match the LMA
6785 of the first section.
6786
6787 3. Some of the sections have been moved, others have not.
6788 In this case those sections which have not been moved can be
6789 placed in the current segment which will have to have its size,
6790 and possibly its LMA changed, and a new segment or segments will
6791 have to be created to contain the other sections.
6792
b5f852ea 6793 4. The sections have been moved, but not by the same amount.
252b5132
RH
6794 In this case we can change the segment's LMA to match the LMA
6795 of the first section and we will have to create a new segment
6796 or segments to contain the other sections.
6797
6798 In order to save time, we allocate an array to hold the section
6799 pointers that we are interested in. As these sections get assigned
6800 to a segment, they are removed from this array. */
6801
a50b1753 6802 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 6803 if (sections == NULL)
b34976b6 6804 return FALSE;
252b5132
RH
6805
6806 /* Step One: Scan for segment vs section LMA conflicts.
6807 Also add the sections to the section array allocated above.
6808 Also add the sections to the current segment. In the common
6809 case, where the sections have not been moved, this means that
6810 we have completely filled the segment, and there is nothing
6811 more to do. */
252b5132 6812 isec = 0;
72730e0c 6813 matching_lma = 0;
252b5132 6814 suggested_lma = 0;
0067a569
AM
6815 first_matching_lma = TRUE;
6816 first_suggested_lma = TRUE;
252b5132 6817
461c4b2e 6818 for (section = first_section, j = 0;
bc67d8a6
NC
6819 section != NULL;
6820 section = section->next)
252b5132 6821 {
caf47ea6 6822 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 6823 {
bc67d8a6
NC
6824 output_section = section->output_section;
6825
0067a569 6826 sections[j++] = section;
252b5132
RH
6827
6828 /* The Solaris native linker always sets p_paddr to 0.
6829 We try to catch that case here, and set it to the
5e8d7549
NC
6830 correct value. Note - some backends require that
6831 p_paddr be left as zero. */
5c44b38e 6832 if (!p_paddr_valid
4455705d 6833 && segment->p_vaddr != 0
0067a569 6834 && !bed->want_p_paddr_set_to_zero
252b5132 6835 && isec == 0
bc67d8a6 6836 && output_section->lma != 0
0067a569
AM
6837 && output_section->vma == (segment->p_vaddr
6838 + (map->includes_filehdr
6839 ? iehdr->e_ehsize
6840 : 0)
6841 + (map->includes_phdrs
6842 ? (iehdr->e_phnum
6843 * iehdr->e_phentsize)
6844 : 0)))
bc67d8a6 6845 map->p_paddr = segment->p_vaddr;
252b5132
RH
6846
6847 /* Match up the physical address of the segment with the
6848 LMA address of the output section. */
bc67d8a6 6849 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 6850 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
6851 || (bed->want_p_paddr_set_to_zero
6852 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 6853 {
0067a569
AM
6854 if (first_matching_lma || output_section->lma < matching_lma)
6855 {
6856 matching_lma = output_section->lma;
6857 first_matching_lma = FALSE;
6858 }
252b5132
RH
6859
6860 /* We assume that if the section fits within the segment
bc67d8a6 6861 then it does not overlap any other section within that
252b5132 6862 segment. */
0067a569
AM
6863 map->sections[isec++] = output_section;
6864 }
6865 else if (first_suggested_lma)
6866 {
6867 suggested_lma = output_section->lma;
6868 first_suggested_lma = FALSE;
252b5132 6869 }
147d51c2
L
6870
6871 if (j == section_count)
6872 break;
252b5132
RH
6873 }
6874 }
6875
bc67d8a6 6876 BFD_ASSERT (j == section_count);
252b5132
RH
6877
6878 /* Step Two: Adjust the physical address of the current segment,
6879 if necessary. */
bc67d8a6 6880 if (isec == section_count)
252b5132
RH
6881 {
6882 /* All of the sections fitted within the segment as currently
6883 specified. This is the default case. Add the segment to
6884 the list of built segments and carry on to process the next
6885 program header in the input BFD. */
bc67d8a6 6886 map->count = section_count;
c044fabd
KH
6887 *pointer_to_map = map;
6888 pointer_to_map = &map->next;
08a40648 6889
5c44b38e
AM
6890 if (p_paddr_valid
6891 && !bed->want_p_paddr_set_to_zero
147d51c2 6892 && matching_lma != map->p_paddr
5c44b38e
AM
6893 && !map->includes_filehdr
6894 && !map->includes_phdrs)
3271a814
NS
6895 /* There is some padding before the first section in the
6896 segment. So, we must account for that in the output
6897 segment's vma. */
6898 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 6899
252b5132
RH
6900 free (sections);
6901 continue;
6902 }
252b5132
RH
6903 else
6904 {
0067a569 6905 if (!first_matching_lma)
72730e0c
AM
6906 {
6907 /* At least one section fits inside the current segment.
6908 Keep it, but modify its physical address to match the
6909 LMA of the first section that fitted. */
bc67d8a6 6910 map->p_paddr = matching_lma;
72730e0c
AM
6911 }
6912 else
6913 {
6914 /* None of the sections fitted inside the current segment.
6915 Change the current segment's physical address to match
6916 the LMA of the first section. */
bc67d8a6 6917 map->p_paddr = suggested_lma;
72730e0c
AM
6918 }
6919
bc67d8a6
NC
6920 /* Offset the segment physical address from the lma
6921 to allow for space taken up by elf headers. */
6922 if (map->includes_filehdr)
010c8431
AM
6923 {
6924 if (map->p_paddr >= iehdr->e_ehsize)
6925 map->p_paddr -= iehdr->e_ehsize;
6926 else
6927 {
6928 map->includes_filehdr = FALSE;
6929 map->includes_phdrs = FALSE;
6930 }
6931 }
252b5132 6932
bc67d8a6
NC
6933 if (map->includes_phdrs)
6934 {
010c8431
AM
6935 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
6936 {
6937 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
6938
6939 /* iehdr->e_phnum is just an estimate of the number
6940 of program headers that we will need. Make a note
6941 here of the number we used and the segment we chose
6942 to hold these headers, so that we can adjust the
6943 offset when we know the correct value. */
6944 phdr_adjust_num = iehdr->e_phnum;
6945 phdr_adjust_seg = map;
6946 }
6947 else
6948 map->includes_phdrs = FALSE;
bc67d8a6 6949 }
252b5132
RH
6950 }
6951
6952 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 6953 those that fit to the current segment and removing them from the
252b5132
RH
6954 sections array; but making sure not to leave large gaps. Once all
6955 possible sections have been assigned to the current segment it is
6956 added to the list of built segments and if sections still remain
6957 to be assigned, a new segment is constructed before repeating
6958 the loop. */
6959 isec = 0;
6960 do
6961 {
bc67d8a6 6962 map->count = 0;
252b5132 6963 suggested_lma = 0;
0067a569 6964 first_suggested_lma = TRUE;
252b5132
RH
6965
6966 /* Fill the current segment with sections that fit. */
bc67d8a6 6967 for (j = 0; j < section_count; j++)
252b5132 6968 {
bc67d8a6 6969 section = sections[j];
252b5132 6970
bc67d8a6 6971 if (section == NULL)
252b5132
RH
6972 continue;
6973
bc67d8a6 6974 output_section = section->output_section;
252b5132 6975
bc67d8a6 6976 BFD_ASSERT (output_section != NULL);
c044fabd 6977
bc67d8a6
NC
6978 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
6979 || IS_COREFILE_NOTE (segment, section))
252b5132 6980 {
bc67d8a6 6981 if (map->count == 0)
252b5132
RH
6982 {
6983 /* If the first section in a segment does not start at
bc67d8a6
NC
6984 the beginning of the segment, then something is
6985 wrong. */
0067a569
AM
6986 if (output_section->lma
6987 != (map->p_paddr
6988 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
6989 + (map->includes_phdrs
6990 ? iehdr->e_phnum * iehdr->e_phentsize
6991 : 0)))
252b5132
RH
6992 abort ();
6993 }
6994 else
6995 {
0067a569 6996 asection *prev_sec;
252b5132 6997
bc67d8a6 6998 prev_sec = map->sections[map->count - 1];
252b5132
RH
6999
7000 /* If the gap between the end of the previous section
bc67d8a6
NC
7001 and the start of this section is more than
7002 maxpagesize then we need to start a new segment. */
eea6121a 7003 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 7004 maxpagesize)
caf47ea6 7005 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 7006 || (prev_sec->lma + prev_sec->size
079e9a2f 7007 > output_section->lma))
252b5132 7008 {
0067a569
AM
7009 if (first_suggested_lma)
7010 {
7011 suggested_lma = output_section->lma;
7012 first_suggested_lma = FALSE;
7013 }
252b5132
RH
7014
7015 continue;
7016 }
7017 }
7018
bc67d8a6 7019 map->sections[map->count++] = output_section;
252b5132
RH
7020 ++isec;
7021 sections[j] = NULL;
b34976b6 7022 section->segment_mark = TRUE;
252b5132 7023 }
0067a569
AM
7024 else if (first_suggested_lma)
7025 {
7026 suggested_lma = output_section->lma;
7027 first_suggested_lma = FALSE;
7028 }
252b5132
RH
7029 }
7030
bc67d8a6 7031 BFD_ASSERT (map->count > 0);
252b5132
RH
7032
7033 /* Add the current segment to the list of built segments. */
c044fabd
KH
7034 *pointer_to_map = map;
7035 pointer_to_map = &map->next;
252b5132 7036
bc67d8a6 7037 if (isec < section_count)
252b5132
RH
7038 {
7039 /* We still have not allocated all of the sections to
7040 segments. Create a new segment here, initialise it
7041 and carry on looping. */
dc810e39
AM
7042 amt = sizeof (struct elf_segment_map);
7043 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
5964fc3a 7044 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 7045 if (map == NULL)
5ed6aba4
NC
7046 {
7047 free (sections);
7048 return FALSE;
7049 }
252b5132
RH
7050
7051 /* Initialise the fields of the segment map. Set the physical
7052 physical address to the LMA of the first section that has
7053 not yet been assigned. */
0067a569
AM
7054 map->next = NULL;
7055 map->p_type = segment->p_type;
7056 map->p_flags = segment->p_flags;
7057 map->p_flags_valid = 1;
7058 map->p_paddr = suggested_lma;
5c44b38e 7059 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 7060 map->includes_filehdr = 0;
0067a569 7061 map->includes_phdrs = 0;
252b5132
RH
7062 }
7063 }
bc67d8a6 7064 while (isec < section_count);
252b5132
RH
7065
7066 free (sections);
7067 }
7068
12bd6957 7069 elf_seg_map (obfd) = map_first;
bc67d8a6
NC
7070
7071 /* If we had to estimate the number of program headers that were
9ad5cbcf 7072 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
7073 the offset if necessary. */
7074 if (phdr_adjust_seg != NULL)
7075 {
7076 unsigned int count;
c044fabd 7077
bc67d8a6 7078 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 7079 count++;
252b5132 7080
bc67d8a6
NC
7081 if (count > phdr_adjust_num)
7082 phdr_adjust_seg->p_paddr
7083 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
7084 }
c044fabd 7085
bc67d8a6 7086#undef SEGMENT_END
eecdbe52 7087#undef SECTION_SIZE
bc67d8a6
NC
7088#undef IS_CONTAINED_BY_VMA
7089#undef IS_CONTAINED_BY_LMA
0efc80c8 7090#undef IS_NOTE
252b5132 7091#undef IS_COREFILE_NOTE
bc67d8a6 7092#undef IS_SOLARIS_PT_INTERP
9f17e2a6 7093#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
7094#undef INCLUDE_SECTION_IN_SEGMENT
7095#undef SEGMENT_AFTER_SEGMENT
7096#undef SEGMENT_OVERLAPS
b34976b6 7097 return TRUE;
252b5132
RH
7098}
7099
84d1d650
L
7100/* Copy ELF program header information. */
7101
7102static bfd_boolean
7103copy_elf_program_header (bfd *ibfd, bfd *obfd)
7104{
7105 Elf_Internal_Ehdr *iehdr;
7106 struct elf_segment_map *map;
7107 struct elf_segment_map *map_first;
7108 struct elf_segment_map **pointer_to_map;
7109 Elf_Internal_Phdr *segment;
7110 unsigned int i;
7111 unsigned int num_segments;
7112 bfd_boolean phdr_included = FALSE;
88967714 7113 bfd_boolean p_paddr_valid;
84d1d650
L
7114
7115 iehdr = elf_elfheader (ibfd);
7116
7117 map_first = NULL;
7118 pointer_to_map = &map_first;
7119
88967714
AM
7120 /* If all the segment p_paddr fields are zero, don't set
7121 map->p_paddr_valid. */
7122 p_paddr_valid = FALSE;
84d1d650 7123 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
7124 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7125 i < num_segments;
7126 i++, segment++)
7127 if (segment->p_paddr != 0)
7128 {
7129 p_paddr_valid = TRUE;
7130 break;
7131 }
7132
84d1d650
L
7133 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7134 i < num_segments;
7135 i++, segment++)
7136 {
7137 asection *section;
7138 unsigned int section_count;
7139 bfd_size_type amt;
7140 Elf_Internal_Shdr *this_hdr;
53020534 7141 asection *first_section = NULL;
a76e6f2f 7142 asection *lowest_section;
84d1d650 7143
84d1d650
L
7144 /* Compute how many sections are in this segment. */
7145 for (section = ibfd->sections, section_count = 0;
7146 section != NULL;
7147 section = section->next)
7148 {
7149 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7150 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 7151 {
a76e6f2f
AM
7152 if (first_section == NULL)
7153 first_section = section;
3271a814
NS
7154 section_count++;
7155 }
84d1d650
L
7156 }
7157
7158 /* Allocate a segment map big enough to contain
7159 all of the sections we have selected. */
7160 amt = sizeof (struct elf_segment_map);
7161 if (section_count != 0)
7162 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 7163 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
7164 if (map == NULL)
7165 return FALSE;
7166
7167 /* Initialize the fields of the output segment map with the
7168 input segment. */
7169 map->next = NULL;
7170 map->p_type = segment->p_type;
7171 map->p_flags = segment->p_flags;
7172 map->p_flags_valid = 1;
7173 map->p_paddr = segment->p_paddr;
88967714 7174 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
7175 map->p_align = segment->p_align;
7176 map->p_align_valid = 1;
3271a814 7177 map->p_vaddr_offset = 0;
84d1d650 7178
04c3a755
NS
7179 if (map->p_type == PT_GNU_RELRO
7180 || map->p_type == PT_GNU_STACK)
b10a8ae0
L
7181 {
7182 /* The PT_GNU_RELRO segment may contain the first a few
7183 bytes in the .got.plt section even if the whole .got.plt
7184 section isn't in the PT_GNU_RELRO segment. We won't
04c3a755
NS
7185 change the size of the PT_GNU_RELRO segment.
7186 Similarly, PT_GNU_STACK size is significant on uclinux
7187 systems. */
9433b9b1 7188 map->p_size = segment->p_memsz;
b10a8ae0
L
7189 map->p_size_valid = 1;
7190 }
7191
84d1d650
L
7192 /* Determine if this segment contains the ELF file header
7193 and if it contains the program headers themselves. */
7194 map->includes_filehdr = (segment->p_offset == 0
7195 && segment->p_filesz >= iehdr->e_ehsize);
7196
7197 map->includes_phdrs = 0;
7198 if (! phdr_included || segment->p_type != PT_LOAD)
7199 {
7200 map->includes_phdrs =
7201 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7202 && (segment->p_offset + segment->p_filesz
7203 >= ((bfd_vma) iehdr->e_phoff
7204 + iehdr->e_phnum * iehdr->e_phentsize)));
7205
7206 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7207 phdr_included = TRUE;
7208 }
7209
bbefd0a9 7210 lowest_section = NULL;
84d1d650
L
7211 if (section_count != 0)
7212 {
7213 unsigned int isec = 0;
7214
53020534 7215 for (section = first_section;
84d1d650
L
7216 section != NULL;
7217 section = section->next)
7218 {
7219 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7220 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
7221 {
7222 map->sections[isec++] = section->output_section;
a76e6f2f
AM
7223 if ((section->flags & SEC_ALLOC) != 0)
7224 {
7225 bfd_vma seg_off;
7226
bbefd0a9
AM
7227 if (lowest_section == NULL
7228 || section->lma < lowest_section->lma)
fb8a5684
AM
7229 lowest_section = section;
7230
a76e6f2f
AM
7231 /* Section lmas are set up from PT_LOAD header
7232 p_paddr in _bfd_elf_make_section_from_shdr.
