bfd: remove unused local variables in elf32-score, elf32-score7 and elfxx-mips
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91 2
2571583a 3 Copyright (C) 1993-2017 Free Software Foundation, Inc.
252b5132 4
5e8d7549 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
5e8d7549
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
5e8d7549 10 (at your option) any later version.
252b5132 11
5e8d7549
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
5e8d7549 17 You should have received a copy of the GNU General Public License
b34976b6 18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132 22
1b74d094
BW
23/*
24SECTION
252b5132
RH
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
661a3fd4 33 haven't bothered yet. */
252b5132 34
7ee38065
MS
35/* For sparc64-cross-sparc32. */
36#define _SYSCALL32
252b5132 37#include "sysdep.h"
3db64b00 38#include "bfd.h"
252b5132
RH
39#include "bfdlink.h"
40#include "libbfd.h"
41#define ARCH_SIZE 0
42#include "elf-bfd.h"
e0e8c97f 43#include "libiberty.h"
ff59fc36 44#include "safe-ctype.h"
de64ce13 45#include "elf-linux-core.h"
252b5132 46
8bc7f138
L
47#ifdef CORE_HEADER
48#include CORE_HEADER
49#endif
50
217aa764 51static int elf_sort_sections (const void *, const void *);
c84fca4d 52static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764 53static bfd_boolean prep_headers (bfd *);
ef10c3ac 54static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int) ;
718175fa
JK
55static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
56static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
57 file_ptr offset);
50b2bdb7 58
252b5132
RH
59/* Swap version information in and out. The version information is
60 currently size independent. If that ever changes, this code will
61 need to move into elfcode.h. */
62
63/* Swap in a Verdef structure. */
64
65void
217aa764
AM
66_bfd_elf_swap_verdef_in (bfd *abfd,
67 const Elf_External_Verdef *src,
68 Elf_Internal_Verdef *dst)
252b5132 69{
dc810e39
AM
70 dst->vd_version = H_GET_16 (abfd, src->vd_version);
71 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
72 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
73 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
74 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
75 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
76 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
77}
78
79/* Swap out a Verdef structure. */
80
81void
217aa764
AM
82_bfd_elf_swap_verdef_out (bfd *abfd,
83 const Elf_Internal_Verdef *src,
84 Elf_External_Verdef *dst)
252b5132 85{
dc810e39
AM
86 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
87 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
88 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
89 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
90 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
91 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
92 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
93}
94
95/* Swap in a Verdaux structure. */
96
97void
217aa764
AM
98_bfd_elf_swap_verdaux_in (bfd *abfd,
99 const Elf_External_Verdaux *src,
100 Elf_Internal_Verdaux *dst)
252b5132 101{
dc810e39
AM
102 dst->vda_name = H_GET_32 (abfd, src->vda_name);
103 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
104}
105
106/* Swap out a Verdaux structure. */
107
108void
217aa764
AM
109_bfd_elf_swap_verdaux_out (bfd *abfd,
110 const Elf_Internal_Verdaux *src,
111 Elf_External_Verdaux *dst)
252b5132 112{
dc810e39
AM
113 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
114 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
115}
116
117/* Swap in a Verneed structure. */
118
119void
217aa764
AM
120_bfd_elf_swap_verneed_in (bfd *abfd,
121 const Elf_External_Verneed *src,
122 Elf_Internal_Verneed *dst)
252b5132 123{
dc810e39
AM
124 dst->vn_version = H_GET_16 (abfd, src->vn_version);
125 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
126 dst->vn_file = H_GET_32 (abfd, src->vn_file);
127 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
128 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
129}
130
131/* Swap out a Verneed structure. */
132
133void
217aa764
AM
134_bfd_elf_swap_verneed_out (bfd *abfd,
135 const Elf_Internal_Verneed *src,
136 Elf_External_Verneed *dst)
252b5132 137{
dc810e39
AM
138 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
139 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
140 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
141 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
142 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
143}
144
145/* Swap in a Vernaux structure. */
146
147void
217aa764
AM
148_bfd_elf_swap_vernaux_in (bfd *abfd,
149 const Elf_External_Vernaux *src,
150 Elf_Internal_Vernaux *dst)
252b5132 151{
dc810e39
AM
152 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
153 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
154 dst->vna_other = H_GET_16 (abfd, src->vna_other);
155 dst->vna_name = H_GET_32 (abfd, src->vna_name);
156 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
157}
158
159/* Swap out a Vernaux structure. */
160
161void
217aa764
AM
162_bfd_elf_swap_vernaux_out (bfd *abfd,
163 const Elf_Internal_Vernaux *src,
164 Elf_External_Vernaux *dst)
252b5132 165{
dc810e39
AM
166 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
167 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
168 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
169 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
170 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
171}
172
173/* Swap in a Versym structure. */
174
175void
217aa764
AM
176_bfd_elf_swap_versym_in (bfd *abfd,
177 const Elf_External_Versym *src,
178 Elf_Internal_Versym *dst)
252b5132 179{
dc810e39 180 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
181}
182
183/* Swap out a Versym structure. */
184
185void
217aa764
AM
186_bfd_elf_swap_versym_out (bfd *abfd,
187 const Elf_Internal_Versym *src,
188 Elf_External_Versym *dst)
252b5132 189{
dc810e39 190 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
191}
192
193/* Standard ELF hash function. Do not change this function; you will
194 cause invalid hash tables to be generated. */
3a99b017 195
252b5132 196unsigned long
217aa764 197bfd_elf_hash (const char *namearg)
252b5132 198{
3a99b017 199 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
200 unsigned long h = 0;
201 unsigned long g;
202 int ch;
203
204 while ((ch = *name++) != '\0')
205 {
206 h = (h << 4) + ch;
207 if ((g = (h & 0xf0000000)) != 0)
208 {
209 h ^= g >> 24;
210 /* The ELF ABI says `h &= ~g', but this is equivalent in
211 this case and on some machines one insn instead of two. */
212 h ^= g;
213 }
214 }
32dfa85d 215 return h & 0xffffffff;
252b5132
RH
216}
217
fdc90cb4
JJ
218/* DT_GNU_HASH hash function. Do not change this function; you will
219 cause invalid hash tables to be generated. */
220
221unsigned long
222bfd_elf_gnu_hash (const char *namearg)
223{
224 const unsigned char *name = (const unsigned char *) namearg;
225 unsigned long h = 5381;
226 unsigned char ch;
227
228 while ((ch = *name++) != '\0')
229 h = (h << 5) + h + ch;
230 return h & 0xffffffff;
231}
232
0c8d6e5c
AM
233/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
234 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 235bfd_boolean
0c8d6e5c 236bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 237 size_t object_size,
4dfe6ac6 238 enum elf_target_id object_id)
252b5132 239{
0ffa91dd
NC
240 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
241 abfd->tdata.any = bfd_zalloc (abfd, object_size);
242 if (abfd->tdata.any == NULL)
243 return FALSE;
252b5132 244
0ffa91dd 245 elf_object_id (abfd) = object_id;
c0355132
AM
246 if (abfd->direction != read_direction)
247 {
248 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
249 if (o == NULL)
250 return FALSE;
251 elf_tdata (abfd)->o = o;
252 elf_program_header_size (abfd) = (bfd_size_type) -1;
253 }
b34976b6 254 return TRUE;
252b5132
RH
255}
256
0ffa91dd
NC
257
258bfd_boolean
ae95ffa6 259bfd_elf_make_object (bfd *abfd)
0ffa91dd 260{
ae95ffa6 261 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 262 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 263 bed->target_id);
0ffa91dd
NC
264}
265
b34976b6 266bfd_boolean
217aa764 267bfd_elf_mkcorefile (bfd *abfd)
252b5132 268{
c044fabd 269 /* I think this can be done just like an object file. */
228e534f
AM
270 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
271 return FALSE;
272 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
273 return elf_tdata (abfd)->core != NULL;
252b5132
RH
274}
275
72a80a16 276static char *
217aa764 277bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
278{
279 Elf_Internal_Shdr **i_shdrp;
f075ee0c 280 bfd_byte *shstrtab = NULL;
dc810e39
AM
281 file_ptr offset;
282 bfd_size_type shstrtabsize;
252b5132
RH
283
284 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
285 if (i_shdrp == 0
286 || shindex >= elf_numsections (abfd)
287 || i_shdrp[shindex] == 0)
f075ee0c 288 return NULL;
252b5132 289
f075ee0c 290 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
291 if (shstrtab == NULL)
292 {
c044fabd 293 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
294 offset = i_shdrp[shindex]->sh_offset;
295 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
296
297 /* Allocate and clear an extra byte at the end, to prevent crashes
298 in case the string table is not terminated. */
3471d59d 299 if (shstrtabsize + 1 <= 1
06614111
NC
300 || bfd_seek (abfd, offset, SEEK_SET) != 0
301 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL)
c6c60d09
JJ
302 shstrtab = NULL;
303 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
304 {
305 if (bfd_get_error () != bfd_error_system_call)
306 bfd_set_error (bfd_error_file_truncated);
06614111 307 bfd_release (abfd, shstrtab);
c6c60d09 308 shstrtab = NULL;
3471d59d
CC
309 /* Once we've failed to read it, make sure we don't keep
310 trying. Otherwise, we'll keep allocating space for
311 the string table over and over. */
312 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
313 }
314 else
315 shstrtab[shstrtabsize] = '\0';
217aa764 316 i_shdrp[shindex]->contents = shstrtab;
252b5132 317 }
f075ee0c 318 return (char *) shstrtab;
252b5132
RH
319}
320
321char *
217aa764
AM
322bfd_elf_string_from_elf_section (bfd *abfd,
323 unsigned int shindex,
324 unsigned int strindex)
252b5132
RH
325{
326 Elf_Internal_Shdr *hdr;
327
328 if (strindex == 0)
329 return "";
330
74f2e02b
AM
331 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
332 return NULL;
333
252b5132
RH
334 hdr = elf_elfsections (abfd)[shindex];
335
06614111
NC
336 if (hdr->contents == NULL)
337 {
338 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
339 {
340 /* PR 17512: file: f057ec89. */
695344c0 341 /* xgettext:c-format */
63a5468a
AM
342 _bfd_error_handler (_("%B: attempt to load strings from"
343 " a non-string section (number %d)"),
06614111
NC
344 abfd, shindex);
345 return NULL;
346 }
b1fa9dd6 347
06614111
NC
348 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
349 return NULL;
350 }
252b5132
RH
351
352 if (strindex >= hdr->sh_size)
353 {
1b3a8575 354 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
4eca0228 355 _bfd_error_handler
695344c0 356 /* xgettext:c-format */
d003868e
AM
357 (_("%B: invalid string offset %u >= %lu for section `%s'"),
358 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 359 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 360 ? ".shstrtab"
1b3a8575 361 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 362 return NULL;
252b5132
RH
363 }
364
365 return ((char *) hdr->contents) + strindex;
366}
367
6cdc0ccc
AM
368/* Read and convert symbols to internal format.
369 SYMCOUNT specifies the number of symbols to read, starting from
370 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
371 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
372 symbols, and symbol section index extensions, respectively.
373 Returns a pointer to the internal symbol buffer (malloced if necessary)
374 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
375
376Elf_Internal_Sym *
217aa764
AM
377bfd_elf_get_elf_syms (bfd *ibfd,
378 Elf_Internal_Shdr *symtab_hdr,
379 size_t symcount,
380 size_t symoffset,
381 Elf_Internal_Sym *intsym_buf,
382 void *extsym_buf,
383 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
384{
385 Elf_Internal_Shdr *shndx_hdr;
217aa764 386 void *alloc_ext;
df622259 387 const bfd_byte *esym;
6cdc0ccc
AM
388 Elf_External_Sym_Shndx *alloc_extshndx;
389 Elf_External_Sym_Shndx *shndx;
4dd07732 390 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
391 Elf_Internal_Sym *isym;
392 Elf_Internal_Sym *isymend;
9c5bfbb7 393 const struct elf_backend_data *bed;
6cdc0ccc
AM
394 size_t extsym_size;
395 bfd_size_type amt;
396 file_ptr pos;
397
e44a2c9c
AM
398 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
399 abort ();
400
6cdc0ccc
AM
401 if (symcount == 0)
402 return intsym_buf;
403
404 /* Normal syms might have section extension entries. */
405 shndx_hdr = NULL;
6a40cf0c
NC
406 if (elf_symtab_shndx_list (ibfd) != NULL)
407 {
408 elf_section_list * entry;
409 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
410
411 /* Find an index section that is linked to this symtab section. */
412 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
315350be
NC
413 {
414 /* PR 20063. */
415 if (entry->hdr.sh_link >= elf_numsections (ibfd))
416 continue;
417
418 if (sections[entry->hdr.sh_link] == symtab_hdr)
419 {
420 shndx_hdr = & entry->hdr;
421 break;
422 };
423 }
6a40cf0c
NC
424
425 if (shndx_hdr == NULL)
426 {
427 if (symtab_hdr == & elf_symtab_hdr (ibfd))
428 /* Not really accurate, but this was how the old code used to work. */
429 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
430 /* Otherwise we do nothing. The assumption is that
431 the index table will not be needed. */
432 }
433 }
6cdc0ccc
AM
434
435 /* Read the symbols. */
436 alloc_ext = NULL;
437 alloc_extshndx = NULL;
4dd07732 438 alloc_intsym = NULL;
6cdc0ccc
AM
439 bed = get_elf_backend_data (ibfd);
440 extsym_size = bed->s->sizeof_sym;
ef53be89 441 amt = (bfd_size_type) symcount * extsym_size;
6cdc0ccc
AM
442 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
443 if (extsym_buf == NULL)
444 {
d0fb9a8d 445 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
446 extsym_buf = alloc_ext;
447 }
448 if (extsym_buf == NULL
449 || bfd_seek (ibfd, pos, SEEK_SET) != 0
450 || bfd_bread (extsym_buf, amt, ibfd) != amt)
451 {
452 intsym_buf = NULL;
453 goto out;
454 }
455
456 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
457 extshndx_buf = NULL;
458 else
459 {
ef53be89 460 amt = (bfd_size_type) symcount * sizeof (Elf_External_Sym_Shndx);
6cdc0ccc
AM
461 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
462 if (extshndx_buf == NULL)
463 {
a50b1753
NC
464 alloc_extshndx = (Elf_External_Sym_Shndx *)
465 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
466 extshndx_buf = alloc_extshndx;
467 }
468 if (extshndx_buf == NULL
469 || bfd_seek (ibfd, pos, SEEK_SET) != 0
470 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
471 {
472 intsym_buf = NULL;
473 goto out;
474 }
475 }
476
477 if (intsym_buf == NULL)
478 {
a50b1753
NC
479 alloc_intsym = (Elf_Internal_Sym *)
480 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 481 intsym_buf = alloc_intsym;
6cdc0ccc
AM
482 if (intsym_buf == NULL)
483 goto out;
484 }
485
486 /* Convert the symbols to internal form. */
487 isymend = intsym_buf + symcount;
a50b1753
NC
488 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
489 shndx = extshndx_buf;
6cdc0ccc
AM
490 isym < isymend;
491 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
492 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
493 {
494 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
695344c0 495 /* xgettext:c-format */
63a5468a
AM
496 _bfd_error_handler (_("%B symbol number %lu references"
497 " nonexistent SHT_SYMTAB_SHNDX section"),
4eca0228 498 ibfd, (unsigned long) symoffset);
4dd07732
AM
499 if (alloc_intsym != NULL)
500 free (alloc_intsym);
8384fb8f
AM
501 intsym_buf = NULL;
502 goto out;
503 }
6cdc0ccc
AM
504
505 out:
506 if (alloc_ext != NULL)
507 free (alloc_ext);
508 if (alloc_extshndx != NULL)
509 free (alloc_extshndx);
510
511 return intsym_buf;
512}
513
5cab59f6
AM
514/* Look up a symbol name. */
515const char *
be8dd2ca
AM
516bfd_elf_sym_name (bfd *abfd,
517 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
518 Elf_Internal_Sym *isym,
519 asection *sym_sec)
5cab59f6 520{
26c61ae5 521 const char *name;
5cab59f6 522 unsigned int iname = isym->st_name;
be8dd2ca 523 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 524
138f35cc
JJ
525 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
526 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 527 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
528 {
529 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
530 shindex = elf_elfheader (abfd)->e_shstrndx;
531 }
532
26c61ae5
L
533 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
534 if (name == NULL)
535 name = "(null)";
536 else if (sym_sec && *name == '\0')
537 name = bfd_section_name (abfd, sym_sec);
538
539 return name;
5cab59f6
AM
540}
541
dbb410c3
AM
542/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
543 sections. The first element is the flags, the rest are section
544 pointers. */
545
546typedef union elf_internal_group {
547 Elf_Internal_Shdr *shdr;
548 unsigned int flags;
549} Elf_Internal_Group;
550
b885599b
AM
551/* Return the name of the group signature symbol. Why isn't the
552 signature just a string? */
553
554static const char *
217aa764 555group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 556{
9dce4196 557 Elf_Internal_Shdr *hdr;
9dce4196
AM
558 unsigned char esym[sizeof (Elf64_External_Sym)];
559 Elf_External_Sym_Shndx eshndx;
560 Elf_Internal_Sym isym;
b885599b 561
13792e9d
L
562 /* First we need to ensure the symbol table is available. Make sure
563 that it is a symbol table section. */
4fbb74a6
AM
564 if (ghdr->sh_link >= elf_numsections (abfd))
565 return NULL;
13792e9d
L
566 hdr = elf_elfsections (abfd) [ghdr->sh_link];
567 if (hdr->sh_type != SHT_SYMTAB
568 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
569 return NULL;
570
9dce4196
AM
571 /* Go read the symbol. */
572 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
573 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
574 &isym, esym, &eshndx) == NULL)
b885599b 575 return NULL;
9dce4196 576
26c61ae5 577 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
578}
579
dbb410c3
AM
580/* Set next_in_group list pointer, and group name for NEWSECT. */
581
b34976b6 582static bfd_boolean
217aa764 583setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
584{
585 unsigned int num_group = elf_tdata (abfd)->num_group;
586
587 /* If num_group is zero, read in all SHT_GROUP sections. The count
588 is set to -1 if there are no SHT_GROUP sections. */
589 if (num_group == 0)
590 {
591 unsigned int i, shnum;
592
593 /* First count the number of groups. If we have a SHT_GROUP
594 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 595 shnum = elf_numsections (abfd);
dbb410c3 596 num_group = 0;
08a40648 597
44534af3 598#define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
1783205a 599 ( (shdr)->sh_type == SHT_GROUP \
44534af3 600 && (shdr)->sh_size >= minsize \
1783205a
NC
601 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
602 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 603
dbb410c3
AM
604 for (i = 0; i < shnum; i++)
605 {
606 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 607
44534af3 608 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3
AM
609 num_group += 1;
610 }
611
612 if (num_group == 0)
20dbb49d
L
613 {
614 num_group = (unsigned) -1;
615 elf_tdata (abfd)->num_group = num_group;
616 }
617 else
dbb410c3
AM
618 {
619 /* We keep a list of elf section headers for group sections,
620 so we can find them quickly. */
20dbb49d 621 bfd_size_type amt;
d0fb9a8d 622
20dbb49d 623 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
624 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
625 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 626 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 627 return FALSE;
dbb410c3
AM
628
629 num_group = 0;
630 for (i = 0; i < shnum; i++)
631 {
632 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 633
44534af3 634 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3 635 {
973ffd63 636 unsigned char *src;
dbb410c3
AM
637 Elf_Internal_Group *dest;
638
639 /* Add to list of sections. */
640 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
641 num_group += 1;
642
643 /* Read the raw contents. */
644 BFD_ASSERT (sizeof (*dest) >= 4);
645 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
646 shdr->contents = (unsigned char *)
647 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
648 /* PR binutils/4110: Handle corrupt group headers. */
649 if (shdr->contents == NULL)
650 {
651 _bfd_error_handler
695344c0 652 /* xgettext:c-format */
63a5468a
AM
653 (_("%B: corrupt size field in group section"
654 " header: 0x%lx"), abfd, shdr->sh_size);
1783205a 655 bfd_set_error (bfd_error_bad_value);
493a3386
NC
656 -- num_group;
657 continue;
1783205a
NC
658 }
659
660 memset (shdr->contents, 0, amt);
661
662 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
663 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
664 != shdr->sh_size))
493a3386
NC
665 {
666 _bfd_error_handler
695344c0 667 /* xgettext:c-format */
63a5468a
AM
668 (_("%B: invalid size field in group section"
669 " header: 0x%lx"), abfd, shdr->sh_size);
493a3386
NC
670 bfd_set_error (bfd_error_bad_value);
671 -- num_group;
63a5468a
AM
672 /* PR 17510: If the group contents are even
673 partially corrupt, do not allow any of the
674 contents to be used. */
493a3386
NC
675 memset (shdr->contents, 0, amt);
676 continue;
677 }
708d7d0d 678
dbb410c3
AM
679 /* Translate raw contents, a flag word followed by an
680 array of elf section indices all in target byte order,
681 to the flag word followed by an array of elf section
682 pointers. */
683 src = shdr->contents + shdr->sh_size;
684 dest = (Elf_Internal_Group *) (shdr->contents + amt);
06614111 685
dbb410c3
AM
686 while (1)
687 {
688 unsigned int idx;
689
690 src -= 4;
691 --dest;
692 idx = H_GET_32 (abfd, src);
693 if (src == shdr->contents)
694 {
695 dest->flags = idx;
b885599b
AM
696 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
697 shdr->bfd_section->flags
698 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
699 break;
700 }
701 if (idx >= shnum)
702 {
4eca0228
AM
703 _bfd_error_handler
704 (_("%B: invalid SHT_GROUP entry"), abfd);
dbb410c3
AM
705 idx = 0;
706 }
707 dest->shdr = elf_elfsections (abfd)[idx];
708 }
709 }
710 }
493a3386
NC
711
712 /* PR 17510: Corrupt binaries might contain invalid groups. */
713 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
714 {
715 elf_tdata (abfd)->num_group = num_group;
716
717 /* If all groups are invalid then fail. */
718 if (num_group == 0)
719 {
720 elf_tdata (abfd)->group_sect_ptr = NULL;
721 elf_tdata (abfd)->num_group = num_group = -1;
4eca0228
AM
722 _bfd_error_handler
723 (_("%B: no valid group sections found"), abfd);
493a3386
NC
724 bfd_set_error (bfd_error_bad_value);
725 }
726 }
dbb410c3
AM
727 }
728 }
729
730 if (num_group != (unsigned) -1)
731 {
732 unsigned int i;
733
734 for (i = 0; i < num_group; i++)
735 {
736 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
737 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
738 unsigned int n_elt = shdr->sh_size / 4;
739
740 /* Look through this group's sections to see if current
741 section is a member. */
742 while (--n_elt != 0)
743 if ((++idx)->shdr == hdr)
744 {
e0e8c97f 745 asection *s = NULL;
dbb410c3
AM
746
747 /* We are a member of this group. Go looking through
748 other members to see if any others are linked via
749 next_in_group. */
750 idx = (Elf_Internal_Group *) shdr->contents;
751 n_elt = shdr->sh_size / 4;
752 while (--n_elt != 0)
753 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 754 && elf_next_in_group (s) != NULL)
dbb410c3
AM
755 break;
756 if (n_elt != 0)
757 {
dbb410c3
AM
758 /* Snarf the group name from other member, and
759 insert current section in circular list. */
945906ff
AM
760 elf_group_name (newsect) = elf_group_name (s);
761 elf_next_in_group (newsect) = elf_next_in_group (s);
762 elf_next_in_group (s) = newsect;
dbb410c3
AM
763 }
764 else
765 {
dbb410c3
AM
766 const char *gname;
767
b885599b
AM
768 gname = group_signature (abfd, shdr);
769 if (gname == NULL)
b34976b6 770 return FALSE;
945906ff 771 elf_group_name (newsect) = gname;
dbb410c3
AM
772
773 /* Start a circular list with one element. */
945906ff 774 elf_next_in_group (newsect) = newsect;
dbb410c3 775 }
b885599b 776
9dce4196
AM
777 /* If the group section has been created, point to the
778 new member. */
dbb410c3 779 if (shdr->bfd_section != NULL)
945906ff 780 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 781
dbb410c3
AM
782 i = num_group - 1;
783 break;
784 }
785 }
786 }
787
945906ff 788 if (elf_group_name (newsect) == NULL)
dbb410c3 789 {
695344c0 790 /* xgettext:c-format */
4eca0228
AM
791 _bfd_error_handler (_("%B: no group info for section %A"),
792 abfd, newsect);
493a3386 793 return FALSE;
dbb410c3 794 }
b34976b6 795 return TRUE;
dbb410c3
AM
796}
797
3d7f7666 798bfd_boolean
dd863624 799_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
800{
801 unsigned int i;
802 unsigned int num_group = elf_tdata (abfd)->num_group;
803 bfd_boolean result = TRUE;
dd863624
L
804 asection *s;
805
806 /* Process SHF_LINK_ORDER. */
807 for (s = abfd->sections; s != NULL; s = s->next)
808 {
809 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
810 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
811 {
812 unsigned int elfsec = this_hdr->sh_link;
813 /* FIXME: The old Intel compiler and old strip/objcopy may
814 not set the sh_link or sh_info fields. Hence we could
815 get the situation where elfsec is 0. */
816 if (elfsec == 0)
817 {
4fbb74a6 818 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
819 if (bed->link_order_error_handler)
820 bed->link_order_error_handler
695344c0 821 /* xgettext:c-format */
dd863624
L
822 (_("%B: warning: sh_link not set for section `%A'"),
823 abfd, s);
824 }
825 else
826 {
91d6fa6a 827 asection *linksec = NULL;
25bbc984 828
4fbb74a6
AM
829 if (elfsec < elf_numsections (abfd))
830 {
831 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 832 linksec = this_hdr->bfd_section;
4fbb74a6 833 }
25bbc984
L
834
835 /* PR 1991, 2008:
836 Some strip/objcopy may leave an incorrect value in
837 sh_link. We don't want to proceed. */
91d6fa6a 838 if (linksec == NULL)
25bbc984 839 {
4eca0228 840 _bfd_error_handler
695344c0 841 /* xgettext:c-format */
25bbc984 842 (_("%B: sh_link [%d] in section `%A' is incorrect"),
c08bb8dd 843 s->owner, elfsec, s);
25bbc984
L
844 result = FALSE;
845 }
846
91d6fa6a 847 elf_linked_to_section (s) = linksec;
dd863624
L
848 }
849 }
53720c49
AM
850 else if (this_hdr->sh_type == SHT_GROUP
851 && elf_next_in_group (s) == NULL)
852 {
4eca0228 853 _bfd_error_handler
695344c0 854 /* xgettext:c-format */
53720c49
AM
855 (_("%B: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
856 abfd, elf_section_data (s)->this_idx);
857 result = FALSE;
858 }
dd863624 859 }
3d7f7666 860
dd863624 861 /* Process section groups. */
3d7f7666
L
862 if (num_group == (unsigned) -1)
863 return result;
864
865 for (i = 0; i < num_group; i++)
866 {
867 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
4b0e8a5f
NC
868 Elf_Internal_Group *idx;
869 unsigned int n_elt;
3d7f7666 870
4b0e8a5f
NC
871 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
872 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
873 {
4eca0228 874 _bfd_error_handler
695344c0 875 /* xgettext:c-format */
4b0e8a5f
NC
876 (_("%B: section group entry number %u is corrupt"),
877 abfd, i);
878 result = FALSE;
879 continue;
880 }
881
882 idx = (Elf_Internal_Group *) shdr->contents;
883 n_elt = shdr->sh_size / 4;
1b786873 884
3d7f7666
L
885 while (--n_elt != 0)
886 if ((++idx)->shdr->bfd_section)
887 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
888 else if (idx->shdr->sh_type == SHT_RELA
889 || idx->shdr->sh_type == SHT_REL)
890 /* We won't include relocation sections in section groups in
891 output object files. We adjust the group section size here
892 so that relocatable link will work correctly when
893 relocation sections are in section group in input object
894 files. */
895 shdr->bfd_section->size -= 4;
896 else
897 {
898 /* There are some unknown sections in the group. */
4eca0228 899 _bfd_error_handler
695344c0 900 /* xgettext:c-format */
dae82561 901 (_("%B: unknown [%d] section `%s' in group [%A]"),
d003868e 902 abfd,
3d7f7666 903 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
904 bfd_elf_string_from_elf_section (abfd,
905 (elf_elfheader (abfd)
906 ->e_shstrndx),
907 idx->shdr->sh_name),
dae82561 908 shdr->bfd_section);
3d7f7666
L
909 result = FALSE;
910 }
911 }
912 return result;
913}
914
72adc230
AM
915bfd_boolean
916bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
917{
918 return elf_next_in_group (sec) != NULL;
919}
920
f6fe1ccd
L
921static char *
922convert_debug_to_zdebug (bfd *abfd, const char *name)
923{
924 unsigned int len = strlen (name);
925 char *new_name = bfd_alloc (abfd, len + 2);
926 if (new_name == NULL)
927 return NULL;
928 new_name[0] = '.';
929 new_name[1] = 'z';
930 memcpy (new_name + 2, name + 1, len);
931 return new_name;
932}
933
934static char *
935convert_zdebug_to_debug (bfd *abfd, const char *name)
936{
937 unsigned int len = strlen (name);
938 char *new_name = bfd_alloc (abfd, len);
939 if (new_name == NULL)
940 return NULL;
941 new_name[0] = '.';
942 memcpy (new_name + 1, name + 2, len - 1);
943 return new_name;
944}
945
252b5132
RH
946/* Make a BFD section from an ELF section. We store a pointer to the
947 BFD section in the bfd_section field of the header. */
948
b34976b6 949bfd_boolean
217aa764
AM
950_bfd_elf_make_section_from_shdr (bfd *abfd,
951 Elf_Internal_Shdr *hdr,
6dc132d9
L
952 const char *name,
953 int shindex)
252b5132
RH
954{
955 asection *newsect;
956 flagword flags;
9c5bfbb7 957 const struct elf_backend_data *bed;
252b5132
RH
958
959 if (hdr->bfd_section != NULL)
4e011fb5 960 return TRUE;
252b5132
RH
961
962 newsect = bfd_make_section_anyway (abfd, name);
963 if (newsect == NULL)
b34976b6 964 return FALSE;
252b5132 965
1829f4b2
AM
966 hdr->bfd_section = newsect;
967 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 968 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 969
2f89ff8d
L
970 /* Always use the real type/flags. */
971 elf_section_type (newsect) = hdr->sh_type;
972 elf_section_flags (newsect) = hdr->sh_flags;
973
252b5132
RH
974 newsect->filepos = hdr->sh_offset;
975
976 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
977 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
978 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 979 bfd_log2 (hdr->sh_addralign)))
b34976b6 980 return FALSE;
252b5132
RH
981
982 flags = SEC_NO_FLAGS;
983 if (hdr->sh_type != SHT_NOBITS)
984 flags |= SEC_HAS_CONTENTS;
dbb410c3 985 if (hdr->sh_type == SHT_GROUP)
b3096250 986 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
987 if ((hdr->sh_flags & SHF_ALLOC) != 0)
988 {
989 flags |= SEC_ALLOC;
990 if (hdr->sh_type != SHT_NOBITS)
991 flags |= SEC_LOAD;
992 }
993 if ((hdr->sh_flags & SHF_WRITE) == 0)
994 flags |= SEC_READONLY;
995 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
996 flags |= SEC_CODE;
997 else if ((flags & SEC_LOAD) != 0)
998 flags |= SEC_DATA;
f5fa8ca2
JJ
999 if ((hdr->sh_flags & SHF_MERGE) != 0)
1000 {
1001 flags |= SEC_MERGE;
1002 newsect->entsize = hdr->sh_entsize;
f5fa8ca2 1003 }
84865015
NC
1004 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1005 flags |= SEC_STRINGS;
dbb410c3
AM
1006 if (hdr->sh_flags & SHF_GROUP)
1007 if (!setup_group (abfd, hdr, newsect))
b34976b6 1008 return FALSE;
13ae64f3
JJ
1009 if ((hdr->sh_flags & SHF_TLS) != 0)
1010 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
1011 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1012 flags |= SEC_EXCLUDE;
252b5132 1013
3d2b39cf 1014 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 1015 {
3d2b39cf
L
1016 /* The debugging sections appear to be recognized only by name,
1017 not any sort of flag. Their SEC_ALLOC bits are cleared. */
3d2b39cf
L
1018 if (name [0] == '.')