7233 If this header has a p_paddr that disagrees
7234 with the section lma, flag the p_paddr as
7235 invalid. */
7236 if ((section->flags & SEC_LOAD) != 0)
7237 seg_off = this_hdr->sh_offset - segment->p_offset;
7238 else
7239 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7240 if (section->lma - segment->p_paddr != seg_off)
7241 map->p_paddr_valid = FALSE;
7242 }
53020534
L
7243 if (isec == section_count)
7244 break;
7245 }
84d1d650
L
7246 }
7247 }
7248
a76e6f2f
AM
7249 if (map->includes_filehdr && lowest_section != NULL)
7250 /* We need to keep the space used by the headers fixed. */
7251 map->header_size = lowest_section->vma - segment->p_vaddr;
d324f6d6 7252
a76e6f2f
AM
7253 if (!map->includes_phdrs
7254 && !map->includes_filehdr
7255 && map->p_paddr_valid)
7256 /* There is some other padding before the first section. */
7257 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
7258 - segment->p_paddr);
7259
84d1d650
L
7260 map->count = section_count;
7261 *pointer_to_map = map;
7262 pointer_to_map = &map->next;
7263 }
7264
12bd6957 7265 elf_seg_map (obfd) = map_first;
84d1d650
L
7266 return TRUE;
7267}
7268
7269/* Copy private BFD data. This copies or rewrites ELF program header
7270 information. */
7271
7272static bfd_boolean
7273copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7274{
84d1d650
L
7275 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7276 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7277 return TRUE;
7278
7279 if (elf_tdata (ibfd)->phdr == NULL)
7280 return TRUE;
7281
7282 if (ibfd->xvec == obfd->xvec)
7283 {
cb3ff1e5
NC
7284 /* Check to see if any sections in the input BFD
7285 covered by ELF program header have changed. */
d55ce4e2 7286 Elf_Internal_Phdr *segment;
84d1d650
L
7287 asection *section, *osec;
7288 unsigned int i, num_segments;
7289 Elf_Internal_Shdr *this_hdr;
147d51c2
L
7290 const struct elf_backend_data *bed;
7291
7292 bed = get_elf_backend_data (ibfd);
7293
7294 /* Regenerate the segment map if p_paddr is set to 0. */
7295 if (bed->want_p_paddr_set_to_zero)
7296 goto rewrite;
84d1d650
L
7297
7298 /* Initialize the segment mark field. */
7299 for (section = obfd->sections; section != NULL;
7300 section = section->next)
7301 section->segment_mark = FALSE;
7302
7303 num_segments = elf_elfheader (ibfd)->e_phnum;
7304 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7305 i < num_segments;
7306 i++, segment++)
7307 {
5f6999aa
NC
7308 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7309 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7310 which severly confuses things, so always regenerate the segment
7311 map in this case. */
7312 if (segment->p_paddr == 0
7313 && segment->p_memsz == 0
7314 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 7315 goto rewrite;
5f6999aa 7316
84d1d650
L
7317 for (section = ibfd->sections;
7318 section != NULL; section = section->next)
7319 {
7320 /* We mark the output section so that we know it comes
7321 from the input BFD. */
7322 osec = section->output_section;
7323 if (osec)
7324 osec->segment_mark = TRUE;
7325
7326 /* Check if this section is covered by the segment. */
7327 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7328 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
7329 {
7330 /* FIXME: Check if its output section is changed or
7331 removed. What else do we need to check? */
7332 if (osec == NULL
7333 || section->flags != osec->flags
7334 || section->lma != osec->lma
7335 || section->vma != osec->vma
7336 || section->size != osec->size
7337 || section->rawsize != osec->rawsize
7338 || section->alignment_power != osec->alignment_power)
7339 goto rewrite;
7340 }
7341 }
7342 }
7343
cb3ff1e5 7344 /* Check to see if any output section do not come from the
84d1d650
L
7345 input BFD. */
7346 for (section = obfd->sections; section != NULL;
7347 section = section->next)
7348 {
535b785f 7349 if (!section->segment_mark)
84d1d650
L
7350 goto rewrite;
7351 else
7352 section->segment_mark = FALSE;
7353 }
7354
7355 return copy_elf_program_header (ibfd, obfd);
7356 }
7357
7358rewrite:
f1d85785
L
7359 if (ibfd->xvec == obfd->xvec)
7360 {
7361 /* When rewriting program header, set the output maxpagesize to
7362 the maximum alignment of input PT_LOAD segments. */
7363 Elf_Internal_Phdr *segment;
7364 unsigned int i;
7365 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7366 bfd_vma maxpagesize = 0;
7367
7368 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7369 i < num_segments;
7370 i++, segment++)
7371 if (segment->p_type == PT_LOAD
7372 && maxpagesize < segment->p_align)
c86934ce
NC
7373 {
7374 /* PR 17512: file: f17299af. */
7375 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
695344c0 7376 /* xgettext:c-format */
4eca0228 7377 _bfd_error_handler (_("\
c86934ce 7378%B: warning: segment alignment of 0x%llx is too large"),
4eca0228 7379 ibfd, (long long) segment->p_align);
c86934ce
NC
7380 else
7381 maxpagesize = segment->p_align;
7382 }
f1d85785
L
7383
7384 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
7385 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
7386 }
7387
84d1d650
L
7388 return rewrite_elf_program_header (ibfd, obfd);
7389}
7390
ccd2ec6a
L
7391/* Initialize private output section information from input section. */
7392
7393bfd_boolean
7394_bfd_elf_init_private_section_data (bfd *ibfd,
7395 asection *isec,
7396 bfd *obfd,
7397 asection *osec,
7398 struct bfd_link_info *link_info)
7399
7400{
7401 Elf_Internal_Shdr *ihdr, *ohdr;
0e1862bb
L
7402 bfd_boolean final_link = (link_info != NULL
7403 && !bfd_link_relocatable (link_info));
ccd2ec6a
L
7404
7405 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7406 || obfd->xvec->flavour != bfd_target_elf_flavour)
7407 return TRUE;
7408
ba85c43e
NC
7409 BFD_ASSERT (elf_section_data (osec) != NULL);
7410
dfa7b0b8
AM
7411 /* For objcopy and relocatable link, don't copy the output ELF
7412 section type from input if the output BFD section flags have been
7413 set to something different. For a final link allow some flags
7414 that the linker clears to differ. */
42bb2e33 7415 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
7416 && (osec->flags == isec->flags
7417 || (final_link
7418 && ((osec->flags ^ isec->flags)
0814be7d 7419 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 7420 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
7421
7422 /* FIXME: Is this correct for all OS/PROC specific flags? */
7423 elf_section_flags (osec) |= (elf_section_flags (isec)
7424 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a 7425
a91e1603
L
7426 /* Copy sh_info from input for mbind section. */
7427 if (elf_section_flags (isec) & SHF_GNU_MBIND)
7428 elf_section_data (osec)->this_hdr.sh_info
7429 = elf_section_data (isec)->this_hdr.sh_info;
7430
ccd2ec6a
L
7431 /* Set things up for objcopy and relocatable link. The output
7432 SHT_GROUP section will have its elf_next_in_group pointing back
7433 to the input group members. Ignore linker created group section.
7434 See elfNN_ia64_object_p in elfxx-ia64.c. */
7bdf4127
AB
7435 if ((link_info == NULL
7436 || !link_info->resolve_section_groups)
7437 && (elf_sec_group (isec) == NULL
7438 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0))
ccd2ec6a 7439 {
7bdf4127
AB
7440 if (elf_section_flags (isec) & SHF_GROUP)
7441 elf_section_flags (osec) |= SHF_GROUP;
7442 elf_next_in_group (osec) = elf_next_in_group (isec);
7443 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
7444 }
7445
7bdf4127
AB
7446 /* If not decompress, preserve SHF_COMPRESSED. */
7447 if (!final_link && (ibfd->flags & BFD_DECOMPRESS) == 0)
7448 elf_section_flags (osec) |= (elf_section_flags (isec)
7449 & SHF_COMPRESSED);
7450
ccd2ec6a
L
7451 ihdr = &elf_section_data (isec)->this_hdr;
7452
7453 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7454 don't use the output section of the linked-to section since it
7455 may be NULL at this point. */
7456 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7457 {
7458 ohdr = &elf_section_data (osec)->this_hdr;
7459 ohdr->sh_flags |= SHF_LINK_ORDER;
7460 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7461 }
7462
7463 osec->use_rela_p = isec->use_rela_p;
7464
7465 return TRUE;
7466}
7467
252b5132
RH
7468/* Copy private section information. This copies over the entsize
7469 field, and sometimes the info field. */
7470
b34976b6 7471bfd_boolean
217aa764
AM
7472_bfd_elf_copy_private_section_data (bfd *ibfd,
7473 asection *isec,
7474 bfd *obfd,
7475 asection *osec)
252b5132
RH
7476{
7477 Elf_Internal_Shdr *ihdr, *ohdr;
7478
7479 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7480 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 7481 return TRUE;
252b5132 7482
252b5132
RH
7483 ihdr = &elf_section_data (isec)->this_hdr;
7484 ohdr = &elf_section_data (osec)->this_hdr;
7485
7486 ohdr->sh_entsize = ihdr->sh_entsize;
7487
7488 if (ihdr->sh_type == SHT_SYMTAB
7489 || ihdr->sh_type == SHT_DYNSYM
7490 || ihdr->sh_type == SHT_GNU_verneed
7491 || ihdr->sh_type == SHT_GNU_verdef)
7492 ohdr->sh_info = ihdr->sh_info;
7493
ccd2ec6a
L
7494 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7495 NULL);
252b5132
RH
7496}
7497
d0bf826b
AM
7498/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7499 necessary if we are removing either the SHT_GROUP section or any of
7500 the group member sections. DISCARDED is the value that a section's
7501 output_section has if the section will be discarded, NULL when this
7502 function is called from objcopy, bfd_abs_section_ptr when called
7503 from the linker. */
80fccad2
BW
7504
7505bfd_boolean
d0bf826b 7506_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 7507{
30288845
AM
7508 asection *isec;
7509
30288845 7510 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 7511 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
7512 {
7513 asection *first = elf_next_in_group (isec);
7514 asection *s = first;
d0bf826b
AM
7515 bfd_size_type removed = 0;
7516
30288845
AM
7517 while (s != NULL)
7518 {
415f38a6
AM
7519 /* If this member section is being output but the
7520 SHT_GROUP section is not, then clear the group info
7521 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
7522 if (s->output_section != discarded
7523 && isec->output_section == discarded)
30288845
AM
7524 {
7525 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7526 elf_group_name (s->output_section) = NULL;
7527 }
415f38a6
AM
7528 /* Conversely, if the member section is not being output
7529 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
7530 else if (s->output_section == discarded
7531 && isec->output_section != discarded)
7532 removed += 4;
30288845
AM
7533 s = elf_next_in_group (s);
7534 if (s == first)
7535 break;
7536 }
d0bf826b
AM
7537 if (removed != 0)
7538 {
7539 if (discarded != NULL)
7540 {
7541 /* If we've been called for ld -r, then we need to
7542 adjust the input section size. This function may
7543 be called multiple times, so save the original
7544 size. */
7545 if (isec->rawsize == 0)
7546 isec->rawsize = isec->size;
7547 isec->size = isec->rawsize - removed;
7548 }
7549 else
7550 {
7551 /* Adjust the output section size when called from
7552 objcopy. */
7553 isec->output_section->size -= removed;
7554 }
7555 }
30288845
AM
7556 }
7557
80fccad2
BW
7558 return TRUE;
7559}
7560
d0bf826b
AM
7561/* Copy private header information. */
7562
7563bfd_boolean
7564_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
7565{
7566 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7567 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7568 return TRUE;
7569
7570 /* Copy over private BFD data if it has not already been copied.
7571 This must be done here, rather than in the copy_private_bfd_data
7572 entry point, because the latter is called after the section
7573 contents have been set, which means that the program headers have
7574 already been worked out. */
12bd6957 7575 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
d0bf826b
AM
7576 {
7577 if (! copy_private_bfd_data (ibfd, obfd))
7578 return FALSE;
7579 }
7580
7581 return _bfd_elf_fixup_group_sections (ibfd, NULL);
7582}
7583
252b5132
RH
7584/* Copy private symbol information. If this symbol is in a section
7585 which we did not map into a BFD section, try to map the section
7586 index correctly. We use special macro definitions for the mapped
7587 section indices; these definitions are interpreted by the
7588 swap_out_syms function. */
7589
9ad5cbcf
AM
7590#define MAP_ONESYMTAB (SHN_HIOS + 1)
7591#define MAP_DYNSYMTAB (SHN_HIOS + 2)
7592#define MAP_STRTAB (SHN_HIOS + 3)
7593#define MAP_SHSTRTAB (SHN_HIOS + 4)
7594#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 7595
b34976b6 7596bfd_boolean
217aa764
AM
7597_bfd_elf_copy_private_symbol_data (bfd *ibfd,
7598 asymbol *isymarg,
7599 bfd *obfd,
7600 asymbol *osymarg)
252b5132
RH
7601{
7602 elf_symbol_type *isym, *osym;
7603
7604 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7605 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 7606 return TRUE;
252b5132
RH
7607
7608 isym = elf_symbol_from (ibfd, isymarg);
7609 osym = elf_symbol_from (obfd, osymarg);
7610
7611 if (isym != NULL
8424d8f5 7612 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
7613 && osym != NULL
7614 && bfd_is_abs_section (isym->symbol.section))
7615 {
7616 unsigned int shndx;
7617
7618 shndx = isym->internal_elf_sym.st_shndx;
7619 if (shndx == elf_onesymtab (ibfd))
7620 shndx = MAP_ONESYMTAB;
7621 else if (shndx == elf_dynsymtab (ibfd))
7622 shndx = MAP_DYNSYMTAB;
12bd6957 7623 else if (shndx == elf_strtab_sec (ibfd))
252b5132 7624 shndx = MAP_STRTAB;
12bd6957 7625 else if (shndx == elf_shstrtab_sec (ibfd))
252b5132 7626 shndx = MAP_SHSTRTAB;
6a40cf0c 7627 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
9ad5cbcf 7628 shndx = MAP_SYM_SHNDX;
252b5132
RH
7629 osym->internal_elf_sym.st_shndx = shndx;
7630 }
7631
b34976b6 7632 return TRUE;
252b5132
RH
7633}
7634
7635/* Swap out the symbols. */
7636
b34976b6 7637static bfd_boolean
217aa764 7638swap_out_syms (bfd *abfd,
ef10c3ac 7639 struct elf_strtab_hash **sttp,
217aa764 7640 int relocatable_p)
252b5132 7641{
9c5bfbb7 7642 const struct elf_backend_data *bed;
079e9a2f
AM
7643 int symcount;
7644 asymbol **syms;
ef10c3ac 7645 struct elf_strtab_hash *stt;
079e9a2f 7646 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 7647 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 7648 Elf_Internal_Shdr *symstrtab_hdr;
ef10c3ac 7649 struct elf_sym_strtab *symstrtab;
f075ee0c
AM
7650 bfd_byte *outbound_syms;
7651 bfd_byte *outbound_shndx;
ef10c3ac
L
7652 unsigned long outbound_syms_index;
7653 unsigned long outbound_shndx_index;
079e9a2f 7654 int idx;
12bd6957 7655 unsigned int num_locals;
079e9a2f 7656 bfd_size_type amt;
174fd7f9 7657 bfd_boolean name_local_sections;
252b5132 7658
12bd6957 7659 if (!elf_map_symbols (abfd, &num_locals))
b34976b6 7660 return FALSE;
252b5132 7661
c044fabd 7662 /* Dump out the symtabs. */
ef10c3ac 7663 stt = _bfd_elf_strtab_init ();
079e9a2f 7664 if (stt == NULL)
b34976b6 7665 return FALSE;
252b5132 7666
079e9a2f
AM
7667 bed = get_elf_backend_data (abfd);
7668 symcount = bfd_get_symcount (abfd);
7669 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
7670 symtab_hdr->sh_type = SHT_SYMTAB;
7671 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
7672 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
12bd6957 7673 symtab_hdr->sh_info = num_locals + 1;
72de5009 7674 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
7675
7676 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
7677 symstrtab_hdr->sh_type = SHT_STRTAB;
7678
ef10c3ac
L
7679 /* Allocate buffer to swap out the .strtab section. */
7680 symstrtab = (struct elf_sym_strtab *) bfd_malloc ((symcount + 1)
7681 * sizeof (*symstrtab));
7682 if (symstrtab == NULL)
7683 {
7684 _bfd_elf_strtab_free (stt);
7685 return FALSE;
7686 }
7687
a50b1753
NC
7688 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
7689 bed->s->sizeof_sym);
079e9a2f 7690 if (outbound_syms == NULL)
5ed6aba4 7691 {
ef10c3ac
L
7692error_return:
7693 _bfd_elf_strtab_free (stt);
7694 free (symstrtab);
5ed6aba4
NC
7695 return FALSE;
7696 }
217aa764 7697 symtab_hdr->contents = outbound_syms;
ef10c3ac 7698 outbound_syms_index = 0;
252b5132 7699
9ad5cbcf 7700 outbound_shndx = NULL;
ef10c3ac 7701 outbound_shndx_index = 0;
6a40cf0c
NC
7702
7703 if (elf_symtab_shndx_list (abfd))
9ad5cbcf 7704 {
6a40cf0c
NC
7705 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
7706 if (symtab_shndx_hdr->sh_name != 0)
7707 {
7708 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
7709 outbound_shndx = (bfd_byte *)
7710 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
7711 if (outbound_shndx == NULL)
7712 goto error_return;
5ed6aba4 7713
6a40cf0c
NC
7714 symtab_shndx_hdr->contents = outbound_shndx;
7715 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
7716 symtab_shndx_hdr->sh_size = amt;
7717 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
7718 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
7719 }
7720 /* FIXME: What about any other headers in the list ? */
9ad5cbcf
AM
7721 }
7722
589e6347 7723 /* Now generate the data (for "contents"). */
079e9a2f
AM
7724 {
7725 /* Fill in zeroth symbol and swap it out. */
7726 Elf_Internal_Sym sym;
7727 sym.st_name = 0;
7728 sym.st_value = 0;
7729 sym.st_size = 0;
7730 sym.st_info = 0;
7731 sym.st_other = 0;
7732 sym.st_shndx = SHN_UNDEF;
35fc36a8 7733 sym.st_target_internal = 0;
ef10c3ac
L
7734 symstrtab[0].sym = sym;
7735 symstrtab[0].dest_index = outbound_syms_index;
7736 symstrtab[0].destshndx_index = outbound_shndx_index;
7737 outbound_syms_index++;
9ad5cbcf 7738 if (outbound_shndx != NULL)
ef10c3ac 7739 outbound_shndx_index++;
079e9a2f 7740 }
252b5132 7741
174fd7f9
RS
7742 name_local_sections
7743 = (bed->elf_backend_name_local_section_symbols
7744 && bed->elf_backend_name_local_section_symbols (abfd));
7745
079e9a2f 7746 syms = bfd_get_outsymbols (abfd);
ef10c3ac 7747 for (idx = 0; idx < symcount;)
252b5132 7748 {
252b5132 7749 Elf_Internal_Sym sym;
079e9a2f
AM
7750 bfd_vma value = syms[idx]->value;
7751 elf_symbol_type *type_ptr;
7752 flagword flags = syms[idx]->flags;
7753 int type;
252b5132 7754
174fd7f9
RS
7755 if (!name_local_sections
7756 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
7757 {
7758 /* Local section symbols have no name. */
ef10c3ac 7759 sym.st_name = (unsigned long) -1;
079e9a2f
AM
7760 }
7761 else
7762 {
ef10c3ac
L
7763 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
7764 to get the final offset for st_name. */
7765 sym.st_name
7766 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
7767 FALSE);
079e9a2f 7768 if (sym.st_name == (unsigned long) -1)
ef10c3ac 7769 goto error_return;
079e9a2f 7770 }
252b5132 7771
079e9a2f 7772 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 7773
079e9a2f
AM
7774 if ((flags & BSF_SECTION_SYM) == 0
7775 && bfd_is_com_section (syms[idx]->section))
7776 {
7777 /* ELF common symbols put the alignment into the `value' field,
7778 and the size into the `size' field. This is backwards from
7779 how BFD handles it, so reverse it here. */
7780 sym.st_size = value;
7781 if (type_ptr == NULL
7782 || type_ptr->internal_elf_sym.st_value == 0)
7783 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
7784 else
7785 sym.st_value = type_ptr->internal_elf_sym.st_value;
7786 sym.st_shndx = _bfd_elf_section_from_bfd_section
7787 (abfd, syms[idx]->section);
7788 }
7789 else
7790 {
7791 asection *sec = syms[idx]->section;
cb33740c 7792 unsigned int shndx;
252b5132 7793
079e9a2f
AM
7794 if (sec->output_section)
7795 {
7796 value += sec->output_offset;
7797 sec = sec->output_section;
7798 }
589e6347 7799
079e9a2f
AM
7800 /* Don't add in the section vma for relocatable output. */
7801 if (! relocatable_p)
7802 value += sec->vma;
7803 sym.st_value = value;
7804 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
7805
7806 if (bfd_is_abs_section (sec)
7807 && type_ptr != NULL
7808 && type_ptr->internal_elf_sym.st_shndx != 0)
7809 {
7810 /* This symbol is in a real ELF section which we did
7811 not create as a BFD section. Undo the mapping done
7812 by copy_private_symbol_data. */
7813 shndx = type_ptr->internal_elf_sym.st_shndx;
7814 switch (shndx)
7815 {
7816 case MAP_ONESYMTAB:
7817 shndx = elf_onesymtab (abfd);
7818 break;
7819 case MAP_DYNSYMTAB:
7820 shndx = elf_dynsymtab (abfd);
7821 break;
7822 case MAP_STRTAB:
12bd6957 7823 shndx = elf_strtab_sec (abfd);
079e9a2f
AM
7824 break;
7825 case MAP_SHSTRTAB:
12bd6957 7826 shndx = elf_shstrtab_sec (abfd);
079e9a2f 7827 break;
9ad5cbcf 7828 case MAP_SYM_SHNDX:
6a40cf0c
NC
7829 if (elf_symtab_shndx_list (abfd))
7830 shndx = elf_symtab_shndx_list (abfd)->ndx;
9ad5cbcf 7831 break;
079e9a2f 7832 default:
15bc576a 7833 shndx = SHN_ABS;
079e9a2f
AM
7834 break;
7835 }
7836 }
7837 else
7838 {
7839 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 7840
cb33740c 7841 if (shndx == SHN_BAD)
079e9a2f
AM
7842 {
7843 asection *sec2;
7844
7845 /* Writing this would be a hell of a lot easier if
7846 we had some decent documentation on bfd, and
7847 knew what to expect of the library, and what to
7848 demand of applications. For example, it
7849 appears that `objcopy' might not set the
7850 section of a symbol to be a section that is
7851 actually in the output file. */
7852 sec2 = bfd_get_section_by_name (abfd, sec->name);
5df1bc57
AM
7853 if (sec2 != NULL)
7854 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
7855 if (shndx == SHN_BAD)
589e6347 7856 {
695344c0 7857 /* xgettext:c-format */
589e6347
NC
7858 _bfd_error_handler (_("\
7859Unable to find equivalent output section for symbol '%s' from section '%s'"),
7860 syms[idx]->name ? syms[idx]->name : "<Local sym>",
7861 sec->name);
811072d8 7862 bfd_set_error (bfd_error_invalid_operation);
ef10c3ac 7863 goto error_return;
589e6347 7864 }
079e9a2f
AM
7865 }
7866 }
252b5132 7867
079e9a2f
AM
7868 sym.st_shndx = shndx;
7869 }
252b5132 7870
13ae64f3
JJ
7871 if ((flags & BSF_THREAD_LOCAL) != 0)
7872 type = STT_TLS;
d8045f23
NC
7873 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
7874 type = STT_GNU_IFUNC;
13ae64f3 7875 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
7876 type = STT_FUNC;
7877 else if ((flags & BSF_OBJECT) != 0)
7878 type = STT_OBJECT;
d9352518
DB
7879 else if ((flags & BSF_RELC) != 0)
7880 type = STT_RELC;
7881 else if ((flags & BSF_SRELC) != 0)
7882 type = STT_SRELC;
079e9a2f
AM
7883 else
7884 type = STT_NOTYPE;
252b5132 7885
13ae64f3
JJ
7886 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
7887 type = STT_TLS;
7888
589e6347 7889 /* Processor-specific types. */
079e9a2f
AM
7890 if (type_ptr != NULL
7891 && bed->elf_backend_get_symbol_type)
7892 type = ((*bed->elf_backend_get_symbol_type)
7893 (&type_ptr->internal_elf_sym, type));
252b5132 7894
079e9a2f
AM
7895 if (flags & BSF_SECTION_SYM)
7896 {
7897 if (flags & BSF_GLOBAL)
7898 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
7899 else
7900 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
7901 }
7902 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 7903 {
b8871f35
L
7904 if (type != STT_TLS)
7905 {
7906 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
7907 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
7908 ? STT_COMMON : STT_OBJECT);
7909 else
7910 type = ((flags & BSF_ELF_COMMON) != 0
7911 ? STT_COMMON : STT_OBJECT);
7912 }
7913 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 7914 }
079e9a2f
AM
7915 else if (bfd_is_und_section (syms[idx]->section))
7916 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
7917 ? STB_WEAK
7918 : STB_GLOBAL),
7919 type);
7920 else if (flags & BSF_FILE)
7921 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
7922 else
7923 {
7924 int bind = STB_LOCAL;
252b5132 7925
079e9a2f
AM
7926 if (flags & BSF_LOCAL)
7927 bind = STB_LOCAL;
3e7a7d11
NC
7928 else if (flags & BSF_GNU_UNIQUE)
7929 bind = STB_GNU_UNIQUE;
079e9a2f
AM
7930 else if (flags & BSF_WEAK)
7931 bind = STB_WEAK;
7932 else if (flags & BSF_GLOBAL)
7933 bind = STB_GLOBAL;
252b5132 7934
079e9a2f
AM
7935 sym.st_info = ELF_ST_INFO (bind, type);
7936 }
252b5132 7937
079e9a2f 7938 if (type_ptr != NULL)
35fc36a8
RS
7939 {
7940 sym.st_other = type_ptr->internal_elf_sym.st_other;
7941 sym.st_target_internal
7942 = type_ptr->internal_elf_sym.st_target_internal;
7943 }
079e9a2f 7944 else
35fc36a8
RS
7945 {
7946 sym.st_other = 0;
7947 sym.st_target_internal = 0;
7948 }
252b5132 7949
ef10c3ac
L
7950 idx++;
7951 symstrtab[idx].sym = sym;
7952 symstrtab[idx].dest_index = outbound_syms_index;
7953 symstrtab[idx].destshndx_index = outbound_shndx_index;
7954
7955 outbound_syms_index++;
9ad5cbcf 7956 if (outbound_shndx != NULL)
ef10c3ac
L
7957 outbound_shndx_index++;
7958 }
7959
7960 /* Finalize the .strtab section. */
7961 _bfd_elf_strtab_finalize (stt);
7962
7963 /* Swap out the .strtab section. */
7964 for (idx = 0; idx <= symcount; idx++)
7965 {
7966 struct elf_sym_strtab *elfsym = &symstrtab[idx];
7967 if (elfsym->sym.st_name == (unsigned long) -1)
7968 elfsym->sym.st_name = 0;
7969 else
7970 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
7971 elfsym->sym.st_name);
7972 bed->s->swap_symbol_out (abfd, &elfsym->sym,
7973 (outbound_syms
7974 + (elfsym->dest_index
7975 * bed->s->sizeof_sym)),
7976 (outbound_shndx
7977 + (elfsym->destshndx_index
7978 * sizeof (Elf_External_Sym_Shndx))));
079e9a2f 7979 }
ef10c3ac 7980 free (symstrtab);
252b5132 7981
079e9a2f 7982 *sttp = stt;
ef10c3ac 7983 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
079e9a2f 7984 symstrtab_hdr->sh_type = SHT_STRTAB;
84865015 7985 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
079e9a2f
AM
7986 symstrtab_hdr->sh_addr = 0;
7987 symstrtab_hdr->sh_entsize = 0;
7988 symstrtab_hdr->sh_link = 0;
7989 symstrtab_hdr->sh_info = 0;
7990 symstrtab_hdr->sh_addralign = 1;
252b5132 7991
b34976b6 7992 return TRUE;
252b5132
RH
7993}
7994
7995/* Return the number of bytes required to hold the symtab vector.
7996
7997 Note that we base it on the count plus 1, since we will null terminate
7998 the vector allocated based on this size. However, the ELF symbol table
7999 always has a dummy entry as symbol #0, so it ends up even. */
8000
8001long
217aa764 8002_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
8003{
8004 long symcount;
8005 long symtab_size;
8006 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
8007
8008 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
8009 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8010 if (symcount > 0)
8011 symtab_size -= sizeof (asymbol *);
252b5132
RH
8012
8013 return symtab_size;
8014}
8015
8016long
217aa764 8017_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
8018{
8019 long symcount;
8020 long symtab_size;
8021 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
8022
8023 if (elf_dynsymtab (abfd) == 0)
8024 {
8025 bfd_set_error (bfd_error_invalid_operation);
8026 return -1;
8027 }
8028
8029 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
8030 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8031 if (symcount > 0)
8032 symtab_size -= sizeof (asymbol *);
252b5132
RH
8033
8034 return symtab_size;
8035}
8036
8037long
217aa764
AM
8038_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
8039 sec_ptr asect)
252b5132
RH
8040{
8041 return (asect->reloc_count + 1) * sizeof (arelent *);
8042}
8043
8044/* Canonicalize the relocs. */
8045
8046long
217aa764
AM
8047_bfd_elf_canonicalize_reloc (bfd *abfd,
8048 sec_ptr section,
8049 arelent **relptr,
8050 asymbol **symbols)
252b5132
RH
8051{
8052 arelent *tblptr;
8053 unsigned int i;
9c5bfbb7 8054 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 8055
b34976b6 8056 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
8057 return -1;
8058
8059 tblptr = section->relocation;
8060 for (i = 0; i < section->reloc_count; i++)
8061 *relptr++ = tblptr++;
8062
8063 *relptr = NULL;
8064
8065 return section->reloc_count;
8066}
8067
8068long
6cee3f79 8069_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 8070{
9c5bfbb7 8071 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 8072 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
8073
8074 if (symcount >= 0)
8075 bfd_get_symcount (abfd) = symcount;
8076 return symcount;
8077}
8078
8079long
217aa764
AM
8080_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
8081 asymbol **allocation)
252b5132 8082{
9c5bfbb7 8083 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 8084 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
8085
8086 if (symcount >= 0)
8087 bfd_get_dynamic_symcount (abfd) = symcount;
8088 return symcount;
252b5132
RH
8089}
8090
8615f3f2
AM
8091/* Return the size required for the dynamic reloc entries. Any loadable
8092 section that was actually installed in the BFD, and has type SHT_REL
8093 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
8094 dynamic reloc section. */
252b5132
RH
8095
8096long
217aa764 8097_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
8098{
8099 long ret;
8100 asection *s;
8101
8102 if (elf_dynsymtab (abfd) == 0)
8103 {
8104 bfd_set_error (bfd_error_invalid_operation);
8105 return -1;
8106 }
8107
8108 ret = sizeof (arelent *);
8109 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 8110 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
8111 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8112 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 8113 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
8114 * sizeof (arelent *));
8115
8116 return ret;
8117}
8118
8615f3f2
AM
8119/* Canonicalize the dynamic relocation entries. Note that we return the
8120 dynamic relocations as a single block, although they are actually
8121 associated with particular sections; the interface, which was
8122 designed for SunOS style shared libraries, expects that there is only
8123 one set of dynamic relocs. Any loadable section that was actually
8124 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8125 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
8126
8127long
217aa764
AM
8128_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
8129 arelent **storage,
8130 asymbol **syms)
252b5132 8131{
217aa764 8132 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
8133 asection *s;
8134 long ret;
8135
8136 if (elf_dynsymtab (abfd) == 0)
8137 {
8138 bfd_set_error (bfd_error_invalid_operation);
8139 return -1;
8140 }
8141
8142 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
8143 ret = 0;
8144 for (s = abfd->sections; s != NULL; s = s->next)
8145 {
266b05cf 8146 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
8147 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8148 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8149 {
8150 arelent *p;
8151 long count, i;
8152
b34976b6 8153 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 8154 return -1;
eea6121a 8155 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
8156 p = s->relocation;
8157 for (i = 0; i < count; i++)
8158 *storage++ = p++;
8159 ret += count;
8160 }
8161 }
8162
8163 *storage = NULL;
8164
8165 return ret;
8166}
8167\f
8168/* Read in the version information. */
8169
b34976b6 8170bfd_boolean
fc0e6df6 8171_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
8172{
8173 bfd_byte *contents = NULL;
fc0e6df6
PB
8174 unsigned int freeidx = 0;
8175
8176 if (elf_dynverref (abfd) != 0)
8177 {
8178 Elf_Internal_Shdr *hdr;
8179 Elf_External_Verneed *everneed;
8180 Elf_Internal_Verneed *iverneed;
8181 unsigned int i;
d0fb9a8d 8182 bfd_byte *contents_end;
fc0e6df6
PB
8183
8184 hdr = &elf_tdata (abfd)->dynverref_hdr;
8185
601a03ba 8186 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verneed))
d0fb9a8d 8187 {
601a03ba 8188error_return_bad_verref:
4eca0228 8189 _bfd_error_handler
601a03ba
AM
8190 (_("%B: .gnu.version_r invalid entry"), abfd);
8191 bfd_set_error (bfd_error_bad_value);
d0fb9a8d
JJ
8192error_return_verref:
8193 elf_tdata (abfd)->verref = NULL;
8194 elf_tdata (abfd)->cverrefs = 0;
8195 goto error_return;
8196 }
601a03ba
AM
8197
8198 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
8199 if (contents == NULL)
8200 goto error_return_verref;
8201
fc0e6df6
PB
8202 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
8203 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 8204 goto error_return_verref;
fc0e6df6 8205
601a03ba
AM
8206 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
8207 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
8208
8209 if (elf_tdata (abfd)->verref == NULL)
d0fb9a8d
JJ
8210 goto error_return_verref;
8211
8212 BFD_ASSERT (sizeof (Elf_External_Verneed)
8213 == sizeof (Elf_External_Vernaux));
8214 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
8215 everneed = (Elf_External_Verneed *) contents;
8216 iverneed = elf_tdata (abfd)->verref;
8217 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8218 {
8219 Elf_External_Vernaux *evernaux;
8220 Elf_Internal_Vernaux *ivernaux;
8221 unsigned int j;
8222
8223 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8224
8225 iverneed->vn_bfd = abfd;
8226
8227 iverneed->vn_filename =
8228 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8229 iverneed->vn_file);
8230 if (iverneed->vn_filename == NULL)
601a03ba 8231 goto error_return_bad_verref;
fc0e6df6 8232
d0fb9a8d
JJ
8233 if (iverneed->vn_cnt == 0)
8234 iverneed->vn_auxptr = NULL;
8235 else
8236 {
a50b1753
NC
8237 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
8238 bfd_alloc2 (abfd, iverneed->vn_cnt,
8239 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
8240 if (iverneed->vn_auxptr == NULL)
8241 goto error_return_verref;
8242 }
8243
8244 if (iverneed->vn_aux
8245 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8246 goto error_return_bad_verref;
fc0e6df6
PB
8247
8248 evernaux = ((Elf_External_Vernaux *)
8249 ((bfd_byte *) everneed + iverneed->vn_aux));
8250 ivernaux = iverneed->vn_auxptr;
8251 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8252 {
8253 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8254
8255 ivernaux->vna_nodename =
8256 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8257 ivernaux->vna_name);
8258 if (ivernaux->vna_nodename == NULL)
601a03ba 8259 goto error_return_bad_verref;
fc0e6df6 8260
25ff461f
AM
8261 if (ivernaux->vna_other > freeidx)
8262 freeidx = ivernaux->vna_other;
8263
8264 ivernaux->vna_nextptr = NULL;
8265 if (ivernaux->vna_next == 0)
8266 {
8267 iverneed->vn_cnt = j + 1;
8268 break;
8269 }
fc0e6df6
PB
8270 if (j + 1 < iverneed->vn_cnt)
8271 ivernaux->vna_nextptr = ivernaux + 1;
fc0e6df6 8272
d0fb9a8d
JJ
8273 if (ivernaux->vna_next
8274 > (size_t) (contents_end - (bfd_byte *) evernaux))
601a03ba 8275 goto error_return_bad_verref;
d0fb9a8d 8276
fc0e6df6
PB
8277 evernaux = ((Elf_External_Vernaux *)
8278 ((bfd_byte *) evernaux + ivernaux->vna_next));
fc0e6df6
PB
8279 }
8280
25ff461f
AM
8281 iverneed->vn_nextref = NULL;
8282 if (iverneed->vn_next == 0)
8283 break;
fc0e6df6
PB
8284 if (i + 1 < hdr->sh_info)
8285 iverneed->vn_nextref = iverneed + 1;
fc0e6df6 8286
d0fb9a8d
JJ
8287 if (iverneed->vn_next
8288 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8289 goto error_return_bad_verref;
d0fb9a8d 8290
fc0e6df6
PB
8291 everneed = ((Elf_External_Verneed *)
8292 ((bfd_byte *) everneed + iverneed->vn_next));
8293 }
25ff461f 8294 elf_tdata (abfd)->cverrefs = i;
fc0e6df6
PB
8295
8296 free (contents);
8297 contents = NULL;
8298 }
252b5132
RH
8299
8300 if (elf_dynverdef (abfd) != 0)
8301 {
8302 Elf_Internal_Shdr *hdr;
8303 Elf_External_Verdef *everdef;
8304 Elf_Internal_Verdef *iverdef;
f631889e
UD
8305 Elf_Internal_Verdef *iverdefarr;
8306 Elf_Internal_Verdef iverdefmem;
252b5132 8307 unsigned int i;
062e2358 8308 unsigned int maxidx;
d0fb9a8d 8309 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
8310
8311 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8312
601a03ba
AM
8313 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
8314 {
8315 error_return_bad_verdef:
4eca0228 8316 _bfd_error_handler
601a03ba
AM
8317 (_("%B: .gnu.version_d invalid entry"), abfd);
8318 bfd_set_error (bfd_error_bad_value);
8319 error_return_verdef:
8320 elf_tdata (abfd)->verdef = NULL;
8321 elf_tdata (abfd)->cverdefs = 0;
8322 goto error_return;
8323 }
8324
a50b1753 8325 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132 8326 if (contents == NULL)
601a03ba 8327 goto error_return_verdef;
252b5132 8328 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 8329 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
601a03ba 8330 goto error_return_verdef;
d0fb9a8d
JJ
8331
8332 BFD_ASSERT (sizeof (Elf_External_Verdef)
8333 >= sizeof (Elf_External_Verdaux));
8334 contents_end_def = contents + hdr->sh_size
8335 - sizeof (Elf_External_Verdef);
8336 contents_end_aux = contents + hdr->sh_size
8337 - sizeof (Elf_External_Verdaux);
8338
f631889e
UD
8339 /* We know the number of entries in the section but not the maximum
8340 index. Therefore we have to run through all entries and find
8341 the maximum. */
252b5132 8342 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
8343 maxidx = 0;
8344 for (i = 0; i < hdr->sh_info; ++i)
8345 {
8346 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8347
601a03ba
AM
8348 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
8349 goto error_return_bad_verdef;
062e2358
AM
8350 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
8351 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 8352
25ff461f
AM
8353 if (iverdefmem.vd_next == 0)
8354 break;
8355
d0fb9a8d
JJ