1019 {
f073ced3
AM
1020 const char *p;
1021 int n;
1022 if (name[1] == 'd')
1023 p = ".debug", n = 6;
1024 else if (name[1] == 'g' && name[2] == 'n')
1025 p = ".gnu.linkonce.wi.", n = 17;
1026 else if (name[1] == 'g' && name[2] == 'd')
1027 p = ".gdb_index", n = 11; /* yes we really do mean 11. */
1028 else if (name[1] == 'l')
1029 p = ".line", n = 5;
1030 else if (name[1] == 's')
1031 p = ".stab", n = 5;
1032 else if (name[1] == 'z')
1033 p = ".zdebug", n = 7;
1034 else
1035 p = NULL, n = 0;
1036 if (p != NULL && strncmp (name, p, n) == 0)
3d2b39cf
L
1037 flags |= SEC_DEBUGGING;
1038 }
1039 }
252b5132
RH
1040
1041 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1042 only link a single copy of the section. This is used to support
1043 g++. g++ will emit each template expansion in its own section.
1044 The symbols will be defined as weak, so that multiple definitions
1045 are permitted. The GNU linker extension is to actually discard
1046 all but one of the sections. */
0112cd26 1047 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 1048 && elf_next_in_group (newsect) == NULL)
252b5132
RH
1049 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1050
fa152c49
JW
1051 bed = get_elf_backend_data (abfd);
1052 if (bed->elf_backend_section_flags)
1053 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 1054 return FALSE;
fa152c49 1055
252b5132 1056 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 1057 return FALSE;
252b5132 1058
718175fa
JK
1059 /* We do not parse the PT_NOTE segments as we are interested even in the
1060 separate debug info files which may have the segments offsets corrupted.
1061 PT_NOTEs from the core files are currently not parsed using BFD. */
1062 if (hdr->sh_type == SHT_NOTE)
1063 {
baea7ef1 1064 bfd_byte *contents;
718175fa 1065
baea7ef1 1066 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
1067 return FALSE;
1068
08698b7b 1069 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, hdr->sh_offset);
718175fa
JK
1070 free (contents);
1071 }
1072
252b5132
RH
1073 if ((flags & SEC_ALLOC) != 0)
1074 {
1075 Elf_Internal_Phdr *phdr;
6ffd7900
AM
1076 unsigned int i, nload;
1077
1078 /* Some ELF linkers produce binaries with all the program header
1079 p_paddr fields zero. If we have such a binary with more than
1080 one PT_LOAD header, then leave the section lma equal to vma
1081 so that we don't create sections with overlapping lma. */
1082 phdr = elf_tdata (abfd)->phdr;
1083 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1084 if (phdr->p_paddr != 0)
1085 break;
1086 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1087 ++nload;
1088 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1089 return TRUE;
252b5132 1090
252b5132
RH
1091 phdr = elf_tdata (abfd)->phdr;
1092 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1093 {
86b2281f
AM
1094 if (((phdr->p_type == PT_LOAD
1095 && (hdr->sh_flags & SHF_TLS) == 0)
1096 || phdr->p_type == PT_TLS)
9a83a553 1097 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 1098 {
88967714
AM
1099 if ((flags & SEC_LOAD) == 0)
1100 newsect->lma = (phdr->p_paddr
1101 + hdr->sh_addr - phdr->p_vaddr);
1102 else
1103 /* We used to use the same adjustment for SEC_LOAD
1104 sections, but that doesn't work if the segment
1105 is packed with code from multiple VMAs.
1106 Instead we calculate the section LMA based on
1107 the segment LMA. It is assumed that the
1108 segment will contain sections with contiguous
1109 LMAs, even if the VMAs are not. */
1110 newsect->lma = (phdr->p_paddr
1111 + hdr->sh_offset - phdr->p_offset);
1112
1113 /* With contiguous segments, we can't tell from file
1114 offsets whether a section with zero size should
1115 be placed at the end of one segment or the
1116 beginning of the next. Decide based on vaddr. */
1117 if (hdr->sh_addr >= phdr->p_vaddr
1118 && (hdr->sh_addr + hdr->sh_size
1119 <= phdr->p_vaddr + phdr->p_memsz))
1120 break;
252b5132
RH
1121 }
1122 }
1123 }
1124
4a114e3e
L
1125 /* Compress/decompress DWARF debug sections with names: .debug_* and
1126 .zdebug_*, after the section flags is set. */
1127 if ((flags & SEC_DEBUGGING)
1128 && ((name[1] == 'd' && name[6] == '_')
1129 || (name[1] == 'z' && name[7] == '_')))
1130 {
1131 enum { nothing, compress, decompress } action = nothing;
151411f8 1132 int compression_header_size;
dab394de 1133 bfd_size_type uncompressed_size;
151411f8
L
1134 bfd_boolean compressed
1135 = bfd_is_section_compressed_with_header (abfd, newsect,
dab394de
L
1136 &compression_header_size,
1137 &uncompressed_size);
4a114e3e 1138
151411f8 1139 if (compressed)
4a114e3e
L
1140 {
1141 /* Compressed section. Check if we should decompress. */
1142 if ((abfd->flags & BFD_DECOMPRESS))
1143 action = decompress;
1144 }
151411f8
L
1145
1146 /* Compress the uncompressed section or convert from/to .zdebug*
1147 section. Check if we should compress. */
1148 if (action == nothing)
4a114e3e 1149 {
151411f8
L
1150 if (newsect->size != 0
1151 && (abfd->flags & BFD_COMPRESS)
1152 && compression_header_size >= 0
dab394de 1153 && uncompressed_size > 0
151411f8
L
1154 && (!compressed
1155 || ((compression_header_size > 0)
1156 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
4a114e3e 1157 action = compress;
151411f8
L
1158 else
1159 return TRUE;
4a114e3e
L
1160 }
1161
151411f8 1162 if (action == compress)
4a114e3e 1163 {
4a114e3e
L
1164 if (!bfd_init_section_compress_status (abfd, newsect))
1165 {
4eca0228 1166 _bfd_error_handler
695344c0 1167 /* xgettext:c-format */
bc823199 1168 (_("%B: unable to initialize compress status for section %s"),
4a114e3e
L
1169 abfd, name);
1170 return FALSE;
1171 }
151411f8
L
1172 }
1173 else
1174 {
4a114e3e
L
1175 if (!bfd_init_section_decompress_status (abfd, newsect))
1176 {
4eca0228 1177 _bfd_error_handler
695344c0 1178 /* xgettext:c-format */
bc823199 1179 (_("%B: unable to initialize decompress status for section %s"),
4a114e3e
L
1180 abfd, name);
1181 return FALSE;
1182 }
151411f8
L
1183 }
1184
f6fe1ccd 1185 if (abfd->is_linker_input)
151411f8 1186 {
f6fe1ccd
L
1187 if (name[1] == 'z'
1188 && (action == decompress
1189 || (action == compress
1190 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
4e011fb5 1191 {
f6fe1ccd
L
1192 /* Convert section name from .zdebug_* to .debug_* so
1193 that linker will consider this section as a debug
1194 section. */
1195 char *new_name = convert_zdebug_to_debug (abfd, name);
151411f8
L
1196 if (new_name == NULL)
1197 return FALSE;
f6fe1ccd 1198 bfd_rename_section (abfd, newsect, new_name);
151411f8 1199 }
4a114e3e 1200 }
f6fe1ccd
L
1201 else
1202 /* For objdump, don't rename the section. For objcopy, delay
1203 section rename to elf_fake_sections. */
1204 newsect->flags |= SEC_ELF_RENAME;
4a114e3e
L
1205 }
1206
b34976b6 1207 return TRUE;
252b5132
RH
1208}
1209
84865015
NC
1210const char *const bfd_elf_section_type_names[] =
1211{
252b5132
RH
1212 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1213 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1214 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1215};
1216
1049f94e 1217/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1218 output, and the reloc is against an external symbol, and nothing
1219 has given us any additional addend, the resulting reloc will also
1220 be against the same symbol. In such a case, we don't want to
1221 change anything about the way the reloc is handled, since it will
1222 all be done at final link time. Rather than put special case code
1223 into bfd_perform_relocation, all the reloc types use this howto
1224 function. It just short circuits the reloc if producing
1049f94e 1225 relocatable output against an external symbol. */
252b5132 1226
252b5132 1227bfd_reloc_status_type
217aa764
AM
1228bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1229 arelent *reloc_entry,
1230 asymbol *symbol,
1231 void *data ATTRIBUTE_UNUSED,
1232 asection *input_section,
1233 bfd *output_bfd,
1234 char **error_message ATTRIBUTE_UNUSED)
1235{
1236 if (output_bfd != NULL
252b5132
RH
1237 && (symbol->flags & BSF_SECTION_SYM) == 0
1238 && (! reloc_entry->howto->partial_inplace
1239 || reloc_entry->addend == 0))
1240 {
1241 reloc_entry->address += input_section->output_offset;
1242 return bfd_reloc_ok;
1243 }
1244
1245 return bfd_reloc_continue;
1246}
1247\f
84865015
NC
1248/* Returns TRUE if section A matches section B.
1249 Names, addresses and links may be different, but everything else
1250 should be the same. */
1251
1252static bfd_boolean
5522f910
NC
1253section_match (const Elf_Internal_Shdr * a,
1254 const Elf_Internal_Shdr * b)
84865015
NC
1255{
1256 return
1257 a->sh_type == b->sh_type
5522f910
NC
1258 && (a->sh_flags & ~ SHF_INFO_LINK)
1259 == (b->sh_flags & ~ SHF_INFO_LINK)
84865015
NC
1260 && a->sh_addralign == b->sh_addralign
1261 && a->sh_size == b->sh_size
1262 && a->sh_entsize == b->sh_entsize
1263 /* FIXME: Check sh_addr ? */
1264 ;
1265}
1266
1267/* Find a section in OBFD that has the same characteristics
1268 as IHEADER. Return the index of this section or SHN_UNDEF if
1269 none can be found. Check's section HINT first, as this is likely
1270 to be the correct section. */
1271
1272static unsigned int
5522f910 1273find_link (const bfd * obfd, const Elf_Internal_Shdr * iheader, const unsigned int hint)
84865015
NC
1274{
1275 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1276 unsigned int i;
1277
a55c9876
NC
1278 BFD_ASSERT (iheader != NULL);
1279
1280 /* See PR 20922 for a reproducer of the NULL test. */
1281 if (oheaders[hint] != NULL
1282 && section_match (oheaders[hint], iheader))
84865015
NC
1283 return hint;
1284
1285 for (i = 1; i < elf_numsections (obfd); i++)
1286 {
1287 Elf_Internal_Shdr * oheader = oheaders[i];
1288
a55c9876
NC
1289 if (oheader == NULL)
1290 continue;
84865015
NC
1291 if (section_match (oheader, iheader))
1292 /* FIXME: Do we care if there is a potential for
1293 multiple matches ? */
1294 return i;
1295 }
1296
1297 return SHN_UNDEF;
1298}
1299
5522f910
NC
1300/* PR 19938: Attempt to set the ELF section header fields of an OS or
1301 Processor specific section, based upon a matching input section.
1302 Returns TRUE upon success, FALSE otherwise. */
1303
1304static bfd_boolean
1305copy_special_section_fields (const bfd *ibfd,
1306 bfd *obfd,
1307 const Elf_Internal_Shdr *iheader,
1308 Elf_Internal_Shdr *oheader,
1309 const unsigned int secnum)
1310{
1311 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1312 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1313 bfd_boolean changed = FALSE;
1314 unsigned int sh_link;
1315
1316 if (oheader->sh_type == SHT_NOBITS)
1317 {
1318 /* This is a feature for objcopy --only-keep-debug:
1319 When a section's type is changed to NOBITS, we preserve
1320 the sh_link and sh_info fields so that they can be
1321 matched up with the original.
1322
1323 Note: Strictly speaking these assignments are wrong.
1324 The sh_link and sh_info fields should point to the
1325 relevent sections in the output BFD, which may not be in
1326 the same location as they were in the input BFD. But
1327 the whole point of this action is to preserve the
1328 original values of the sh_link and sh_info fields, so
1329 that they can be matched up with the section headers in
1330 the original file. So strictly speaking we may be
1331 creating an invalid ELF file, but it is only for a file
1332 that just contains debug info and only for sections
1333 without any contents. */
1334 if (oheader->sh_link == 0)
1335 oheader->sh_link = iheader->sh_link;
1336 if (oheader->sh_info == 0)
1337 oheader->sh_info = iheader->sh_info;
1338 return TRUE;
1339 }
1340
1341 /* Allow the target a chance to decide how these fields should be set. */
1342 if (bed->elf_backend_copy_special_section_fields != NULL
1343 && bed->elf_backend_copy_special_section_fields
1344 (ibfd, obfd, iheader, oheader))
1345 return TRUE;
1346
1347 /* We have an iheader which might match oheader, and which has non-zero
1348 sh_info and/or sh_link fields. Attempt to follow those links and find
1349 the section in the output bfd which corresponds to the linked section
1350 in the input bfd. */
1351 if (iheader->sh_link != SHN_UNDEF)
1352 {
4f3ca05b
NC
1353 /* See PR 20931 for a reproducer. */
1354 if (iheader->sh_link >= elf_numsections (ibfd))
1355 {
1356 (* _bfd_error_handler)
1357 /* xgettext:c-format */
1358 (_("%B: Invalid sh_link field (%d) in section number %d"),
1359 ibfd, iheader->sh_link, secnum);
1360 return FALSE;
1361 }
1362
5522f910
NC
1363 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1364 if (sh_link != SHN_UNDEF)
1365 {
1366 oheader->sh_link = sh_link;
1367 changed = TRUE;
1368 }
1369 else
1370 /* FIXME: Should we install iheader->sh_link
1371 if we could not find a match ? */
1372 (* _bfd_error_handler)
695344c0 1373 /* xgettext:c-format */
5522f910
NC
1374 (_("%B: Failed to find link section for section %d"), obfd, secnum);
1375 }
1376
1377 if (iheader->sh_info)
1378 {
1379 /* The sh_info field can hold arbitrary information, but if the
1380 SHF_LINK_INFO flag is set then it should be interpreted as a
1381 section index. */
1382 if (iheader->sh_flags & SHF_INFO_LINK)
1383 {
1384 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1385 iheader->sh_info);
1386 if (sh_link != SHN_UNDEF)
1387 oheader->sh_flags |= SHF_INFO_LINK;
1388 }
1389 else
1390 /* No idea what it means - just copy it. */
1391 sh_link = iheader->sh_info;
1392
1393 if (sh_link != SHN_UNDEF)
1394 {
1395 oheader->sh_info = sh_link;
1396 changed = TRUE;
1397 }
1398 else
1399 (* _bfd_error_handler)
695344c0 1400 /* xgettext:c-format */
5522f910
NC
1401 (_("%B: Failed to find info section for section %d"), obfd, secnum);
1402 }
1403
1404 return changed;
1405}
1406
0ac4564e
L
1407/* Copy the program header and other data from one object module to
1408 another. */
252b5132 1409
b34976b6 1410bfd_boolean
217aa764 1411_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050 1412{
5522f910
NC
1413 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1414 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1415 const struct elf_backend_data *bed;
84865015
NC
1416 unsigned int i;
1417
2d502050 1418 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
84865015 1419 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1420 return TRUE;
2d502050 1421
57b828ef
L
1422 if (!elf_flags_init (obfd))
1423 {
1424 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1425 elf_flags_init (obfd) = TRUE;
1426 }
2d502050 1427
0ac4564e 1428 elf_gp (obfd) = elf_gp (ibfd);
57b828ef
L
1429
1430 /* Also copy the EI_OSABI field. */
1431 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1432 elf_elfheader (ibfd)->e_ident[EI_OSABI];
104d59d1 1433
5522f910
NC
1434 /* If set, copy the EI_ABIVERSION field. */
1435 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1436 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1437 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
1438
104d59d1
JM
1439 /* Copy object attributes. */
1440 _bfd_elf_copy_obj_attributes (ibfd, obfd);
63b9bbb7 1441
84865015
NC
1442 if (iheaders == NULL || oheaders == NULL)
1443 return TRUE;
63b9bbb7 1444
5522f910
NC
1445 bed = get_elf_backend_data (obfd);
1446
1447 /* Possibly copy other fields in the section header. */
84865015 1448 for (i = 1; i < elf_numsections (obfd); i++)
63b9bbb7 1449 {
84865015
NC
1450 unsigned int j;
1451 Elf_Internal_Shdr * oheader = oheaders[i];
63b9bbb7 1452
5522f910
NC
1453 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1454 because of a special case need for generating separate debug info
1455 files. See below for more details. */
84865015
NC
1456 if (oheader == NULL
1457 || (oheader->sh_type != SHT_NOBITS
5522f910
NC
1458 && oheader->sh_type < SHT_LOOS))
1459 continue;
1460
1461 /* Ignore empty sections, and sections whose
1462 fields have already been initialised. */
1463 if (oheader->sh_size == 0
84865015
NC
1464 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1465 continue;
63b9bbb7 1466
84865015 1467 /* Scan for the matching section in the input bfd.
5522f910
NC
1468 First we try for a direct mapping between the input and output sections. */
1469 for (j = 1; j < elf_numsections (ibfd); j++)
1470 {
1471 const Elf_Internal_Shdr * iheader = iheaders[j];
1472
1473 if (iheader == NULL)
1474 continue;
1475
1476 if (oheader->bfd_section != NULL
1477 && iheader->bfd_section != NULL
1478 && iheader->bfd_section->output_section != NULL
1479 && iheader->bfd_section->output_section == oheader->bfd_section)
1480 {
1481 /* We have found a connection from the input section to the
1482 output section. Attempt to copy the header fields. If
1483 this fails then do not try any further sections - there
1484 should only be a one-to-one mapping between input and output. */
1485 if (! copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1486 j = elf_numsections (ibfd);
1487 break;
1488 }
1489 }
1490
1491 if (j < elf_numsections (ibfd))
1492 continue;
1493
1494 /* That failed. So try to deduce the corresponding input section.
84865015
NC
1495 Unfortunately we cannot compare names as the output string table
1496 is empty, so instead we check size, address and type. */
1497 for (j = 1; j < elf_numsections (ibfd); j++)
1498 {
5522f910 1499 const Elf_Internal_Shdr * iheader = iheaders[j];
84865015 1500
5522f910
NC
1501 if (iheader == NULL)
1502 continue;
1503
1504 /* Try matching fields in the input section's header.
1505 Since --only-keep-debug turns all non-debug sections into
84865015
NC
1506 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1507 input type. */
1508 if ((oheader->sh_type == SHT_NOBITS
1509 || iheader->sh_type == oheader->sh_type)
5522f910
NC
1510 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1511 == (oheader->sh_flags & ~ SHF_INFO_LINK)
84865015
NC
1512 && iheader->sh_addralign == oheader->sh_addralign
1513 && iheader->sh_entsize == oheader->sh_entsize
1514 && iheader->sh_size == oheader->sh_size
1515 && iheader->sh_addr == oheader->sh_addr
1516 && (iheader->sh_info != oheader->sh_info
1517 || iheader->sh_link != oheader->sh_link))
63b9bbb7 1518 {
5522f910
NC
1519 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1520 break;
63b9bbb7
NC
1521 }
1522 }
5522f910
NC
1523
1524 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1525 {
1526 /* Final attempt. Call the backend copy function
1527 with a NULL input section. */
1528 if (bed->elf_backend_copy_special_section_fields != NULL)
1529 bed->elf_backend_copy_special_section_fields (ibfd, obfd, NULL, oheader);
1530 }
63b9bbb7
NC
1531 }
1532
b34976b6 1533 return TRUE;
2d502050
L
1534}
1535
cedc298e
L
1536static const char *
1537get_segment_type (unsigned int p_type)
1538{
1539 const char *pt;
1540 switch (p_type)
1541 {
1542 case PT_NULL: pt = "NULL"; break;
1543 case PT_LOAD: pt = "LOAD"; break;
1544 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1545 case PT_INTERP: pt = "INTERP"; break;
1546 case PT_NOTE: pt = "NOTE"; break;
1547 case PT_SHLIB: pt = "SHLIB"; break;
1548 case PT_PHDR: pt = "PHDR"; break;
1549 case PT_TLS: pt = "TLS"; break;
1550 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1551 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1552 case PT_GNU_RELRO: pt = "RELRO"; break;
1553 default: pt = NULL; break;
1554 }
1555 return pt;
1556}
1557
f0b79d91
L
1558/* Print out the program headers. */
1559
b34976b6 1560bfd_boolean
217aa764 1561_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1562{
a50b1753 1563 FILE *f = (FILE *) farg;
252b5132
RH
1564 Elf_Internal_Phdr *p;
1565 asection *s;
1566 bfd_byte *dynbuf = NULL;
1567
1568 p = elf_tdata (abfd)->phdr;
1569 if (p != NULL)
1570 {
1571 unsigned int i, c;
1572
1573 fprintf (f, _("\nProgram Header:\n"));
1574 c = elf_elfheader (abfd)->e_phnum;
1575 for (i = 0; i < c; i++, p++)
1576 {
cedc298e 1577 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1578 char buf[20];
1579
cedc298e 1580 if (pt == NULL)
252b5132 1581 {
cedc298e
L
1582 sprintf (buf, "0x%lx", p->p_type);
1583 pt = buf;
252b5132 1584 }
dc810e39 1585 fprintf (f, "%8s off 0x", pt);
60b89a18 1586 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1587 fprintf (f, " vaddr 0x");
60b89a18 1588 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1589 fprintf (f, " paddr 0x");
60b89a18 1590 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1591 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1592 fprintf (f, " filesz 0x");
60b89a18 1593 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1594 fprintf (f, " memsz 0x");
60b89a18 1595 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1596 fprintf (f, " flags %c%c%c",
1597 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1598 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1599 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1600 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1601 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1602 fprintf (f, "\n");
1603 }
1604 }
1605
1606 s = bfd_get_section_by_name (abfd, ".dynamic");
1607 if (s != NULL)
1608 {
cb33740c 1609 unsigned int elfsec;
dc810e39 1610 unsigned long shlink;
252b5132
RH
1611 bfd_byte *extdyn, *extdynend;
1612 size_t extdynsize;
217aa764 1613 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1614
1615 fprintf (f, _("\nDynamic Section:\n"));
1616
eea6121a 1617 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1618 goto error_return;
1619
1620 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1621 if (elfsec == SHN_BAD)
252b5132 1622 goto error_return;
dc810e39 1623 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1624
1625 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1626 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1627
1628 extdyn = dynbuf;
06614111
NC
1629 /* PR 17512: file: 6f427532. */
1630 if (s->size < extdynsize)
1631 goto error_return;
eea6121a 1632 extdynend = extdyn + s->size;
1036838a
NC
1633 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1634 Fix range check. */
1635 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
252b5132
RH
1636 {
1637 Elf_Internal_Dyn dyn;
ad9563d6 1638 const char *name = "";
252b5132 1639 char ab[20];
b34976b6 1640 bfd_boolean stringp;
ad9563d6 1641 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1642
217aa764 1643 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1644
1645 if (dyn.d_tag == DT_NULL)
1646 break;
1647
b34976b6 1648 stringp = FALSE;
252b5132
RH
1649 switch (dyn.d_tag)
1650 {
1651 default:
ad9563d6
CM
1652 if (bed->elf_backend_get_target_dtag)
1653 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1654
1655 if (!strcmp (name, ""))
1656 {
1657 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1658 name = ab;
1659 }
252b5132
RH
1660 break;
1661
b34976b6 1662 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1663 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1664 case DT_PLTGOT: name = "PLTGOT"; break;
1665 case DT_HASH: name = "HASH"; break;
1666 case DT_STRTAB: name = "STRTAB"; break;
1667 case DT_SYMTAB: name = "SYMTAB"; break;
1668 case DT_RELA: name = "RELA"; break;
1669 case DT_RELASZ: name = "RELASZ"; break;
1670 case DT_RELAENT: name = "RELAENT"; break;
1671 case DT_STRSZ: name = "STRSZ"; break;
1672 case DT_SYMENT: name = "SYMENT"; break;
1673 case DT_INIT: name = "INIT"; break;
1674 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1675 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1676 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1677 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1678 case DT_REL: name = "REL"; break;
1679 case DT_RELSZ: name = "RELSZ"; break;
1680 case DT_RELENT: name = "RELENT"; break;
1681 case DT_PLTREL: name = "PLTREL"; break;
1682 case DT_DEBUG: name = "DEBUG"; break;
1683 case DT_TEXTREL: name = "TEXTREL"; break;
1684 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1685 case DT_BIND_NOW: name = "BIND_NOW"; break;
1686 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1687 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1688 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1689 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1690 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1691 case DT_FLAGS: name = "FLAGS"; break;
1692 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1693 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1694 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1695 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1696 case DT_MOVEENT: name = "MOVEENT"; break;
1697 case DT_MOVESZ: name = "MOVESZ"; break;
1698 case DT_FEATURE: name = "FEATURE"; break;
1699 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1700 case DT_SYMINSZ: name = "SYMINSZ"; break;
1701 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1702 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1703 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1704 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1705 case DT_PLTPAD: name = "PLTPAD"; break;
1706 case DT_MOVETAB: name = "MOVETAB"; break;
1707 case DT_SYMINFO: name = "SYMINFO"; break;
1708 case DT_RELACOUNT: name = "RELACOUNT"; break;
1709 case DT_RELCOUNT: name = "RELCOUNT"; break;
1710 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1711 case DT_VERSYM: name = "VERSYM"; break;
1712 case DT_VERDEF: name = "VERDEF"; break;
1713 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1714 case DT_VERNEED: name = "VERNEED"; break;
1715 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1716 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1717 case DT_USED: name = "USED"; break;
b34976b6 1718 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1719 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1720 }
1721
ad9563d6 1722 fprintf (f, " %-20s ", name);
252b5132 1723 if (! stringp)
a1f3c56e
AN
1724 {
1725 fprintf (f, "0x");
1726 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1727 }
252b5132
RH
1728 else
1729 {
1730 const char *string;
dc810e39 1731 unsigned int tagv = dyn.d_un.d_val;
252b5132 1732
dc810e39 1733 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1734 if (string == NULL)
1735 goto error_return;
1736 fprintf (f, "%s", string);
1737 }
1738 fprintf (f, "\n");
1739 }
1740
1741 free (dynbuf);
1742 dynbuf = NULL;
1743 }
1744
1745 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1746 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1747 {
fc0e6df6 1748 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1749 return FALSE;
252b5132
RH
1750 }
1751
1752 if (elf_dynverdef (abfd) != 0)
1753 {
1754 Elf_Internal_Verdef *t;
1755
1756 fprintf (f, _("\nVersion definitions:\n"));
1757 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1758 {
1759 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1760 t->vd_flags, t->vd_hash,
1761 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1762 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1763 {
1764 Elf_Internal_Verdaux *a;
1765
1766 fprintf (f, "\t");
1767 for (a = t->vd_auxptr->vda_nextptr;
1768 a != NULL;
1769 a = a->vda_nextptr)
d0fb9a8d
JJ
1770 fprintf (f, "%s ",
1771 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1772 fprintf (f, "\n");
1773 }
1774 }
1775 }
1776
1777 if (elf_dynverref (abfd) != 0)
1778 {
1779 Elf_Internal_Verneed *t;
1780
1781 fprintf (f, _("\nVersion References:\n"));
1782 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1783 {
1784 Elf_Internal_Vernaux *a;
1785
d0fb9a8d
JJ
1786 fprintf (f, _(" required from %s:\n"),
1787 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1788 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1789 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1790 a->vna_flags, a->vna_other,
1791 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1792 }
1793 }
1794
b34976b6 1795 return TRUE;
252b5132
RH
1796
1797 error_return:
1798 if (dynbuf != NULL)
1799 free (dynbuf);
b34976b6 1800 return FALSE;
252b5132
RH
1801}
1802
bb4d2ac2
L
1803/* Get version string. */
1804
1805const char *
60bb06bc
L
1806_bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1807 bfd_boolean *hidden)
bb4d2ac2
L
1808{
1809 const char *version_string = NULL;
1810 if (elf_dynversym (abfd) != 0
1811 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1812 {
1813 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1814
1815 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1816 vernum &= VERSYM_VERSION;
1817
1818 if (vernum == 0)
1819 version_string = "";
1820 else if (vernum == 1)
1821 version_string = "Base";
1822 else if (vernum <= elf_tdata (abfd)->cverdefs)
1823 version_string =
1824 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1825 else
1826 {
1827 Elf_Internal_Verneed *t;
1828
1829 version_string = "";
1830 for (t = elf_tdata (abfd)->verref;
1831 t != NULL;
1832 t = t->vn_nextref)
1833 {
1834 Elf_Internal_Vernaux *a;
1835
1836 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1837 {
1838 if (a->vna_other == vernum)
1839 {
1840 version_string = a->vna_nodename;
1841 break;
1842 }
1843 }
1844 }
1845 }
1846 }
1847 return version_string;
1848}
1849
252b5132
RH
1850/* Display ELF-specific fields of a symbol. */
1851
1852void
217aa764
AM
1853bfd_elf_print_symbol (bfd *abfd,
1854 void *filep,
1855 asymbol *symbol,
1856 bfd_print_symbol_type how)
252b5132 1857{
a50b1753 1858 FILE *file = (FILE *) filep;
252b5132
RH
1859 switch (how)
1860 {
1861 case bfd_print_symbol_name:
1862 fprintf (file, "%s", symbol->name);
1863 break;
1864 case bfd_print_symbol_more:
1865 fprintf (file, "elf ");
60b89a18 1866 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1867 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1868 break;
1869 case bfd_print_symbol_all:
1870 {
4e8a9624
AM
1871 const char *section_name;
1872 const char *name = NULL;
9c5bfbb7 1873 const struct elf_backend_data *bed;
7a13edea 1874 unsigned char st_other;
dbb410c3 1875 bfd_vma val;
bb4d2ac2
L
1876 const char *version_string;
1877 bfd_boolean hidden;
c044fabd 1878
252b5132 1879 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1880
1881 bed = get_elf_backend_data (abfd);
1882 if (bed->elf_backend_print_symbol_all)
c044fabd 1883 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1884
1885 if (name == NULL)
1886 {
7ee38065 1887 name = symbol->name;
217aa764 1888 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1889 }
1890
252b5132
RH
1891 fprintf (file, " %s\t", section_name);
1892 /* Print the "other" value for a symbol. For common symbols,
1893 we've already printed the size; now print the alignment.
1894 For other symbols, we have no specified alignment, and
1895 we've printed the address; now print the size. */
dcf6c779 1896 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1897 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1898 else
1899 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1900 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1901
1902 /* If we have version information, print it. */
60bb06bc
L
1903 version_string = _bfd_elf_get_symbol_version_string (abfd,
1904 symbol,
1905 &hidden);
bb4d2ac2 1906 if (version_string)
252b5132 1907 {
bb4d2ac2 1908 if (!hidden)
252b5132
RH
1909 fprintf (file, " %-11s", version_string);
1910 else
1911 {
1912 int i;
1913
1914 fprintf (file, " (%s)", version_string);
1915 for (i = 10 - strlen (version_string); i > 0; --i)
1916 putc (' ', file);
1917 }
1918 }
1919
1920 /* If the st_other field is not zero, print it. */
7a13edea 1921 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1922
7a13edea
NC
1923 switch (st_other)
1924 {
1925 case 0: break;
1926 case STV_INTERNAL: fprintf (file, " .internal"); break;
1927 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1928 case STV_PROTECTED: fprintf (file, " .protected"); break;
1929 default:
1930 /* Some other non-defined flags are also present, so print
1931 everything hex. */
1932 fprintf (file, " 0x%02x", (unsigned int) st_other);
1933 }
252b5132 1934
587ff49e 1935 fprintf (file, " %s", name);
252b5132
RH
1936 }
1937 break;
1938 }
1939}
252b5132
RH
1940\f
1941/* ELF .o/exec file reading */
1942
c044fabd 1943/* Create a new bfd section from an ELF section header. */
252b5132 1944
b34976b6 1945bfd_boolean
217aa764 1946bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1947{
4fbb74a6
AM
1948 Elf_Internal_Shdr *hdr;
1949 Elf_Internal_Ehdr *ehdr;
1950 const struct elf_backend_data *bed;
90937f86 1951 const char *name;
bf67003b
NC
1952 bfd_boolean ret = TRUE;
1953 static bfd_boolean * sections_being_created = NULL;
5a4b0ccc 1954 static bfd * sections_being_created_abfd = NULL;
bf67003b 1955 static unsigned int nesting = 0;
252b5132 1956
4fbb74a6
AM
1957 if (shindex >= elf_numsections (abfd))
1958 return FALSE;
1959
bf67003b
NC
1960 if (++ nesting > 3)
1961 {
1962 /* PR17512: A corrupt ELF binary might contain a recursive group of
06614111 1963 sections, with each the string indicies pointing to the next in the
bf67003b
NC
1964 loop. Detect this here, by refusing to load a section that we are
1965 already in the process of loading. We only trigger this test if
1966 we have nested at least three sections deep as normal ELF binaries
5a4b0ccc
NC
1967 can expect to recurse at least once.
1968
1969 FIXME: It would be better if this array was attached to the bfd,
1970 rather than being held in a static pointer. */
1971
1972 if (sections_being_created_abfd != abfd)
1973 sections_being_created = NULL;
bf67003b
NC
1974 if (sections_being_created == NULL)
1975 {
1976 /* FIXME: It would be more efficient to attach this array to the bfd somehow. */
1977 sections_being_created = (bfd_boolean *)
1978 bfd_zalloc (abfd, elf_numsections (abfd) * sizeof (bfd_boolean));
5a4b0ccc 1979 sections_being_created_abfd = abfd;
bf67003b
NC
1980 }
1981 if (sections_being_created [shindex])
1982 {
4eca0228 1983 _bfd_error_handler
bf67003b
NC
1984 (_("%B: warning: loop in section dependencies detected"), abfd);
1985 return FALSE;
1986 }
1987 sections_being_created [shindex] = TRUE;
1988 }
1989
4fbb74a6
AM
1990 hdr = elf_elfsections (abfd)[shindex];
1991 ehdr = elf_elfheader (abfd);
1992 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1993 hdr->sh_name);
933d961a 1994 if (name == NULL)
bf67003b 1995 goto fail;
252b5132 1996
4fbb74a6 1997 bed = get_elf_backend_data (abfd);
252b5132
RH
1998 switch (hdr->sh_type)
1999 {
2000 case SHT_NULL:
2001 /* Inactive section. Throw it away. */
bf67003b 2002 goto success;
252b5132 2003
bf67003b
NC
2004 case SHT_PROGBITS: /* Normal section with contents. */
2005 case SHT_NOBITS: /* .bss section. */
2006 case SHT_HASH: /* .hash section. */
2007 case SHT_NOTE: /* .note section. */
25e27870
L
2008 case SHT_INIT_ARRAY: /* .init_array section. */
2009 case SHT_FINI_ARRAY: /* .fini_array section. */
2010 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 2011 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 2012 case SHT_GNU_HASH: /* .gnu.hash section. */
bf67003b
NC
2013 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2014 goto success;
252b5132 2015
797fc050 2016 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 2017 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2018 goto fail;
2019
cfcac11d
NC
2020 if (hdr->sh_link > elf_numsections (abfd))
2021 {
caa83f8b 2022 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
2023 field set to SHN_BEFORE or SHN_AFTER. */
2024 switch (bfd_get_arch (abfd))
2025 {
caa83f8b 2026 case bfd_arch_i386:
cfcac11d
NC
2027 case bfd_arch_sparc:
2028 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
2029 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
2030 break;
2031 /* Otherwise fall through. */
2032 default:
bf67003b 2033 goto fail;
cfcac11d
NC
2034 }
2035 }
2036 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
bf67003b 2037 goto fail;
cfcac11d 2038 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
2039 {
2040 Elf_Internal_Shdr *dynsymhdr;
2041
2042 /* The shared libraries distributed with hpux11 have a bogus
2043 sh_link field for the ".dynamic" section. Find the
2044 string table for the ".dynsym" section instead. */
2045 if (elf_dynsymtab (abfd) != 0)
2046 {
2047 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2048 hdr->sh_link = dynsymhdr->sh_link;
2049 }
2050 else
2051 {
2052 unsigned int i, num_sec;
2053
2054 num_sec = elf_numsections (abfd);
2055 for (i = 1; i < num_sec; i++)
2056 {
2057 dynsymhdr = elf_elfsections (abfd)[i];
2058 if (dynsymhdr->sh_type == SHT_DYNSYM)
2059 {
2060 hdr->sh_link = dynsymhdr->sh_link;
2061 break;
2062 }
2063 }
2064 }
2065 }
bf67003b 2066 goto success;
797fc050 2067
bf67003b 2068 case SHT_SYMTAB: /* A symbol table. */
252b5132 2069 if (elf_onesymtab (abfd) == shindex)
bf67003b 2070 goto success;
252b5132 2071
a50b2160 2072 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2073 goto fail;
2074
3337c1e5 2075 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
eee3b786
AM
2076 {
2077 if (hdr->sh_size != 0)
bf67003b 2078 goto fail;
eee3b786
AM
2079 /* Some assemblers erroneously set sh_info to one with a
2080 zero sh_size. ld sees this as a global symbol count
2081 of (unsigned) -1. Fix it here. */
2082 hdr->sh_info = 0;
bf67003b 2083 goto success;
eee3b786 2084 }
bf67003b 2085
16ad13ec
NC
2086 /* PR 18854: A binary might contain more than one symbol table.
2087 Unusual, but possible. Warn, but continue. */
2088 if (elf_onesymtab (abfd) != 0)
2089 {
4eca0228 2090 _bfd_error_handler
695344c0 2091 /* xgettext:c-format */
63a5468a
AM
2092 (_("%B: warning: multiple symbol tables detected"
2093 " - ignoring the table in section %u"),
16ad13ec
NC
2094 abfd, shindex);
2095 goto success;
2096 }
252b5132 2097 elf_onesymtab (abfd) = shindex;
6a40cf0c
NC
2098 elf_symtab_hdr (abfd) = *hdr;
2099 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
252b5132
RH
2100 abfd->flags |= HAS_SYMS;
2101
2102 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
2103 SHF_ALLOC is set, and this is a shared object, then we also
2104 treat this section as a BFD section. We can not base the
2105 decision purely on SHF_ALLOC, because that flag is sometimes
2106 set in a relocatable object file, which would confuse the
2107 linker. */
252b5132
RH
2108 if ((hdr->sh_flags & SHF_ALLOC) != 0
2109 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
2110 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2111 shindex))
bf67003b 2112 goto fail;
252b5132 2113
1b3a8575
AM
2114 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2115 can't read symbols without that section loaded as well. It
2116 is most likely specified by the next section header. */
6a40cf0c
NC
2117 {
2118 elf_section_list * entry;
2119 unsigned int i, num_sec;
1b3a8575 2120
6a40cf0c
NC
2121 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2122 if (entry->hdr.sh_link == shindex)
2123 goto success;
2124
2125 num_sec = elf_numsections (abfd);
2126 for (i = shindex + 1; i < num_sec; i++)
2127 {
2128 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2129
2130 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2131 && hdr2->sh_link == shindex)
2132 break;
2133 }
2134
2135 if (i == num_sec)
2136 for (i = 1; i < shindex; i++)
1b3a8575
AM
2137 {
2138 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
6a40cf0c 2139
1b3a8575
AM
2140 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2141 && hdr2->sh_link == shindex)
2142 break;
2143 }
6a40cf0c
NC
2144
2145 if (i != shindex)
2146 ret = bfd_section_from_shdr (abfd, i);
2147 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2148 goto success;
2149 }
252b5132 2150
bf67003b 2151 case SHT_DYNSYM: /* A dynamic symbol table. */
252b5132 2152 if (elf_dynsymtab (abfd) == shindex)
bf67003b 2153 goto success;
252b5132 2154
a50b2160 2155 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2156 goto fail;
2157
eee3b786
AM
2158 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2159 {
2160 if (hdr->sh_size != 0)
bf67003b
NC
2161 goto fail;
2162
eee3b786
AM
2163 /* Some linkers erroneously set sh_info to one with a
2164 zero sh_size. ld sees this as a global symbol count
2165 of (unsigned) -1. Fix it here. */
2166 hdr->sh_info = 0;
bf67003b 2167 goto success;
eee3b786 2168 }
bf67003b 2169
16ad13ec
NC
2170 /* PR 18854: A binary might contain more than one dynamic symbol table.
2171 Unusual, but possible. Warn, but continue. */
2172 if (elf_dynsymtab (abfd) != 0)
2173 {
4eca0228 2174 _bfd_error_handler
695344c0 2175 /* xgettext:c-format */
63a5468a
AM
2176 (_("%B: warning: multiple dynamic symbol tables detected"
2177 " - ignoring the table in section %u"),
16ad13ec
NC
2178 abfd, shindex);
2179 goto success;
2180 }
252b5132
RH
2181 elf_dynsymtab (abfd) = shindex;
2182 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2183 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2184 abfd->flags |= HAS_SYMS;
2185
2186 /* Besides being a symbol table, we also treat this as a regular
2187 section, so that objcopy can handle it. */
bf67003b
NC
2188 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2189 goto success;
252b5132 2190
bf67003b 2191 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
6a40cf0c
NC
2192 {
2193 elf_section_list * entry;
9ad5cbcf 2194
6a40cf0c
NC
2195 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2196 if (entry->ndx == shindex)
2197 goto success;
2198
2199 entry = bfd_alloc (abfd, sizeof * entry);
2200 if (entry == NULL)
2201 goto fail;
2202 entry->ndx = shindex;
2203 entry->hdr = * hdr;
2204 entry->next = elf_symtab_shndx_list (abfd);
2205 elf_symtab_shndx_list (abfd) = entry;
2206 elf_elfsections (abfd)[shindex] = & entry->hdr;
2207 goto success;
2208 }
9ad5cbcf 2209
bf67003b 2210 case SHT_STRTAB: /* A string table. */
252b5132 2211 if (hdr->bfd_section != NULL)
bf67003b
NC
2212 goto success;
2213
252b5132
RH
2214 if (ehdr->e_shstrndx == shindex)
2215 {
2216 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2217 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
bf67003b 2218 goto success;
252b5132 2219 }
bf67003b 2220
1b3a8575
AM
2221 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2222 {
2223 symtab_strtab:
2224 elf_tdata (abfd)->strtab_hdr = *hdr;
2225 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
bf67003b 2226 goto success;
1b3a8575 2227 }
bf67003b 2228
1b3a8575
AM
2229 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2230 {
2231 dynsymtab_strtab:
2232 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2233 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2234 elf_elfsections (abfd)[shindex] = hdr;
2235 /* We also treat this as a regular section, so that objcopy
2236 can handle it. */
bf67003b
NC
2237 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2238 shindex);
2239 goto success;
1b3a8575 2240 }
252b5132 2241
1b3a8575
AM
2242 /* If the string table isn't one of the above, then treat it as a
2243 regular section. We need to scan all the headers to be sure,
2244 just in case this strtab section appeared before the above. */
2245 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2246 {
2247 unsigned int i, num_sec;
252b5132 2248
1b3a8575
AM
2249 num_sec = elf_numsections (abfd);
2250 for (i = 1; i < num_sec; i++)
2251 {
2252 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2253 if (hdr2->sh_link == shindex)
2254 {
933d961a
JJ
2255 /* Prevent endless recursion on broken objects. */
2256 if (i == shindex)
bf67003b 2257 goto fail;
1b3a8575 2258 if (! bfd_section_from_shdr (abfd, i))
bf67003b 2259 goto fail;
1b3a8575
AM
2260 if (elf_onesymtab (abfd) == i)
2261 goto symtab_strtab;
2262 if (elf_dynsymtab (abfd) == i)
2263 goto dynsymtab_strtab;
2264 }
2265 }
2266 }
bf67003b
NC
2267 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2268 goto success;
252b5132
RH
2269
2270 case SHT_REL:
2271 case SHT_RELA:
2272 /* *These* do a lot of work -- but build no sections! */
2273 {
2274 asection *target_sect;
d4730f92 2275 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 2276 unsigned int num_sec = elf_numsections (abfd);
d4730f92 2277 struct bfd_elf_section_data *esdt;
252b5132 2278
aa2ca951
JJ
2279 if (hdr->sh_entsize
2280 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160 2281 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
bf67003b 2282 goto fail;
a50b2160 2283
03ae5f59 2284 /* Check for a bogus link to avoid crashing. */
4fbb74a6 2285 if (hdr->sh_link >= num_sec)
03ae5f59 2286 {
4eca0228 2287 _bfd_error_handler
695344c0 2288 /* xgettext:c-format */
4eca0228
AM
2289 (_("%B: invalid link %lu for reloc section %s (index %u)"),
2290 abfd, hdr->sh_link, name, shindex);
bf67003b
NC
2291 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2292 shindex);
2293 goto success;
03ae5f59
ILT
2294 }
2295
252b5132
RH
2296 /* For some incomprehensible reason Oracle distributes
2297 libraries for Solaris in which some of the objects have
2298 bogus sh_link fields. It would be nice if we could just
2299 reject them, but, unfortunately, some people need to use
2300 them. We scan through the section headers; if we find only
2301 one suitable symbol table, we clobber the sh_link to point
83b89087
L
2302 to it. I hope this doesn't break anything.
2303
2304 Don't do it on executable nor shared library. */
2305 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2306 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
2307 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2308 {
9ad5cbcf 2309 unsigned int scan;
252b5132
RH
2310 int found;
2311
2312 found = 0;
9ad5cbcf 2313 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2314 {
2315 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2316 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2317 {
2318 if (found != 0)
2319 {
2320 found = 0;
2321 break;
2322 }
2323 found = scan;
2324 }
2325 }
2326 if (found != 0)
2327 hdr->sh_link = found;
2328 }
2329
2330 /* Get the symbol table. */
1b3a8575
AM
2331 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2332 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2333 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
bf67003b 2334 goto fail;
252b5132
RH
2335
2336 /* If this reloc section does not use the main symbol table we
2337 don't treat it as a reloc section. BFD can't adequately
2338 represent such a section, so at least for now, we don't
c044fabd 2339 try. We just present it as a normal section. We also
60bcf0fa 2340 can't use it as a reloc section if it points to the null
83b89087
L
2341 section, an invalid section, another reloc section, or its
2342 sh_link points to the null section. */
185ef66d 2343 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 2344 || hdr->sh_link == SHN_UNDEF
185ef66d 2345 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
2346 || hdr->sh_info >= num_sec
2347 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2348 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
bf67003b
NC
2349 {
2350 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2351 shindex);
2352 goto success;
2353 }
252b5132
RH
2354
2355 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
bf67003b
NC
2356 goto fail;
2357
252b5132
RH
2358 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2359 if (target_sect == NULL)
bf67003b 2360 goto fail;
252b5132 2361
d4730f92
BS
2362 esdt = elf_section_data (target_sect);
2363 if (hdr->sh_type == SHT_RELA)
2364 p_hdr = &esdt->rela.hdr;
252b5132 2365 else
d4730f92
BS
2366 p_hdr = &esdt->rel.hdr;
2367
06614111
NC
2368 /* PR 17512: file: 0b4f81b7. */
2369 if (*p_hdr != NULL)
2370 goto fail;
ef53be89 2371 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
d4730f92 2372 if (hdr2 == NULL)
bf67003b 2373 goto fail;
252b5132 2374 *hdr2 = *hdr;
d4730f92 2375 *p_hdr = hdr2;
252b5132 2376 elf_elfsections (abfd)[shindex] = hdr2;
056bafd4
MR
2377 target_sect->reloc_count += (NUM_SHDR_ENTRIES (hdr)
2378 * bed->s->int_rels_per_ext_rel);
252b5132
RH
2379 target_sect->flags |= SEC_RELOC;
2380 target_sect->relocation = NULL;
2381 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2382 /* In the section to which the relocations apply, mark whether
2383 its relocations are of the REL or RELA variety. */
72730e0c 2384 if (hdr->sh_size != 0)
d4730f92
BS
2385 {
2386 if (hdr->sh_type == SHT_RELA)
2387 target_sect->use_rela_p = 1;
2388 }
252b5132 2389 abfd->flags |= HAS_RELOC;
bf67003b 2390 goto success;
252b5132 2391 }
252b5132
RH
2392
2393 case SHT_GNU_verdef:
2394 elf_dynverdef (abfd) = shindex;
2395 elf_tdata (abfd)->dynverdef_hdr = *hdr;
bf67003b
NC
2396 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2397 goto success;
252b5132
RH
2398
2399 case SHT_GNU_versym:
a50b2160 2400 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
bf67003b
NC
2401 goto fail;
2402
252b5132
RH
2403 elf_dynversym (abfd) = shindex;
2404 elf_tdata (abfd)->dynversym_hdr = *hdr;
bf67003b
NC
2405 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2406 goto success;
252b5132
RH
2407
2408 case SHT_GNU_verneed:
2409 elf_dynverref (abfd) = shindex;
2410 elf_tdata (abfd)->dynverref_hdr = *hdr;
bf67003b
NC
2411 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2412 goto success;
252b5132
RH
2413
2414 case SHT_SHLIB:
bf67003b 2415 goto success;
252b5132 2416
dbb410c3 2417 case SHT_GROUP:
44534af3 2418 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
bf67003b
NC
2419 goto fail;
2420
6dc132d9 2421 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2422 goto fail;
2423
dbb410c3
AM
2424 if (hdr->contents != NULL)
2425 {
2426 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
06614111 2427 unsigned int n_elt = hdr->sh_size / sizeof (* idx);
dbb410c3
AM
2428 asection *s;
2429
06614111
NC
2430 if (n_elt == 0)
2431 goto fail;
b885599b
AM
2432 if (idx->flags & GRP_COMDAT)
2433 hdr->bfd_section->flags
2434 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2435
45c5e9ed
L
2436 /* We try to keep the same section order as it comes in. */
2437 idx += n_elt;
06614111 2438
dbb410c3 2439 while (--n_elt != 0)
1783205a
NC
2440 {
2441 --idx;
2442
2443 if (idx->shdr != NULL
2444 && (s = idx->shdr->bfd_section) != NULL
2445 && elf_next_in_group (s) != NULL)
2446 {
2447 elf_next_in_group (hdr->bfd_section) = s;
2448 break;
2449 }
2450 }
dbb410c3 2451 }
bf67003b 2452 goto success;
dbb410c3 2453
252b5132 2454 default:
104d59d1
JM
2455 /* Possibly an attributes section. */
2456 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2457 || hdr->sh_type == bed->obj_attrs_section_type)
2458 {
2459 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2460 goto fail;
104d59d1 2461 _bfd_elf_parse_attributes (abfd, hdr);
bf67003b 2462 goto success;
104d59d1
JM
2463 }
2464
252b5132 2465 /* Check for any processor-specific section types. */
3eb70a79 2466 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2467 goto success;
3eb70a79
L
2468
2469 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2470 {
2471 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2472 /* FIXME: How to properly handle allocated section reserved
2473 for applications? */
4eca0228 2474 _bfd_error_handler
695344c0 2475 /* xgettext:c-format */
3eb70a79
L
2476 (_("%B: don't know how to handle allocated, application "
2477 "specific section `%s' [0x%8x]"),
2478 abfd, name, hdr->sh_type);
2479 else
bf67003b
NC
2480 {
2481 /* Allow sections reserved for applications. */
2482 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2483 shindex);
2484 goto success;
2485 }
3eb70a79
L
2486 }
2487 else if (hdr->sh_type >= SHT_LOPROC
2488 && hdr->sh_type <= SHT_HIPROC)
2489 /* FIXME: We should handle this section. */
4eca0228 2490 _bfd_error_handler
695344c0 2491 /* xgettext:c-format */
3eb70a79
L
2492 (_("%B: don't know how to handle processor specific section "
2493 "`%s' [0x%8x]"),
2494 abfd, name, hdr->sh_type);
2495 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
2496 {
2497 /* Unrecognised OS-specific sections. */
2498 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2499 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 2500 required to correctly process the section and the file should
ff15b240 2501 be rejected with an error message. */
4eca0228 2502 _bfd_error_handler
695344c0 2503 /* xgettext:c-format */
ff15b240
NC
2504 (_("%B: don't know how to handle OS specific section "
2505 "`%s' [0x%8x]"),
2506 abfd, name, hdr->sh_type);
2507 else
bf67003b
NC
2508 {
2509 /* Otherwise it should be processed. */
2510 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2511 goto success;
2512 }
ff15b240 2513 }
3eb70a79
L
2514 else
2515 /* FIXME: We should handle this section. */
4eca0228 2516 _bfd_error_handler
695344c0 2517 /* xgettext:c-format */
3eb70a79
L
2518 (_("%B: don't know how to handle section `%s' [0x%8x]"),
2519 abfd, name, hdr->sh_type);
2520
bf67003b 2521 goto fail;
252b5132
RH
2522 }
2523
bf67003b
NC
2524 fail:
2525 ret = FALSE;
2526 success:
e5b470e2 2527 if (sections_being_created && sections_being_created_abfd == abfd)
bf67003b
NC
2528 sections_being_created [shindex] = FALSE;
2529 if (-- nesting == 0)
5a4b0ccc
NC
2530 {
2531 sections_being_created = NULL;
2532 sections_being_created_abfd = abfd;
2533 }
bf67003b 2534 return ret;
252b5132
RH
2535}
2536
87d72d41 2537/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2538
87d72d41
AM
2539Elf_Internal_Sym *
2540bfd_sym_from_r_symndx (struct sym_cache *cache,
2541 bfd *abfd,
2542 unsigned long r_symndx)
ec338859 2543{
ec338859
AM
2544 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2545
a5d1b3b5
AM
2546 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2547 {
2548 Elf_Internal_Shdr *symtab_hdr;
2549 unsigned char esym[sizeof (Elf64_External_Sym)];
2550 Elf_External_Sym_Shndx eshndx;
ec338859 2551
a5d1b3b5
AM
2552 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2553 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2554 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2555 return NULL;
9ad5cbcf 2556
a5d1b3b5
AM
2557 if (cache->abfd != abfd)
2558 {
2559 memset (cache->indx, -1, sizeof (cache->indx));
2560 cache->abfd = abfd;
2561 }
2562 cache->indx[ent] = r_symndx;
ec338859 2563 }
a5d1b3b5 2564
87d72d41 2565 return &cache->sym[ent];
ec338859
AM
2566}
2567
252b5132
RH
2568/* Given an ELF section number, retrieve the corresponding BFD
2569 section. */
2570
2571asection *
91d6fa6a 2572bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2573{
91d6fa6a 2574 if (sec_index >= elf_numsections (abfd))
252b5132 2575 return NULL;
91d6fa6a 2576 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2577}
2578
b35d266b 2579static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2580{
0112cd26
NC
2581 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2582 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2583};
2584
b35d266b 2585static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2586{
0112cd26
NC
2587 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2588 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2589};
2590
b35d266b 2591static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2592{
0112cd26
NC
2593 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2594 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
a9a72a65
DE
2595 /* There are more DWARF sections than these, but they needn't be added here
2596 unless you have to cope with broken compilers that don't emit section
2597 attributes or you want to help the user writing assembler. */
0112cd26
NC
2598 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2599 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2600 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2601 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2602 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2603 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2604 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2605 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2606 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2607};
2608
b35d266b 2609static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2610{
6f9dbcd4
AM
2611 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2612 { STRING_COMMA_LEN (".fini_array"), -2, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2613 { NULL, 0 , 0, 0, 0 }
7f4d3958
L
2614};
2615
b35d266b 2616static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2617{
0112cd26 2618 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
68efed41 2619 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
0112cd26
NC
2620 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2621 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2622 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2623 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2624 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2625 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2626 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2627 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2628};
2629
b35d266b 2630static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2631{
0112cd26
NC
2632 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2633 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2634};
2635
b35d266b 2636static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2637{
6f9dbcd4
AM
2638 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2639 { STRING_COMMA_LEN (".init_array"), -2, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2640 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2641 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2642};
2643
b35d266b 2644static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2645{
0112cd26
NC
2646 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2647 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2648};
2649
b35d266b 2650static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2651{
0112cd26
NC
2652 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2653 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2654 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2655};
2656
b35d266b 2657static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2658{
6f9dbcd4
AM
2659 { STRING_COMMA_LEN (".preinit_array"), -2, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2660 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2661 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2662};
2663
b35d266b 2664static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2665{
0112cd26
NC
2666 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2667 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2668 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2669 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2670 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2671};
2672
b35d266b 2673static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2674{
0112cd26
NC
2675 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2676 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2677 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2678 /* See struct bfd_elf_special_section declaration for the semantics of
2679 this special case where .prefix_length != strlen (.prefix). */
2680 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2681 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2682};
2683
b35d266b 2684static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2685{
0112cd26
NC
2686 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2687 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2688 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2689 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2690};
2691
1b315056
CS
2692static const struct bfd_elf_special_section special_sections_z[] =
2693{
2694 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2695 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2696 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2697 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2698 { NULL, 0, 0, 0, 0 }
2699};
2700
e4c93b56 2701static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2702{
7f4d3958 2703 special_sections_b, /* 'b' */
98ece1b3 2704 special_sections_c, /* 'c' */
7f4d3958
L
2705 special_sections_d, /* 'd' */
2706 NULL, /* 'e' */
2707 special_sections_f, /* 'f' */
2708 special_sections_g, /* 'g' */
2709 special_sections_h, /* 'h' */
2710 special_sections_i, /* 'i' */
2711 NULL, /* 'j' */
2712 NULL, /* 'k' */
2713 special_sections_l, /* 'l' */
2714 NULL, /* 'm' */
2715 special_sections_n, /* 'n' */
2716 NULL, /* 'o' */
2717 special_sections_p, /* 'p' */
2718 NULL, /* 'q' */
2719 special_sections_r, /* 'r' */
2720 special_sections_s, /* 's' */
2721 special_sections_t, /* 't' */
1b315056
CS
2722 NULL, /* 'u' */
2723 NULL, /* 'v' */
2724 NULL, /* 'w' */
2725 NULL, /* 'x' */
2726 NULL, /* 'y' */
2727 special_sections_z /* 'z' */
7f4d3958
L
2728};
2729
551b43fd
AM
2730const struct bfd_elf_special_section *
2731_bfd_elf_get_special_section (const char *name,
2732 const struct bfd_elf_special_section *spec,
2733 unsigned int rela)
2f89ff8d
L
2734{
2735 int i;
7f4d3958 2736 int len;
7f4d3958 2737
551b43fd 2738 len = strlen (name);
7f4d3958 2739
551b43fd 2740 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2741 {
2742 int suffix_len;
551b43fd 2743 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2744
2745 if (len < prefix_len)
2746 continue;
551b43fd 2747 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2748 continue;
2749
551b43fd 2750 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2751 if (suffix_len <= 0)
2752 {
2753 if (name[prefix_len] != 0)
2754 {
2755 if (suffix_len == 0)
2756 continue;
2757 if (name[prefix_len] != '.'