8356 if (iverdefmem.vd_next
8357 > (size_t) (contents_end_def - (bfd_byte *) everdef))
601a03ba 8358 goto error_return_bad_verdef;
d0fb9a8d 8359
f631889e
UD
8360 everdef = ((Elf_External_Verdef *)
8361 ((bfd_byte *) everdef + iverdefmem.vd_next));
8362 }
8363
fc0e6df6
PB
8364 if (default_imported_symver)
8365 {
8366 if (freeidx > maxidx)
8367 maxidx = ++freeidx;
8368 else
8369 freeidx = ++maxidx;
8370 }
201159ec 8371
601a03ba
AM
8372 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
8373 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e 8374 if (elf_tdata (abfd)->verdef == NULL)
601a03ba 8375 goto error_return_verdef;
f631889e
UD
8376
8377 elf_tdata (abfd)->cverdefs = maxidx;
8378
8379 everdef = (Elf_External_Verdef *) contents;
8380 iverdefarr = elf_tdata (abfd)->verdef;
8381 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
8382 {
8383 Elf_External_Verdaux *everdaux;
8384 Elf_Internal_Verdaux *iverdaux;
8385 unsigned int j;
8386
f631889e
UD
8387 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8388
d0fb9a8d 8389 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
601a03ba 8390 goto error_return_bad_verdef;
d0fb9a8d 8391
f631889e 8392 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
595bce75 8393 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
252b5132
RH
8394
8395 iverdef->vd_bfd = abfd;
8396
d0fb9a8d
JJ
8397 if (iverdef->vd_cnt == 0)
8398 iverdef->vd_auxptr = NULL;
8399 else
8400 {
a50b1753
NC
8401 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
8402 bfd_alloc2 (abfd, iverdef->vd_cnt,
8403 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
8404 if (iverdef->vd_auxptr == NULL)
8405 goto error_return_verdef;
8406 }
8407
8408 if (iverdef->vd_aux
8409 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
601a03ba 8410 goto error_return_bad_verdef;
252b5132
RH
8411
8412 everdaux = ((Elf_External_Verdaux *)
8413 ((bfd_byte *) everdef + iverdef->vd_aux));
8414 iverdaux = iverdef->vd_auxptr;
8415 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
8416 {
8417 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
8418
8419 iverdaux->vda_nodename =
8420 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8421 iverdaux->vda_name);
8422 if (iverdaux->vda_nodename == NULL)
601a03ba 8423 goto error_return_bad_verdef;
252b5132 8424
25ff461f
AM
8425 iverdaux->vda_nextptr = NULL;
8426 if (iverdaux->vda_next == 0)
8427 {
8428 iverdef->vd_cnt = j + 1;
8429 break;
8430 }
252b5132
RH
8431 if (j + 1 < iverdef->vd_cnt)
8432 iverdaux->vda_nextptr = iverdaux + 1;
252b5132 8433
d0fb9a8d
JJ
8434 if (iverdaux->vda_next
8435 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
601a03ba 8436 goto error_return_bad_verdef;
d0fb9a8d 8437
252b5132
RH
8438 everdaux = ((Elf_External_Verdaux *)
8439 ((bfd_byte *) everdaux + iverdaux->vda_next));
8440 }
8441
595bce75 8442 iverdef->vd_nodename = NULL;
d0fb9a8d
JJ
8443 if (iverdef->vd_cnt)
8444 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 8445
25ff461f
AM
8446 iverdef->vd_nextdef = NULL;
8447 if (iverdef->vd_next == 0)
8448 break;
d0fb9a8d 8449 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132 8450 iverdef->vd_nextdef = iverdef + 1;
252b5132
RH
8451
8452 everdef = ((Elf_External_Verdef *)
8453 ((bfd_byte *) everdef + iverdef->vd_next));
8454 }
8455
8456 free (contents);
8457 contents = NULL;
8458 }
fc0e6df6 8459 else if (default_imported_symver)
252b5132 8460 {
fc0e6df6
PB
8461 if (freeidx < 3)
8462 freeidx = 3;
8463 else
8464 freeidx++;
252b5132 8465
a50b1753
NC
8466 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
8467 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 8468 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
8469 goto error_return;
8470
fc0e6df6
PB
8471 elf_tdata (abfd)->cverdefs = freeidx;
8472 }
252b5132 8473
fc0e6df6
PB
8474 /* Create a default version based on the soname. */
8475 if (default_imported_symver)
8476 {
8477 Elf_Internal_Verdef *iverdef;
8478 Elf_Internal_Verdaux *iverdaux;
252b5132 8479
5bb3703f 8480 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
252b5132 8481
fc0e6df6
PB
8482 iverdef->vd_version = VER_DEF_CURRENT;
8483 iverdef->vd_flags = 0;
8484 iverdef->vd_ndx = freeidx;
8485 iverdef->vd_cnt = 1;
252b5132 8486
fc0e6df6 8487 iverdef->vd_bfd = abfd;
252b5132 8488
fc0e6df6
PB
8489 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
8490 if (iverdef->vd_nodename == NULL)
d0fb9a8d 8491 goto error_return_verdef;
fc0e6df6 8492 iverdef->vd_nextdef = NULL;
601a03ba
AM
8493 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
8494 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
d0fb9a8d
JJ
8495 if (iverdef->vd_auxptr == NULL)
8496 goto error_return_verdef;
252b5132 8497
fc0e6df6
PB
8498 iverdaux = iverdef->vd_auxptr;
8499 iverdaux->vda_nodename = iverdef->vd_nodename;
252b5132
RH
8500 }
8501
b34976b6 8502 return TRUE;
252b5132
RH
8503
8504 error_return:
5ed6aba4 8505 if (contents != NULL)
252b5132 8506 free (contents);
b34976b6 8507 return FALSE;
252b5132
RH
8508}
8509\f
8510asymbol *
217aa764 8511_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
8512{
8513 elf_symbol_type *newsym;
8514
201159ec 8515 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof * newsym);
252b5132
RH
8516 if (!newsym)
8517 return NULL;
201159ec
NC
8518 newsym->symbol.the_bfd = abfd;
8519 return &newsym->symbol;
252b5132
RH
8520}
8521
8522void
217aa764
AM
8523_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
8524 asymbol *symbol,
8525 symbol_info *ret)
252b5132
RH
8526{
8527 bfd_symbol_info (symbol, ret);
8528}
8529
8530/* Return whether a symbol name implies a local symbol. Most targets
8531 use this function for the is_local_label_name entry point, but some
8532 override it. */
8533
b34976b6 8534bfd_boolean
217aa764
AM
8535_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
8536 const char *name)
252b5132
RH
8537{
8538 /* Normal local symbols start with ``.L''. */
8539 if (name[0] == '.' && name[1] == 'L')
b34976b6 8540 return TRUE;
252b5132
RH
8541
8542 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
8543 DWARF debugging symbols starting with ``..''. */
8544 if (name[0] == '.' && name[1] == '.')
b34976b6 8545 return TRUE;
252b5132
RH
8546
8547 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
8548 emitting DWARF debugging output. I suspect this is actually a
8549 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
8550 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
8551 underscore to be emitted on some ELF targets). For ease of use,
8552 we treat such symbols as local. */
8553 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 8554 return TRUE;
252b5132 8555
b1fa9dd6
NC
8556 /* Treat assembler generated fake symbols, dollar local labels and
8557 forward-backward labels (aka local labels) as locals.
8558 These labels have the form:
8559
8560 L0^A.* (fake symbols)
8561
8562 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
8563
8564 Versions which start with .L will have already been matched above,
8565 so we only need to match the rest. */
8566 if (name[0] == 'L' && ISDIGIT (name[1]))
8567 {
8568 bfd_boolean ret = FALSE;
8569 const char * p;
8570 char c;
8571
8572 for (p = name + 2; (c = *p); p++)
8573 {
8574 if (c == 1 || c == 2)
8575 {
8576 if (c == 1 && p == name + 2)
8577 /* A fake symbol. */
8578 return TRUE;
8579
8580 /* FIXME: We are being paranoid here and treating symbols like
8581 L0^Bfoo as if there were non-local, on the grounds that the
8582 assembler will never generate them. But can any symbol
8583 containing an ASCII value in the range 1-31 ever be anything
8584 other than some kind of local ? */
8585 ret = TRUE;
8586 }
8587
8588 if (! ISDIGIT (c))
8589 {
8590 ret = FALSE;
8591 break;
8592 }
8593 }
8594 return ret;
8595 }
ffa54770 8596
b34976b6 8597 return FALSE;
252b5132
RH
8598}
8599
8600alent *
217aa764
AM
8601_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
8602 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
8603{
8604 abort ();
8605 return NULL;
8606}
8607
b34976b6 8608bfd_boolean
217aa764
AM
8609_bfd_elf_set_arch_mach (bfd *abfd,
8610 enum bfd_architecture arch,
8611 unsigned long machine)
252b5132
RH
8612{
8613 /* If this isn't the right architecture for this backend, and this
8614 isn't the generic backend, fail. */
8615 if (arch != get_elf_backend_data (abfd)->arch
8616 && arch != bfd_arch_unknown
8617 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 8618 return FALSE;
252b5132
RH
8619
8620 return bfd_default_set_arch_mach (abfd, arch, machine);
8621}
8622
d1fad7c6
NC
8623/* Find the nearest line to a particular section and offset,
8624 for error reporting. */
8625
b34976b6 8626bfd_boolean
217aa764 8627_bfd_elf_find_nearest_line (bfd *abfd,
217aa764 8628 asymbol **symbols,
fb167eb2 8629 asection *section,
217aa764
AM
8630 bfd_vma offset,
8631 const char **filename_ptr,
8632 const char **functionname_ptr,
fb167eb2
AM
8633 unsigned int *line_ptr,
8634 unsigned int *discriminator_ptr)
d1fad7c6 8635{
b34976b6 8636 bfd_boolean found;
d1fad7c6 8637
fb167eb2 8638 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
4e8a9624 8639 filename_ptr, functionname_ptr,
fb167eb2
AM
8640 line_ptr, discriminator_ptr,
8641 dwarf_debug_sections, 0,
e00e8198
AM
8642 &elf_tdata (abfd)->dwarf2_find_line_info)
8643 || _bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
8644 filename_ptr, functionname_ptr,
8645 line_ptr))
d1fad7c6
NC
8646 {
8647 if (!*functionname_ptr)
e00e8198
AM
8648 _bfd_elf_find_function (abfd, symbols, section, offset,
8649 *filename_ptr ? NULL : filename_ptr,
8650 functionname_ptr);
b34976b6 8651 return TRUE;
d1fad7c6
NC
8652 }
8653
8654 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
8655 &found, filename_ptr,
8656 functionname_ptr, line_ptr,
8657 &elf_tdata (abfd)->line_info))
b34976b6 8658 return FALSE;
dc43ada5 8659 if (found && (*functionname_ptr || *line_ptr))
b34976b6 8660 return TRUE;
d1fad7c6
NC
8661
8662 if (symbols == NULL)
b34976b6 8663 return FALSE;
d1fad7c6 8664
e00e8198
AM
8665 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
8666 filename_ptr, functionname_ptr))
b34976b6 8667 return FALSE;
d1fad7c6 8668
252b5132 8669 *line_ptr = 0;
b34976b6 8670 return TRUE;
252b5132
RH
8671}
8672
5420f73d
L
8673/* Find the line for a symbol. */
8674
8675bfd_boolean
8676_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
8677 const char **filename_ptr, unsigned int *line_ptr)
9b8d1a36 8678{
fb167eb2
AM
8679 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
8680 filename_ptr, NULL, line_ptr, NULL,
8681 dwarf_debug_sections, 0,
8682 &elf_tdata (abfd)->dwarf2_find_line_info);
5420f73d
L
8683}
8684
4ab527b0
FF
8685/* After a call to bfd_find_nearest_line, successive calls to
8686 bfd_find_inliner_info can be used to get source information about
8687 each level of function inlining that terminated at the address
8688 passed to bfd_find_nearest_line. Currently this is only supported
8689 for DWARF2 with appropriate DWARF3 extensions. */
8690
8691bfd_boolean
8692_bfd_elf_find_inliner_info (bfd *abfd,
8693 const char **filename_ptr,
8694 const char **functionname_ptr,
8695 unsigned int *line_ptr)
8696{
8697 bfd_boolean found;
8698 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
8699 functionname_ptr, line_ptr,
8700 & elf_tdata (abfd)->dwarf2_find_line_info);
8701 return found;
8702}
8703
252b5132 8704int
a6b96beb 8705_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 8706{
8ded5a0f
AM
8707 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8708 int ret = bed->s->sizeof_ehdr;
252b5132 8709
0e1862bb 8710 if (!bfd_link_relocatable (info))
8ded5a0f 8711 {
12bd6957 8712 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 8713
62d7a5f6
AM
8714 if (phdr_size == (bfd_size_type) -1)
8715 {
8716 struct elf_segment_map *m;
8717
8718 phdr_size = 0;
12bd6957 8719 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62d7a5f6 8720 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 8721
62d7a5f6
AM
8722 if (phdr_size == 0)
8723 phdr_size = get_program_header_size (abfd, info);
8724 }
8ded5a0f 8725
12bd6957 8726 elf_program_header_size (abfd) = phdr_size;
8ded5a0f
AM
8727 ret += phdr_size;
8728 }
8729
252b5132
RH
8730 return ret;
8731}
8732
b34976b6 8733bfd_boolean
217aa764
AM
8734_bfd_elf_set_section_contents (bfd *abfd,
8735 sec_ptr section,
0f867abe 8736 const void *location,
217aa764
AM
8737 file_ptr offset,
8738 bfd_size_type count)
252b5132
RH
8739{
8740 Elf_Internal_Shdr *hdr;
1b6aeedb 8741 file_ptr pos;
252b5132
RH
8742
8743 if (! abfd->output_has_begun
217aa764 8744 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 8745 return FALSE;
252b5132 8746
0ce398f1
L
8747 if (!count)
8748 return TRUE;
8749
252b5132 8750 hdr = &elf_section_data (section)->this_hdr;
0ce398f1
L
8751 if (hdr->sh_offset == (file_ptr) -1)
8752 {
8753 /* We must compress this section. Write output to the buffer. */
8754 unsigned char *contents = hdr->contents;
8755 if ((offset + count) > hdr->sh_size
8756 || (section->flags & SEC_ELF_COMPRESS) == 0
8757 || contents == NULL)
8758 abort ();
8759 memcpy (contents + offset, location, count);
8760 return TRUE;
8761 }
dc810e39
AM
8762 pos = hdr->sh_offset + offset;
8763 if (bfd_seek (abfd, pos, SEEK_SET) != 0
8764 || bfd_bwrite (location, count, abfd) != count)
b34976b6 8765 return FALSE;
252b5132 8766
b34976b6 8767 return TRUE;
252b5132
RH
8768}
8769
8770void
217aa764
AM
8771_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
8772 arelent *cache_ptr ATTRIBUTE_UNUSED,
8773 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
8774{
8775 abort ();
8776}
8777
252b5132
RH
8778/* Try to convert a non-ELF reloc into an ELF one. */
8779
b34976b6 8780bfd_boolean
217aa764 8781_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 8782{
c044fabd 8783 /* Check whether we really have an ELF howto. */
252b5132
RH
8784
8785 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
8786 {
8787 bfd_reloc_code_real_type code;
8788 reloc_howto_type *howto;
8789
8790 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 8791 equivalent ELF reloc. */
252b5132
RH
8792
8793 if (areloc->howto->pc_relative)
8794 {
8795 switch (areloc->howto->bitsize)
8796 {
8797 case 8:
8798 code = BFD_RELOC_8_PCREL;
8799 break;
8800 case 12:
8801 code = BFD_RELOC_12_PCREL;
8802 break;
8803 case 16:
8804 code = BFD_RELOC_16_PCREL;
8805 break;
8806 case 24:
8807 code = BFD_RELOC_24_PCREL;
8808 break;
8809 case 32:
8810 code = BFD_RELOC_32_PCREL;
8811 break;
8812 case 64:
8813 code = BFD_RELOC_64_PCREL;
8814 break;
8815 default:
8816 goto fail;
8817 }
8818
8819 howto = bfd_reloc_type_lookup (abfd, code);
8820
8821 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
8822 {
8823 if (howto->pcrel_offset)
8824 areloc->addend += areloc->address;
8825 else
8826 areloc->addend -= areloc->address; /* addend is unsigned!! */
8827 }
8828 }
8829 else
8830 {
8831 switch (areloc->howto->bitsize)
8832 {
8833 case 8:
8834 code = BFD_RELOC_8;
8835 break;
8836 case 14:
8837 code = BFD_RELOC_14;
8838 break;
8839 case 16:
8840 code = BFD_RELOC_16;
8841 break;
8842 case 26:
8843 code = BFD_RELOC_26;
8844 break;
8845 case 32:
8846 code = BFD_RELOC_32;
8847 break;
8848 case 64:
8849 code = BFD_RELOC_64;
8850 break;
8851 default:
8852 goto fail;
8853 }
8854
8855 howto = bfd_reloc_type_lookup (abfd, code);
8856 }
8857
8858 if (howto)
8859 areloc->howto = howto;
8860 else
8861 goto fail;
8862 }
8863
b34976b6 8864 return TRUE;
252b5132
RH
8865
8866 fail:
4eca0228 8867 _bfd_error_handler
695344c0 8868 /* xgettext:c-format */
d003868e
AM
8869 (_("%B: unsupported relocation type %s"),
8870 abfd, areloc->howto->name);
252b5132 8871 bfd_set_error (bfd_error_bad_value);
b34976b6 8872 return FALSE;
252b5132
RH
8873}
8874
b34976b6 8875bfd_boolean
217aa764 8876_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132 8877{
d9071b0c
TG
8878 struct elf_obj_tdata *tdata = elf_tdata (abfd);
8879 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
252b5132 8880 {
c0355132 8881 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 8882 _bfd_elf_strtab_free (elf_shstrtab (abfd));
d9071b0c 8883 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
252b5132
RH
8884 }
8885
8886 return _bfd_generic_close_and_cleanup (abfd);
8887}
8888
8889/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
8890 in the relocation's offset. Thus we cannot allow any sort of sanity
8891 range-checking to interfere. There is nothing else to do in processing
8892 this reloc. */
8893
8894bfd_reloc_status_type
217aa764
AM
8895_bfd_elf_rel_vtable_reloc_fn
8896 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 8897 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
8898 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
8899 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
8900{
8901 return bfd_reloc_ok;
8902}
252b5132
RH
8903\f
8904/* Elf core file support. Much of this only works on native
8905 toolchains, since we rely on knowing the
8906 machine-dependent procfs structure in order to pick
c044fabd 8907 out details about the corefile. */
252b5132
RH
8908
8909#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
8910/* Needed for new procfs interface on sparc-solaris. */
8911# define _STRUCTURED_PROC 1
252b5132
RH
8912# include <sys/procfs.h>
8913#endif
8914
261b8d08
PA
8915/* Return a PID that identifies a "thread" for threaded cores, or the
8916 PID of the main process for non-threaded cores. */
252b5132
RH
8917
8918static int
217aa764 8919elfcore_make_pid (bfd *abfd)
252b5132 8920{
261b8d08
PA
8921 int pid;
8922
228e534f 8923 pid = elf_tdata (abfd)->core->lwpid;
261b8d08 8924 if (pid == 0)
228e534f 8925 pid = elf_tdata (abfd)->core->pid;
261b8d08
PA
8926
8927 return pid;
252b5132
RH
8928}
8929
252b5132
RH
8930/* If there isn't a section called NAME, make one, using
8931 data from SECT. Note, this function will generate a
8932 reference to NAME, so you shouldn't deallocate or
c044fabd 8933 overwrite it. */
252b5132 8934
b34976b6 8935static bfd_boolean
217aa764 8936elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 8937{
c044fabd 8938 asection *sect2;
252b5132
RH
8939
8940 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 8941 return TRUE;
252b5132 8942
117ed4f8 8943 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 8944 if (sect2 == NULL)
b34976b6 8945 return FALSE;
252b5132 8946
eea6121a 8947 sect2->size = sect->size;
252b5132 8948 sect2->filepos = sect->filepos;
252b5132 8949 sect2->alignment_power = sect->alignment_power;
b34976b6 8950 return TRUE;
252b5132
RH
8951}
8952
bb0082d6
AM
8953/* Create a pseudosection containing SIZE bytes at FILEPOS. This
8954 actually creates up to two pseudosections:
8955 - For the single-threaded case, a section named NAME, unless
8956 such a section already exists.