2758 && (suffix_len == -2
551b43fd 2759 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2760 continue;
2761 }
2762 }
2763 else
2764 {
2765 if (len < prefix_len + suffix_len)
2766 continue;
2767 if (memcmp (name + len - suffix_len,
551b43fd 2768 spec[i].prefix + prefix_len,
7dcb9820
AM
2769 suffix_len) != 0)
2770 continue;
2771 }
551b43fd 2772 return &spec[i];
7dcb9820 2773 }
2f89ff8d
L
2774
2775 return NULL;
2776}
2777
7dcb9820 2778const struct bfd_elf_special_section *
29ef7005 2779_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2780{
551b43fd
AM
2781 int i;
2782 const struct bfd_elf_special_section *spec;
29ef7005 2783 const struct elf_backend_data *bed;
2f89ff8d
L
2784
2785 /* See if this is one of the special sections. */
551b43fd
AM
2786 if (sec->name == NULL)
2787 return NULL;
2f89ff8d 2788
29ef7005
L
2789 bed = get_elf_backend_data (abfd);
2790 spec = bed->special_sections;
2791 if (spec)
2792 {
2793 spec = _bfd_elf_get_special_section (sec->name,
2794 bed->special_sections,
2795 sec->use_rela_p);
2796 if (spec != NULL)
2797 return spec;
2798 }
2799
551b43fd
AM
2800 if (sec->name[0] != '.')
2801 return NULL;
2f89ff8d 2802
551b43fd 2803 i = sec->name[1] - 'b';
1b315056 2804 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2805 return NULL;
2806
2807 spec = special_sections[i];
2f89ff8d 2808
551b43fd
AM
2809 if (spec == NULL)
2810 return NULL;
2811
2812 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2813}
2814
b34976b6 2815bfd_boolean
217aa764 2816_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2817{
2818 struct bfd_elf_section_data *sdata;
551b43fd 2819 const struct elf_backend_data *bed;
7dcb9820 2820 const struct bfd_elf_special_section *ssect;
252b5132 2821
f0abc2a1
AM
2822 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2823 if (sdata == NULL)
2824 {
a50b1753
NC
2825 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2826 sizeof (*sdata));
f0abc2a1
AM
2827 if (sdata == NULL)
2828 return FALSE;
217aa764 2829 sec->used_by_bfd = sdata;
f0abc2a1 2830 }
bf572ba0 2831
551b43fd
AM
2832 /* Indicate whether or not this section should use RELA relocations. */
2833 bed = get_elf_backend_data (abfd);
2834 sec->use_rela_p = bed->default_use_rela_p;
2835
e843e0f8
L
2836 /* When we read a file, we don't need to set ELF section type and
2837 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2838 anyway. We will set ELF section type and flags for all linker
2839 created sections. If user specifies BFD section flags, we will
2840 set ELF section type and flags based on BFD section flags in
02ecc8e9
L
2841 elf_fake_sections. Special handling for .init_array/.fini_array
2842 output sections since they may contain .ctors/.dtors input
2843 sections. We don't want _bfd_elf_init_private_section_data to
2844 copy ELF section type from .ctors/.dtors input sections. */
2845 if (abfd->direction != read_direction
3496cb2a 2846 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2847 {
551b43fd 2848 ssect = (*bed->get_sec_type_attr) (abfd, sec);
02ecc8e9
L
2849 if (ssect != NULL
2850 && (!sec->flags
2851 || (sec->flags & SEC_LINKER_CREATED) != 0
2852 || ssect->type == SHT_INIT_ARRAY
2853 || ssect->type == SHT_FINI_ARRAY))
a31501e9
L
2854 {
2855 elf_section_type (sec) = ssect->type;
2856 elf_section_flags (sec) = ssect->attr;
2857 }
2f89ff8d
L
2858 }
2859
f592407e 2860 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2861}
2862
2863/* Create a new bfd section from an ELF program header.
2864
2865 Since program segments have no names, we generate a synthetic name
2866 of the form segment<NUM>, where NUM is generally the index in the
2867 program header table. For segments that are split (see below) we
2868 generate the names segment<NUM>a and segment<NUM>b.
2869
2870 Note that some program segments may have a file size that is different than
2871 (less than) the memory size. All this means is that at execution the
2872 system must allocate the amount of memory specified by the memory size,
2873 but only initialize it with the first "file size" bytes read from the
2874 file. This would occur for example, with program segments consisting
2875 of combined data+bss.
2876
2877 To handle the above situation, this routine generates TWO bfd sections
2878 for the single program segment. The first has the length specified by
2879 the file size of the segment, and the second has the length specified
2880 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2881 into its initialized and uninitialized parts.
252b5132
RH
2882
2883 */
2884
b34976b6 2885bfd_boolean
217aa764
AM
2886_bfd_elf_make_section_from_phdr (bfd *abfd,
2887 Elf_Internal_Phdr *hdr,
91d6fa6a 2888 int hdr_index,
a50b1753 2889 const char *type_name)
252b5132
RH
2890{
2891 asection *newsect;
2892 char *name;
2893 char namebuf[64];
d4c88bbb 2894 size_t len;
252b5132
RH
2895 int split;
2896
2897 split = ((hdr->p_memsz > 0)
2898 && (hdr->p_filesz > 0)
2899 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2900
2901 if (hdr->p_filesz > 0)
252b5132 2902 {
91d6fa6a 2903 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2904 len = strlen (namebuf) + 1;
a50b1753 2905 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2906 if (!name)
2907 return FALSE;
2908 memcpy (name, namebuf, len);
2909 newsect = bfd_make_section (abfd, name);
2910 if (newsect == NULL)
2911 return FALSE;
2912 newsect->vma = hdr->p_vaddr;
2913 newsect->lma = hdr->p_paddr;
2914 newsect->size = hdr->p_filesz;
2915 newsect->filepos = hdr->p_offset;
2916 newsect->flags |= SEC_HAS_CONTENTS;
2917 newsect->alignment_power = bfd_log2 (hdr->p_align);
2918 if (hdr->p_type == PT_LOAD)
252b5132 2919 {
d5191d0c
AM
2920 newsect->flags |= SEC_ALLOC;
2921 newsect->flags |= SEC_LOAD;
2922 if (hdr->p_flags & PF_X)
2923 {
2924 /* FIXME: all we known is that it has execute PERMISSION,
2925 may be data. */
2926 newsect->flags |= SEC_CODE;
2927 }
2928 }
2929 if (!(hdr->p_flags & PF_W))
2930 {
2931 newsect->flags |= SEC_READONLY;
252b5132 2932 }
252b5132
RH
2933 }
2934
d5191d0c 2935 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2936 {
d5191d0c
AM
2937 bfd_vma align;
2938
91d6fa6a 2939 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2940 len = strlen (namebuf) + 1;
a50b1753 2941 name = (char *) bfd_alloc (abfd, len);
252b5132 2942 if (!name)
b34976b6 2943 return FALSE;
d4c88bbb 2944 memcpy (name, namebuf, len);
252b5132
RH
2945 newsect = bfd_make_section (abfd, name);
2946 if (newsect == NULL)
b34976b6 2947 return FALSE;
252b5132
RH
2948 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2949 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2950 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2951 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2952 align = newsect->vma & -newsect->vma;
2953 if (align == 0 || align > hdr->p_align)
2954 align = hdr->p_align;
2955 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2956 if (hdr->p_type == PT_LOAD)
2957 {
d5191d0c
AM
2958 /* Hack for gdb. Segments that have not been modified do
2959 not have their contents written to a core file, on the
2960 assumption that a debugger can find the contents in the
2961 executable. We flag this case by setting the fake
2962 section size to zero. Note that "real" bss sections will
2963 always have their contents dumped to the core file. */
2964 if (bfd_get_format (abfd) == bfd_core)
2965 newsect->size = 0;
252b5132
RH
2966 newsect->flags |= SEC_ALLOC;
2967 if (hdr->p_flags & PF_X)
2968 newsect->flags |= SEC_CODE;
2969 }
2970 if (!(hdr->p_flags & PF_W))
2971 newsect->flags |= SEC_READONLY;
2972 }
2973
b34976b6 2974 return TRUE;
252b5132
RH
2975}
2976
b34976b6 2977bfd_boolean
91d6fa6a 2978bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2979{
9c5bfbb7 2980 const struct elf_backend_data *bed;
20cfcaae
NC
2981
2982 switch (hdr->p_type)
2983 {
2984 case PT_NULL:
91d6fa6a 2985 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2986
2987 case PT_LOAD:
91d6fa6a 2988 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2989
2990 case PT_DYNAMIC:
91d6fa6a 2991 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2992
2993 case PT_INTERP:
91d6fa6a 2994 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2995
2996 case PT_NOTE:
91d6fa6a 2997 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2998 return FALSE;
718175fa 2999 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
3000 return FALSE;
3001 return TRUE;
20cfcaae
NC
3002
3003 case PT_SHLIB:
91d6fa6a 3004 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
3005
3006 case PT_PHDR:
91d6fa6a 3007 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 3008
811072d8 3009 case PT_GNU_EH_FRAME:
91d6fa6a 3010 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
3011 "eh_frame_hdr");
3012
2b05f1b7 3013 case PT_GNU_STACK:
91d6fa6a 3014 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 3015
8c37241b 3016 case PT_GNU_RELRO:
91d6fa6a 3017 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 3018
20cfcaae 3019 default:
8c1acd09 3020 /* Check for any processor-specific program segment types. */
20cfcaae 3021 bed = get_elf_backend_data (abfd);
91d6fa6a 3022 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
3023 }
3024}
3025
d4730f92
BS
3026/* Return the REL_HDR for SEC, assuming there is only a single one, either
3027 REL or RELA. */
3028
3029Elf_Internal_Shdr *
3030_bfd_elf_single_rel_hdr (asection *sec)
3031{
3032 if (elf_section_data (sec)->rel.hdr)
3033 {
3034 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3035 return elf_section_data (sec)->rel.hdr;
3036 }
3037 else
3038 return elf_section_data (sec)->rela.hdr;
3039}
3040
3e19fb8f
L
3041static bfd_boolean
3042_bfd_elf_set_reloc_sh_name (bfd *abfd,
3043 Elf_Internal_Shdr *rel_hdr,
3044 const char *sec_name,
3045 bfd_boolean use_rela_p)
3046{
3047 char *name = (char *) bfd_alloc (abfd,
3048 sizeof ".rela" + strlen (sec_name));
3049 if (name == NULL)
3050 return FALSE;
3051
3052 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3053 rel_hdr->sh_name =
3054 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3055 FALSE);
3056 if (rel_hdr->sh_name == (unsigned int) -1)
3057 return FALSE;
3058
3059 return TRUE;
3060}
3061
d4730f92
BS
3062/* Allocate and initialize a section-header for a new reloc section,
3063 containing relocations against ASECT. It is stored in RELDATA. If
3064 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3065 relocations. */
23bc299b 3066
5d13b3b3 3067static bfd_boolean
217aa764 3068_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 3069 struct bfd_elf_section_reloc_data *reldata,
f6fe1ccd 3070 const char *sec_name,
3e19fb8f
L
3071 bfd_boolean use_rela_p,
3072 bfd_boolean delay_st_name_p)
23bc299b 3073{
d4730f92 3074 Elf_Internal_Shdr *rel_hdr;
9c5bfbb7 3075 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3076
d4730f92 3077 BFD_ASSERT (reldata->hdr == NULL);
ef53be89 3078 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
d4730f92 3079 reldata->hdr = rel_hdr;
23bc299b 3080
3e19fb8f
L
3081 if (delay_st_name_p)
3082 rel_hdr->sh_name = (unsigned int) -1;
3083 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3084 use_rela_p))
b34976b6 3085 return FALSE;
23bc299b
MM
3086 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3087 rel_hdr->sh_entsize = (use_rela_p
3088 ? bed->s->sizeof_rela
3089 : bed->s->sizeof_rel);
72de5009 3090 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
3091 rel_hdr->sh_flags = 0;
3092 rel_hdr->sh_addr = 0;
3093 rel_hdr->sh_size = 0;
3094 rel_hdr->sh_offset = 0;
3095
b34976b6 3096 return TRUE;
23bc299b
MM
3097}
3098
94be91de
JB
3099/* Return the default section type based on the passed in section flags. */
3100
3101int
3102bfd_elf_get_default_section_type (flagword flags)
3103{
3104 if ((flags & SEC_ALLOC) != 0
2e76e85a 3105 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
3106 return SHT_NOBITS;
3107 return SHT_PROGBITS;
3108}
3109
d4730f92
BS
3110struct fake_section_arg
3111{
3112 struct bfd_link_info *link_info;
3113 bfd_boolean failed;
3114};
3115
252b5132
RH
3116/* Set up an ELF internal section header for a section. */
3117
252b5132 3118static void
d4730f92 3119elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 3120{
d4730f92 3121 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 3122 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3123 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 3124 Elf_Internal_Shdr *this_hdr;
0414f35b 3125 unsigned int sh_type;
0ce398f1 3126 const char *name = asect->name;
3e19fb8f 3127 bfd_boolean delay_st_name_p = FALSE;
252b5132 3128
d4730f92 3129 if (arg->failed)
252b5132
RH
3130 {
3131 /* We already failed; just get out of the bfd_map_over_sections
08a40648 3132 loop. */
252b5132
RH
3133 return;
3134 }
3135
d4730f92 3136 this_hdr = &esd->this_hdr;
252b5132 3137
f6fe1ccd 3138 if (arg->link_info)
0ce398f1 3139 {
f6fe1ccd
L
3140 /* ld: compress DWARF debug sections with names: .debug_*. */
3141 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
3142 && (asect->flags & SEC_DEBUGGING)
3143 && name[1] == 'd'
3144 && name[6] == '_')
3145 {
3146 /* Set SEC_ELF_COMPRESS to indicate this section should be
3147 compressed. */
3148 asect->flags |= SEC_ELF_COMPRESS;
0ce398f1 3149
dd905818 3150 /* If this section will be compressed, delay adding section
3e19fb8f
L
3151 name to section name section after it is compressed in
3152 _bfd_elf_assign_file_positions_for_non_load. */
3153 delay_st_name_p = TRUE;
f6fe1ccd
L
3154 }
3155 }
3156 else if ((asect->flags & SEC_ELF_RENAME))
3157 {
3158 /* objcopy: rename output DWARF debug section. */
3159 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
3160 {
3161 /* When we decompress or compress with SHF_COMPRESSED,
3162 convert section name from .zdebug_* to .debug_* if
3163 needed. */
3164 if (name[1] == 'z')
3165 {
3166 char *new_name = convert_zdebug_to_debug (abfd, name);
3167 if (new_name == NULL)
3168 {
3169 arg->failed = TRUE;
3170 return;
3171 }
3172 name = new_name;
3173 }
3174 }
3175 else if (asect->compress_status == COMPRESS_SECTION_DONE)
0ce398f1 3176 {
f6fe1ccd
L
3177 /* PR binutils/18087: Compression does not always make a
3178 section smaller. So only rename the section when
3179 compression has actually taken place. If input section
3180 name is .zdebug_*, we should never compress it again. */
3181 char *new_name = convert_debug_to_zdebug (abfd, name);
0ce398f1
L
3182 if (new_name == NULL)
3183 {
3184 arg->failed = TRUE;
3185 return;
3186 }
f6fe1ccd
L
3187 BFD_ASSERT (name[1] != 'z');
3188 name = new_name;
0ce398f1
L
3189 }
3190 }
3191
3e19fb8f
L
3192 if (delay_st_name_p)
3193 this_hdr->sh_name = (unsigned int) -1;
3194 else
252b5132 3195 {
3e19fb8f
L
3196 this_hdr->sh_name
3197 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3198 name, FALSE);
3199 if (this_hdr->sh_name == (unsigned int) -1)
3200 {
3201 arg->failed = TRUE;
3202 return;
3203 }
252b5132
RH
3204 }
3205
a4d8e49b 3206 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
3207
3208 if ((asect->flags & SEC_ALLOC) != 0
3209 || asect->user_set_vma)
3210 this_hdr->sh_addr = asect->vma;
3211 else
3212 this_hdr->sh_addr = 0;
3213
3214 this_hdr->sh_offset = 0;
eea6121a 3215 this_hdr->sh_size = asect->size;
252b5132 3216 this_hdr->sh_link = 0;
c86934ce
NC
3217 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3218 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3219 {
4eca0228 3220 _bfd_error_handler
695344c0 3221 /* xgettext:c-format */
c86934ce 3222 (_("%B: error: Alignment power %d of section `%A' is too big"),
c08bb8dd 3223 abfd, asect->alignment_power, asect);
c86934ce
NC
3224 arg->failed = TRUE;
3225 return;
3226 }
72de5009 3227 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
3228 /* The sh_entsize and sh_info fields may have been set already by
3229 copy_private_section_data. */
3230
3231 this_hdr->bfd_section = asect;
3232 this_hdr->contents = NULL;
3233
3cddba1e
L
3234 /* If the section type is unspecified, we set it based on
3235 asect->flags. */
98ece1b3
AM
3236 if ((asect->flags & SEC_GROUP) != 0)
3237 sh_type = SHT_GROUP;
98ece1b3 3238 else
94be91de 3239 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 3240
3cddba1e 3241 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
3242 this_hdr->sh_type = sh_type;
3243 else if (this_hdr->sh_type == SHT_NOBITS
3244 && sh_type == SHT_PROGBITS
3245 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 3246 {
98ece1b3
AM
3247 /* Warn if we are changing a NOBITS section to PROGBITS, but
3248 allow the link to proceed. This can happen when users link
3249 non-bss input sections to bss output sections, or emit data
3250 to a bss output section via a linker script. */
4eca0228 3251 _bfd_error_handler
58f0869b 3252 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 3253 this_hdr->sh_type = sh_type;
3cddba1e
L
3254 }
3255
2f89ff8d 3256 switch (this_hdr->sh_type)
252b5132 3257 {
2f89ff8d 3258 default:
2f89ff8d
L
3259 break;
3260
3261 case SHT_STRTAB:
2f89ff8d
L
3262 case SHT_NOTE:
3263 case SHT_NOBITS:
3264 case SHT_PROGBITS:
3265 break;
606851fb
AM
3266
3267 case SHT_INIT_ARRAY:
3268 case SHT_FINI_ARRAY:
3269 case SHT_PREINIT_ARRAY:
3270 this_hdr->sh_entsize = bed->s->arch_size / 8;
3271 break;
2f89ff8d
L
3272
3273 case SHT_HASH:
c7ac6ff8 3274 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 3275 break;
5de3bf90 3276
2f89ff8d 3277 case SHT_DYNSYM:
252b5132 3278 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
3279 break;
3280
3281 case SHT_DYNAMIC:
252b5132 3282 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
3283 break;
3284
3285 case SHT_RELA:
3286 if (get_elf_backend_data (abfd)->may_use_rela_p)
3287 this_hdr->sh_entsize = bed->s->sizeof_rela;
3288 break;
3289
3290 case SHT_REL:
3291 if (get_elf_backend_data (abfd)->may_use_rel_p)
3292 this_hdr->sh_entsize = bed->s->sizeof_rel;
3293 break;
3294
3295 case SHT_GNU_versym:
252b5132 3296 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
3297 break;
3298
3299 case SHT_GNU_verdef:
252b5132
RH
3300 this_hdr->sh_entsize = 0;
3301 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3302 cverdefs. The linker will set cverdefs, but sh_info will be
3303 zero. */
252b5132
RH
3304 if (this_hdr->sh_info == 0)
3305 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3306 else
3307 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3308 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
3309 break;
3310
3311 case SHT_GNU_verneed:
252b5132
RH
3312 this_hdr->sh_entsize = 0;
3313 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3314 cverrefs. The linker will set cverrefs, but sh_info will be
3315 zero. */
252b5132
RH
3316 if (this_hdr->sh_info == 0)
3317 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3318 else
3319 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3320 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
3321 break;
3322
3323 case SHT_GROUP:
1783205a 3324 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 3325 break;
fdc90cb4
JJ
3326
3327 case SHT_GNU_HASH:
3328 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3329 break;
dbb410c3 3330 }
252b5132
RH
3331
3332 if ((asect->flags & SEC_ALLOC) != 0)
3333 this_hdr->sh_flags |= SHF_ALLOC;
3334 if ((asect->flags & SEC_READONLY) == 0)
3335 this_hdr->sh_flags |= SHF_WRITE;
3336 if ((asect->flags & SEC_CODE) != 0)
3337 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
3338 if ((asect->flags & SEC_MERGE) != 0)
3339 {
3340 this_hdr->sh_flags |= SHF_MERGE;
3341 this_hdr->sh_entsize = asect->entsize;
f5fa8ca2 3342 }
84865015
NC
3343 if ((asect->flags & SEC_STRINGS) != 0)
3344 this_hdr->sh_flags |= SHF_STRINGS;
1126897b 3345 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 3346 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 3347 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
3348 {
3349 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
3350 if (asect->size == 0
3351 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 3352 {
3a800eb9 3353 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 3354
704afa60 3355 this_hdr->sh_size = 0;
3a800eb9
AM
3356 if (o != NULL)
3357 {
704afa60 3358 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
3359 if (this_hdr->sh_size != 0)
3360 this_hdr->sh_type = SHT_NOBITS;
3361 }
704afa60
JJ
3362 }
3363 }
18ae9cc1
L
3364 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3365 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 3366
d4730f92
BS
3367 /* If the section has relocs, set up a section header for the
3368 SHT_REL[A] section. If two relocation sections are required for
3369 this section, it is up to the processor-specific back-end to
3370 create the other. */
3371 if ((asect->flags & SEC_RELOC) != 0)
3372 {
3373 /* When doing a relocatable link, create both REL and RELA sections if
3374 needed. */
3375 if (arg->link_info
3376 /* Do the normal setup if we wouldn't create any sections here. */
3377 && esd->rel.count + esd->rela.count > 0
0e1862bb
L
3378 && (bfd_link_relocatable (arg->link_info)
3379 || arg->link_info->emitrelocations))
d4730f92
BS
3380 {
3381 if (esd->rel.count && esd->rel.hdr == NULL
3e19fb8f
L
3382 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name, FALSE,
3383 delay_st_name_p))
d4730f92
BS
3384 {
3385 arg->failed = TRUE;
3386 return;
3387 }
3388 if (esd->rela.count && esd->rela.hdr == NULL
3e19fb8f
L
3389 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name, TRUE,
3390 delay_st_name_p))
d4730f92
BS
3391 {
3392 arg->failed = TRUE;
3393 return;
3394 }
3395 }
3396 else if (!_bfd_elf_init_reloc_shdr (abfd,
3397 (asect->use_rela_p
3398 ? &esd->rela : &esd->rel),
f6fe1ccd 3399 name,
3e19fb8f
L
3400 asect->use_rela_p,
3401 delay_st_name_p))
d4730f92
BS
3402 arg->failed = TRUE;
3403 }
3404
252b5132 3405 /* Check for processor-specific section types. */
0414f35b 3406 sh_type = this_hdr->sh_type;
e1fddb6b
AO
3407 if (bed->elf_backend_fake_sections
3408 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
d4730f92 3409 arg->failed = TRUE;
252b5132 3410
42bb2e33 3411 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
3412 {
3413 /* Don't change the header type from NOBITS if we are being
42bb2e33 3414 called for objcopy --only-keep-debug. */
0414f35b
AM
3415 this_hdr->sh_type = sh_type;
3416 }
252b5132
RH
3417}
3418
bcacc0f5
AM
3419/* Fill in the contents of a SHT_GROUP section. Called from
3420 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3421 when ELF targets use the generic linker, ld. Called for ld -r
3422 from bfd_elf_final_link. */
dbb410c3 3423
1126897b 3424void
217aa764 3425bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 3426{
a50b1753 3427 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 3428 asection *elt, *first;
dbb410c3 3429 unsigned char *loc;
b34976b6 3430 bfd_boolean gas;
dbb410c3 3431
7e4111ad
L
3432 /* Ignore linker created group section. See elfNN_ia64_object_p in
3433 elfxx-ia64.c. */
3434 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
3435 || *failedptr)
3436 return;
3437
bcacc0f5
AM
3438 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3439 {
3440 unsigned long symindx = 0;
3441
3442 /* elf_group_id will have been set up by objcopy and the
3443 generic linker. */
3444 if (elf_group_id (sec) != NULL)
3445 symindx = elf_group_id (sec)->udata.i;
1126897b 3446
bcacc0f5
AM
3447 if (symindx == 0)
3448 {
3449 /* If called from the assembler, swap_out_syms will have set up
3450 elf_section_syms. */
3451 BFD_ASSERT (elf_section_syms (abfd) != NULL);
3452 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3453 }
3454 elf_section_data (sec)->this_hdr.sh_info = symindx;
3455 }
3456 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 3457 {
bcacc0f5
AM
3458 /* The ELF backend linker sets sh_info to -2 when the group
3459 signature symbol is global, and thus the index can't be
3460 set until all local symbols are output. */
53720c49
AM
3461 asection *igroup;
3462 struct bfd_elf_section_data *sec_data;
3463 unsigned long symndx;
3464 unsigned long extsymoff;
bcacc0f5
AM
3465 struct elf_link_hash_entry *h;
3466
53720c49
AM
3467 /* The point of this little dance to the first SHF_GROUP section
3468 then back to the SHT_GROUP section is that this gets us to
3469 the SHT_GROUP in the input object. */
3470 igroup = elf_sec_group (elf_next_in_group (sec));
3471 sec_data = elf_section_data (igroup);
3472 symndx = sec_data->this_hdr.sh_info;
3473 extsymoff = 0;
bcacc0f5
AM
3474 if (!elf_bad_symtab (igroup->owner))
3475 {
3476 Elf_Internal_Shdr *symtab_hdr;
3477
3478 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3479 extsymoff = symtab_hdr->sh_info;
3480 }
3481 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3482 while (h->root.type == bfd_link_hash_indirect
3483 || h->root.type == bfd_link_hash_warning)
3484 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3485
3486 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 3487 }
dbb410c3 3488
1126897b 3489 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 3490 gas = TRUE;
dbb410c3
AM
3491 if (sec->contents == NULL)
3492 {
b34976b6 3493 gas = FALSE;
a50b1753 3494 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
3495
3496 /* Arrange for the section to be written out. */
3497 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
3498 if (sec->contents == NULL)
3499 {
b34976b6 3500 *failedptr = TRUE;
dbb410c3
AM
3501 return;
3502 }
3503 }
3504
eea6121a 3505 loc = sec->contents + sec->size;
dbb410c3 3506
9dce4196
AM
3507 /* Get the pointer to the first section in the group that gas
3508 squirreled away here. objcopy arranges for this to be set to the
3509 start of the input section group. */
3510 first = elt = elf_next_in_group (sec);
dbb410c3
AM
3511
3512 /* First element is a flag word. Rest of section is elf section
3513 indices for all the sections of the group. Write them backwards
3514 just to keep the group in the same order as given in .section
3515 directives, not that it matters. */
3516 while (elt != NULL)
3517 {
9dce4196 3518 asection *s;
9dce4196 3519
9dce4196 3520 s = elt;
415f38a6
AM
3521 if (!gas)
3522 s = s->output_section;
3523 if (s != NULL
3524 && !bfd_is_abs_section (s))
01e1a5bc 3525 {
415f38a6
AM
3526 unsigned int idx = elf_section_data (s)->this_idx;
3527
01e1a5bc 3528 loc -= 4;
01e1a5bc
NC
3529 H_PUT_32 (abfd, idx, loc);
3530 }
945906ff 3531 elt = elf_next_in_group (elt);
9dce4196
AM
3532 if (elt == first)
3533 break;
dbb410c3
AM
3534 }
3535
3d7f7666 3536 if ((loc -= 4) != sec->contents)
9dce4196 3537 abort ();
dbb410c3 3538
9dce4196 3539 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
3540}
3541