8957 - For the multi-threaded case, a section named "NAME/PID", where
8958 PID is elfcore_make_pid (abfd).
8959 Both pseudosections have identical contents. */
b34976b6 8960bfd_boolean
217aa764
AM
8961_bfd_elfcore_make_pseudosection (bfd *abfd,
8962 char *name,
8963 size_t size,
8964 ufile_ptr filepos)
bb0082d6
AM
8965{
8966 char buf[100];
8967 char *threaded_name;
d4c88bbb 8968 size_t len;
bb0082d6
AM
8969 asection *sect;
8970
8971 /* Build the section name. */
8972
8973 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 8974 len = strlen (buf) + 1;
a50b1753 8975 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 8976 if (threaded_name == NULL)
b34976b6 8977 return FALSE;
d4c88bbb 8978 memcpy (threaded_name, buf, len);
bb0082d6 8979
117ed4f8
AM
8980 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
8981 SEC_HAS_CONTENTS);
bb0082d6 8982 if (sect == NULL)
b34976b6 8983 return FALSE;
eea6121a 8984 sect->size = size;
bb0082d6 8985 sect->filepos = filepos;
bb0082d6
AM
8986 sect->alignment_power = 2;
8987
936e320b 8988 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
8989}
8990
252b5132 8991/* prstatus_t exists on:
4a938328 8992 solaris 2.5+
252b5132
RH
8993 linux 2.[01] + glibc
8994 unixware 4.2
8995*/
8996
8997#if defined (HAVE_PRSTATUS_T)
a7b97311 8998
b34976b6 8999static bfd_boolean
217aa764 9000elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 9001{
eea6121a 9002 size_t size;
7ee38065 9003 int offset;
252b5132 9004
4a938328
MS
9005 if (note->descsz == sizeof (prstatus_t))
9006 {
9007 prstatus_t prstat;
252b5132 9008
eea6121a 9009 size = sizeof (prstat.pr_reg);
7ee38065 9010 offset = offsetof (prstatus_t, pr_reg);
4a938328 9011 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 9012
fa49d224
NC
9013 /* Do not overwrite the core signal if it
9014 has already been set by another thread. */
228e534f
AM
9015 if (elf_tdata (abfd)->core->signal == 0)
9016 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9017 if (elf_tdata (abfd)->core->pid == 0)
9018 elf_tdata (abfd)->core->pid = prstat.pr_pid;
252b5132 9019
4a938328
MS
9020 /* pr_who exists on:
9021 solaris 2.5+
9022 unixware 4.2
9023 pr_who doesn't exist on:
9024 linux 2.[01]
9025 */
252b5132 9026#if defined (HAVE_PRSTATUS_T_PR_WHO)
228e534f 9027 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 9028#else
228e534f 9029 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
252b5132 9030#endif
4a938328 9031 }
7ee38065 9032#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
9033 else if (note->descsz == sizeof (prstatus32_t))
9034 {
9035 /* 64-bit host, 32-bit corefile */
9036 prstatus32_t prstat;
9037
eea6121a 9038 size = sizeof (prstat.pr_reg);
7ee38065 9039 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
9040 memcpy (&prstat, note->descdata, sizeof (prstat));
9041
fa49d224
NC
9042 /* Do not overwrite the core signal if it
9043 has already been set by another thread. */
228e534f
AM
9044 if (elf_tdata (abfd)->core->signal == 0)
9045 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9046 if (elf_tdata (abfd)->core->pid == 0)
9047 elf_tdata (abfd)->core->pid = prstat.pr_pid;
4a938328
MS
9048
9049 /* pr_who exists on:
9050 solaris 2.5+
9051 unixware 4.2
9052 pr_who doesn't exist on:
9053 linux 2.[01]
9054 */
7ee38065 9055#if defined (HAVE_PRSTATUS32_T_PR_WHO)
228e534f 9056 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 9057#else
228e534f 9058 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
4a938328
MS
9059#endif
9060 }
7ee38065 9061#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
9062 else
9063 {
9064 /* Fail - we don't know how to handle any other
9065 note size (ie. data object type). */
b34976b6 9066 return TRUE;
4a938328 9067 }
252b5132 9068
bb0082d6 9069 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 9070 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 9071 size, note->descpos + offset);
252b5132
RH
9072}
9073#endif /* defined (HAVE_PRSTATUS_T) */
9074
bb0082d6 9075/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 9076static bfd_boolean
217aa764
AM
9077elfcore_make_note_pseudosection (bfd *abfd,
9078 char *name,
9079 Elf_Internal_Note *note)
252b5132 9080{
936e320b
AM
9081 return _bfd_elfcore_make_pseudosection (abfd, name,
9082 note->descsz, note->descpos);
252b5132
RH
9083}
9084
ff08c6bb
JB
9085/* There isn't a consistent prfpregset_t across platforms,
9086 but it doesn't matter, because we don't have to pick this
c044fabd
KH
9087 data structure apart. */
9088
b34976b6 9089static bfd_boolean
217aa764 9090elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
9091{
9092 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9093}
9094
ff08c6bb 9095/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 9096 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 9097 literally. */
c044fabd 9098
b34976b6 9099static bfd_boolean
217aa764 9100elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
9101{
9102 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9103}
9104
4339cae0
L
9105/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9106 with a note type of NT_X86_XSTATE. Just include the whole note's
9107 contents literally. */
9108
9109static bfd_boolean
9110elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
9111{
9112 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
9113}
9114
97753bd5
AM
9115static bfd_boolean
9116elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
9117{
9118 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
9119}
9120
89eeb0bc
LM
9121static bfd_boolean
9122elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
9123{
9124 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
9125}
97753bd5 9126
0675e188
UW
9127static bfd_boolean
9128elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
9129{
9130 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
9131}
9132
d7eeb400
MS
9133static bfd_boolean
9134elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
9135{
9136 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
9137}
9138
9139static bfd_boolean
9140elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
9141{
9142 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
9143}
9144
9145static bfd_boolean
9146elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
9147{
9148 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
9149}
9150
9151static bfd_boolean
9152elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
9153{
9154 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
9155}
9156
9157static bfd_boolean
9158elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9159{
9160 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9161}
9162
355b81d9
UW
9163static bfd_boolean
9164elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9165{
9166 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9167}
9168
9169static bfd_boolean
9170elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9171{
9172 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9173}
9174
abb3f6cc
NC
9175static bfd_boolean
9176elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9177{
9178 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9179}
9180
4ef9f41a
AA
9181static bfd_boolean
9182elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
9183{
9184 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
9185}
9186
9187static bfd_boolean
9188elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
9189{
9190 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
9191}
9192
faa9a424
UW
9193static bfd_boolean
9194elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
9195{
9196 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
9197}
9198
652451f8
YZ
9199static bfd_boolean
9200elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
9201{
9202 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
9203}
9204
9205static bfd_boolean
9206elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
9207{
9208 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
9209}
9210
9211static bfd_boolean
9212elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
9213{
9214 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
9215}
9216
252b5132 9217#if defined (HAVE_PRPSINFO_T)
4a938328 9218typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 9219#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9220typedef prpsinfo32_t elfcore_psinfo32_t;
9221#endif
252b5132
RH
9222#endif
9223
9224#if defined (HAVE_PSINFO_T)
4a938328 9225typedef psinfo_t elfcore_psinfo_t;
7ee38065 9226#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9227typedef psinfo32_t elfcore_psinfo32_t;
9228#endif
252b5132
RH
9229#endif
9230
252b5132
RH
9231/* return a malloc'ed copy of a string at START which is at
9232 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 9233 the copy will always have a terminating '\0'. */
252b5132 9234
936e320b 9235char *
217aa764 9236_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 9237{
dc810e39 9238 char *dups;
a50b1753 9239 char *end = (char *) memchr (start, '\0', max);
dc810e39 9240 size_t len;
252b5132
RH
9241
9242 if (end == NULL)
9243 len = max;
9244 else
9245 len = end - start;
9246
a50b1753 9247 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 9248 if (dups == NULL)
252b5132
RH
9249 return NULL;
9250
dc810e39
AM
9251 memcpy (dups, start, len);
9252 dups[len] = '\0';
252b5132 9253
dc810e39 9254 return dups;
252b5132
RH
9255}
9256
bb0082d6 9257#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 9258static bfd_boolean
217aa764 9259elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 9260{
4a938328
MS
9261 if (note->descsz == sizeof (elfcore_psinfo_t))
9262 {
9263 elfcore_psinfo_t psinfo;
252b5132 9264
7ee38065 9265 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9266
335e41d4 9267#if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
228e534f 9268 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9269#endif
228e534f 9270 elf_tdata (abfd)->core->program
936e320b
AM
9271 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9272 sizeof (psinfo.pr_fname));
252b5132 9273
228e534f 9274 elf_tdata (abfd)->core->command
936e320b
AM
9275 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9276 sizeof (psinfo.pr_psargs));
4a938328 9277 }
7ee38065 9278#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
9279 else if (note->descsz == sizeof (elfcore_psinfo32_t))
9280 {
9281 /* 64-bit host, 32-bit corefile */
9282 elfcore_psinfo32_t psinfo;
9283
7ee38065 9284 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9285
335e41d4 9286#if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
228e534f 9287 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9288#endif
228e534f 9289 elf_tdata (abfd)->core->program
936e320b
AM
9290 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9291 sizeof (psinfo.pr_fname));
4a938328 9292
228e534f 9293 elf_tdata (abfd)->core->command
936e320b
AM
9294 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9295 sizeof (psinfo.pr_psargs));
4a938328
MS
9296 }
9297#endif
9298
9299 else
9300 {
9301 /* Fail - we don't know how to handle any other
9302 note size (ie. data object type). */
b34976b6 9303 return TRUE;
4a938328 9304 }
252b5132
RH
9305
9306 /* Note that for some reason, a spurious space is tacked
9307 onto the end of the args in some (at least one anyway)
c044fabd 9308 implementations, so strip it off if it exists. */
252b5132
RH
9309
9310 {
228e534f 9311 char *command = elf_tdata (abfd)->core->command;
252b5132
RH
9312 int n = strlen (command);
9313
9314 if (0 < n && command[n - 1] == ' ')
9315 command[n - 1] = '\0';
9316 }
9317
b34976b6 9318 return TRUE;
252b5132
RH
9319}
9320#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
9321
252b5132 9322#if defined (HAVE_PSTATUS_T)
b34976b6 9323static bfd_boolean
217aa764 9324elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 9325{
f572a39d
AM
9326 if (note->descsz == sizeof (pstatus_t)
9327#if defined (HAVE_PXSTATUS_T)
9328 || note->descsz == sizeof (pxstatus_t)
9329#endif
9330 )
4a938328
MS
9331 {
9332 pstatus_t pstat;
252b5132 9333
4a938328 9334 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9335
228e534f 9336 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328 9337 }
7ee38065 9338#if defined (HAVE_PSTATUS32_T)
4a938328
MS
9339 else if (note->descsz == sizeof (pstatus32_t))
9340 {
9341 /* 64-bit host, 32-bit corefile */
9342 pstatus32_t pstat;
252b5132 9343
4a938328 9344 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9345
228e534f 9346 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328
MS
9347 }
9348#endif
252b5132
RH
9349 /* Could grab some more details from the "representative"
9350 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 9351 NT_LWPSTATUS note, presumably. */
252b5132 9352
b34976b6 9353 return TRUE;
252b5132
RH
9354}
9355#endif /* defined (HAVE_PSTATUS_T) */
9356
252b5132 9357#if defined (HAVE_LWPSTATUS_T)
b34976b6 9358static bfd_boolean
217aa764 9359elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
9360{
9361 lwpstatus_t lwpstat;
9362 char buf[100];
c044fabd 9363 char *name;
d4c88bbb 9364 size_t len;
c044fabd 9365 asection *sect;
252b5132 9366
f572a39d
AM
9367 if (note->descsz != sizeof (lwpstat)
9368#if defined (HAVE_LWPXSTATUS_T)
9369 && note->descsz != sizeof (lwpxstatus_t)
9370#endif
9371 )
b34976b6 9372 return TRUE;
252b5132
RH
9373
9374 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
9375
228e534f 9376 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
a1504221
JB
9377 /* Do not overwrite the core signal if it has already been set by
9378 another thread. */
228e534f
AM
9379 if (elf_tdata (abfd)->core->signal == 0)
9380 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
252b5132 9381
c044fabd 9382 /* Make a ".reg/999" section. */
252b5132
RH
9383
9384 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 9385 len = strlen (buf) + 1;
217aa764 9386 name = bfd_alloc (abfd, len);
252b5132 9387 if (name == NULL)
b34976b6 9388 return FALSE;
d4c88bbb 9389 memcpy (name, buf, len);
252b5132 9390
117ed4f8 9391 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9392 if (sect == NULL)
b34976b6 9393 return FALSE;
252b5132
RH
9394
9395#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9396 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
9397 sect->filepos = note->descpos
9398 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
9399#endif
9400
9401#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 9402 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
9403 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
9404#endif
9405
252b5132
RH
9406 sect->alignment_power = 2;
9407
9408 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9409 return FALSE;
252b5132
RH
9410
9411 /* Make a ".reg2/999" section */
9412
9413 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 9414 len = strlen (buf) + 1;
217aa764 9415 name = bfd_alloc (abfd, len);
252b5132 9416 if (name == NULL)
b34976b6 9417 return FALSE;
d4c88bbb 9418 memcpy (name, buf, len);
252b5132 9419
117ed4f8 9420 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9421 if (sect == NULL)
b34976b6 9422 return FALSE;
252b5132
RH
9423
9424#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9425 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
9426 sect->filepos = note->descpos
9427 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
9428#endif
9429
9430#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 9431 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
9432 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
9433#endif
9434
252b5132
RH
9435 sect->alignment_power = 2;
9436
936e320b 9437 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
9438}
9439#endif /* defined (HAVE_LWPSTATUS_T) */
9440
b34976b6 9441static bfd_boolean
217aa764 9442elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
9443{
9444 char buf[30];
c044fabd 9445 char *name;
d4c88bbb 9446 size_t len;
c044fabd 9447 asection *sect;
4a6636fb
PA
9448 int type;
9449 int is_active_thread;
9450 bfd_vma base_addr;
16e9c715 9451
4a6636fb 9452 if (note->descsz < 728)
b34976b6 9453 return TRUE;
16e9c715 9454
4a6636fb
PA
9455 if (! CONST_STRNEQ (note->namedata, "win32"))
9456 return TRUE;
9457
9458 type = bfd_get_32 (abfd, note->descdata);
c044fabd 9459
4a6636fb 9460 switch (type)
16e9c715 9461 {
4a6636fb 9462 case 1 /* NOTE_INFO_PROCESS */:
228e534f 9463 /* FIXME: need to add ->core->command. */
4a6636fb 9464 /* process_info.pid */
228e534f 9465 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
4a6636fb 9466 /* process_info.signal */
228e534f 9467 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 9468 break;
16e9c715 9469
4a6636fb 9470 case 2 /* NOTE_INFO_THREAD */:
16e9c715 9471 /* Make a ".reg/999" section. */
4a6636fb
PA
9472 /* thread_info.tid */
9473 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 9474
d4c88bbb 9475 len = strlen (buf) + 1;
a50b1753 9476 name = (char *) bfd_alloc (abfd, len);
16e9c715 9477 if (name == NULL)
b34976b6 9478 return FALSE;
c044fabd 9479
d4c88bbb 9480 memcpy (name, buf, len);
16e9c715 9481
117ed4f8 9482 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 9483 if (sect == NULL)
b34976b6 9484 return FALSE;
c044fabd 9485
4a6636fb
PA
9486 /* sizeof (thread_info.thread_context) */
9487 sect->size = 716;
9488 /* offsetof (thread_info.thread_context) */
9489 sect->filepos = note->descpos + 12;
16e9c715
NC
9490 sect->alignment_power = 2;
9491
4a6636fb
PA
9492 /* thread_info.is_active_thread */
9493 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
9494
9495 if (is_active_thread)
16e9c715 9496 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9497 return FALSE;
16e9c715
NC
9498 break;
9499
4a6636fb 9500 case 3 /* NOTE_INFO_MODULE */:
16e9c715 9501 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
9502 /* module_info.base_address */
9503 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 9504 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 9505
d4c88bbb 9506 len = strlen (buf) + 1;
a50b1753 9507 name = (char *) bfd_alloc (abfd, len);
16e9c715 9508 if (name == NULL)
b34976b6 9509 return FALSE;
c044fabd 9510
d4c88bbb 9511 memcpy (name, buf, len);
252b5132 9512
117ed4f8 9513 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 9514
16e9c715 9515 if (sect == NULL)
b34976b6 9516 return FALSE;
c044fabd 9517
eea6121a 9518 sect->size = note->descsz;
16e9c715 9519 sect->filepos = note->descpos;
16e9c715
NC
9520 sect->alignment_power = 2;
9521 break;
9522
9523 default:
b34976b6 9524 return TRUE;
16e9c715
NC
9525 }
9526
b34976b6 9527 return TRUE;
16e9c715 9528}
252b5132 9529
b34976b6 9530static bfd_boolean
217aa764 9531elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 9532{
9c5bfbb7 9533 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 9534
252b5132
RH
9535 switch (note->type)
9536 {
9537 default:
b34976b6 9538 return TRUE;
252b5132 9539
252b5132 9540 case NT_PRSTATUS:
bb0082d6
AM
9541 if (bed->elf_backend_grok_prstatus)
9542 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 9543 return TRUE;
bb0082d6 9544#if defined (HAVE_PRSTATUS_T)
252b5132 9545 return elfcore_grok_prstatus (abfd, note);
bb0082d6 9546#else
b34976b6 9547 return TRUE;
252b5132
RH
9548#endif
9549
9550#if defined (HAVE_PSTATUS_T)
9551 case NT_PSTATUS:
9552 return elfcore_grok_pstatus (abfd, note);
9553#endif
9554
9555#if defined (HAVE_LWPSTATUS_T)
9556 case NT_LWPSTATUS:
9557 return elfcore_grok_lwpstatus (abfd, note);
9558#endif
9559
9560 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
9561 return elfcore_grok_prfpreg (abfd, note);
9562
c044fabd 9563 case NT_WIN32PSTATUS:
16e9c715 9564 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 9565
c044fabd 9566 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
9567 if (note->namesz == 6
9568 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
9569 return elfcore_grok_prxfpreg (abfd, note);
9570 else
b34976b6 9571 return TRUE;
ff08c6bb 9572
4339cae0
L
9573 case NT_X86_XSTATE: /* Linux XSAVE extension */
9574 if (note->namesz == 6
9575 && strcmp (note->namedata, "LINUX") == 0)
9576 return elfcore_grok_xstatereg (abfd, note);
9577 else
9578 return TRUE;
9579
97753bd5
AM
9580 case NT_PPC_VMX:
9581 if (note->namesz == 6
9582 && strcmp (note->namedata, "LINUX") == 0)
9583 return elfcore_grok_ppc_vmx (abfd, note);