bce964aa
AM
3542/* Given NAME, the name of a relocation section stripped of its
3543 .rel/.rela prefix, return the section in ABFD to which the
3544 relocations apply. */
bd53a53a
L
3545
3546asection *
bce964aa
AM
3547_bfd_elf_plt_get_reloc_section (bfd *abfd, const char *name)
3548{
3549 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3550 section likely apply to .got.plt or .got section. */
3551 if (get_elf_backend_data (abfd)->want_got_plt
3552 && strcmp (name, ".plt") == 0)
3553 {
3554 asection *sec;
3555
3556 name = ".got.plt";
3557 sec = bfd_get_section_by_name (abfd, name);
3558 if (sec != NULL)
3559 return sec;
3560 name = ".got";
3561 }
3562
3563 return bfd_get_section_by_name (abfd, name);
3564}
3565
3566/* Return the section to which RELOC_SEC applies. */
3567
3568static asection *
3569elf_get_reloc_section (asection *reloc_sec)
bd53a53a
L
3570{
3571 const char *name;
3572 unsigned int type;
3573 bfd *abfd;
bce964aa 3574 const struct elf_backend_data *bed;
bd53a53a
L
3575
3576 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3577 if (type != SHT_REL && type != SHT_RELA)
3578 return NULL;
3579
3580 /* We look up the section the relocs apply to by name. */
3581 name = reloc_sec->name;
bce964aa
AM
3582 if (strncmp (name, ".rel", 4) != 0)
3583 return NULL;
3584 name += 4;
3585 if (type == SHT_RELA && *name++ != 'a')
3586 return NULL;
bd53a53a 3587
bd53a53a 3588 abfd = reloc_sec->owner;
bce964aa
AM
3589 bed = get_elf_backend_data (abfd);
3590 return bed->get_reloc_section (abfd, name);
bd53a53a
L
3591}
3592
252b5132
RH
3593/* Assign all ELF section numbers. The dummy first section is handled here
3594 too. The link/info pointers for the standard section types are filled
3595 in here too, while we're at it. */
3596
b34976b6 3597static bfd_boolean
da9f89d4 3598assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
3599{
3600 struct elf_obj_tdata *t = elf_tdata (abfd);
3601 asection *sec;
3e19fb8f 3602 unsigned int section_number;
252b5132 3603 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 3604 struct bfd_elf_section_data *d;
3516e984 3605 bfd_boolean need_symtab;
252b5132
RH
3606
3607 section_number = 1;
3608
2b0f7ef9
JJ
3609 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3610
da9f89d4 3611 /* SHT_GROUP sections are in relocatable files only. */
0e1862bb 3612 if (link_info == NULL || bfd_link_relocatable (link_info))
252b5132 3613 {
ef53be89 3614 size_t reloc_count = 0;
14f2c699 3615
da9f89d4 3616 /* Put SHT_GROUP sections first. */
04dd1667 3617 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 3618 {
5daa8fe7 3619 d = elf_section_data (sec);
da9f89d4
L
3620
3621 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 3622 {
5daa8fe7 3623 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
3624 {
3625 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 3626 bfd_section_list_remove (abfd, sec);
da9f89d4 3627 abfd->section_count--;
da9f89d4 3628 }
08a40648 3629 else
4fbb74a6 3630 d->this_idx = section_number++;
da9f89d4 3631 }
14f2c699
L
3632
3633 /* Count relocations. */
3634 reloc_count += sec->reloc_count;
47cc2cf5 3635 }
14f2c699
L
3636
3637 /* Clear HAS_RELOC if there are no relocations. */
3638 if (reloc_count == 0)
3639 abfd->flags &= ~HAS_RELOC;
47cc2cf5
PB
3640 }
3641
3642 for (sec = abfd->sections; sec; sec = sec->next)
3643 {
3644 d = elf_section_data (sec);
3645
3646 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 3647 d->this_idx = section_number++;
3e19fb8f
L
3648 if (d->this_hdr.sh_name != (unsigned int) -1)
3649 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 3650 if (d->rel.hdr)
2b0f7ef9 3651 {
d4730f92 3652 d->rel.idx = section_number++;
3e19fb8f
L
3653 if (d->rel.hdr->sh_name != (unsigned int) -1)
3654 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 3655 }
d4730f92
BS
3656 else
3657 d->rel.idx = 0;
23bc299b 3658
d4730f92 3659 if (d->rela.hdr)
2b0f7ef9 3660 {
d4730f92 3661 d->rela.idx = section_number++;
3e19fb8f
L
3662 if (d->rela.hdr->sh_name != (unsigned int) -1)
3663 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 3664 }
23bc299b 3665 else
d4730f92 3666 d->rela.idx = 0;
252b5132
RH
3667 }
3668
3516e984
L
3669 need_symtab = (bfd_get_symcount (abfd) > 0
3670 || (link_info == NULL
3671 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3672 == HAS_RELOC)));
3673 if (need_symtab)
252b5132 3674 {
12bd6957 3675 elf_onesymtab (abfd) = section_number++;
2b0f7ef9 3676 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 3677 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 3678 {
6a40cf0c
NC
3679 elf_section_list * entry;
3680
3681 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3682
3683 entry = bfd_zalloc (abfd, sizeof * entry);
3684 entry->ndx = section_number++;
3685 elf_symtab_shndx_list (abfd) = entry;
3686 entry->hdr.sh_name
9ad5cbcf 3687 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3688 ".symtab_shndx", FALSE);
6a40cf0c 3689 if (entry->hdr.sh_name == (unsigned int) -1)
b34976b6 3690 return FALSE;
9ad5cbcf 3691 }
12bd6957 3692 elf_strtab_sec (abfd) = section_number++;
2b0f7ef9 3693 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3694 }
3695
dd905818
NC
3696 elf_shstrtab_sec (abfd) = section_number++;
3697 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3698 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3699
1c52a645
L
3700 if (section_number >= SHN_LORESERVE)
3701 {
695344c0 3702 /* xgettext:c-format */
1c52a645
L
3703 _bfd_error_handler (_("%B: too many sections: %u"),
3704 abfd, section_number);
3705 return FALSE;
3706 }
3707
9ad5cbcf 3708 elf_numsections (abfd) = section_number;
252b5132
RH
3709 elf_elfheader (abfd)->e_shnum = section_number;
3710
3711 /* Set up the list of section header pointers, in agreement with the
3712 indices. */
a50b1753
NC
3713 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
3714 sizeof (Elf_Internal_Shdr *));
252b5132 3715 if (i_shdrp == NULL)
b34976b6 3716 return FALSE;
252b5132 3717
a50b1753
NC
3718 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3719 sizeof (Elf_Internal_Shdr));
252b5132
RH
3720 if (i_shdrp[0] == NULL)
3721 {
3722 bfd_release (abfd, i_shdrp);
b34976b6 3723 return FALSE;
252b5132 3724 }
252b5132
RH
3725
3726 elf_elfsections (abfd) = i_shdrp;
3727
12bd6957 3728 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3516e984 3729 if (need_symtab)
252b5132 3730 {
12bd6957 3731 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
4fbb74a6 3732 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf 3733 {
6a40cf0c
NC
3734 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3735 BFD_ASSERT (entry != NULL);
3736 i_shdrp[entry->ndx] = & entry->hdr;
3737 entry->hdr.sh_link = elf_onesymtab (abfd);
9ad5cbcf 3738 }
12bd6957
AM
3739 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3740 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
252b5132 3741 }
38ce5b11 3742
252b5132
RH
3743 for (sec = abfd->sections; sec; sec = sec->next)
3744 {
252b5132 3745 asection *s;
252b5132 3746
91d6fa6a
NC
3747 d = elf_section_data (sec);
3748
252b5132 3749 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3750 if (d->rel.idx != 0)
3751 i_shdrp[d->rel.idx] = d->rel.hdr;
3752 if (d->rela.idx != 0)
3753 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3754
3755 /* Fill in the sh_link and sh_info fields while we're at it. */
3756
3757 /* sh_link of a reloc section is the section index of the symbol
3758 table. sh_info is the section index of the section to which
3759 the relocation entries apply. */
d4730f92 3760 if (d->rel.idx != 0)
252b5132 3761 {
12bd6957 3762 d->rel.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3763 d->rel.hdr->sh_info = d->this_idx;
9ef5d938 3764 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
252b5132 3765 }
d4730f92 3766 if (d->rela.idx != 0)
23bc299b 3767 {
12bd6957 3768 d->rela.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3769 d->rela.hdr->sh_info = d->this_idx;
9ef5d938 3770 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
23bc299b 3771 }
252b5132 3772
38ce5b11
L
3773 /* We need to set up sh_link for SHF_LINK_ORDER. */
3774 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3775 {
3776 s = elf_linked_to_section (sec);
3777 if (s)
38ce5b11 3778 {
f2876037 3779 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3780 if (link_info != NULL)
38ce5b11 3781 {
f2876037 3782 /* Check discarded linkonce section. */
dbaa2011 3783 if (discarded_section (s))
38ce5b11 3784 {
ccd2ec6a 3785 asection *kept;
4eca0228 3786 _bfd_error_handler
695344c0 3787 /* xgettext:c-format */
63a5468a
AM
3788 (_("%B: sh_link of section `%A' points to"
3789 " discarded section `%A' of `%B'"),
ccd2ec6a
L
3790 abfd, d->this_hdr.bfd_section,
3791 s, s->owner);
3792 /* Point to the kept section if it has the same
3793 size as the discarded one. */
c0f00686 3794 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3795 if (kept == NULL)
185d09ad 3796 {
ccd2ec6a
L
3797 bfd_set_error (bfd_error_bad_value);
3798 return FALSE;
185d09ad 3799 }
ccd2ec6a 3800 s = kept;
38ce5b11 3801 }
e424ecc8 3802
ccd2ec6a
L
3803 s = s->output_section;
3804 BFD_ASSERT (s != NULL);
38ce5b11 3805 }
f2876037
L
3806 else
3807 {
3808 /* Handle objcopy. */
3809 if (s->output_section == NULL)
3810 {
4eca0228 3811 _bfd_error_handler
695344c0 3812 /* xgettext:c-format */
63a5468a
AM
3813 (_("%B: sh_link of section `%A' points to"
3814 " removed section `%A' of `%B'"),
f2876037
L
3815 abfd, d->this_hdr.bfd_section, s, s->owner);
3816 bfd_set_error (bfd_error_bad_value);
3817 return FALSE;
3818 }
3819 s = s->output_section;
3820 }
ccd2ec6a
L
3821 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3822 }
3823 else
3824 {
3825 /* PR 290:
3826 The Intel C compiler generates SHT_IA_64_UNWIND with
3827 SHF_LINK_ORDER. But it doesn't set the sh_link or
3828 sh_info fields. Hence we could get the situation
08a40648 3829 where s is NULL. */
ccd2ec6a
L
3830 const struct elf_backend_data *bed
3831 = get_elf_backend_data (abfd);
3832 if (bed->link_order_error_handler)
3833 bed->link_order_error_handler
695344c0 3834 /* xgettext:c-format */
ccd2ec6a
L
3835 (_("%B: warning: sh_link not set for section `%A'"),
3836 abfd, sec);
38ce5b11
L
3837 }
3838 }
3839
252b5132
RH
3840 switch (d->this_hdr.sh_type)
3841 {
3842 case SHT_REL:
3843 case SHT_RELA:
3844 /* A reloc section which we are treating as a normal BFD
3845 section. sh_link is the section index of the symbol
3846 table. sh_info is the section index of the section to
3847 which the relocation entries apply. We assume that an
3848 allocated reloc section uses the dynamic symbol table.
3849 FIXME: How can we be sure? */
3850 s = bfd_get_section_by_name (abfd, ".dynsym");
3851 if (s != NULL)
3852 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3853
bce964aa 3854 s = elf_get_reloc_section (sec);
252b5132 3855 if (s != NULL)
9ef5d938
L
3856 {
3857 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3858 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3859 }
252b5132
RH
3860 break;
3861
3862 case SHT_STRTAB:
3863 /* We assume that a section named .stab*str is a stabs
3864 string section. We look for a section with the same name
3865 but without the trailing ``str'', and set its sh_link
3866 field to point to this section. */
0112cd26 3867 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3868 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3869 {
3870 size_t len;
3871 char *alc;
3872
3873 len = strlen (sec->name);
a50b1753 3874 alc = (char *) bfd_malloc (len - 2);
252b5132 3875 if (alc == NULL)
b34976b6 3876 return FALSE;
d4c88bbb 3877 memcpy (alc, sec->name, len - 3);
252b5132
RH
3878 alc[len - 3] = '\0';
3879 s = bfd_get_section_by_name (abfd, alc);
3880 free (alc);
3881 if (s != NULL)
3882 {
3883 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3884
3885 /* This is a .stab section. */
0594c12d
AM
3886 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3887 elf_section_data (s)->this_hdr.sh_entsize
3888 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3889 }
3890 }
3891 break;
3892
3893 case SHT_DYNAMIC:
3894 case SHT_DYNSYM:
3895 case SHT_GNU_verneed:
3896 case SHT_GNU_verdef:
3897 /* sh_link is the section header index of the string table
3898 used for the dynamic entries, or the symbol table, or the
3899 version strings. */
3900 s = bfd_get_section_by_name (abfd, ".dynstr");
3901 if (s != NULL)
3902 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3903 break;
3904
7f1204bb
JJ
3905 case SHT_GNU_LIBLIST:
3906 /* sh_link is the section header index of the prelink library
08a40648
AM
3907 list used for the dynamic entries, or the symbol table, or
3908 the version strings. */
7f1204bb
JJ
3909 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3910 ? ".dynstr" : ".gnu.libstr");
3911 if (s != NULL)
3912 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3913 break;
3914
252b5132 3915 case SHT_HASH:
fdc90cb4 3916 case SHT_GNU_HASH:
252b5132
RH
3917 case SHT_GNU_versym:
3918 /* sh_link is the section header index of the symbol table
3919 this hash table or version table is for. */
3920 s = bfd_get_section_by_name (abfd, ".dynsym");
3921 if (s != NULL)
3922 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3923 break;
dbb410c3
AM
3924
3925 case SHT_GROUP:
12bd6957 3926 d->this_hdr.sh_link = elf_onesymtab (abfd);
252b5132
RH
3927 }
3928 }
3929
3e19fb8f
L
3930 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
3931 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
3932 debug section name from .debug_* to .zdebug_* if needed. */
3933
b34976b6 3934 return TRUE;
252b5132
RH
3935}
3936
5372391b 3937static bfd_boolean
217aa764 3938sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3939{
3940 /* If the backend has a special mapping, use it. */
9c5bfbb7 3941 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3942 if (bed->elf_backend_sym_is_global)
3943 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3944
e47bf690 3945 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3946 || bfd_is_und_section (bfd_get_section (sym))
3947 || bfd_is_com_section (bfd_get_section (sym)));
3948}
3949
76359541
TP
3950/* Filter global symbols of ABFD to include in the import library. All
3951 SYMCOUNT symbols of ABFD can be examined from their pointers in
3952 SYMS. Pointers of symbols to keep should be stored contiguously at
3953 the beginning of that array.
3954
3955 Returns the number of symbols to keep. */
3956
3957unsigned int
3958_bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
3959 asymbol **syms, long symcount)
3960{
3961 long src_count, dst_count = 0;
3962
3963 for (src_count = 0; src_count < symcount; src_count++)
3964 {
3965 asymbol *sym = syms[src_count];
3966 char *name = (char *) bfd_asymbol_name (sym);
3967 struct bfd_link_hash_entry *h;
3968
3969 if (!sym_is_global (abfd, sym))
3970 continue;
3971
3972 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, FALSE);
5df1bc57
AM
3973 if (h == NULL)
3974 continue;
76359541
TP
3975 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
3976 continue;
76359541
TP
3977 if (h->linker_def || h->ldscript_def)
3978 continue;
3979
3980 syms[dst_count++] = sym;
3981 }
3982
3983 syms[dst_count] = NULL;
3984
3985 return dst_count;
3986}
3987
5372391b 3988/* Don't output section symbols for sections that are not going to be
c6d8cab4 3989 output, that are duplicates or there is no BFD section. */
5372391b
AM
3990
3991static bfd_boolean
3992ignore_section_sym (bfd *abfd, asymbol *sym)
3993{
c6d8cab4
L
3994 elf_symbol_type *type_ptr;
3995
3996 if ((sym->flags & BSF_SECTION_SYM) == 0)
3997 return FALSE;
3998
3999 type_ptr = elf_symbol_from (abfd, sym);
4000 return ((type_ptr != NULL
4001 && type_ptr->internal_elf_sym.st_shndx != 0
4002 && bfd_is_abs_section (sym->section))
4003 || !(sym->section->owner == abfd
0f0a5e58 4004 || (sym->section->output_section->owner == abfd
2633a79c
AM
4005 && sym->section->output_offset == 0)
4006 || bfd_is_abs_section (sym->section)));
5372391b
AM
4007}
4008
2633a79c
AM
4009/* Map symbol from it's internal number to the external number, moving
4010 all local symbols to be at the head of the list. */
4011
b34976b6 4012static bfd_boolean
12bd6957 4013elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
252b5132 4014{
dc810e39 4015 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
4016 asymbol **syms = bfd_get_outsymbols (abfd);
4017 asymbol **sect_syms;
dc810e39
AM
4018 unsigned int num_locals = 0;
4019 unsigned int num_globals = 0;
4020 unsigned int num_locals2 = 0;
4021 unsigned int num_globals2 = 0;
7292b3ac 4022 unsigned int max_index = 0;
dc810e39 4023 unsigned int idx;
252b5132
RH
4024 asection *asect;
4025 asymbol **new_syms;
252b5132
RH
4026
4027#ifdef DEBUG
4028 fprintf (stderr, "elf_map_symbols\n");
4029 fflush (stderr);
4030#endif
4031
252b5132
RH
4032 for (asect = abfd->sections; asect; asect = asect->next)
4033 {
4034 if (max_index < asect->index)
4035 max_index = asect->index;
4036 }
4037
4038 max_index++;
a50b1753 4039 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 4040 if (sect_syms == NULL)
b34976b6 4041 return FALSE;
252b5132 4042 elf_section_syms (abfd) = sect_syms;
4e89ac30 4043 elf_num_section_syms (abfd) = max_index;
252b5132 4044
079e9a2f
AM
4045 /* Init sect_syms entries for any section symbols we have already
4046 decided to output. */
252b5132
RH
4047 for (idx = 0; idx < symcount; idx++)
4048 {
dc810e39 4049 asymbol *sym = syms[idx];
c044fabd 4050
252b5132 4051 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 4052 && sym->value == 0
2633a79c
AM
4053 && !ignore_section_sym (abfd, sym)
4054 && !bfd_is_abs_section (sym->section))
252b5132 4055 {
5372391b 4056 asection *sec = sym->section;
252b5132 4057
5372391b
AM
4058 if (sec->owner != abfd)
4059 sec = sec->output_section;
252b5132 4060
5372391b 4061 sect_syms[sec->index] = syms[idx];
252b5132
RH
4062 }
4063 }
4064
252b5132
RH
4065 /* Classify all of the symbols. */
4066 for (idx = 0; idx < symcount; idx++)
4067 {
2633a79c 4068 if (sym_is_global (abfd, syms[idx]))
252b5132 4069 num_globals++;
2633a79c
AM
4070 else if (!ignore_section_sym (abfd, syms[idx]))
4071 num_locals++;
252b5132 4072 }
079e9a2f 4073
5372391b 4074 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
4075 sections will already have a section symbol in outsymbols, but
4076 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4077 at least in that case. */
252b5132
RH
4078 for (asect = abfd->sections; asect; asect = asect->next)
4079 {
079e9a2f 4080 if (sect_syms[asect->index] == NULL)
252b5132 4081 {
079e9a2f 4082 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
4083 num_locals++;
4084 else
4085 num_globals++;
252b5132
RH
4086 }
4087 }
4088
4089 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
4090 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
4091 sizeof (asymbol *));
dc810e39 4092
252b5132 4093 if (new_syms == NULL)
b34976b6 4094 return FALSE;
252b5132
RH
4095
4096 for (idx = 0; idx < symcount; idx++)
4097 {
4098 asymbol *sym = syms[idx];
dc810e39 4099 unsigned int i;
252b5132 4100
2633a79c
AM
4101 if (sym_is_global (abfd, sym))
4102 i = num_locals + num_globals2++;
4103 else if (!ignore_section_sym (abfd, sym))
252b5132
RH
4104 i = num_locals2++;
4105 else
2633a79c 4106 continue;
252b5132
RH
4107 new_syms[i] = sym;
4108 sym->udata.i = i + 1;
4109 }
4110 for (asect = abfd->sections; asect; asect = asect->next)
4111 {
079e9a2f 4112 if (sect_syms[asect->index] == NULL)
252b5132 4113 {
079e9a2f 4114 asymbol *sym = asect->symbol;
dc810e39 4115 unsigned int i;
252b5132 4116
079e9a2f 4117 sect_syms[asect->index] = sym;
252b5132
RH
4118 if (!sym_is_global (abfd, sym))
4119 i = num_locals2++;
4120 else
4121 i = num_locals + num_globals2++;
4122 new_syms[i] = sym;
4123 sym->udata.i = i + 1;
4124 }
4125 }
4126
4127 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4128
12bd6957 4129 *pnum_locals = num_locals;
b34976b6 4130 return TRUE;
252b5132
RH
4131}
4132
4133/* Align to the maximum file alignment that could be required for any
4134 ELF data structure. */
4135
268b6b39 4136static inline file_ptr
217aa764 4137align_file_position (file_ptr off, int align)
252b5132
RH
4138{
4139 return (off + align - 1) & ~(align - 1);
4140}
4141
4142/* Assign a file position to a section, optionally aligning to the
4143 required section alignment. */
4144
217aa764
AM
4145file_ptr
4146_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4147 file_ptr offset,
4148 bfd_boolean align)
252b5132 4149{
72de5009
AM
4150 if (align && i_shdrp->sh_addralign > 1)
4151 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
4152 i_shdrp->sh_offset = offset;
4153 if (i_shdrp->bfd_section != NULL)
4154 i_shdrp->bfd_section->filepos = offset;
4155 if (i_shdrp->sh_type != SHT_NOBITS)
4156 offset += i_shdrp->sh_size;
4157 return offset;
4158}
4159
4160/* Compute the file positions we are going to put the sections at, and
4161 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4162 is not NULL, this is being called by the ELF backend linker. */
4163
b34976b6 4164bfd_boolean
217aa764
AM
4165_bfd_elf_compute_section_file_positions (bfd *abfd,
4166 struct bfd_link_info *link_info)
252b5132 4167{
9c5bfbb7 4168 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 4169 struct fake_section_arg fsargs;
b34976b6 4170 bfd_boolean failed;
ef10c3ac 4171 struct elf_strtab_hash *strtab = NULL;
252b5132 4172 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 4173 bfd_boolean need_symtab;
252b5132
RH
4174
4175 if (abfd->output_has_begun)
b34976b6 4176 return TRUE;
252b5132
RH
4177
4178 /* Do any elf backend specific processing first. */
4179 if (bed->elf_backend_begin_write_processing)
4180 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4181
4182 if (! prep_headers (abfd))
b34976b6 4183 return FALSE;
252b5132 4184
e6c51ed4 4185 /* Post process the headers if necessary. */
78245035 4186 (*bed->elf_backend_post_process_headers) (abfd, link_info);
e6c51ed4 4187
d4730f92
BS
4188 fsargs.failed = FALSE;
4189 fsargs.link_info = link_info;
4190 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4191 if (fsargs.failed)
b34976b6 4192 return FALSE;
252b5132 4193
da9f89d4 4194 if (!assign_section_numbers (abfd, link_info))
b34976b6 4195 return FALSE;
252b5132
RH
4196
4197 /* The backend linker builds symbol table information itself. */
3516e984
L
4198 need_symtab = (link_info == NULL
4199 && (bfd_get_symcount (abfd) > 0
4200 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4201 == HAS_RELOC)));
4202 if (need_symtab)
252b5132
RH
4203 {
4204 /* Non-zero if doing a relocatable link. */
4205 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4206
4207 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 4208 return FALSE;
252b5132
RH
4209 }
4210
d4730f92 4211 failed = FALSE;
1126897b 4212 if (link_info == NULL)
dbb410c3 4213 {
1126897b 4214 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 4215 if (failed)
b34976b6 4216 return FALSE;
dbb410c3
AM
4217 }
4218
252b5132
RH
4219 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
4220 /* sh_name was set in prep_headers. */
4221 shstrtab_hdr->sh_type = SHT_STRTAB;
84865015 4222 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
252b5132 4223 shstrtab_hdr->sh_addr = 0;
946748d5 4224 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4225 shstrtab_hdr->sh_entsize = 0;
4226 shstrtab_hdr->sh_link = 0;
4227 shstrtab_hdr->sh_info = 0;
3e19fb8f 4228 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4229 shstrtab_hdr->sh_addralign = 1;
4230
c84fca4d 4231 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 4232 return FALSE;
252b5132 4233
3516e984 4234 if (need_symtab)
252b5132
RH
4235 {
4236 file_ptr off;
4237 Elf_Internal_Shdr *hdr;
4238
12bd6957 4239 off = elf_next_file_pos (abfd);
252b5132 4240
6a40cf0c 4241 hdr = & elf_symtab_hdr (abfd);
b34976b6 4242 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4243
6a40cf0c
NC
4244 if (elf_symtab_shndx_list (abfd) != NULL)
4245 {
4246 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4247 if (hdr->sh_size != 0)
4248 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4249 /* FIXME: What about other symtab_shndx sections in the list ? */
4250 }
9ad5cbcf 4251
252b5132 4252 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 4253 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4254
12bd6957 4255 elf_next_file_pos (abfd) = off;
252b5132
RH
4256
4257 /* Now that we know where the .strtab section goes, write it
08a40648 4258 out. */
252b5132 4259 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
ef10c3ac 4260 || ! _bfd_elf_strtab_emit (abfd, strtab))
b34976b6 4261 return FALSE;
ef10c3ac 4262 _bfd_elf_strtab_free (strtab);
252b5132
RH
4263 }
4264
b34976b6 4265 abfd->output_has_begun = TRUE;
252b5132 4266
b34976b6 4267 return TRUE;
252b5132
RH
4268}
4269
8ded5a0f
AM
4270/* Make an initial estimate of the size of the program header. If we
4271 get the number wrong here, we'll redo section placement. */
4272
4273static bfd_size_type
4274get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4275{
4276 size_t segs;
4277 asection *s;
2b05f1b7 4278 const struct elf_backend_data *bed;
8ded5a0f
AM
4279
4280 /* Assume we will need exactly two PT_LOAD segments: one for text
4281 and one for data. */
4282 segs = 2;
4283
4284 s = bfd_get_section_by_name (abfd, ".interp");
4285 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4286 {
4287 /* If we have a loadable interpreter section, we need a
4288 PT_INTERP segment. In this case, assume we also need a
4289 PT_PHDR segment, although that may not be true for all
4290 targets. */
e9a38e0f 4291 segs += 2;
8ded5a0f
AM
4292 }
4293
4294 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4295 {
4296 /* We need a PT_DYNAMIC segment. */
4297 ++segs;
f210dcff 4298 }
08a40648 4299
ceae84aa 4300 if (info != NULL && info->relro)
f210dcff
L
4301 {
4302 /* We need a PT_GNU_RELRO segment. */
4303 ++segs;
8ded5a0f
AM
4304 }
4305
12bd6957 4306 if (elf_eh_frame_hdr (abfd))
8ded5a0f
AM
4307 {
4308 /* We need a PT_GNU_EH_FRAME segment. */
4309 ++segs;
4310 }
4311
12bd6957 4312 if (elf_stack_flags (abfd))
8ded5a0f 4313 {
2b05f1b7
L
4314 /* We need a PT_GNU_STACK segment. */
4315 ++segs;
4316 }
94b11780 4317
2b05f1b7
L
4318 for (s = abfd->sections; s != NULL; s = s->next)
4319 {
8ded5a0f 4320 if ((s->flags & SEC_LOAD) != 0
0112cd26 4321 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
4322 {
4323 /* We need a PT_NOTE segment. */
4324 ++segs;
1c5265b5
JJ
4325 /* Try to create just one PT_NOTE segment
4326 for all adjacent loadable .note* sections.