9584 else
9585 return TRUE;
9586
89eeb0bc
LM
9587 case NT_PPC_VSX:
9588 if (note->namesz == 6
9589 && strcmp (note->namedata, "LINUX") == 0)
9590 return elfcore_grok_ppc_vsx (abfd, note);
9591 else
9592 return TRUE;
9593
0675e188
UW
9594 case NT_S390_HIGH_GPRS:
9595 if (note->namesz == 6
9596 && strcmp (note->namedata, "LINUX") == 0)
9597 return elfcore_grok_s390_high_gprs (abfd, note);
9598 else
9599 return TRUE;
9600
d7eeb400
MS
9601 case NT_S390_TIMER:
9602 if (note->namesz == 6
9603 && strcmp (note->namedata, "LINUX") == 0)
9604 return elfcore_grok_s390_timer (abfd, note);
9605 else
9606 return TRUE;
9607
9608 case NT_S390_TODCMP:
9609 if (note->namesz == 6
9610 && strcmp (note->namedata, "LINUX") == 0)
9611 return elfcore_grok_s390_todcmp (abfd, note);
9612 else
9613 return TRUE;
9614
9615 case NT_S390_TODPREG:
9616 if (note->namesz == 6
9617 && strcmp (note->namedata, "LINUX") == 0)
9618 return elfcore_grok_s390_todpreg (abfd, note);
9619 else
9620 return TRUE;
9621
9622 case NT_S390_CTRS:
9623 if (note->namesz == 6
9624 && strcmp (note->namedata, "LINUX") == 0)
9625 return elfcore_grok_s390_ctrs (abfd, note);
9626 else
9627 return TRUE;
9628
9629 case NT_S390_PREFIX:
9630 if (note->namesz == 6
9631 && strcmp (note->namedata, "LINUX") == 0)
9632 return elfcore_grok_s390_prefix (abfd, note);
9633 else
9634 return TRUE;
9635
355b81d9
UW
9636 case NT_S390_LAST_BREAK:
9637 if (note->namesz == 6
9638 && strcmp (note->namedata, "LINUX") == 0)
9639 return elfcore_grok_s390_last_break (abfd, note);
9640 else
9641 return TRUE;
9642
9643 case NT_S390_SYSTEM_CALL:
9644 if (note->namesz == 6
9645 && strcmp (note->namedata, "LINUX") == 0)
9646 return elfcore_grok_s390_system_call (abfd, note);
9647 else
9648 return TRUE;
9649
abb3f6cc
NC
9650 case NT_S390_TDB:
9651 if (note->namesz == 6
9652 && strcmp (note->namedata, "LINUX") == 0)
9653 return elfcore_grok_s390_tdb (abfd, note);
9654 else
9655 return TRUE;
9656
4ef9f41a
AA
9657 case NT_S390_VXRS_LOW:
9658 if (note->namesz == 6
9659 && strcmp (note->namedata, "LINUX") == 0)
9660 return elfcore_grok_s390_vxrs_low (abfd, note);
9661 else
9662 return TRUE;
9663
9664 case NT_S390_VXRS_HIGH:
9665 if (note->namesz == 6
9666 && strcmp (note->namedata, "LINUX") == 0)
9667 return elfcore_grok_s390_vxrs_high (abfd, note);
9668 else
9669 return TRUE;
9670
faa9a424
UW
9671 case NT_ARM_VFP:
9672 if (note->namesz == 6
9673 && strcmp (note->namedata, "LINUX") == 0)
9674 return elfcore_grok_arm_vfp (abfd, note);
9675 else
9676 return TRUE;
9677
652451f8
YZ
9678 case NT_ARM_TLS:
9679 if (note->namesz == 6
9680 && strcmp (note->namedata, "LINUX") == 0)
9681 return elfcore_grok_aarch_tls (abfd, note);
9682 else
9683 return TRUE;
9684
9685 case NT_ARM_HW_BREAK:
9686 if (note->namesz == 6
9687 && strcmp (note->namedata, "LINUX") == 0)
9688 return elfcore_grok_aarch_hw_break (abfd, note);
9689 else
9690 return TRUE;
9691
9692 case NT_ARM_HW_WATCH:
9693 if (note->namesz == 6
9694 && strcmp (note->namedata, "LINUX") == 0)
9695 return elfcore_grok_aarch_hw_watch (abfd, note);
9696 else
9697 return TRUE;
9698
252b5132
RH
9699 case NT_PRPSINFO:
9700 case NT_PSINFO:
bb0082d6
AM
9701 if (bed->elf_backend_grok_psinfo)
9702 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 9703 return TRUE;
bb0082d6 9704#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 9705 return elfcore_grok_psinfo (abfd, note);
bb0082d6 9706#else
b34976b6 9707 return TRUE;
252b5132 9708#endif
3333a7c3
RM
9709
9710 case NT_AUXV:
9711 {
117ed4f8
AM
9712 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9713 SEC_HAS_CONTENTS);
3333a7c3
RM
9714
9715 if (sect == NULL)
9716 return FALSE;
eea6121a 9717 sect->size = note->descsz;
3333a7c3 9718 sect->filepos = note->descpos;
3333a7c3
RM
9719 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9720
9721 return TRUE;
9722 }
9015683b 9723
451b7c33
TT
9724 case NT_FILE:
9725 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
9726 note);
9727
9015683b
TT
9728 case NT_SIGINFO:
9729 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
9730 note);
5b2c414d 9731
252b5132
RH
9732 }
9733}
9734
718175fa
JK
9735static bfd_boolean
9736elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
9737{
c74f7d1c 9738 struct bfd_build_id* build_id;
30e8ee25
AM
9739
9740 if (note->descsz == 0)
9741 return FALSE;
9742
c74f7d1c
JT
9743 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
9744 if (build_id == NULL)
718175fa
JK
9745 return FALSE;
9746
c74f7d1c
JT
9747 build_id->size = note->descsz;
9748 memcpy (build_id->data, note->descdata, note->descsz);
9749 abfd->build_id = build_id;
718175fa
JK
9750
9751 return TRUE;
9752}
9753
9754static bfd_boolean
9755elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
9756{
9757 switch (note->type)
9758 {
9759 default:
9760 return TRUE;
9761
46bed679
L
9762 case NT_GNU_PROPERTY_TYPE_0:
9763 return _bfd_elf_parse_gnu_properties (abfd, note);
9764
718175fa
JK
9765 case NT_GNU_BUILD_ID:
9766 return elfobj_grok_gnu_build_id (abfd, note);
9767 }
9768}
9769
e21e5835
NC
9770static bfd_boolean
9771elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
9772{
9773 struct sdt_note *cur =
9774 (struct sdt_note *) bfd_alloc (abfd, sizeof (struct sdt_note)
9775 + note->descsz);
9776
9777 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
9778 cur->size = (bfd_size_type) note->descsz;
9779 memcpy (cur->data, note->descdata, note->descsz);
9780
9781 elf_tdata (abfd)->sdt_note_head = cur;
9782
9783 return TRUE;
9784}
9785
9786static bfd_boolean
9787elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
9788{
9789 switch (note->type)
9790 {
9791 case NT_STAPSDT:
9792 return elfobj_grok_stapsdt_note_1 (abfd, note);
9793
9794 default:
9795 return TRUE;
9796 }
9797}
9798
aa1ed4a9
JB
9799static bfd_boolean
9800elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
9801{
9802 size_t offset;
9803
b5430a3c 9804 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
aa1ed4a9 9805 {
b5430a3c 9806 case ELFCLASS32:
0064d223
JB
9807 if (note->descsz < 108)
9808 return FALSE;
aa1ed4a9
JB
9809 break;
9810
b5430a3c 9811 case ELFCLASS64:
0064d223
JB
9812 if (note->descsz < 120)
9813 return FALSE;
aa1ed4a9
JB
9814 break;
9815
9816 default:
9817 return FALSE;
9818 }
9819
0064d223
JB
9820 /* Check for version 1 in pr_version. */
9821 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
9822 return FALSE;
9823 offset = 4;
9824
9825 /* Skip over pr_psinfosz. */
b5430a3c 9826 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
0064d223
JB
9827 offset += 4;
9828 else
9829 {
9830 offset += 4; /* Padding before pr_psinfosz. */
9831 offset += 8;
9832 }
9833
aa1ed4a9
JB
9834 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
9835 elf_tdata (abfd)->core->program
9836 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
9837 offset += 17;
9838
9839 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
9840 elf_tdata (abfd)->core->command
9841 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
0064d223
JB
9842 offset += 81;
9843
9844 /* Padding before pr_pid. */
9845 offset += 2;
9846
9847 /* The pr_pid field was added in version "1a". */
9848 if (note->descsz < offset + 4)
9849 return TRUE;
9850
9851 elf_tdata (abfd)->core->pid
9852 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
aa1ed4a9
JB
9853
9854 return TRUE;
9855}
9856
9857static bfd_boolean
9858elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
9859{
9860 size_t offset;
9861 size_t size;
9862
9863 /* Check for version 1 in pr_version. */
9864 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
9865 return FALSE;
9866 offset = 4;
9867
9868 /* Skip over pr_statussz. */
b5430a3c 9869 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
aa1ed4a9 9870 {
b5430a3c 9871 case ELFCLASS32:
aa1ed4a9
JB
9872 offset += 4;
9873 break;
9874
b5430a3c 9875 case ELFCLASS64:
aa1ed4a9
JB
9876 offset += 4; /* Padding before pr_statussz. */
9877 offset += 8;
9878 break;
9879
9880 default:
9881 return FALSE;
9882 }
9883
9884 /* Extract size of pr_reg from pr_gregsetsz. */
b5430a3c 9885 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
aa1ed4a9
JB
9886 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
9887 else
9888 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
9889
9890 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
b5430a3c
JB
9891 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
9892 offset += 4 * 2;
9893 else
9894 offset += 8 * 2;
aa1ed4a9
JB
9895
9896 /* Skip over pr_osreldate. */
9897 offset += 4;
9898
9899 /* Read signal from pr_cursig. */
9900 if (elf_tdata (abfd)->core->signal == 0)
9901 elf_tdata (abfd)->core->signal
9902 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
9903 offset += 4;
9904
9905 /* Read TID from pr_pid. */
9906 elf_tdata (abfd)->core->lwpid
9907 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
9908 offset += 4;
9909
9910 /* Padding before pr_reg. */
b5430a3c 9911 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS64)
aa1ed4a9
JB
9912 offset += 4;
9913
9914 /* Make a ".reg/999" section and a ".reg" section. */
9915 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
9916 size, note->descpos + offset);
9917}
9918
9919static bfd_boolean
9920elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
9921{
9922 switch (note->type)
9923 {
9924 case NT_PRSTATUS:
9925 return elfcore_grok_freebsd_prstatus (abfd, note);
9926
9927 case NT_FPREGSET:
9928 return elfcore_grok_prfpreg (abfd, note);
9929
9930 case NT_PRPSINFO:
9931 return elfcore_grok_freebsd_psinfo (abfd, note);
9932
9933 case NT_FREEBSD_THRMISC:
9934 if (note->namesz == 8)
9935 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
9936 else
9937 return TRUE;
9938
3350c5f5
JB
9939 case NT_FREEBSD_PROCSTAT_AUXV:
9940 {
9941 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9942 SEC_HAS_CONTENTS);
9943
9944 if (sect == NULL)
9945 return FALSE;
9946 sect->size = note->descsz - 4;
9947 sect->filepos = note->descpos + 4;
9948 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9949
9950 return TRUE;
9951 }
9952
aa1ed4a9
JB
9953 case NT_X86_XSTATE:
9954 if (note->namesz == 8)
9955 return elfcore_grok_xstatereg (abfd, note);
9956 else
9957 return TRUE;
9958
9959 default:
9960 return TRUE;
9961 }
9962}
9963
b34976b6 9964static bfd_boolean
217aa764 9965elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
9966{
9967 char *cp;
9968
9969 cp = strchr (note->namedata, '@');
9970 if (cp != NULL)
9971 {
d2b64500 9972 *lwpidp = atoi(cp + 1);
b34976b6 9973 return TRUE;
50b2bdb7 9974 }
b34976b6 9975 return FALSE;
50b2bdb7
AM
9976}
9977
b34976b6 9978static bfd_boolean
217aa764 9979elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 9980{
50b2bdb7 9981 /* Signal number at offset 0x08. */
228e534f 9982 elf_tdata (abfd)->core->signal
50b2bdb7
AM
9983 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
9984
9985 /* Process ID at offset 0x50. */
228e534f 9986 elf_tdata (abfd)->core->pid
50b2bdb7
AM
9987 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
9988
9989 /* Command name at 0x7c (max 32 bytes, including nul). */
228e534f 9990 elf_tdata (abfd)->core->command
50b2bdb7
AM
9991 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
9992
7720ba9f
MK
9993 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
9994 note);
50b2bdb7
AM
9995}
9996
b34976b6 9997static bfd_boolean
217aa764 9998elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
9999{
10000 int lwp;
10001
10002 if (elfcore_netbsd_get_lwpid (note, &lwp))
228e534f 10003 elf_tdata (abfd)->core->lwpid = lwp;
50b2bdb7 10004
b4db1224 10005 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
10006 {
10007 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
10008 find this note before any of the others, which is fine,
10009 since the kernel writes this note out first when it
10010 creates a core file. */
47d9a591 10011
50b2bdb7
AM
10012 return elfcore_grok_netbsd_procinfo (abfd, note);
10013 }
10014
b4db1224
JT
10015 /* As of Jan 2002 there are no other machine-independent notes
10016 defined for NetBSD core files. If the note type is less
10017 than the start of the machine-dependent note types, we don't
10018 understand it. */
47d9a591 10019
b4db1224 10020 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 10021 return TRUE;
50b2bdb7
AM
10022
10023
10024 switch (bfd_get_arch (abfd))
10025 {
08a40648
AM
10026 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
10027 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
10028
10029 case bfd_arch_alpha:
10030 case bfd_arch_sparc:
10031 switch (note->type)
08a40648
AM
10032 {
10033 case NT_NETBSDCORE_FIRSTMACH+0:
10034 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 10035
08a40648
AM
10036 case NT_NETBSDCORE_FIRSTMACH+2:
10037 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 10038
08a40648
AM
10039 default:
10040 return TRUE;
10041 }
50b2bdb7 10042
08a40648
AM
10043 /* On all other arch's, PT_GETREGS == mach+1 and
10044 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
10045
10046 default:
10047 switch (note->type)
08a40648
AM
10048 {
10049 case NT_NETBSDCORE_FIRSTMACH+1:
10050 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 10051
08a40648
AM
10052 case NT_NETBSDCORE_FIRSTMACH+3:
10053 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 10054
08a40648
AM
10055 default:
10056 return TRUE;
10057 }
50b2bdb7
AM
10058 }
10059 /* NOTREACHED */
10060}
10061
67cc5033
MK
10062static bfd_boolean
10063elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10064{
10065 /* Signal number at offset 0x08. */
228e534f 10066 elf_tdata (abfd)->core->signal
67cc5033
MK
10067 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10068
10069 /* Process ID at offset 0x20. */
228e534f 10070 elf_tdata (abfd)->core->pid
67cc5033
MK
10071 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
10072
10073 /* Command name at 0x48 (max 32 bytes, including nul). */
228e534f 10074 elf_tdata (abfd)->core->command
67cc5033
MK
10075 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
10076
10077 return TRUE;
10078}
10079
10080static bfd_boolean
10081elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
10082{
10083 if (note->type == NT_OPENBSD_PROCINFO)
10084 return elfcore_grok_openbsd_procinfo (abfd, note);
10085
10086 if (note->type == NT_OPENBSD_REGS)
10087 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10088
10089 if (note->type == NT_OPENBSD_FPREGS)
10090 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10091
10092 if (note->type == NT_OPENBSD_XFPREGS)
10093 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
10094
10095 if (note->type == NT_OPENBSD_AUXV)
10096 {
10097 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
10098 SEC_HAS_CONTENTS);
10099
10100 if (sect == NULL)
10101 return FALSE;
10102 sect->size = note->descsz;
10103 sect->filepos = note->descpos;
10104 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10105
10106 return TRUE;
10107 }
10108
10109 if (note->type == NT_OPENBSD_WCOOKIE)
10110 {
10111 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
10112 SEC_HAS_CONTENTS);
10113
10114 if (sect == NULL)
10115 return FALSE;
10116 sect->size = note->descsz;
10117 sect->filepos = note->descpos;
10118 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10119
10120 return TRUE;
10121 }
10122
10123 return TRUE;
10124}
10125
07c6e936 10126static bfd_boolean
d3fd4074 10127elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
10128{
10129 void *ddata = note->descdata;
10130 char buf[100];
10131 char *name;
10132 asection *sect;
f8843e87
AM
10133 short sig;
10134 unsigned flags;
07c6e936
NC
10135
10136 /* nto_procfs_status 'pid' field is at offset 0. */
228e534f 10137 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
07c6e936 10138
f8843e87
AM
10139 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
10140 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
10141
10142 /* nto_procfs_status 'flags' field is at offset 8. */
10143 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
10144
10145 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
10146 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
10147 {
228e534f
AM
10148 elf_tdata (abfd)->core->signal = sig;
10149 elf_tdata (abfd)->core->lwpid = *tid;
f8843e87 10150 }
07c6e936 10151
f8843e87
AM
10152 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
10153 do not come from signals so we make sure we set the current
10154 thread just in case. */
10155 if (flags & 0x00000080)
228e534f 10156 elf_tdata (abfd)->core->lwpid = *tid;
07c6e936
NC
10157
10158 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 10159 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 10160
a50b1753 10161 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10162 if (name == NULL)
10163 return FALSE;
10164 strcpy (name, buf);
10165
117ed4f8 10166 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10167 if (sect == NULL)
10168 return FALSE;
10169
eea6121a 10170 sect->size = note->descsz;
07c6e936 10171 sect->filepos = note->descpos;
07c6e936
NC
10172 sect->alignment_power = 2;
10173
10174 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
10175}
10176
10177static bfd_boolean
d69f560c
KW
10178elfcore_grok_nto_regs (bfd *abfd,
10179 Elf_Internal_Note *note,
d3fd4074 10180 long tid,
d69f560c 10181 char *base)
07c6e936
NC
10182{
10183 char buf[100];
10184 char *name;
10185 asection *sect;
10186
d69f560c 10187 /* Make a "(base)/%d" section. */
d3fd4074 10188 sprintf (buf, "%s/%ld", base, tid);
07c6e936 10189
a50b1753 10190 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10191 if (name == NULL)
10192 return FALSE;
10193 strcpy (name, buf);
10194
117ed4f8 10195 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10196 if (sect == NULL)
10197 return FALSE;
10198
eea6121a 10199 sect->size = note->descsz;
07c6e936 10200 sect->filepos = note->descpos;
07c6e936
NC
10201 sect->alignment_power = 2;
10202
f8843e87 10203 /* This is the current thread. */
228e534f 10204 if (elf_tdata (abfd)->core->lwpid == tid)
d69f560c 10205 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
10206
10207 return TRUE;
07c6e936
NC
10208}
10209
10210#define BFD_QNT_CORE_INFO 7
10211#define BFD_QNT_CORE_STATUS 8
10212#define BFD_QNT_CORE_GREG 9
10213#define BFD_QNT_CORE_FPREG 10
10214
10215static bfd_boolean
217aa764 10216elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
10217{
10218 /* Every GREG section has a STATUS section before it. Store the
811072d8 10219 tid from the previous call to pass down to the next gregs
07c6e936 10220 function. */
d3fd4074 10221 static long tid = 1;
07c6e936
NC
10222
10223 switch (note->type)
10224 {
d69f560c
KW
10225 case BFD_QNT_CORE_INFO:
10226 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
10227 case BFD_QNT_CORE_STATUS:
10228 return elfcore_grok_nto_status (abfd, note, &tid);
10229 case BFD_QNT_CORE_GREG:
10230 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
10231 case BFD_QNT_CORE_FPREG:
10232 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
10233 default:
10234 return TRUE;
07c6e936
NC
10235 }
10236}
10237
b15fa79e
AM
10238static bfd_boolean
10239elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
10240{
10241 char *name;
10242 asection *sect;
10243 size_t len;
10244
10245 /* Use note name as section name. */
10246 len = note->namesz;
a50b1753 10247 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
10248 if (name == NULL)
10249 return FALSE;
10250 memcpy (name, note->namedata, len);
10251 name[len - 1] = '\0';
10252
10253 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10254 if (sect == NULL)
10255 return FALSE;
10256
10257 sect->size = note->descsz;
10258 sect->filepos = note->descpos;
10259 sect->alignment_power = 1;
10260
10261 return TRUE;
10262}
10263
7c76fa91
MS
10264/* Function: elfcore_write_note
10265
47d9a591 10266 Inputs:
a39f3346 10267 buffer to hold note, and current size of buffer
7c76fa91
MS
10268 name of note
10269 type of note
10270 data for note
10271 size of data for note
10272
a39f3346
AM
10273 Writes note to end of buffer. ELF64 notes are written exactly as
10274 for ELF32, despite the current (as of 2006) ELF gabi specifying
10275 that they ought to have 8-byte namesz and descsz field, and have
10276 8-byte alignment. Other writers, eg. Linux kernel, do the same.