4327 gABI requires that within a PT_NOTE segment
4328 (and also inside of each SHT_NOTE section)
4329 each note is padded to a multiple of 4 size,
4330 so we check whether the sections are correctly
4331 aligned. */
4332 if (s->alignment_power == 2)
4333 while (s->next != NULL
4334 && s->next->alignment_power == 2
4335 && (s->next->flags & SEC_LOAD) != 0
4336 && CONST_STRNEQ (s->next->name, ".note"))
4337 s = s->next;
8ded5a0f
AM
4338 }
4339 }
4340
4341 for (s = abfd->sections; s != NULL; s = s->next)
4342 {
4343 if (s->flags & SEC_THREAD_LOCAL)
4344 {
4345 /* We need a PT_TLS segment. */
4346 ++segs;
4347 break;
4348 }
4349 }
4350
2b05f1b7 4351 bed = get_elf_backend_data (abfd);
a91e1603
L
4352
4353 if ((abfd->flags & D_PAGED) != 0)
4354 {
4355 /* Add a PT_GNU_MBIND segment for each mbind section. */
4356 unsigned int page_align_power = bfd_log2 (bed->commonpagesize);
4357 for (s = abfd->sections; s != NULL; s = s->next)
4358 if (elf_section_flags (s) & SHF_GNU_MBIND)
4359 {
4360 if (elf_section_data (s)->this_hdr.sh_info
4361 > PT_GNU_MBIND_NUM)
4362 {
4363 _bfd_error_handler
4364 /* xgettext:c-format */
4365 (_("%B: GNU_MBIN section `%A' has invalid sh_info field: %d"),
4366 abfd, s, elf_section_data (s)->this_hdr.sh_info);
4367 continue;
4368 }
4369 /* Align mbind section to page size. */
4370 if (s->alignment_power < page_align_power)
4371 s->alignment_power = page_align_power;
4372 segs ++;
4373 }
4374 }
4375
4376 /* Let the backend count up any program headers it might need. */
4377 if (bed->elf_backend_additional_program_headers)
8ded5a0f
AM
4378 {
4379 int a;
4380
4381 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4382 if (a == -1)
4383 abort ();
4384 segs += a;
4385 }
4386
4387 return segs * bed->s->sizeof_phdr;
4388}
4389
2ea37f1c
NC
4390/* Find the segment that contains the output_section of section. */
4391
4392Elf_Internal_Phdr *
4393_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4394{
4395 struct elf_segment_map *m;
4396 Elf_Internal_Phdr *p;
4397
12bd6957 4398 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
2ea37f1c
NC
4399 m != NULL;
4400 m = m->next, p++)
4401 {
4402 int i;
4403
4404 for (i = m->count - 1; i >= 0; i--)
4405 if (m->sections[i] == section)
4406 return p;
4407 }
4408
4409 return NULL;
4410}
4411
252b5132
RH
4412/* Create a mapping from a set of sections to a program segment. */
4413
217aa764
AM
4414static struct elf_segment_map *
4415make_mapping (bfd *abfd,
4416 asection **sections,
4417 unsigned int from,
4418 unsigned int to,
4419 bfd_boolean phdr)
252b5132
RH
4420{
4421 struct elf_segment_map *m;
4422 unsigned int i;
4423 asection **hdrpp;
dc810e39 4424 bfd_size_type amt;
252b5132 4425
dc810e39
AM
4426 amt = sizeof (struct elf_segment_map);
4427 amt += (to - from - 1) * sizeof (asection *);
a50b1753 4428 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4429 if (m == NULL)
4430 return NULL;
4431 m->next = NULL;
4432 m->p_type = PT_LOAD;
4433 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4434 m->sections[i - from] = *hdrpp;
4435 m->count = to - from;
4436
4437 if (from == 0 && phdr)
4438 {
4439 /* Include the headers in the first PT_LOAD segment. */
4440 m->includes_filehdr = 1;
4441 m->includes_phdrs = 1;
4442 }
4443
4444 return m;
4445}
4446
229fcec5
MM
4447/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4448 on failure. */
4449
4450struct elf_segment_map *
4451_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4452{
4453 struct elf_segment_map *m;
4454
a50b1753
NC
4455 m = (struct elf_segment_map *) bfd_zalloc (abfd,
4456 sizeof (struct elf_segment_map));
229fcec5
MM
4457 if (m == NULL)
4458 return NULL;
4459 m->next = NULL;
4460 m->p_type = PT_DYNAMIC;
4461 m->count = 1;
4462 m->sections[0] = dynsec;
08a40648 4463
229fcec5
MM
4464 return m;
4465}
4466
8ded5a0f 4467/* Possibly add or remove segments from the segment map. */
252b5132 4468
b34976b6 4469static bfd_boolean
3dea8fca
AM
4470elf_modify_segment_map (bfd *abfd,
4471 struct bfd_link_info *info,
4472 bfd_boolean remove_empty_load)
252b5132 4473{
252e386e 4474 struct elf_segment_map **m;
8ded5a0f 4475 const struct elf_backend_data *bed;
252b5132 4476
8ded5a0f
AM
4477 /* The placement algorithm assumes that non allocated sections are
4478 not in PT_LOAD segments. We ensure this here by removing such
4479 sections from the segment map. We also remove excluded
252e386e
AM
4480 sections. Finally, any PT_LOAD segment without sections is
4481 removed. */
12bd6957 4482 m = &elf_seg_map (abfd);
252e386e 4483 while (*m)
8ded5a0f
AM
4484 {
4485 unsigned int i, new_count;
252b5132 4486
252e386e 4487 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 4488 {
252e386e
AM
4489 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4490 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4491 || (*m)->p_type != PT_LOAD))
8ded5a0f 4492 {
252e386e
AM
4493 (*m)->sections[new_count] = (*m)->sections[i];
4494 new_count++;
8ded5a0f
AM
4495 }
4496 }
252e386e 4497 (*m)->count = new_count;
252b5132 4498
1a9ccd70
NC
4499 if (remove_empty_load
4500 && (*m)->p_type == PT_LOAD
4501 && (*m)->count == 0
4502 && !(*m)->includes_phdrs)
252e386e
AM
4503 *m = (*m)->next;
4504 else
4505 m = &(*m)->next;
8ded5a0f 4506 }
252b5132 4507
8ded5a0f
AM
4508 bed = get_elf_backend_data (abfd);
4509 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 4510 {
252e386e 4511 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 4512 return FALSE;
252b5132 4513 }
252b5132 4514
8ded5a0f
AM
4515 return TRUE;
4516}
252b5132 4517
8ded5a0f 4518/* Set up a mapping from BFD sections to program segments. */
252b5132 4519
8ded5a0f
AM
4520bfd_boolean
4521_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4522{
4523 unsigned int count;
4524 struct elf_segment_map *m;
4525 asection **sections = NULL;
4526 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 4527 bfd_boolean no_user_phdrs;
252b5132 4528
12bd6957 4529 no_user_phdrs = elf_seg_map (abfd) == NULL;
d324f6d6
RM
4530
4531 if (info != NULL)
4532 info->user_phdrs = !no_user_phdrs;
4533
3dea8fca 4534 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 4535 {
8ded5a0f
AM
4536 asection *s;
4537 unsigned int i;
4538 struct elf_segment_map *mfirst;
4539 struct elf_segment_map **pm;
4540 asection *last_hdr;
4541 bfd_vma last_size;
4542 unsigned int phdr_index;
4543 bfd_vma maxpagesize;
4544 asection **hdrpp;
4545 bfd_boolean phdr_in_segment = TRUE;
4546 bfd_boolean writable;
4547 int tls_count = 0;
4548 asection *first_tls = NULL;
a91e1603 4549 asection *first_mbind = NULL;
8ded5a0f
AM
4550 asection *dynsec, *eh_frame_hdr;
4551 bfd_size_type amt;
8d06853e 4552 bfd_vma addr_mask, wrap_to = 0;
1a9ccd70 4553 bfd_boolean linker_created_pt_phdr_segment = FALSE;
252b5132 4554
8ded5a0f 4555 /* Select the allocated sections, and sort them. */
252b5132 4556
a50b1753
NC
4557 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
4558 sizeof (asection *));
8ded5a0f 4559 if (sections == NULL)
252b5132 4560 goto error_return;
252b5132 4561
8d06853e
AM
4562 /* Calculate top address, avoiding undefined behaviour of shift
4563 left operator when shift count is equal to size of type
4564 being shifted. */
4565 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4566 addr_mask = (addr_mask << 1) + 1;
4567
8ded5a0f
AM
4568 i = 0;
4569 for (s = abfd->sections; s != NULL; s = s->next)
4570 {
4571 if ((s->flags & SEC_ALLOC) != 0)
4572 {
4573 sections[i] = s;
4574 ++i;
8d06853e
AM
4575 /* A wrapping section potentially clashes with header. */
4576 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
4577 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
4578 }
4579 }
4580 BFD_ASSERT (i <= bfd_count_sections (abfd));
4581 count = i;
252b5132 4582
8ded5a0f 4583 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 4584
8ded5a0f 4585 /* Build the mapping. */
252b5132 4586
8ded5a0f
AM
4587 mfirst = NULL;
4588 pm = &mfirst;
252b5132 4589
8ded5a0f
AM
4590 /* If we have a .interp section, then create a PT_PHDR segment for
4591 the program headers and a PT_INTERP segment for the .interp
4592 section. */
4593 s = bfd_get_section_by_name (abfd, ".interp");
4594 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4595 {
4596 amt = sizeof (struct elf_segment_map);
a50b1753 4597 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4598 if (m == NULL)
4599 goto error_return;
4600 m->next = NULL;
4601 m->p_type = PT_PHDR;
4602 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
4603 m->p_flags = PF_R | PF_X;
4604 m->p_flags_valid = 1;
4605 m->includes_phdrs = 1;
1a9ccd70 4606 linker_created_pt_phdr_segment = TRUE;
8ded5a0f
AM
4607 *pm = m;
4608 pm = &m->next;
252b5132 4609
8ded5a0f 4610 amt = sizeof (struct elf_segment_map);
a50b1753 4611 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4612 if (m == NULL)
4613 goto error_return;
4614 m->next = NULL;
4615 m->p_type = PT_INTERP;
4616 m->count = 1;
4617 m->sections[0] = s;
4618
4619 *pm = m;
4620 pm = &m->next;
252b5132 4621 }
8ded5a0f
AM
4622
4623 /* Look through the sections. We put sections in the same program
4624 segment when the start of the second section can be placed within
4625 a few bytes of the end of the first section. */
4626 last_hdr = NULL;
4627 last_size = 0;
4628 phdr_index = 0;
4629 maxpagesize = bed->maxpagesize;
063bb025
NC
4630 /* PR 17512: file: c8455299.
4631 Avoid divide-by-zero errors later on.
4632 FIXME: Should we abort if the maxpagesize is zero ? */
4633 if (maxpagesize == 0)
4634 maxpagesize = 1;
8ded5a0f
AM
4635 writable = FALSE;
4636 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4637 if (dynsec != NULL
4638 && (dynsec->flags & SEC_LOAD) == 0)
4639 dynsec = NULL;
4640
4641 /* Deal with -Ttext or something similar such that the first section
4642 is not adjacent to the program headers. This is an
4643 approximation, since at this point we don't know exactly how many
4644 program headers we will need. */
4645 if (count > 0)
252b5132 4646 {
12bd6957 4647 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 4648
62d7a5f6 4649 if (phdr_size == (bfd_size_type) -1)
8ded5a0f 4650 phdr_size = get_program_header_size (abfd, info);
d2bcb0d1 4651 phdr_size += bed->s->sizeof_ehdr;
8ded5a0f 4652 if ((abfd->flags & D_PAGED) == 0
8d06853e
AM
4653 || (sections[0]->lma & addr_mask) < phdr_size
4654 || ((sections[0]->lma & addr_mask) % maxpagesize
4655 < phdr_size % maxpagesize)
4656 || (sections[0]->lma & addr_mask & -maxpagesize) < wrap_to)
1a9ccd70
NC
4657 {
4658 /* PR 20815: The ELF standard says that a PT_PHDR segment, if
4659 present, must be included as part of the memory image of the
4660 program. Ie it must be part of a PT_LOAD segment as well.
4661 If we have had to create our own PT_PHDR segment, but it is
4662 not going to be covered by the first PT_LOAD segment, then
4663 force the inclusion if we can... */
4664 if ((abfd->flags & D_PAGED) != 0
4665 && linker_created_pt_phdr_segment)
4666 phdr_in_segment = TRUE;
4667 else
4668 phdr_in_segment = FALSE;
4669 }
252b5132
RH
4670 }
4671
8ded5a0f 4672 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 4673 {
8ded5a0f
AM
4674 asection *hdr;
4675 bfd_boolean new_segment;
4676
4677 hdr = *hdrpp;
4678
4679 /* See if this section and the last one will fit in the same
4680 segment. */
4681
4682 if (last_hdr == NULL)
4683 {
4684 /* If we don't have a segment yet, then we don't need a new
4685 one (we build the last one after this loop). */
4686 new_segment = FALSE;
4687 }
4688 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4689 {
4690 /* If this section has a different relation between the
4691 virtual address and the load address, then we need a new
4692 segment. */
4693 new_segment = TRUE;
4694 }
b5599592
AM
4695 else if (hdr->lma < last_hdr->lma + last_size
4696 || last_hdr->lma + last_size < last_hdr->lma)
4697 {
4698 /* If this section has a load address that makes it overlap
4699 the previous section, then we need a new segment. */
4700 new_segment = TRUE;
4701 }
39948a60
NC
4702 /* In the next test we have to be careful when last_hdr->lma is close
4703 to the end of the address space. If the aligned address wraps
4704 around to the start of the address space, then there are no more
4705 pages left in memory and it is OK to assume that the current
4706 section can be included in the current segment. */
4707 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4708 > last_hdr->lma)
4709 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 4710 <= hdr->lma))
8ded5a0f
AM
4711 {
4712 /* If putting this section in this segment would force us to
4713 skip a page in the segment, then we need a new segment. */
4714 new_segment = TRUE;
4715 }
4716 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
e5654c0f
AM
4717 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0
4718 && ((abfd->flags & D_PAGED) == 0
4719 || (((last_hdr->lma + last_size - 1) & -maxpagesize)
4720 != (hdr->lma & -maxpagesize))))
8ded5a0f 4721 {
e5654c0f
AM
4722 /* We don't want to put a loaded section after a
4723 nonloaded (ie. bss style) section in the same segment
4724 as that will force the non-loaded section to be loaded.
4725 Consider .tbss sections as loaded for this purpose.
4726 However, like the writable/non-writable case below,
4727 if they are on the same page then they must be put
4728 in the same segment. */
8ded5a0f
AM
4729 new_segment = TRUE;
4730 }
4731 else if ((abfd->flags & D_PAGED) == 0)
4732 {
4733 /* If the file is not demand paged, which means that we
4734 don't require the sections to be correctly aligned in the
4735 file, then there is no other reason for a new segment. */
4736 new_segment = FALSE;
4737 }
4738 else if (! writable
4739 && (hdr->flags & SEC_READONLY) == 0
8d06853e
AM
4740 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4741 != (hdr->lma & -maxpagesize)))
8ded5a0f
AM
4742 {
4743 /* We don't want to put a writable section in a read only
4744 segment, unless they are on the same page in memory
4745 anyhow. We already know that the last section does not
4746 bring us past the current section on the page, so the
4747 only case in which the new section is not on the same
4748 page as the previous section is when the previous section
4749 ends precisely on a page boundary. */
4750 new_segment = TRUE;
4751 }
4752 else
4753 {
4754 /* Otherwise, we can use the same segment. */
4755 new_segment = FALSE;
4756 }
4757
2889e75b 4758 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
4759 if (last_hdr != NULL
4760 && info != NULL
4761 && info->callbacks->override_segment_assignment != NULL)
4762 new_segment
4763 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4764 last_hdr,
4765 new_segment);
2889e75b 4766
8ded5a0f
AM
4767 if (! new_segment)
4768 {
4769 if ((hdr->flags & SEC_READONLY) == 0)
4770 writable = TRUE;
4771 last_hdr = hdr;
4772 /* .tbss sections effectively have zero size. */
4773 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4774 != SEC_THREAD_LOCAL)
4775 last_size = hdr->size;
4776 else
4777 last_size = 0;
4778 continue;
4779 }
4780
4781 /* We need a new program segment. We must create a new program
4782 header holding all the sections from phdr_index until hdr. */
4783
4784 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4785 if (m == NULL)
4786 goto error_return;
4787
4788 *pm = m;
4789 pm = &m->next;
4790
252b5132 4791 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 4792 writable = TRUE;
8ded5a0f
AM
4793 else
4794 writable = FALSE;
4795
baaff79e
JJ
4796 last_hdr = hdr;
4797 /* .tbss sections effectively have zero size. */
e5caec89 4798 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 4799 last_size = hdr->size;
baaff79e
JJ
4800 else
4801 last_size = 0;
8ded5a0f
AM
4802 phdr_index = i;
4803 phdr_in_segment = FALSE;
252b5132
RH
4804 }
4805
86b2281f
AM
4806 /* Create a final PT_LOAD program segment, but not if it's just
4807 for .tbss. */
4808 if (last_hdr != NULL
4809 && (i - phdr_index != 1
4810 || ((last_hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4811 != SEC_THREAD_LOCAL)))
8ded5a0f
AM
4812 {
4813 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4814 if (m == NULL)
4815 goto error_return;
252b5132 4816
8ded5a0f
AM
4817 *pm = m;
4818 pm = &m->next;
4819 }
252b5132 4820
8ded5a0f
AM
4821 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4822 if (dynsec != NULL)
4823 {
4824 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4825 if (m == NULL)
4826 goto error_return;
4827 *pm = m;
4828 pm = &m->next;
4829 }
252b5132 4830
1c5265b5
JJ
4831 /* For each batch of consecutive loadable .note sections,
4832 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4833 because if we link together nonloadable .note sections and
4834 loadable .note sections, we will generate two .note sections
4835 in the output file. FIXME: Using names for section types is
4836 bogus anyhow. */
8ded5a0f
AM
4837 for (s = abfd->sections; s != NULL; s = s->next)
4838 {
4839 if ((s->flags & SEC_LOAD) != 0
0112cd26 4840 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 4841 {
1c5265b5 4842 asection *s2;
91d6fa6a
NC
4843
4844 count = 1;
8ded5a0f 4845 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
4846 if (s->alignment_power == 2)
4847 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
4848 {
4849 if (s2->next->alignment_power == 2
4850 && (s2->next->flags & SEC_LOAD) != 0
4851 && CONST_STRNEQ (s2->next->name, ".note")
8d06853e
AM
4852 && align_power (s2->lma + s2->size, 2)
4853 == s2->next->lma)
55b581a6
JJ
4854 count++;
4855 else
4856 break;
4857 }
1c5265b5 4858 amt += (count - 1) * sizeof (asection *);
a50b1753 4859 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4860 if (m == NULL)
4861 goto error_return;
4862 m->next = NULL;
4863 m->p_type = PT_NOTE;
1c5265b5
JJ
4864 m->count = count;
4865 while (count > 1)
4866 {
4867 m->sections[m->count - count--] = s;
4868 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
4869 s = s->next;
4870 }
4871 m->sections[m->count - 1] = s;
4872 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
4873 *pm = m;
4874 pm = &m->next;
4875 }
4876 if (s->flags & SEC_THREAD_LOCAL)
4877 {
4878 if (! tls_count)
4879 first_tls = s;
4880 tls_count++;
4881 }
a91e1603
L
4882 if (first_mbind == NULL
4883 && (elf_section_flags (s) & SHF_GNU_MBIND) != 0)
4884 first_mbind = s;
8ded5a0f 4885 }
252b5132 4886
8ded5a0f
AM
4887 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
4888 if (tls_count > 0)
4889 {
8ded5a0f
AM
4890 amt = sizeof (struct elf_segment_map);
4891 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 4892 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4893 if (m == NULL)
4894 goto error_return;
4895 m->next = NULL;
4896 m->p_type = PT_TLS;
4897 m->count = tls_count;
4898 /* Mandated PF_R. */
4899 m->p_flags = PF_R;
4900 m->p_flags_valid = 1;
d923cae0 4901 s = first_tls;
91d6fa6a 4902 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f 4903 {
d923cae0
L
4904 if ((s->flags & SEC_THREAD_LOCAL) == 0)
4905 {
4906 _bfd_error_handler
4907 (_("%B: TLS sections are not adjacent:"), abfd);
4908 s = first_tls;
4909 i = 0;
4910 while (i < (unsigned int) tls_count)
4911 {
4912 if ((s->flags & SEC_THREAD_LOCAL) != 0)
4913 {
4914 _bfd_error_handler (_(" TLS: %A"), s);
4915 i++;
4916 }
4917 else
4918 _bfd_error_handler (_(" non-TLS: %A"), s);
4919 s = s->next;
4920 }
4921 bfd_set_error (bfd_error_bad_value);
4922 goto error_return;
4923 }
4924 m->sections[i] = s;
4925 s = s->next;
8ded5a0f 4926 }
252b5132 4927
8ded5a0f
AM
4928 *pm = m;
4929 pm = &m->next;
4930 }
252b5132 4931
a91e1603
L
4932 if (first_mbind && (abfd->flags & D_PAGED) != 0)
4933 for (s = first_mbind; s != NULL; s = s->next)
4934 if ((elf_section_flags (s) & SHF_GNU_MBIND) != 0
4935 && (elf_section_data (s)->this_hdr.sh_info
4936 <= PT_GNU_MBIND_NUM))
4937 {
4938 /* Mandated PF_R. */
4939 unsigned long p_flags = PF_R;
4940 if ((s->flags & SEC_READONLY) == 0)
4941 p_flags |= PF_W;
4942 if ((s->flags & SEC_CODE) != 0)
4943 p_flags |= PF_X;
4944
4945 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
4946 m = bfd_zalloc (abfd, amt);
4947 if (m == NULL)
4948 goto error_return;
4949 m->next = NULL;
4950 m->p_type = (PT_GNU_MBIND_LO
4951 + elf_section_data (s)->this_hdr.sh_info);
4952 m->count = 1;
4953 m->p_flags_valid = 1;
4954 m->sections[0] = s;
4955 m->p_flags = p_flags;
4956
4957 *pm = m;
4958 pm = &m->next;
4959 }
4960
8ded5a0f
AM
4961 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4962 segment. */
12bd6957 4963 eh_frame_hdr = elf_eh_frame_hdr (abfd);
8ded5a0f
AM
4964 if (eh_frame_hdr != NULL
4965 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 4966 {
dc810e39 4967 amt = sizeof (struct elf_segment_map);
a50b1753 4968 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4969 if (m == NULL)
4970 goto error_return;
4971 m->next = NULL;
8ded5a0f 4972 m->p_type = PT_GNU_EH_FRAME;
252b5132 4973 m->count = 1;
8ded5a0f 4974 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
4975
4976 *pm = m;
4977 pm = &m->next;
4978 }
13ae64f3 4979
12bd6957 4980 if (elf_stack_flags (abfd))
13ae64f3 4981 {
8ded5a0f 4982 amt = sizeof (struct elf_segment_map);
a50b1753 4983 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4984 if (m == NULL)
4985 goto error_return;
4986 m->next = NULL;
2b05f1b7 4987 m->p_type = PT_GNU_STACK;
12bd6957 4988 m->p_flags = elf_stack_flags (abfd);
04c3a755 4989 m->p_align = bed->stack_align;
8ded5a0f 4990 m->p_flags_valid = 1;
04c3a755
NS
4991 m->p_align_valid = m->p_align != 0;
4992 if (info->stacksize > 0)
4993 {
4994 m->p_size = info->stacksize;
4995 m->p_size_valid = 1;
4996 }
252b5132 4997
8ded5a0f
AM
4998 *pm = m;
4999 pm = &m->next;
5000 }
65765700 5001
ceae84aa 5002 if (info != NULL && info->relro)
8ded5a0f 5003 {
f210dcff
L
5004 for (m = mfirst; m != NULL; m = m->next)
5005 {
3832a4d8
AM
5006 if (m->p_type == PT_LOAD
5007 && m->count != 0
5008 && m->sections[0]->vma >= info->relro_start
5009 && m->sections[0]->vma < info->relro_end)
f210dcff 5010 {
3832a4d8
AM
5011 i = m->count;
5012 while (--i != (unsigned) -1)
5013 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
5014 == (SEC_LOAD | SEC_HAS_CONTENTS))
5015 break;
5016
43a8475c 5017 if (i != (unsigned) -1)
f210dcff
L
5018 break;
5019 }
be01b344 5020 }
f210dcff
L
5021
5022 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
5023 if (m != NULL)
5024 {
5025 amt = sizeof (struct elf_segment_map);
a50b1753 5026 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
5027 if (m == NULL)
5028 goto error_return;
5029 m->next = NULL;
5030 m->p_type = PT_GNU_RELRO;
f210dcff
L
5031 *pm = m;
5032 pm = &m->next;
5033 }
8ded5a0f 5034 }
9ee5e499 5035
8ded5a0f 5036 free (sections);
12bd6957 5037 elf_seg_map (abfd) = mfirst;
9ee5e499
JJ
5038 }
5039
3dea8fca 5040 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 5041 return FALSE;
8c37241b 5042
12bd6957 5043 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
8ded5a0f 5044 ++count;
12bd6957 5045 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
252b5132 5046
b34976b6 5047 return TRUE;
252b5132
RH
5048
5049 error_return:
5050 if (sections != NULL)
5051 free (sections);
b34976b6 5052 return FALSE;
252b5132
RH
5053}
5054
5055/* Sort sections by address. */
5056
5057static int
217aa764 5058elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
5059{
5060 const asection *sec1 = *(const asection **) arg1;
5061 const asection *sec2 = *(const asection **) arg2;
eecdbe52 5062 bfd_size_type size1, size2;
252b5132
RH
5063
5064 /* Sort by LMA first, since this is the address used to
5065 place the section into a segment. */
5066 if (sec1->lma < sec2->lma)
5067 return -1;
5068 else if (sec1->lma > sec2->lma)
5069 return 1;
5070
5071 /* Then sort by VMA. Normally the LMA and the VMA will be
5072 the same, and this will do nothing. */
5073 if (sec1->vma < sec2->vma)
5074 return -1;
5075 else if (sec1->vma > sec2->vma)
5076 return 1;
5077
5078 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
5079
07c6e936 5080#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
5081
5082 if (TOEND (sec1))
5083 {
5084 if (TOEND (sec2))
00a7cdc5
NC
5085 {
5086 /* If the indicies are the same, do not return 0
5087 here, but continue to try the next comparison. */
5088 if (sec1->target_index - sec2->target_index != 0)
5089 return sec1->target_index - sec2->target_index;
5090 }
252b5132
RH
5091 else
5092 return 1;
5093 }
00a7cdc5 5094 else if (TOEND (sec2))
252b5132
RH
5095 return -1;
5096
5097#undef TOEND
5098
00a7cdc5
NC
5099 /* Sort by size, to put zero sized sections
5100 before others at the same address. */
252b5132 5101
eea6121a
AM
5102 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
5103 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
5104
5105 if (size1 < size2)
252b5132 5106 return -1;
eecdbe52 5107 if (size1 > size2)
252b5132
RH
5108 return 1;
5109
5110 return sec1->target_index - sec2->target_index;
5111}
5112
340b6d91
AC
5113/* Ian Lance Taylor writes:
5114
5115 We shouldn't be using % with a negative signed number. That's just
5116 not good. We have to make sure either that the number is not
5117 negative, or that the number has an unsigned type. When the types
5118 are all the same size they wind up as unsigned. When file_ptr is a
5119 larger signed type, the arithmetic winds up as signed long long,
5120 which is wrong.
5121
5122 What we're trying to say here is something like ``increase OFF by
5123 the least amount that will cause it to be equal to the VMA modulo
5124 the page size.'' */
5125/* In other words, something like:
5126
5127 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5128 off_offset = off % bed->maxpagesize;
5129 if (vma_offset < off_offset)
5130 adjustment = vma_offset + bed->maxpagesize - off_offset;
5131 else
5132 adjustment = vma_offset - off_offset;
08a40648 5133
340b6d91
AC
5134 which can can be collapsed into the expression below. */
5135
5136static file_ptr
5137vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5138{
dc9155b2
NC
5139 /* PR binutils/16199: Handle an alignment of zero. */
5140 if (maxpagesize == 0)
5141 maxpagesize = 1;
340b6d91
AC
5142 return ((vma - off) % maxpagesize);
5143}
5144
6d33f217
L
5145static void
5146print_segment_map (const struct elf_segment_map *m)
5147{
5148 unsigned int j;
5149 const char *pt = get_segment_type (m->p_type);
5150 char buf[32];
5151
5152 if (pt == NULL)
5153 {
5154 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5155 sprintf (buf, "LOPROC+%7.7x",
5156 (unsigned int) (m->p_type - PT_LOPROC));
5157 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5158 sprintf (buf, "LOOS+%7.7x",
5159 (unsigned int) (m->p_type - PT_LOOS));
5160 else
5161 snprintf (buf, sizeof (buf), "%8.8x",
5162 (unsigned int) m->p_type);
5163 pt = buf;
5164 }
4a97a0e5 5165 fflush (stdout);
6d33f217
L
5166 fprintf (stderr, "%s:", pt);
5167 for (j = 0; j < m->count; j++)
5168 fprintf (stderr, " %s", m->sections [j]->name);
5169 putc ('\n',stderr);
4a97a0e5 5170 fflush (stderr);
6d33f217
L
5171}
5172
32812159
AM
5173static bfd_boolean
5174write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5175{
5176 void *buf;
5177 bfd_boolean ret;
5178
5179 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5180 return FALSE;
5181 buf = bfd_zmalloc (len);
5182 if (buf == NULL)
5183 return FALSE;
5184 ret = bfd_bwrite (buf, len, abfd) == len;
5185 free (buf);
5186 return ret;
5187}
5188
252b5132
RH
5189/* Assign file positions to the sections based on the mapping from
5190 sections to segments. This function also sets up some fields in
f3520d2f 5191 the file header. */
252b5132 5192
b34976b6 5193static bfd_boolean
f3520d2f
AM
5194assign_file_positions_for_load_sections (bfd *abfd,
5195 struct bfd_link_info *link_info)
252b5132
RH
5196{
5197 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5198 struct elf_segment_map *m;
252b5132 5199 Elf_Internal_Phdr *phdrs;
252b5132 5200 Elf_Internal_Phdr *p;
02bf8d82 5201 file_ptr off;
3f570048 5202 bfd_size_type maxpagesize;
a8c75b76 5203 unsigned int pt_load_count = 0;
f3520d2f 5204 unsigned int alloc;
0920dee7 5205 unsigned int i, j;
2b0bc088 5206 bfd_vma header_pad = 0;
252b5132 5207
e36284ab 5208 if (link_info == NULL
ceae84aa 5209 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 5210 return FALSE;
252b5132 5211
8ded5a0f 5212 alloc = 0;
12bd6957 5213 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
2b0bc088
NC
5214 {
5215 ++alloc;
5216 if (m->header_size)
5217 header_pad = m->header_size;
5218 }
252b5132 5219
82f2dbf7
NC
5220 if (alloc)
5221 {
5222 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5223 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5224 }
5225 else
5226 {
5227 /* PR binutils/12467. */
5228 elf_elfheader (abfd)->e_phoff = 0;
5229 elf_elfheader (abfd)->e_phentsize = 0;
5230 }
d324f6d6 5231
8ded5a0f 5232 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 5233
12bd6957
AM
5234 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
5235 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
8ded5a0f 5236 else
12bd6957 5237 BFD_ASSERT (elf_program_header_size (abfd)
59e0647f 5238 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
5239
5240 if (alloc == 0)
f3520d2f 5241 {
12bd6957 5242 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
8ded5a0f 5243 return TRUE;
f3520d2f 5244 }
252b5132 5245
12bd6957 5246 /* We're writing the size in elf_program_header_size (abfd),
57268894
HPN
5247 see assign_file_positions_except_relocs, so make sure we have
5248 that amount allocated, with trailing space cleared.
12bd6957
AM
5249 The variable alloc contains the computed need, while
5250 elf_program_header_size (abfd) contains the size used for the
57268894
HPN
5251 layout.
5252 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5253 where the layout is forced to according to a larger size in the
5254 last iterations for the testcase ld-elf/header. */
12bd6957 5255 BFD_ASSERT (elf_program_header_size (abfd) % bed->s->sizeof_phdr
57268894 5256 == 0);
a50b1753
NC
5257 phdrs = (Elf_Internal_Phdr *)
5258 bfd_zalloc2 (abfd,
12bd6957 5259 (elf_program_header_size (abfd) / bed->s->sizeof_phdr),
a50b1753 5260 sizeof (Elf_Internal_Phdr));
f3520d2f 5261 elf_tdata (abfd)->phdr = phdrs;
252b5132 5262 if (phdrs == NULL)
b34976b6 5263 return FALSE;
252b5132 5264
3f570048
AM
5265 maxpagesize = 1;
5266 if ((abfd->flags & D_PAGED) != 0)
5267 maxpagesize = bed->maxpagesize;
5268
252b5132
RH
5269 off = bed->s->sizeof_ehdr;
5270 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
5271 if (header_pad < (bfd_vma) off)
5272 header_pad = 0;
5273 else
5274 header_pad -= off;
5275 off += header_pad;
252b5132 5276
12bd6957 5277 for (m = elf_seg_map (abfd), p = phdrs, j = 0;
252b5132 5278 m != NULL;
0920dee7 5279 m = m->next, p++, j++)
252b5132 5280 {
252b5132 5281 asection **secpp;
bf988460
AM
5282 bfd_vma off_adjust;
5283 bfd_boolean no_contents;
252b5132
RH
5284
5285 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 5286 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
5287 not be done to the PT_NOTE section of a corefile, which may
5288 contain several pseudo-sections artificially created by bfd.
5289 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
5290 if (m->count > 1
5291 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 5292 && m->p_type == PT_NOTE))
252b5132
RH
5293 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5294 elf_sort_sections);
5295
b301b248
AM
5296 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5297 number of sections with contents contributing to both p_filesz
5298 and p_memsz, followed by a number of sections with no contents
5299 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 5300 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 5301 p->p_type = m->p_type;
28a7f3e7 5302 p->p_flags = m->p_flags;
252b5132 5303
3f570048
AM
5304 if (m->count == 0)
5305 p->p_vaddr = 0;
5306 else
3271a814 5307 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
5308
5309 if (m->p_paddr_valid)
5310 p->p_paddr = m->p_paddr;
5311 else if (m->count == 0)
5312 p->p_paddr = 0;
5313 else
08a40648 5314 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
5315
5316 if (p->p_type == PT_LOAD
5317 && (abfd->flags & D_PAGED) != 0)
5318 {
5319 /* p_align in demand paged PT_LOAD segments effectively stores
5320 the maximum page size. When copying an executable with
5321 objcopy, we set m->p_align from the input file. Use this
5322 value for maxpagesize rather than bed->maxpagesize, which
5323 may be different. Note that we use maxpagesize for PT_TLS
5324 segment alignment later in this function, so we are relying
5325 on at least one PT_LOAD segment appearing before a PT_TLS
5326 segment. */
5327 if (m->p_align_valid)
5328 maxpagesize = m->p_align;
5329
5330 p->p_align = maxpagesize;
a8c75b76 5331 pt_load_count += 1;
3f570048 5332 }
3271a814
NS
5333 else if (m->p_align_valid)
5334 p->p_align = m->p_align;
e970b90a
DJ
5335 else if (m->count == 0)
5336 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
5337 else
5338 p->p_align = 0;
5339
bf988460
AM
5340 no_contents = FALSE;
5341 off_adjust = 0;
252b5132 5342 if (p->p_type == PT_LOAD
b301b248 5343 && m->count > 0)
252b5132 5344 {
b301b248 5345 bfd_size_type align;
a49e53ed 5346 unsigned int align_power = 0;
b301b248 5347
3271a814
NS
5348 if (m->p_align_valid)
5349 align = p->p_align;
5350 else
252b5132 5351 {
3271a814
NS
5352 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5353 {
5354 unsigned int secalign;
08a40648 5355
3271a814
NS
5356 secalign = bfd_get_section_alignment (abfd, *secpp);
5357 if (secalign > align_power)
5358 align_power = secalign;
5359 }
5360 align = (bfd_size_type) 1 << align_power;
5361 if (align < maxpagesize)
5362 align = maxpagesize;
b301b248 5363 }
252b5132 5364
02bf8d82
AM
5365 for (i = 0; i < m->count; i++)
5366 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5367 /* If we aren't making room for this section, then
5368 it must be SHT_NOBITS regardless of what we've
5369 set via struct bfd_elf_special_section. */
5370 elf_section_type (m->sections[i]) = SHT_NOBITS;
5371
bf988460 5372 /* Find out whether this segment contains any loadable
aea274d3
AM
5373 sections. */
5374 no_contents = TRUE;
5375 for (i = 0; i < m->count; i++)
5376 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5377 {
5378 no_contents = FALSE;
5379 break;
5380 }
bf988460 5381
85cfcbfb 5382 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
a8c75b76
AM
5383
5384 /* Broken hardware and/or kernel require that files do not
5385 map the same page with different permissions on some hppa
5386 processors. */
5387 if (pt_load_count > 1
5388 && bed->no_page_alias
5389 && (off & (maxpagesize - 1)) != 0
5390 && (off & -maxpagesize) == ((off + off_adjust) & -maxpagesize))
5391 off_adjust += maxpagesize;
bf988460
AM
5392 off += off_adjust;
5393 if (no_contents)
5394 {
5395 /* We shouldn't need to align the segment on disk since
5396 the segment doesn't need file space, but the gABI
5397 arguably requires the alignment and glibc ld.so
5398 checks it. So to comply with the alignment
5399 requirement but not waste file space, we adjust
5400 p_offset for just this segment. (OFF_ADJUST is
5401 subtracted from OFF later.) This may put p_offset
5402 past the end of file, but that shouldn't matter. */
5403 }
5404 else
5405 off_adjust = 0;
252b5132 5406 }
b1a6d0b1
NC
5407 /* Make sure the .dynamic section is the first section in the
5408 PT_DYNAMIC segment. */
5409 else if (p->p_type == PT_DYNAMIC
5410 && m->count > 1
5411 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5412 {
5413 _bfd_error_handler
63a5468a
AM
5414 (_("%B: The first section in the PT_DYNAMIC segment"
5415 " is not the .dynamic section"),
b301b248 5416 abfd);
b1a6d0b1
NC
5417 bfd_set_error (bfd_error_bad_value);
5418 return FALSE;
5419 }
3f001e84
JK
5420 /* Set the note section type to SHT_NOTE. */
5421 else if (p->p_type == PT_NOTE)
5422 for (i = 0; i < m->count; i++)
5423 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 5424
252b5132
RH
5425 p->p_offset = 0;
5426 p->p_filesz = 0;
5427 p->p_memsz = 0;
5428
5429 if (m->includes_filehdr)
5430 {
bf988460 5431 if (!m->p_flags_valid)
252b5132 5432 p->p_flags |= PF_R;
252b5132
RH
5433 p->p_filesz = bed->s->sizeof_ehdr;
5434 p->p_memsz = bed->s->sizeof_ehdr;
5435 if (m->count > 0)
5436 {
9ab82472
L
5437 if (p->p_vaddr < (bfd_vma) off
5438 || (!m->p_paddr_valid
5439 && p->p_paddr < (bfd_vma) off))
252b5132 5440 {
4eca0228 5441 _bfd_error_handler
63a5468a
AM
5442 (_("%B: Not enough room for program headers,"
5443 " try linking with -N"),
b301b248 5444 abfd);
252b5132 5445 bfd_set_error (bfd_error_bad_value);
b34976b6 5446 return FALSE;
252b5132
RH
5447 }
5448
5449 p->p_vaddr -= off;
bf988460 5450 if (!m->p_paddr_valid)
252b5132
RH
5451 p->p_paddr -= off;
5452 }
252b5132
RH
5453 }
5454
5455 if (m->includes_phdrs)
5456 {
bf988460 5457 if (!m->p_flags_valid)
252b5132
RH
5458 p->p_flags |= PF_R;
5459
f3520d2f 5460 if (!m->includes_filehdr)
252b5132
RH
5461 {
5462 p->p_offset = bed->s->sizeof_ehdr;
5463
5464 if (m->count > 0)
5465 {
252b5132 5466 p->p_vaddr -= off - p->p_offset;
bf988460 5467 if (!m->p_paddr_valid)
252b5132
RH
5468 p->p_paddr -= off - p->p_offset;
5469 }
252b5132
RH
5470 }
5471
5472 p->p_filesz += alloc * bed->s->sizeof_phdr;
5473 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
5474 if (m->count)
5475 {
5476 p->p_filesz += header_pad;
5477 p->p_memsz += header_pad;
5478 }
252b5132
RH
5479 }
5480
5481 if (p->p_type == PT_LOAD
5482 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5483 {
bf988460 5484 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 5485 p->p_offset = off;
252b5132
RH
5486 else
5487 {
5488 file_ptr adjust;
5489
5490 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
5491 if (!no_contents)
5492 p->p_filesz += adjust;
252b5132
RH
5493 p->p_memsz += adjust;
5494 }
5495 }
5496
1ea63fd2
AM
5497 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5498 maps. Set filepos for sections in PT_LOAD segments, and in
5499 core files, for sections in PT_NOTE segments.
5500 assign_file_positions_for_non_load_sections will set filepos
5501 for other sections and update p_filesz for other segments. */
252b5132
RH
5502 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5503 {
5504 asection *sec;
252b5132 5505 bfd_size_type align;
627b32bc 5506 Elf_Internal_Shdr *this_hdr;
252b5132
RH
5507
5508 sec = *secpp;
02bf8d82 5509 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 5510 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 5511
88967714
AM
5512 if ((p->p_type == PT_LOAD
5513 || p->p_type == PT_TLS)
5514 && (this_hdr->sh_type != SHT_NOBITS
5515 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5516 && ((this_hdr->sh_flags & SHF_TLS) == 0
5517 || p->p_type == PT_TLS))))
252b5132 5518 {
b5599592
AM
5519 bfd_vma p_start = p->p_paddr;
5520 bfd_vma p_end = p_start + p->p_memsz;
5521 bfd_vma s_start = sec->lma;
5522 bfd_vma adjust = s_start - p_end;
252b5132 5523
a2d1e028
L
5524 if (adjust != 0
5525 && (s_start < p_end
5526 || p_end < p_start))
252b5132 5527 {
4eca0228 5528 _bfd_error_handler
695344c0 5529 /* xgettext:c-format */
b5599592
AM
5530 (_("%B: section %A lma %#lx adjusted to %#lx"), abfd, sec,
5531 (unsigned long) s_start, (unsigned long) p_end);
88967714 5532 adjust = 0;
b5599592 5533 sec->lma = p_end;
1cfb7d1e 5534 }
3ac9b6c9 5535 p->p_memsz += adjust;
1cfb7d1e 5536
88967714
AM
5537 if (this_hdr->sh_type != SHT_NOBITS)
5538 {
32812159
AM
5539 if (p->p_filesz + adjust < p->p_memsz)
5540 {
5541 /* We have a PROGBITS section following NOBITS ones.
5542 Allocate file space for the NOBITS section(s) and
5543 zero it. */
5544 adjust = p->p_memsz - p->p_filesz;
5545 if (!write_zeros (abfd, off, adjust))
5546 return FALSE;
5547 }
88967714
AM
5548 off += adjust;
5549 p->p_filesz += adjust;
252b5132 5550 }
252b5132
RH
5551 }
5552
5553 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5554 {
b301b248
AM
5555 /* The section at i == 0 is the one that actually contains
5556 everything. */
4a938328
MS
5557 if (i == 0)
5558 {
627b32bc 5559 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
5560 off += this_hdr->sh_size;
5561 p->p_filesz = this_hdr->sh_size;
b301b248
AM
5562 p->p_memsz = 0;
5563 p->p_align = 1;
252b5132 5564 }
4a938328 5565 else
252b5132 5566 {
b301b248 5567 /* The rest are fake sections that shouldn't be written. */
252b5132 5568 sec->filepos = 0;
eea6121a 5569 sec->size = 0;
b301b248
AM
5570 sec->flags = 0;
5571 continue;
252b5132 5572 }
252b5132
RH
5573 }
5574 else
5575 {
1e951488 5576 if (p->p_type == PT_LOAD)
b301b248 5577 {
1e951488
AM
5578 this_hdr->sh_offset = sec->filepos = off;
5579 if (this_hdr->sh_type != SHT_NOBITS)
5580 off += this_hdr->sh_size;
5581 }
5582 else if (this_hdr->sh_type == SHT_NOBITS
5583 && (this_hdr->sh_flags & SHF_TLS) != 0
5584 && this_hdr->sh_offset == 0)
5585 {
5586 /* This is a .tbss section that didn't get a PT_LOAD.
5587 (See _bfd_elf_map_sections_to_segments "Create a
5588 final PT_LOAD".) Set sh_offset to the value it
5589 would have if we had created a zero p_filesz and
5590 p_memsz PT_LOAD header for the section. This
5591 also makes the PT_TLS header have the same
5592 p_offset value. */
5593 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5594 off, align);
5595 this_hdr->sh_offset = sec->filepos = off + adjust;
b301b248 5596 }
252b5132 5597
02bf8d82 5598 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 5599 {
6a3cd2b4 5600 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
5601 /* A load section without SHF_ALLOC is something like
5602 a note section in a PT_NOTE segment. These take
5603 file space but are not loaded into memory. */
5604 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 5605 p->p_memsz += this_hdr->sh_size;
b301b248 5606 }
6a3cd2b4 5607 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 5608 {
6a3cd2b4
AM
5609 if (p->p_type == PT_TLS)
5610 p->p_memsz += this_hdr->sh_size;
5611
5612 /* .tbss is special. It doesn't contribute to p_memsz of
5613 normal segments. */
5614 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5615 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
5616 }
5617
b10a8ae0
L
5618 if (align > p->p_align
5619 && !m->p_align_valid
5620 && (p->p_type != PT_LOAD
5621 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
5622 p->p_align = align;
5623 }
5624
bf988460 5625 if (!m->p_flags_valid)
252b5132
RH
5626 {
5627 p->p_flags |= PF_R;
02bf8d82 5628 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 5629 p->p_flags |= PF_X;
02bf8d82 5630 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
5631 p->p_flags |= PF_W;
5632 }
5633 }
43a8475c 5634
bf988460 5635 off -= off_adjust;
0920dee7 5636
7c928300
AM
5637 /* Check that all sections are in a PT_LOAD segment.
5638 Don't check funky gdb generated core files. */
5639 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
5640 {
5641 bfd_boolean check_vma = TRUE;
5642
5643 for (i = 1; i < m->count; i++)
5644 if (m->sections[i]->vma == m->sections[i - 1]->vma
5645 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5646 ->this_hdr), p) != 0
5647 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5648 ->this_hdr), p) != 0)
0920dee7 5649 {
9a83a553
AM
5650 /* Looks like we have overlays packed into the segment. */
5651 check_vma = FALSE;
5652 break;
0920dee7 5653 }
9a83a553
AM
5654
5655 for (i = 0; i < m->count; i++)
5656 {
5657 Elf_Internal_Shdr *this_hdr;
5658 asection *sec;
5659
5660 sec = m->sections[i];
5661 this_hdr = &(elf_section_data(sec)->this_hdr);
86b2281f
AM
5662 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5663 && !ELF_TBSS_SPECIAL (this_hdr, p))
9a83a553 5664 {
4eca0228 5665 _bfd_error_handler
695344c0 5666 /* xgettext:c-format */
9a83a553
AM
5667 (_("%B: section `%A' can't be allocated in segment %d"),
5668 abfd, sec, j);
5669 print_segment_map (m);
5670 }
5671 }
5672 }
252b5132
RH
5673 }
5674
12bd6957 5675 elf_next_file_pos (abfd) = off;
f3520d2f
AM
5676 return TRUE;
5677}
5678
5679/* Assign file positions for the other sections. */
5680
5681static bfd_boolean
5682assign_file_positions_for_non_load_sections (bfd *abfd,
5683 struct bfd_link_info *link_info)
5684{
5685 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5686 Elf_Internal_Shdr **i_shdrpp;
e06efbf1 5687 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
f3520d2f
AM
5688 Elf_Internal_Phdr *phdrs;
5689 Elf_Internal_Phdr *p;
5690 struct elf_segment_map *m;
62655c7b 5691 struct elf_segment_map *hdrs_segment;
f3520d2f
AM
5692 bfd_vma filehdr_vaddr, filehdr_paddr;
5693 bfd_vma phdrs_vaddr, phdrs_paddr;
5694 file_ptr off;
f3520d2f
AM
5695 unsigned int count;
5696
5c182d5f 5697 i_shdrpp = elf_elfsections (abfd);
e06efbf1 5698 end_hdrpp = i_shdrpp + elf_numsections (abfd);
12bd6957 5699 off = elf_next_file_pos (abfd);
e06efbf1 5700 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
5c182d5f 5701 {
5c182d5f
AM
5702 Elf_Internal_Shdr *hdr;
5703
5704 hdr = *hdrpp;
5705 if (hdr->bfd_section != NULL
252e386e
AM
5706 && (hdr->bfd_section->filepos != 0
5707 || (hdr->sh_type == SHT_NOBITS
5708 && hdr->contents == NULL)))
627b32bc 5709 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
5710 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
5711 {
e8d2ba53 5712 if (hdr->sh_size != 0)
4eca0228 5713 _bfd_error_handler
695344c0 5714 /* xgettext:c-format */
e8d2ba53
AM
5715 (_("%B: warning: allocated section `%s' not in segment"),
5716 abfd,
5717 (hdr->bfd_section == NULL
5718 ? "*unknown*"
5719 : hdr->bfd_section->name));
3ba71138
L
5720 /* We don't need to page align empty sections. */
5721 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
5722 off += vma_page_aligned_bias (hdr->sh_addr, off,
5723 bed->maxpagesize);
5724 else
5725 off += vma_page_aligned_bias (hdr->sh_addr, off,
5726 hdr->sh_addralign);
5727 off = _bfd_elf_assign_file_position_for_section (hdr, off,
5728 FALSE);
5729 }
5730 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5731 && hdr->bfd_section == NULL)
0ce398f1
L
5732 || (hdr->bfd_section != NULL
5733 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS))
5734 /* Compress DWARF debug sections. */
12bd6957 5735 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6a40cf0c
NC
5736 || (elf_symtab_shndx_list (abfd) != NULL
5737 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
5738 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
5739 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
5c182d5f
AM
5740 hdr->sh_offset = -1;
5741 else
5742 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
5743 }
5744
252b5132
RH
5745 /* Now that we have set the section file positions, we can set up
5746 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
5747 count = 0;
5748 filehdr_vaddr = 0;
5749 filehdr_paddr = 0;
5750 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
5751 phdrs_paddr = 0;
62655c7b 5752 hdrs_segment = NULL;
f3520d2f 5753 phdrs = elf_tdata (abfd)->phdr;
12bd6957 5754 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
f3520d2f
AM
5755 {
5756 ++count;
5757 if (p->p_type != PT_LOAD)
5758 continue;
5759
5760 if (m->includes_filehdr)
5761 {
5762 filehdr_vaddr = p->p_vaddr;
5763 filehdr_paddr = p->p_paddr;
5764 }
5765 if (m->includes_phdrs)
5766 {
5767 phdrs_vaddr = p->p_vaddr;
5768 phdrs_paddr = p->p_paddr;
5769 if (m->includes_filehdr)
5770 {
62655c7b 5771 hdrs_segment = m;
f3520d2f
AM
5772 phdrs_vaddr += bed->s->sizeof_ehdr;
5773 phdrs_paddr += bed->s->sizeof_ehdr;
5774 }
5775 }
5776 }
5777
62655c7b
RM
5778 if (hdrs_segment != NULL && link_info != NULL)
5779 {
5780 /* There is a segment that contains both the file headers and the
5781 program headers, so provide a symbol __ehdr_start pointing there.
5782 A program can use this to examine itself robustly. */
5783
5784 struct elf_link_hash_entry *hash
5785 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5786 FALSE, FALSE, TRUE);
5787 /* If the symbol was referenced and not defined, define it. */
5788 if (hash != NULL
5789 && (hash->root.type == bfd_link_hash_new
5790 || hash->root.type == bfd_link_hash_undefined
5791 || hash->root.type == bfd_link_hash_undefweak
5792 || hash->root.type == bfd_link_hash_common))
5793 {
5794 asection *s = NULL;
5795 if (hdrs_segment->count != 0)
5796 /* The segment contains sections, so use the first one. */
5797 s = hdrs_segment->sections[0];
5798 else
5799 /* Use the first (i.e. lowest-addressed) section in any segment. */
12bd6957 5800 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62655c7b
RM
5801 if (m->count != 0)
5802 {
5803 s = m->sections[0];
5804 break;
5805 }
5806
5807 if (s != NULL)
5808 {
5809 hash->root.u.def.value = filehdr_vaddr - s->vma;
5810 hash->root.u.def.section = s;
5811 }
5812 else
5813 {
5814 hash->root.u.def.value = filehdr_vaddr;
5815 hash->root.u.def.section = bfd_abs_section_ptr;
5816 }
5817
5818 hash->root.type = bfd_link_hash_defined;
5819 hash->def_regular = 1;
5820 hash->non_elf = 0;
5821 }
5822 }
5823
12bd6957 5824 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
252b5132 5825 {
129af99f 5826 if (p->p_type == PT_GNU_RELRO)
252b5132 5827 {
b84a33b5 5828 const Elf_Internal_Phdr *lp;
3146fac4 5829 struct elf_segment_map *lm;
1ea63fd2 5830
129af99f 5831 if (link_info != NULL)
8c37241b 5832 {
129af99f
AS
5833 /* During linking the range of the RELRO segment is passed
5834 in link_info. */
12bd6957 5835 for (lm = elf_seg_map (abfd), lp = phdrs;
3146fac4
AM
5836 lm != NULL;
5837 lm = lm->next, lp++)
8c37241b
JJ
5838 {
5839 if (lp->p_type == PT_LOAD
b84a33b5 5840 && lp->p_vaddr < link_info->relro_end
3146fac4
AM
5841 && lm->count != 0
5842 && lm->sections[0]->vma >= link_info->relro_start)
8c37241b
JJ
5843 break;
5844 }
8981c88a 5845
3146fac4 5846 BFD_ASSERT (lm != NULL);
8c37241b 5847 }
129af99f
AS
5848 else
5849 {
5850 /* Otherwise we are copying an executable or shared
b84a33b5 5851 library, but we need to use the same linker logic. */
129af99f
AS
5852 for (lp = phdrs; lp < phdrs + count; ++lp)
5853 {
5854 if (lp->p_type == PT_LOAD
5855 && lp->p_paddr == p->p_paddr)
5856 break;
5857 }
b84a33b5
AM
5858 }
5859
5860 if (lp < phdrs + count)
5861 {
5862 p->p_vaddr = lp->p_vaddr;
5863 p->p_paddr = lp->p_paddr;
5864 p->p_offset = lp->p_offset;
5865 if (link_info != NULL)
5866 p->p_filesz = link_info->relro_end - lp->p_vaddr;
5867 else if (m->p_size_valid)
5868 p->p_filesz = m->p_size;
129af99f
AS
5869 else
5870 abort ();
b84a33b5 5871 p->p_memsz = p->p_filesz;
f3944f72
L
5872 /* Preserve the alignment and flags if they are valid. The
5873 gold linker generates RW/4 for the PT_GNU_RELRO section.
5874 It is better for objcopy/strip to honor these attributes
5875 otherwise gdb will choke when using separate debug files.