10277
7c76fa91 10278 Return:
a39f3346 10279 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
10280
10281char *
a39f3346 10282elfcore_write_note (bfd *abfd,
217aa764 10283 char *buf,
a39f3346 10284 int *bufsiz,
217aa764 10285 const char *name,
a39f3346 10286 int type,
217aa764 10287 const void *input,
a39f3346 10288 int size)
7c76fa91
MS
10289{
10290 Elf_External_Note *xnp;
d4c88bbb 10291 size_t namesz;
d4c88bbb 10292 size_t newspace;
a39f3346 10293 char *dest;
7c76fa91 10294
d4c88bbb 10295 namesz = 0;
d4c88bbb 10296 if (name != NULL)
a39f3346 10297 namesz = strlen (name) + 1;
d4c88bbb 10298
a39f3346 10299 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 10300
a50b1753 10301 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
10302 if (buf == NULL)
10303 return buf;
a39f3346 10304 dest = buf + *bufsiz;
7c76fa91
MS
10305 *bufsiz += newspace;
10306 xnp = (Elf_External_Note *) dest;
10307 H_PUT_32 (abfd, namesz, xnp->namesz);
10308 H_PUT_32 (abfd, size, xnp->descsz);
10309 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
10310 dest = xnp->name;
10311 if (name != NULL)
10312 {
10313 memcpy (dest, name, namesz);
10314 dest += namesz;
a39f3346 10315 while (namesz & 3)
d4c88bbb
AM
10316 {
10317 *dest++ = '\0';
a39f3346 10318 ++namesz;
d4c88bbb
AM
10319 }
10320 }
10321 memcpy (dest, input, size);
a39f3346
AM
10322 dest += size;
10323 while (size & 3)
10324 {
10325 *dest++ = '\0';
10326 ++size;
10327 }
10328 return buf;
7c76fa91
MS
10329}
10330
7c76fa91 10331char *
217aa764
AM
10332elfcore_write_prpsinfo (bfd *abfd,
10333 char *buf,
10334 int *bufsiz,
10335 const char *fname,
10336 const char *psargs)
7c76fa91 10337{
183e98be
AM
10338 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10339
10340 if (bed->elf_backend_write_core_note != NULL)
10341 {
10342 char *ret;
10343 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
10344 NT_PRPSINFO, fname, psargs);
10345 if (ret != NULL)
10346 return ret;
10347 }
7c76fa91 10348
1f20dca5 10349#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
183e98be
AM
10350#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
10351 if (bed->s->elfclass == ELFCLASS32)
10352 {
10353#if defined (HAVE_PSINFO32_T)
10354 psinfo32_t data;
10355 int note_type = NT_PSINFO;
10356#else
10357 prpsinfo32_t data;
10358 int note_type = NT_PRPSINFO;
10359#endif
10360
10361 memset (&data, 0, sizeof (data));
10362 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
10363 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
10364 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 10365 "CORE", note_type, &data, sizeof (data));
183e98be
AM
10366 }
10367 else
10368#endif
10369 {
7c76fa91 10370#if defined (HAVE_PSINFO_T)
183e98be
AM
10371 psinfo_t data;
10372 int note_type = NT_PSINFO;
7c76fa91 10373#else
183e98be
AM
10374 prpsinfo_t data;
10375 int note_type = NT_PRPSINFO;
7c76fa91
MS
10376#endif
10377
183e98be
AM
10378 memset (&data, 0, sizeof (data));
10379 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
10380 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
10381 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 10382 "CORE", note_type, &data, sizeof (data));
183e98be 10383 }
7c76fa91
MS
10384#endif /* PSINFO_T or PRPSINFO_T */
10385
1f20dca5
UW
10386 free (buf);
10387 return NULL;
10388}
10389
70a38d42
SDJ
10390char *
10391elfcore_write_linux_prpsinfo32
10392 (bfd *abfd, char *buf, int *bufsiz,
10393 const struct elf_internal_linux_prpsinfo *prpsinfo)
10394{
10395 struct elf_external_linux_prpsinfo32 data;
10396
aeb70569 10397 swap_linux_prpsinfo32_out (abfd, prpsinfo, &data);
70a38d42
SDJ
10398 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
10399 &data, sizeof (data));
10400}
10401
10402char *
10403elfcore_write_linux_prpsinfo64
10404 (bfd *abfd, char *buf, int *bufsiz,
10405 const struct elf_internal_linux_prpsinfo *prpsinfo)
10406{
10407 struct elf_external_linux_prpsinfo64 data;
10408
aeb70569 10409 swap_linux_prpsinfo64_out (abfd, prpsinfo, &data);
70a38d42
SDJ
10410 return elfcore_write_note (abfd, buf, bufsiz,
10411 "CORE", NT_PRPSINFO, &data, sizeof (data));
10412}
10413
7c76fa91 10414char *
217aa764
AM
10415elfcore_write_prstatus (bfd *abfd,
10416 char *buf,
10417 int *bufsiz,
10418 long pid,
10419 int cursig,
10420 const void *gregs)
7c76fa91 10421{
183e98be 10422 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 10423
183e98be
AM
10424 if (bed->elf_backend_write_core_note != NULL)
10425 {
10426 char *ret;
10427 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
10428 NT_PRSTATUS,
10429 pid, cursig, gregs);
10430 if (ret != NULL)
10431 return ret;
10432 }
10433
1f20dca5 10434#if defined (HAVE_PRSTATUS_T)
183e98be
AM
10435#if defined (HAVE_PRSTATUS32_T)
10436 if (bed->s->elfclass == ELFCLASS32)
10437 {
10438 prstatus32_t prstat;
10439
10440 memset (&prstat, 0, sizeof (prstat));
10441 prstat.pr_pid = pid;
10442 prstat.pr_cursig = cursig;
10443 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 10444 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
10445 NT_PRSTATUS, &prstat, sizeof (prstat));
10446 }
10447 else
10448#endif
10449 {
10450 prstatus_t prstat;
10451
10452 memset (&prstat, 0, sizeof (prstat));
10453 prstat.pr_pid = pid;
10454 prstat.pr_cursig = cursig;
10455 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 10456 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
10457 NT_PRSTATUS, &prstat, sizeof (prstat));
10458 }
7c76fa91
MS
10459#endif /* HAVE_PRSTATUS_T */
10460
1f20dca5
UW
10461 free (buf);
10462 return NULL;
10463}
10464
51316059
MS
10465#if defined (HAVE_LWPSTATUS_T)
10466char *
217aa764
AM
10467elfcore_write_lwpstatus (bfd *abfd,
10468 char *buf,
10469 int *bufsiz,
10470 long pid,
10471 int cursig,
10472 const void *gregs)
51316059
MS
10473{
10474 lwpstatus_t lwpstat;
183e98be 10475 const char *note_name = "CORE";
51316059
MS
10476
10477 memset (&lwpstat, 0, sizeof (lwpstat));
10478 lwpstat.pr_lwpid = pid >> 16;
10479 lwpstat.pr_cursig = cursig;
10480#if defined (HAVE_LWPSTATUS_T_PR_REG)
d1e8523e 10481 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
51316059
MS
10482#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10483#if !defined(gregs)
10484 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
10485 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
10486#else
10487 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
10488 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
10489#endif
10490#endif
47d9a591 10491 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
10492 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
10493}
10494#endif /* HAVE_LWPSTATUS_T */
10495
7c76fa91
MS
10496#if defined (HAVE_PSTATUS_T)
10497char *
217aa764
AM
10498elfcore_write_pstatus (bfd *abfd,
10499 char *buf,
10500 int *bufsiz,
10501 long pid,
6c10990d
NC
10502 int cursig ATTRIBUTE_UNUSED,
10503 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 10504{
183e98be
AM
10505 const char *note_name = "CORE";
10506#if defined (HAVE_PSTATUS32_T)
10507 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 10508
183e98be
AM
10509 if (bed->s->elfclass == ELFCLASS32)
10510 {
10511 pstatus32_t pstat;
10512
10513 memset (&pstat, 0, sizeof (pstat));
10514 pstat.pr_pid = pid & 0xffff;
10515 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
10516 NT_PSTATUS, &pstat, sizeof (pstat));
10517 return buf;
10518 }
10519 else
10520#endif
10521 {
10522 pstatus_t pstat;
10523
10524 memset (&pstat, 0, sizeof (pstat));
10525 pstat.pr_pid = pid & 0xffff;
10526 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
10527 NT_PSTATUS, &pstat, sizeof (pstat));
10528 return buf;
10529 }
7c76fa91
MS
10530}
10531#endif /* HAVE_PSTATUS_T */
10532
10533char *
217aa764
AM
10534elfcore_write_prfpreg (bfd *abfd,
10535 char *buf,
10536 int *bufsiz,
10537 const void *fpregs,
10538 int size)
7c76fa91 10539{
183e98be 10540 const char *note_name = "CORE";
47d9a591 10541 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
10542 note_name, NT_FPREGSET, fpregs, size);
10543}
10544
10545char *
217aa764
AM
10546elfcore_write_prxfpreg (bfd *abfd,
10547 char *buf,
10548 int *bufsiz,
10549 const void *xfpregs,
10550 int size)
7c76fa91
MS
10551{
10552 char *note_name = "LINUX";
47d9a591 10553 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
10554 note_name, NT_PRXFPREG, xfpregs, size);
10555}
10556
4339cae0
L
10557char *
10558elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
10559 const void *xfpregs, int size)
10560{
97de3545
JB
10561 char *note_name;
10562 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
10563 note_name = "FreeBSD";
10564 else
10565 note_name = "LINUX";
4339cae0
L
10566 return elfcore_write_note (abfd, buf, bufsiz,
10567 note_name, NT_X86_XSTATE, xfpregs, size);
10568}
10569
97753bd5
AM
10570char *
10571elfcore_write_ppc_vmx (bfd *abfd,
10572 char *buf,
10573 int *bufsiz,
10574 const void *ppc_vmx,
10575 int size)
10576{
10577 char *note_name = "LINUX";
10578 return elfcore_write_note (abfd, buf, bufsiz,
10579 note_name, NT_PPC_VMX, ppc_vmx, size);
10580}
10581
89eeb0bc
LM
10582char *
10583elfcore_write_ppc_vsx (bfd *abfd,
10584 char *buf,
10585 int *bufsiz,
10586 const void *ppc_vsx,
10587 int size)
10588{
10589 char *note_name = "LINUX";
10590 return elfcore_write_note (abfd, buf, bufsiz,
10591 note_name, NT_PPC_VSX, ppc_vsx, size);
10592}
10593
0675e188
UW
10594static char *
10595elfcore_write_s390_high_gprs (bfd *abfd,
10596 char *buf,
10597 int *bufsiz,
10598 const void *s390_high_gprs,
10599 int size)
10600{
10601 char *note_name = "LINUX";
10602 return elfcore_write_note (abfd, buf, bufsiz,
10603 note_name, NT_S390_HIGH_GPRS,
10604 s390_high_gprs, size);
10605}
10606
d7eeb400
MS
10607char *
10608elfcore_write_s390_timer (bfd *abfd,
10609 char *buf,
10610 int *bufsiz,
10611 const void *s390_timer,
10612 int size)
10613{
10614 char *note_name = "LINUX";
10615 return elfcore_write_note (abfd, buf, bufsiz,
10616 note_name, NT_S390_TIMER, s390_timer, size);
10617}
10618
10619char *
10620elfcore_write_s390_todcmp (bfd *abfd,
10621 char *buf,
10622 int *bufsiz,
10623 const void *s390_todcmp,
10624 int size)
10625{
10626 char *note_name = "LINUX";
10627 return elfcore_write_note (abfd, buf, bufsiz,
10628 note_name, NT_S390_TODCMP, s390_todcmp, size);
10629}
10630
10631char *
10632elfcore_write_s390_todpreg (bfd *abfd,
10633 char *buf,
10634 int *bufsiz,
10635 const void *s390_todpreg,
10636 int size)
10637{
10638 char *note_name = "LINUX";
10639 return elfcore_write_note (abfd, buf, bufsiz,
10640 note_name, NT_S390_TODPREG, s390_todpreg, size);
10641}
10642
10643char *
10644elfcore_write_s390_ctrs (bfd *abfd,
10645 char *buf,
10646 int *bufsiz,
10647 const void *s390_ctrs,
10648 int size)
10649{
10650 char *note_name = "LINUX";
10651 return elfcore_write_note (abfd, buf, bufsiz,
10652 note_name, NT_S390_CTRS, s390_ctrs, size);
10653}
10654
10655char *
10656elfcore_write_s390_prefix (bfd *abfd,
10657 char *buf,
10658 int *bufsiz,
10659 const void *s390_prefix,
10660 int size)
10661{
10662 char *note_name = "LINUX";
10663 return elfcore_write_note (abfd, buf, bufsiz,
10664 note_name, NT_S390_PREFIX, s390_prefix, size);
10665}
10666
355b81d9
UW
10667char *
10668elfcore_write_s390_last_break (bfd *abfd,
10669 char *buf,
10670 int *bufsiz,
10671 const void *s390_last_break,
10672 int size)
10673{
10674 char *note_name = "LINUX";
10675 return elfcore_write_note (abfd, buf, bufsiz,
10676 note_name, NT_S390_LAST_BREAK,
10677 s390_last_break, size);
10678}
10679
10680char *
10681elfcore_write_s390_system_call (bfd *abfd,
10682 char *buf,
10683 int *bufsiz,
10684 const void *s390_system_call,
10685 int size)
10686{
10687 char *note_name = "LINUX";
10688 return elfcore_write_note (abfd, buf, bufsiz,
10689 note_name, NT_S390_SYSTEM_CALL,
10690 s390_system_call, size);
10691}
10692
abb3f6cc
NC
10693char *
10694elfcore_write_s390_tdb (bfd *abfd,
10695 char *buf,
10696 int *bufsiz,
10697 const void *s390_tdb,
10698 int size)
10699{
10700 char *note_name = "LINUX";
10701 return elfcore_write_note (abfd, buf, bufsiz,
10702 note_name, NT_S390_TDB, s390_tdb, size);
10703}
10704
4ef9f41a
AA
10705char *
10706elfcore_write_s390_vxrs_low (bfd *abfd,
10707 char *buf,
10708 int *bufsiz,
10709 const void *s390_vxrs_low,
10710 int size)
10711{
10712 char *note_name = "LINUX";
10713 return elfcore_write_note (abfd, buf, bufsiz,
10714 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
10715}
10716
10717char *
10718elfcore_write_s390_vxrs_high (bfd *abfd,
10719 char *buf,
10720 int *bufsiz,
10721 const void *s390_vxrs_high,
10722 int size)
10723{
10724 char *note_name = "LINUX";
10725 return elfcore_write_note (abfd, buf, bufsiz,
10726 note_name, NT_S390_VXRS_HIGH,
10727 s390_vxrs_high, size);
10728}
10729
faa9a424
UW
10730char *
10731elfcore_write_arm_vfp (bfd *abfd,
10732 char *buf,
10733 int *bufsiz,
10734 const void *arm_vfp,
10735 int size)
10736{
10737 char *note_name = "LINUX";
10738 return elfcore_write_note (abfd, buf, bufsiz,
10739 note_name, NT_ARM_VFP, arm_vfp, size);
10740}
10741
652451f8
YZ
10742char *
10743elfcore_write_aarch_tls (bfd *abfd,
10744 char *buf,
10745 int *bufsiz,
10746 const void *aarch_tls,
10747 int size)
10748{
10749 char *note_name = "LINUX";
10750 return elfcore_write_note (abfd, buf, bufsiz,
10751 note_name, NT_ARM_TLS, aarch_tls, size);
10752}
10753
10754char *
10755elfcore_write_aarch_hw_break (bfd *abfd,
10756 char *buf,
10757 int *bufsiz,
10758 const void *aarch_hw_break,
10759 int size)
10760{
10761 char *note_name = "LINUX";
10762 return elfcore_write_note (abfd, buf, bufsiz,
10763 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
10764}
10765
10766char *
10767elfcore_write_aarch_hw_watch (bfd *abfd,
10768 char *buf,
10769 int *bufsiz,
10770 const void *aarch_hw_watch,
10771 int size)
10772{
10773 char *note_name = "LINUX";
10774 return elfcore_write_note (abfd, buf, bufsiz,
10775 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
10776}
10777
bb864ac1
CES
10778char *
10779elfcore_write_register_note (bfd *abfd,
10780 char *buf,
10781 int *bufsiz,
10782 const char *section,
10783 const void *data,
10784 int size)
10785{
10786 if (strcmp (section, ".reg2") == 0)
10787 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
10788 if (strcmp (section, ".reg-xfp") == 0)
10789 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
10790 if (strcmp (section, ".reg-xstate") == 0)
10791 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
10792 if (strcmp (section, ".reg-ppc-vmx") == 0)
10793 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
10794 if (strcmp (section, ".reg-ppc-vsx") == 0)
10795 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
10796 if (strcmp (section, ".reg-s390-high-gprs") == 0)
10797 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
10798 if (strcmp (section, ".reg-s390-timer") == 0)
10799 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
10800 if (strcmp (section, ".reg-s390-todcmp") == 0)
10801 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
10802 if (strcmp (section, ".reg-s390-todpreg") == 0)
10803 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
10804 if (strcmp (section, ".reg-s390-ctrs") == 0)
10805 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
10806 if (strcmp (section, ".reg-s390-prefix") == 0)
10807 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
355b81d9
UW
10808 if (strcmp (section, ".reg-s390-last-break") == 0)
10809 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
10810 if (strcmp (section, ".reg-s390-system-call") == 0)
10811 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
abb3f6cc
NC
10812 if (strcmp (section, ".reg-s390-tdb") == 0)
10813 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
4ef9f41a
AA
10814 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
10815 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
10816 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
10817 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
faa9a424
UW
10818 if (strcmp (section, ".reg-arm-vfp") == 0)
10819 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
652451f8
YZ
10820 if (strcmp (section, ".reg-aarch-tls") == 0)
10821 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
10822 if (strcmp (section, ".reg-aarch-hw-break") == 0)
10823 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
10824 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
10825 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
bb864ac1
CES
10826 return NULL;
10827}
10828
b34976b6 10829static bfd_boolean
718175fa 10830elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 10831{
c044fabd 10832 char *p;
252b5132 10833
252b5132
RH
10834 p = buf;
10835 while (p < buf + size)
10836 {
c044fabd
KH
10837 /* FIXME: bad alignment assumption. */
10838 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
10839 Elf_Internal_Note in;
10840
baea7ef1
AM
10841 if (offsetof (Elf_External_Note, name) > buf - p + size)
10842 return FALSE;
10843
dc810e39 10844 in.type = H_GET_32 (abfd, xnp->type);
252b5132 10845
dc810e39 10846 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 10847 in.namedata = xnp->name;
baea7ef1
AM
10848 if (in.namesz > buf - in.namedata + size)
10849 return FALSE;
252b5132 10850
dc810e39 10851 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
10852 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
10853 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
10854 if (in.descsz != 0
10855 && (in.descdata >= buf + size
10856 || in.descsz > buf - in.descdata + size))
10857 return FALSE;
252b5132 10858
718175fa
JK
10859 switch (bfd_get_format (abfd))
10860 {
10861 default:
10862 return TRUE;
10863
10864 case bfd_core:
f64e188b 10865 {
8acbedd6 10866#define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
f64e188b 10867 struct
718175fa 10868 {
f64e188b 10869 const char * string;
8acbedd6 10870 size_t len;
f64e188b 10871 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
718175fa 10872 }
f64e188b 10873 grokers[] =
b15fa79e 10874 {
8acbedd6 10875 GROKER_ELEMENT ("", elfcore_grok_note),
aa1ed4a9 10876 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
8acbedd6
KS
10877 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
10878 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
10879 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
10880 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note)
f64e188b 10881 };
8acbedd6 10882#undef GROKER_ELEMENT
f64e188b
NC
10883 int i;
10884
10885 for (i = ARRAY_SIZE (grokers); i--;)
8acbedd6
KS
10886 {
10887 if (in.namesz >= grokers[i].len
10888 && strncmp (in.namedata, grokers[i].string,
10889 grokers[i].len) == 0)
10890 {
10891 if (! grokers[i].func (abfd, & in))
10892 return FALSE;
10893 break;
10894 }
10895 }
f64e188b
NC
10896 break;
10897 }
718175fa
JK
10898
10899 case bfd_object:
10900 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
10901 {
10902 if (! elfobj_grok_gnu_note (abfd, &in))
10903 return FALSE;
10904 }
e21e5835
NC
10905 else if (in.namesz == sizeof "stapsdt"
10906 && strcmp (in.namedata, "stapsdt") == 0)
10907 {
10908 if (! elfobj_grok_stapsdt_note (abfd, &in))
10909 return FALSE;
10910 }
718175fa 10911 break;
08a40648 10912 }
252b5132
RH
10913
10914 p = in.descdata + BFD_ALIGN (in.descsz, 4);
10915 }
10916
718175fa
JK
10917 return TRUE;
10918}
10919
10920static bfd_boolean
10921elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
10922{
10923 char *buf;
10924
10925 if (size <= 0)
10926 return TRUE;
10927
10928 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
10929 return FALSE;
10930
f64e188b 10931 buf = (char *) bfd_malloc (size + 1);
718175fa
JK
10932 if (buf == NULL)
10933 return FALSE;
10934
f64e188b
NC
10935 /* PR 17512: file: ec08f814
10936 0-termintate the buffer so that string searches will not overflow. */
10937 buf[size] = 0;
10938
718175fa
JK
10939 if (bfd_bread (buf, size, abfd) != size
10940 || !elf_parse_notes (abfd, buf, size, offset))
10941 {
10942 free (buf);
10943 return FALSE;
10944 }
10945
252b5132 10946 free (buf);
b34976b6 10947 return TRUE;
252b5132 10948}
98d8431c
JB
10949\f
10950/* Providing external access to the ELF program header table. */
10951
10952/* Return an upper bound on the number of bytes required to store a
10953 copy of ABFD's program header table entries. Return -1 if an error
10954 occurs; bfd_get_error will return an appropriate code. */
c044fabd 10955
98d8431c 10956long
217aa764 10957bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
10958{
10959 if (abfd->xvec->flavour != bfd_target_elf_flavour)
10960 {
10961 bfd_set_error (bfd_error_wrong_format);
10962 return -1;
10963 }
10964
936e320b 10965 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
10966}
10967
98d8431c
JB
10968/* Copy ABFD's program header table entries to *PHDRS. The entries
10969 will be stored as an array of Elf_Internal_Phdr structures, as
10970 defined in include/elf/internal.h. To find out how large the
10971 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
10972
10973 Return the number of program header table entries read, or -1 if an
10974 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 10975
98d8431c 10976int
217aa764 10977bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
10978{
10979 int num_phdrs;
10980
10981 if (abfd->xvec->flavour != bfd_target_elf_flavour)
10982 {
10983 bfd_set_error (bfd_error_wrong_format);
10984 return -1;
10985 }
10986
10987 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 10988 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
10989 num_phdrs * sizeof (Elf_Internal_Phdr));
10990
10991 return num_phdrs;
10992}
ae4221d7 10993
db6751f2 10994enum elf_reloc_type_class
7e612e98
AM
10995_bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
10996 const asection *rel_sec ATTRIBUTE_UNUSED,
10997 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
10998{
10999 return reloc_class_normal;
11000}
f8df10f4 11001
47d9a591 11002/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
11003 relocation against a local symbol. */
11004
11005bfd_vma
217aa764
AM
11006_bfd_elf_rela_local_sym (bfd *abfd,
11007 Elf_Internal_Sym *sym,
8517fae7 11008 asection **psec,
217aa764 11009 Elf_Internal_Rela *rel)
f8df10f4 11010{
8517fae7 11011 asection *sec = *psec;
f8df10f4
JJ
11012 bfd_vma relocation;
11013
11014 relocation = (sec->output_section->vma
11015 + sec->output_offset
11016 + sym->st_value);
11017 if ((sec->flags & SEC_MERGE)
c629eae0 11018 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 11019 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
f8df10f4 11020 {
f8df10f4 11021 rel->r_addend =
8517fae7 11022 _bfd_merged_section_offset (abfd, psec,
65765700 11023 elf_section_data (sec)->sec_info,
753731ee
AM
11024 sym->st_value + rel->r_addend);
11025 if (sec != *psec)
11026 {
11027 /* If we have changed the section, and our original section is
11028 marked with SEC_EXCLUDE, it means that the original
11029 SEC_MERGE section has been completely subsumed in some
11030 other SEC_MERGE section. In this case, we need to leave
11031 some info around for --emit-relocs. */
11032 if ((sec->flags & SEC_EXCLUDE) != 0)
11033 sec->kept_section = *psec;
11034 sec = *psec;
11035 }
8517fae7
AM
11036 rel->r_addend -= relocation;
11037 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
11038 }
11039 return relocation;
11040}
c629eae0
JJ
11041
11042bfd_vma
217aa764
AM
11043_bfd_elf_rel_local_sym (bfd *abfd,
11044 Elf_Internal_Sym *sym,
11045 asection **psec,
11046 bfd_vma addend)
47d9a591 11047{
c629eae0
JJ
11048 asection *sec = *psec;
11049
dbaa2011 11050 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
c629eae0
JJ
11051 return sym->st_value + addend;
11052
11053 return _bfd_merged_section_offset (abfd, psec,
65765700 11054 elf_section_data (sec)->sec_info,
753731ee 11055 sym->st_value + addend);
c629eae0
JJ
11056}
11057
37b01f6a
DG
11058/* Adjust an address within a section. Given OFFSET within SEC, return
11059 the new offset within the section, based upon changes made to the
11060 section. Returns -1 if the offset is now invalid.
11061 The offset (in abnd out) is in target sized bytes, however big a
11062 byte may be. */
11063
c629eae0 11064bfd_vma
217aa764 11065_bfd_elf_section_offset (bfd *abfd,
92e4ec35 11066 struct bfd_link_info *info,
217aa764
AM
11067 asection *sec,
11068 bfd_vma offset)
c629eae0 11069{
68bfbfcc 11070 switch (sec->sec_info_type)
65765700 11071 {
dbaa2011 11072 case SEC_INFO_TYPE_STABS:
eea6121a
AM
11073 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
11074 offset);
dbaa2011 11075 case SEC_INFO_TYPE_EH_FRAME:
92e4ec35 11076 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
37b01f6a 11077
65765700 11078 default:
310fd250
L
11079 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
11080 {
37b01f6a 11081 /* Reverse the offset. */
310fd250
L
11082 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11083 bfd_size_type address_size = bed->s->arch_size / 8;
37b01f6a
DG
11084
11085 /* address_size and sec->size are in octets. Convert
11086 to bytes before subtracting the original offset. */
11087 offset = (sec->size - address_size) / bfd_octets_per_byte (abfd) - offset;
310fd250 11088 }
65765700
JJ
11089 return offset;
11090 }
c629eae0 11091}
3333a7c3
RM
11092\f
11093/* Create a new BFD as if by bfd_openr. Rather than opening a file,
11094 reconstruct an ELF file by reading the segments out of remote memory
11095 based on the ELF file header at EHDR_VMA and the ELF program headers it
11096 points to. If not null, *LOADBASEP is filled in with the difference
11097 between the VMAs from which the segments were read, and the VMAs the
11098 file headers (and hence BFD's idea of each section's VMA) put them at.
11099
11100 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
11101 remote memory at target address VMA into the local buffer at MYADDR; it
11102 should return zero on success or an `errno' code on failure. TEMPL must
11103 be a BFD for an ELF target with the word size and byte order found in
11104 the remote memory. */
11105
11106bfd *
217aa764
AM
11107bfd_elf_bfd_from_remote_memory
11108 (bfd *templ,
11109 bfd_vma ehdr_vma,
f0a5d95a 11110 bfd_size_type size,
217aa764 11111 bfd_vma *loadbasep,
fe78531d 11112 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
3333a7c3
RM
11113{
11114 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
5979d6b6 11115 (templ, ehdr_vma, size, loadbasep, target_read_memory);
3333a7c3 11116}
4c45e5c9
JJ
11117\f
11118long
c9727e01
AM
11119_bfd_elf_get_synthetic_symtab (bfd *abfd,
11120 long symcount ATTRIBUTE_UNUSED,
11121 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 11122 long dynsymcount,
c9727e01
AM
11123 asymbol **dynsyms,
11124 asymbol **ret)
4c45e5c9
JJ
11125{
11126 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11127 asection *relplt;
11128 asymbol *s;
11129 const char *relplt_name;
11130 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
11131 arelent *p;
11132 long count, i, n;
11133 size_t size;
11134 Elf_Internal_Shdr *hdr;
11135 char *names;
11136 asection *plt;
11137
8615f3f2
AM
11138 *ret = NULL;
11139
90e3cdf2
JJ
11140 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
11141 return 0;
11142
8615f3f2
AM
11143 if (dynsymcount <= 0)
11144 return 0;
11145
4c45e5c9
JJ
11146 if (!bed->plt_sym_val)
11147 return 0;
11148
11149 relplt_name = bed->relplt_name;
11150 if (relplt_name == NULL)
d35fd659 11151 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
11152 relplt = bfd_get_section_by_name (abfd, relplt_name);
11153 if (relplt == NULL)
11154 return 0;
11155
11156 hdr = &elf_section_data (relplt)->this_hdr;
11157 if (hdr->sh_link != elf_dynsymtab (abfd)
11158 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
11159 return 0;
11160
11161 plt = bfd_get_section_by_name (abfd, ".plt");
11162 if (plt == NULL)
11163 return 0;
11164
11165 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 11166 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
11167 return -1;
11168
eea6121a 11169 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
11170 size = count * sizeof (asymbol);
11171 p = relplt->relocation;
cb53bf42 11172 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
11173 {
11174 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
11175 if (p->addend != 0)
11176 {
11177#ifdef BFD64
11178 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
11179#else
11180 size += sizeof ("+0x") - 1 + 8;
11181#endif
11182 }
11183 }
4c45e5c9 11184
a50b1753 11185 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
11186 if (s == NULL)
11187 return -1;
11188
11189 names = (char *) (s + count);
11190 p = relplt->relocation;
11191 n = 0;
cb53bf42 11192 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
11193 {
11194 size_t len;
11195 bfd_vma addr;
11196
11197 addr = bed->plt_sym_val (i, plt, p);
11198 if (addr == (bfd_vma) -1)
11199 continue;
11200
11201 *s = **p->sym_ptr_ptr;
65a7a66f
AM
11202 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
11203 we are defining a symbol, ensure one of them is set. */
11204 if ((s->flags & BSF_LOCAL) == 0)
11205 s->flags |= BSF_GLOBAL;
6ba2a415 11206 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
11207 s->section = plt;
11208 s->value = addr - plt->vma;
11209 s->name = names;
8f39ba8e 11210 s->udata.p = NULL;
4c45e5c9
JJ
11211 len = strlen ((*p->sym_ptr_ptr)->name);
11212 memcpy (names, (*p->sym_ptr_ptr)->name, len);
11213 names += len;
041de40d
AM
11214 if (p->addend != 0)
11215 {
1d770845 11216 char buf[30], *a;
d324f6d6 11217
041de40d
AM
11218 memcpy (names, "+0x", sizeof ("+0x") - 1);
11219 names += sizeof ("+0x") - 1;
1d770845
L
11220 bfd_sprintf_vma (abfd, buf, p->addend);
11221 for (a = buf; *a == '0'; ++a)
11222 ;
11223 len = strlen (a);
11224 memcpy (names, a, len);
11225 names += len;
041de40d 11226 }
4c45e5c9
JJ
11227 memcpy (names, "@plt", sizeof ("@plt"));
11228 names += sizeof ("@plt");
8f39ba8e 11229 ++s, ++n;
4c45e5c9
JJ
11230 }
11231
11232 return n;
11233}
3d7f7666 11234
821e6ff6
AM
11235/* It is only used by x86-64 so far.
11236 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
7eacd66b
AM
11237 but current usage would allow all of _bfd_std_section to be zero. */
11238static const asymbol lcomm_sym
11239 = GLOBAL_SYM_INIT ("LARGE_COMMON", &_bfd_elf_large_com_section);
3b22753a 11240asection _bfd_elf_large_com_section
7eacd66b 11241 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, &lcomm_sym,
821e6ff6 11242 "LARGE_COMMON", 0, SEC_IS_COMMON);
ecca9871 11243
d1036acb 11244void
78245035
L
11245_bfd_elf_post_process_headers (bfd * abfd,
11246 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
d1036acb
L
11247{
11248 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
11249
11250 i_ehdrp = elf_elfheader (abfd);
11251
11252 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
11253
11254 /* To make things simpler for the loader on Linux systems we set the
9c55345c 11255 osabi field to ELFOSABI_GNU if the binary contains symbols of
f64b2e8d 11256 the STT_GNU_IFUNC type or STB_GNU_UNIQUE binding. */
d8045f23 11257 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
f64b2e8d 11258 && elf_tdata (abfd)->has_gnu_symbols)
9c55345c 11259 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
d1036acb 11260}
fcb93ecf
PB
11261
11262
11263/* Return TRUE for ELF symbol types that represent functions.
11264 This is the default version of this function, which is sufficient for
d8045f23 11265 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
11266
11267bfd_boolean
11268_bfd_elf_is_function_type (unsigned int type)
11269{
d8045f23
NC
11270 return (type == STT_FUNC
11271 || type == STT_GNU_IFUNC);
fcb93ecf 11272}
9f296da3 11273
aef36ac1
AM
11274/* If the ELF symbol SYM might be a function in SEC, return the
11275 function size and set *CODE_OFF to the function's entry point,
11276 otherwise return zero. */
9f296da3 11277
aef36ac1
AM
11278bfd_size_type
11279_bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
11280 bfd_vma *code_off)
9f296da3 11281{
aef36ac1
AM
11282 bfd_size_type size;
11283
ff9e0f5b 11284 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
aef36ac1
AM
11285 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
11286 || sym->section != sec)
11287 return 0;
ff9e0f5b 11288
ff9e0f5b 11289 *code_off = sym->value;
aef36ac1
AM
11290 size = 0;
11291 if (!(sym->flags & BSF_SYNTHETIC))
11292 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
11293 if (size == 0)
11294 size = 1;
11295 return size;
9f296da3 11296}