5876 */
5877 if (!m->p_align_valid)
5878 p->p_align = 1;
5879 if (!m->p_flags_valid)
341b8ee7 5880 p->p_flags = PF_R;
129af99f 5881 }
9433b9b1 5882 else
b84a33b5
AM
5883 {
5884 memset (p, 0, sizeof *p);
5885 p->p_type = PT_NULL;
5886 }
129af99f 5887 }
04c3a755
NS
5888 else if (p->p_type == PT_GNU_STACK)
5889 {
5890 if (m->p_size_valid)
5891 p->p_memsz = m->p_size;
5892 }
129af99f
AS
5893 else if (m->count != 0)
5894 {
e06efbf1 5895 unsigned int i;
1a9ccd70 5896
129af99f
AS
5897 if (p->p_type != PT_LOAD
5898 && (p->p_type != PT_NOTE
5899 || bfd_get_format (abfd) != bfd_core))
5900 {
1a9ccd70
NC
5901 /* A user specified segment layout may include a PHDR
5902 segment that overlaps with a LOAD segment... */
5903 if (p->p_type == PT_PHDR)
5904 {
5905 m->count = 0;
5906 continue;
5907 }
5908
c86934ce
NC
5909 if (m->includes_filehdr || m->includes_phdrs)
5910 {
b1fa9dd6 5911 /* PR 17512: file: 2195325e. */
4eca0228 5912 _bfd_error_handler
1a9ccd70
NC
5913 (_("%B: error: non-load segment %d includes file header and/or program header"),
5914 abfd, (int)(p - phdrs));
c86934ce
NC
5915 return FALSE;
5916 }
129af99f 5917
86b2281f 5918 p->p_filesz = 0;
129af99f 5919 p->p_offset = m->sections[0]->filepos;
86b2281f
AM
5920 for (i = m->count; i-- != 0;)
5921 {
5922 asection *sect = m->sections[i];
5923 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
5924 if (hdr->sh_type != SHT_NOBITS)
5925 {
5926 p->p_filesz = (sect->filepos - m->sections[0]->filepos
5927 + hdr->sh_size);
5928 break;
5929 }
5930 }
129af99f
AS
5931 }
5932 }
5933 else if (m->includes_filehdr)
5934 {
5935 p->p_vaddr = filehdr_vaddr;
5936 if (! m->p_paddr_valid)
5937 p->p_paddr = filehdr_paddr;
5938 }
5939 else if (m->includes_phdrs)
5940 {
5941 p->p_vaddr = phdrs_vaddr;
5942 if (! m->p_paddr_valid)
5943 p->p_paddr = phdrs_paddr;
252b5132
RH
5944 }
5945 }
5946
12bd6957 5947 elf_next_file_pos (abfd) = off;
252b5132 5948
b34976b6 5949 return TRUE;
252b5132
RH
5950}
5951
6a40cf0c
NC
5952static elf_section_list *
5953find_section_in_list (unsigned int i, elf_section_list * list)
5954{
5955 for (;list != NULL; list = list->next)
5956 if (list->ndx == i)
5957 break;
5958 return list;
5959}
5960
252b5132
RH
5961/* Work out the file positions of all the sections. This is called by
5962 _bfd_elf_compute_section_file_positions. All the section sizes and
5963 VMAs must be known before this is called.
5964
e0638f70
AM
5965 Reloc sections come in two flavours: Those processed specially as
5966 "side-channel" data attached to a section to which they apply, and
5967 those that bfd doesn't process as relocations. The latter sort are
5968 stored in a normal bfd section by bfd_section_from_shdr. We don't
5969 consider the former sort here, unless they form part of the loadable
5970 image. Reloc sections not assigned here will be handled later by
5971 assign_file_positions_for_relocs.
252b5132
RH
5972
5973 We also don't set the positions of the .symtab and .strtab here. */
5974
b34976b6 5975static bfd_boolean
c84fca4d
AO
5976assign_file_positions_except_relocs (bfd *abfd,
5977 struct bfd_link_info *link_info)
252b5132 5978{
5c182d5f
AM
5979 struct elf_obj_tdata *tdata = elf_tdata (abfd);
5980 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
9c5bfbb7 5981 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5982
5983 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
5984 && bfd_get_format (abfd) != bfd_core)
5985 {
5c182d5f
AM
5986 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
5987 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
5988 Elf_Internal_Shdr **hdrpp;
5989 unsigned int i;
a485e98e 5990 file_ptr off;
252b5132
RH
5991
5992 /* Start after the ELF header. */
5993 off = i_ehdrp->e_ehsize;
5994
5995 /* We are not creating an executable, which means that we are
5996 not creating a program header, and that the actual order of
5997 the sections in the file is unimportant. */
9ad5cbcf 5998 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
5999 {
6000 Elf_Internal_Shdr *hdr;
6001
6002 hdr = *hdrpp;
e0638f70
AM
6003 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6004 && hdr->bfd_section == NULL)
0ce398f1
L
6005 || (hdr->bfd_section != NULL
6006 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS))
6007 /* Compress DWARF debug sections. */
12bd6957 6008 || i == elf_onesymtab (abfd)
6a40cf0c
NC
6009 || (elf_symtab_shndx_list (abfd) != NULL
6010 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
6011 || i == elf_strtab_sec (abfd)
6012 || i == elf_shstrtab_sec (abfd))
252b5132
RH
6013 {
6014 hdr->sh_offset = -1;
252b5132 6015 }
9ad5cbcf 6016 else
b34976b6 6017 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 6018 }
a485e98e
AM
6019
6020 elf_next_file_pos (abfd) = off;
252b5132
RH
6021 }
6022 else
6023 {
f3520d2f
AM
6024 unsigned int alloc;
6025
252b5132 6026 /* Assign file positions for the loaded sections based on the
08a40648 6027 assignment of sections to segments. */
f3520d2f
AM
6028 if (!assign_file_positions_for_load_sections (abfd, link_info))
6029 return FALSE;
6030
6031 /* And for non-load sections. */
6032 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
6033 return FALSE;
6034
e36284ab
AM
6035 if (bed->elf_backend_modify_program_headers != NULL)
6036 {
6037 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
6038 return FALSE;
6039 }
6040
58e7ebac 6041 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=. */
0e1862bb 6042 if (link_info != NULL && bfd_link_pie (link_info))
58e7ebac
L
6043 {
6044 unsigned int num_segments = elf_elfheader (abfd)->e_phnum;
6045 Elf_Internal_Phdr *segment = elf_tdata (abfd)->phdr;
6046 Elf_Internal_Phdr *end_segment = &segment[num_segments];
6047
6048 /* Find the lowest p_vaddr in PT_LOAD segments. */
6049 bfd_vma p_vaddr = (bfd_vma) -1;
6050 for (; segment < end_segment; segment++)
6051 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
6052 p_vaddr = segment->p_vaddr;
6053
6054 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
6055 segments is non-zero. */
6056 if (p_vaddr)
6057 i_ehdrp->e_type = ET_EXEC;
6058 }
6059
f3520d2f 6060 /* Write out the program headers. */
12bd6957 6061 alloc = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
1a9ccd70
NC
6062
6063 /* Sort the program headers into the ordering required by the ELF standard. */
6064 if (alloc == 0)
6065 return TRUE;
6066
1a9ccd70
NC
6067 /* PR ld/20815 - Check that the program header segment, if present, will
6068 be loaded into memory. FIXME: The check below is not sufficient as
6069 really all PT_LOAD segments should be checked before issuing an error
6070 message. Plus the PHDR segment does not have to be the first segment
6071 in the program header table. But this version of the check should
cd584857
NC
6072 catch all real world use cases.
6073
6074 FIXME: We used to have code here to sort the PT_LOAD segments into
6075 ascending order, as per the ELF spec. But this breaks some programs,
6076 including the Linux kernel. But really either the spec should be
6077 changed or the programs updated. */
1a9ccd70 6078 if (alloc > 1
cd584857
NC
6079 && tdata->phdr[0].p_type == PT_PHDR
6080 && ! bed->elf_backend_allow_non_load_phdr (abfd, tdata->phdr, alloc)
6081 && tdata->phdr[1].p_type == PT_LOAD
6082 && (tdata->phdr[1].p_vaddr > tdata->phdr[0].p_vaddr
6083 || (tdata->phdr[1].p_vaddr + tdata->phdr[1].p_memsz)
6084 < (tdata->phdr[0].p_vaddr + tdata->phdr[0].p_memsz)))
1a9ccd70
NC
6085 {
6086 /* The fix for this error is usually to edit the linker script being
6087 used and set up the program headers manually. Either that or
6088 leave room for the headers at the start of the SECTIONS. */
6089 _bfd_error_handler (_("\
6090%B: error: PHDR segment not covered by LOAD segment"),
6091 abfd);
1a9ccd70
NC
6092 return FALSE;
6093 }
6094
f3520d2f 6095 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
cd584857
NC
6096 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
6097 return FALSE;
252b5132
RH
6098 }
6099
b34976b6 6100 return TRUE;
252b5132
RH
6101}
6102
b34976b6 6103static bfd_boolean
217aa764 6104prep_headers (bfd *abfd)
252b5132 6105{
3d540e93 6106 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 6107 struct elf_strtab_hash *shstrtab;
9c5bfbb7 6108 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
6109
6110 i_ehdrp = elf_elfheader (abfd);
252b5132 6111
2b0f7ef9 6112 shstrtab = _bfd_elf_strtab_init ();
252b5132 6113 if (shstrtab == NULL)
b34976b6 6114 return FALSE;
252b5132
RH
6115
6116 elf_shstrtab (abfd) = shstrtab;
6117
6118 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
6119 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
6120 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
6121 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
6122
6123 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
6124 i_ehdrp->e_ident[EI_DATA] =
6125 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
6126 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
6127
252b5132
RH
6128 if ((abfd->flags & DYNAMIC) != 0)
6129 i_ehdrp->e_type = ET_DYN;
6130 else if ((abfd->flags & EXEC_P) != 0)
6131 i_ehdrp->e_type = ET_EXEC;
6132 else if (bfd_get_format (abfd) == bfd_core)
6133 i_ehdrp->e_type = ET_CORE;
6134 else
6135 i_ehdrp->e_type = ET_REL;
6136
6137 switch (bfd_get_arch (abfd))
6138 {
6139 case bfd_arch_unknown:
6140 i_ehdrp->e_machine = EM_NONE;
6141 break;
aa4f99bb
AO
6142
6143 /* There used to be a long list of cases here, each one setting
6144 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6145 in the corresponding bfd definition. To avoid duplication,
6146 the switch was removed. Machines that need special handling
6147 can generally do it in elf_backend_final_write_processing(),
6148 unless they need the information earlier than the final write.
6149 Such need can generally be supplied by replacing the tests for
6150 e_machine with the conditions used to determine it. */
252b5132 6151 default:
9c5bfbb7
AM
6152 i_ehdrp->e_machine = bed->elf_machine_code;
6153 }
aa4f99bb 6154
252b5132
RH
6155 i_ehdrp->e_version = bed->s->ev_current;
6156 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
6157
c044fabd 6158 /* No program header, for now. */
252b5132
RH
6159 i_ehdrp->e_phoff = 0;
6160 i_ehdrp->e_phentsize = 0;
6161 i_ehdrp->e_phnum = 0;
6162
c044fabd 6163 /* Each bfd section is section header entry. */
252b5132
RH
6164 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6165 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6166
c044fabd 6167 /* If we're building an executable, we'll need a program header table. */
252b5132 6168 if (abfd->flags & EXEC_P)
0e71e495
BE
6169 /* It all happens later. */
6170 ;
252b5132
RH
6171 else
6172 {
6173 i_ehdrp->e_phentsize = 0;
252b5132
RH
6174 i_ehdrp->e_phoff = 0;
6175 }
6176
6177 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 6178 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 6179 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 6180 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 6181 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 6182 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132 6183 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
17ca87fc 6184 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
252b5132 6185 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 6186 return FALSE;
252b5132 6187
b34976b6 6188 return TRUE;
252b5132
RH
6189}
6190
6191/* Assign file positions for all the reloc sections which are not part
a485e98e 6192 of the loadable file image, and the file position of section headers. */
252b5132 6193
0ce398f1
L
6194static bfd_boolean
6195_bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
252b5132
RH
6196{
6197 file_ptr off;
e06efbf1 6198 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
3e19fb8f 6199 Elf_Internal_Shdr *shdrp;
a485e98e
AM
6200 Elf_Internal_Ehdr *i_ehdrp;
6201 const struct elf_backend_data *bed;
252b5132 6202
12bd6957 6203 off = elf_next_file_pos (abfd);
252b5132 6204
e06efbf1
L
6205 shdrpp = elf_elfsections (abfd);
6206 end_shdrpp = shdrpp + elf_numsections (abfd);
6207 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
252b5132 6208 {
252b5132 6209 shdrp = *shdrpp;
0ce398f1
L
6210 if (shdrp->sh_offset == -1)
6211 {
3e19fb8f 6212 asection *sec = shdrp->bfd_section;
0ce398f1
L
6213 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
6214 || shdrp->sh_type == SHT_RELA);
6215 if (is_rel
3e19fb8f 6216 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
0ce398f1
L
6217 {
6218 if (!is_rel)
6219 {
3e19fb8f
L
6220 const char *name = sec->name;
6221 struct bfd_elf_section_data *d;
6222
0ce398f1 6223 /* Compress DWARF debug sections. */
3e19fb8f 6224 if (!bfd_compress_section (abfd, sec,
0ce398f1
L
6225 shdrp->contents))
6226 return FALSE;
3e19fb8f
L
6227
6228 if (sec->compress_status == COMPRESS_SECTION_DONE
6229 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
6230 {
6231 /* If section is compressed with zlib-gnu, convert
6232 section name from .debug_* to .zdebug_*. */
6233 char *new_name
6234 = convert_debug_to_zdebug (abfd, name);
6235 if (new_name == NULL)
6236 return FALSE;
6237 name = new_name;
6238 }
dd905818 6239 /* Add section name to section name section. */
3e19fb8f
L
6240 if (shdrp->sh_name != (unsigned int) -1)
6241 abort ();
6242 shdrp->sh_name
6243 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6244 name, FALSE);
6245 d = elf_section_data (sec);
6246
dd905818 6247 /* Add reloc section name to section name section. */
3e19fb8f
L
6248 if (d->rel.hdr
6249 && !_bfd_elf_set_reloc_sh_name (abfd,
6250 d->rel.hdr,
6251 name, FALSE))
6252 return FALSE;
6253 if (d->rela.hdr
6254 && !_bfd_elf_set_reloc_sh_name (abfd,
6255 d->rela.hdr,
91cb26da 6256 name, TRUE))
3e19fb8f
L
6257 return FALSE;
6258
0ce398f1 6259 /* Update section size and contents. */
3e19fb8f
L
6260 shdrp->sh_size = sec->size;
6261 shdrp->contents = sec->contents;
0ce398f1
L
6262 shdrp->bfd_section->contents = NULL;
6263 }
6264 off = _bfd_elf_assign_file_position_for_section (shdrp,
6265 off,
6266 TRUE);
6267 }
6268 }
252b5132
RH
6269 }
6270
3e19fb8f
L
6271 /* Place section name section after DWARF debug sections have been
6272 compressed. */
6273 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6274 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6275 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6276 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
6277
6278 /* Place the section headers. */
a485e98e
AM
6279 i_ehdrp = elf_elfheader (abfd);
6280 bed = get_elf_backend_data (abfd);
6281 off = align_file_position (off, 1 << bed->s->log_file_align);
6282 i_ehdrp->e_shoff = off;
6283 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
12bd6957 6284 elf_next_file_pos (abfd) = off;
0ce398f1
L
6285
6286 return TRUE;
252b5132
RH
6287}
6288
b34976b6 6289bfd_boolean
217aa764 6290_bfd_elf_write_object_contents (bfd *abfd)
252b5132 6291{
9c5bfbb7 6292 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6293 Elf_Internal_Shdr **i_shdrp;
b34976b6 6294 bfd_boolean failed;
9ad5cbcf 6295 unsigned int count, num_sec;
30e8ee25 6296 struct elf_obj_tdata *t;
252b5132
RH
6297
6298 if (! abfd->output_has_begun
217aa764 6299 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6300 return FALSE;
252b5132
RH
6301
6302 i_shdrp = elf_elfsections (abfd);
252b5132 6303
b34976b6 6304 failed = FALSE;
252b5132
RH
6305 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6306 if (failed)
b34976b6 6307 return FALSE;
252b5132 6308
0ce398f1
L
6309 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6310 return FALSE;
252b5132 6311
c044fabd 6312 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
6313 num_sec = elf_numsections (abfd);
6314 for (count = 1; count < num_sec; count++)
252b5132 6315 {
3e19fb8f
L
6316 i_shdrp[count]->sh_name
6317 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6318 i_shdrp[count]->sh_name);
252b5132
RH
6319 if (bed->elf_backend_section_processing)
6320 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
6321 if (i_shdrp[count]->contents)
6322 {
dc810e39
AM
6323 bfd_size_type amt = i_shdrp[count]->sh_size;
6324
252b5132 6325 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 6326 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 6327 return FALSE;
252b5132
RH
6328 }
6329 }
6330
6331 /* Write out the section header names. */
30e8ee25 6332 t = elf_tdata (abfd);
26ae6d5e 6333 if (elf_shstrtab (abfd) != NULL
30e8ee25 6334 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 6335 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 6336 return FALSE;
252b5132
RH
6337
6338 if (bed->elf_backend_final_write_processing)
12bd6957 6339 (*bed->elf_backend_final_write_processing) (abfd, elf_linker (abfd));
252b5132 6340
ff59fc36
RM
6341 if (!bed->s->write_shdrs_and_ehdr (abfd))
6342 return FALSE;
6343
6344 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
c0355132
AM
6345 if (t->o->build_id.after_write_object_contents != NULL)
6346 return (*t->o->build_id.after_write_object_contents) (abfd);
ff59fc36
RM
6347
6348 return TRUE;
252b5132
RH
6349}
6350
b34976b6 6351bfd_boolean
217aa764 6352_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 6353{
c044fabd 6354 /* Hopefully this can be done just like an object file. */
252b5132
RH
6355 return _bfd_elf_write_object_contents (abfd);
6356}
c044fabd
KH
6357
6358/* Given a section, search the header to find them. */
6359
cb33740c 6360unsigned int
198beae2 6361_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 6362{
9c5bfbb7 6363 const struct elf_backend_data *bed;
91d6fa6a 6364 unsigned int sec_index;
252b5132 6365
9ad5cbcf
AM
6366 if (elf_section_data (asect) != NULL
6367 && elf_section_data (asect)->this_idx != 0)
6368 return elf_section_data (asect)->this_idx;
6369
6370 if (bfd_is_abs_section (asect))
91d6fa6a 6371 sec_index = SHN_ABS;
af746e92 6372 else if (bfd_is_com_section (asect))
91d6fa6a 6373 sec_index = SHN_COMMON;
af746e92 6374 else if (bfd_is_und_section (asect))
91d6fa6a 6375 sec_index = SHN_UNDEF;
af746e92 6376 else
91d6fa6a 6377 sec_index = SHN_BAD;
252b5132 6378
af746e92 6379 bed = get_elf_backend_data (abfd);
252b5132
RH
6380 if (bed->elf_backend_section_from_bfd_section)
6381 {
91d6fa6a 6382 int retval = sec_index;
9ad5cbcf 6383
af746e92
AM
6384 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6385 return retval;
252b5132
RH
6386 }
6387
91d6fa6a 6388 if (sec_index == SHN_BAD)
af746e92 6389 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 6390
91d6fa6a 6391 return sec_index;
252b5132
RH
6392}
6393
6394/* Given a BFD symbol, return the index in the ELF symbol table, or -1
6395 on error. */
6396
6397int
217aa764 6398_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
6399{
6400 asymbol *asym_ptr = *asym_ptr_ptr;
6401 int idx;
6402 flagword flags = asym_ptr->flags;
6403
6404 /* When gas creates relocations against local labels, it creates its
6405 own symbol for the section, but does put the symbol into the
6406 symbol chain, so udata is 0. When the linker is generating
6407 relocatable output, this section symbol may be for one of the
6408 input sections rather than the output section. */
6409 if (asym_ptr->udata.i == 0
6410 && (flags & BSF_SECTION_SYM)
6411 && asym_ptr->section)
6412 {
5372391b 6413 asection *sec;
252b5132
RH
6414 int indx;
6415
5372391b
AM
6416 sec = asym_ptr->section;
6417 if (sec->owner != abfd && sec->output_section != NULL)
6418 sec = sec->output_section;
6419 if (sec->owner == abfd
6420 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 6421 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
6422 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
6423 }
6424
6425 idx = asym_ptr->udata.i;
6426
6427 if (idx == 0)
6428 {
6429 /* This case can occur when using --strip-symbol on a symbol
08a40648 6430 which is used in a relocation entry. */
4eca0228 6431 _bfd_error_handler
695344c0 6432 /* xgettext:c-format */
d003868e
AM
6433 (_("%B: symbol `%s' required but not present"),
6434 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
6435 bfd_set_error (bfd_error_no_symbols);
6436 return -1;
6437 }
6438
6439#if DEBUG & 4
6440 {
6441 fprintf (stderr,
9ccb8af9
AM
6442 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx\n",
6443 (long) asym_ptr, asym_ptr->name, idx, (long) flags);
252b5132
RH
6444 fflush (stderr);
6445 }
6446#endif
6447
6448 return idx;
6449}
6450
84d1d650 6451/* Rewrite program header information. */
252b5132 6452
b34976b6 6453static bfd_boolean
84d1d650 6454rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 6455{
b34976b6
AM
6456 Elf_Internal_Ehdr *iehdr;
6457 struct elf_segment_map *map;
6458 struct elf_segment_map *map_first;
6459 struct elf_segment_map **pointer_to_map;
6460 Elf_Internal_Phdr *segment;
6461 asection *section;
6462 unsigned int i;
6463 unsigned int num_segments;
6464 bfd_boolean phdr_included = FALSE;
5c44b38e 6465 bfd_boolean p_paddr_valid;
b34976b6
AM
6466 bfd_vma maxpagesize;
6467 struct elf_segment_map *phdr_adjust_seg = NULL;
6468 unsigned int phdr_adjust_num = 0;
9c5bfbb7 6469 const struct elf_backend_data *bed;
bc67d8a6 6470
caf47ea6 6471 bed = get_elf_backend_data (ibfd);
252b5132
RH
6472 iehdr = elf_elfheader (ibfd);
6473
bc67d8a6 6474 map_first = NULL;
c044fabd 6475 pointer_to_map = &map_first;
252b5132
RH
6476
6477 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
6478 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6479
6480 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
6481#define SEGMENT_END(segment, start) \
6482 (start + (segment->p_memsz > segment->p_filesz \
6483 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 6484
eecdbe52
JJ
6485#define SECTION_SIZE(section, segment) \
6486 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6487 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 6488 ? section->size : 0)
eecdbe52 6489
b34976b6 6490 /* Returns TRUE if the given section is contained within
bc67d8a6 6491 the given segment. VMA addresses are compared. */
aecc8f8a
AM
6492#define IS_CONTAINED_BY_VMA(section, segment) \
6493 (section->vma >= segment->p_vaddr \
eecdbe52 6494 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 6495 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 6496
b34976b6 6497 /* Returns TRUE if the given section is contained within
bc67d8a6 6498 the given segment. LMA addresses are compared. */
aecc8f8a
AM
6499#define IS_CONTAINED_BY_LMA(section, segment, base) \
6500 (section->lma >= base \
eecdbe52 6501 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 6502 <= SEGMENT_END (segment, base)))
252b5132 6503
0efc80c8
L
6504 /* Handle PT_NOTE segment. */
6505#define IS_NOTE(p, s) \
aecc8f8a 6506 (p->p_type == PT_NOTE \
0efc80c8 6507 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 6508 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6509 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6510 <= p->p_offset + p->p_filesz))
252b5132 6511
0efc80c8
L
6512 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6513 etc. */
6514#define IS_COREFILE_NOTE(p, s) \
6515 (IS_NOTE (p, s) \
6516 && bfd_get_format (ibfd) == bfd_core \
6517 && s->vma == 0 \
6518 && s->lma == 0)
6519
252b5132
RH
6520 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6521 linker, which generates a PT_INTERP section with p_vaddr and
6522 p_memsz set to 0. */
aecc8f8a
AM
6523#define IS_SOLARIS_PT_INTERP(p, s) \
6524 (p->p_vaddr == 0 \
6525 && p->p_paddr == 0 \
6526 && p->p_memsz == 0 \
6527 && p->p_filesz > 0 \
6528 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 6529 && s->size > 0 \
aecc8f8a 6530 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6531 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6532 <= p->p_offset + p->p_filesz))
5c440b1e 6533
bc67d8a6
NC
6534 /* Decide if the given section should be included in the given segment.
6535 A section will be included if:
f5ffc919 6536 1. It is within the address space of the segment -- we use the LMA
08a40648 6537 if that is set for the segment and the VMA otherwise,
0efc80c8 6538 2. It is an allocated section or a NOTE section in a PT_NOTE
d324f6d6 6539 segment.
bc67d8a6 6540 3. There is an output section associated with it,
eecdbe52 6541 4. The section has not already been allocated to a previous segment.
2b05f1b7 6542 5. PT_GNU_STACK segments do not include any sections.
03394ac9 6543 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
6544 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6545 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 6546 (with the possible exception of .dynamic). */
9f17e2a6 6547#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
6548 ((((segment->p_paddr \
6549 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
6550 : IS_CONTAINED_BY_VMA (section, segment)) \
6551 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 6552 || IS_NOTE (segment, section)) \
2b05f1b7
L
6553 && segment->p_type != PT_GNU_STACK \
6554 && (segment->p_type != PT_TLS \
6555 || (section->flags & SEC_THREAD_LOCAL)) \
6556 && (segment->p_type == PT_LOAD \
6557 || segment->p_type == PT_TLS \
6558 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6559 && (segment->p_type != PT_DYNAMIC \
6560 || SECTION_SIZE (section, segment) > 0 \
6561 || (segment->p_paddr \
6562 ? segment->p_paddr != section->lma \
6563 : segment->p_vaddr != section->vma) \
6564 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
6565 == 0)) \
0067a569 6566 && !section->segment_mark)
bc67d8a6 6567
9f17e2a6
L
6568/* If the output section of a section in the input segment is NULL,
6569 it is removed from the corresponding output segment. */
6570#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
6571 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
6572 && section->output_section != NULL)
6573
b34976b6 6574 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
6575#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6576 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6577
6578 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6579 their VMA address ranges and their LMA address ranges overlap.
6580 It is possible to have overlapping VMA ranges without overlapping LMA
6581 ranges. RedBoot images for example can have both .data and .bss mapped
6582 to the same VMA range, but with the .data section mapped to a different
6583 LMA. */
aecc8f8a 6584#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 6585 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 6586 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 6587 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 6588 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
6589
6590 /* Initialise the segment mark field. */
6591 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 6592 section->segment_mark = FALSE;
bc67d8a6 6593
5c44b38e
AM
6594 /* The Solaris linker creates program headers in which all the
6595 p_paddr fields are zero. When we try to objcopy or strip such a
6596 file, we get confused. Check for this case, and if we find it
6597 don't set the p_paddr_valid fields. */
6598 p_paddr_valid = FALSE;
6599 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6600 i < num_segments;
6601 i++, segment++)
6602 if (segment->p_paddr != 0)
6603 {
6604 p_paddr_valid = TRUE;
6605 break;
6606 }
6607
252b5132 6608 /* Scan through the segments specified in the program header
bc67d8a6 6609 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 6610 in the loadable segments. These can be created by weird
aecc8f8a 6611 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
6612 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6613 i < num_segments;
c044fabd 6614 i++, segment++)
252b5132 6615 {
252b5132 6616 unsigned int j;
c044fabd 6617 Elf_Internal_Phdr *segment2;
252b5132 6618
aecc8f8a
AM
6619 if (segment->p_type == PT_INTERP)
6620 for (section = ibfd->sections; section; section = section->next)
6621 if (IS_SOLARIS_PT_INTERP (segment, section))
6622 {
6623 /* Mininal change so that the normal section to segment
4cc11e76 6624 assignment code will work. */
aecc8f8a
AM
6625 segment->p_vaddr = section->vma;
6626 break;
6627 }
6628
bc67d8a6 6629 if (segment->p_type != PT_LOAD)
b10a8ae0
L
6630 {
6631 /* Remove PT_GNU_RELRO segment. */
6632 if (segment->p_type == PT_GNU_RELRO)
6633 segment->p_type = PT_NULL;
6634 continue;
6635 }
c044fabd 6636
bc67d8a6 6637 /* Determine if this segment overlaps any previous segments. */
0067a569 6638 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
6639 {
6640 bfd_signed_vma extra_length;
c044fabd 6641
bc67d8a6 6642 if (segment2->p_type != PT_LOAD
0067a569 6643 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 6644 continue;
c044fabd 6645
bc67d8a6
NC
6646 /* Merge the two segments together. */
6647 if (segment2->p_vaddr < segment->p_vaddr)
6648 {
c044fabd 6649 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 6650 SEGMENT. */
0067a569
AM
6651 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
6652 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 6653
bc67d8a6
NC
6654 if (extra_length > 0)
6655 {
0067a569 6656 segment2->p_memsz += extra_length;
bc67d8a6
NC
6657 segment2->p_filesz += extra_length;
6658 }
c044fabd 6659
bc67d8a6 6660 segment->p_type = PT_NULL;
c044fabd 6661
bc67d8a6
NC
6662 /* Since we have deleted P we must restart the outer loop. */
6663 i = 0;
6664 segment = elf_tdata (ibfd)->phdr;
6665 break;
6666 }
6667 else
6668 {
c044fabd 6669 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 6670 SEGMENT2. */
0067a569
AM
6671 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
6672 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 6673
bc67d8a6
NC
6674 if (extra_length > 0)
6675 {
0067a569 6676 segment->p_memsz += extra_length;
bc67d8a6
NC
6677 segment->p_filesz += extra_length;
6678 }
c044fabd 6679
bc67d8a6
NC
6680 segment2->p_type = PT_NULL;
6681 }
6682 }
6683 }
c044fabd 6684
bc67d8a6
NC
6685 /* The second scan attempts to assign sections to segments. */
6686 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6687 i < num_segments;
0067a569 6688 i++, segment++)
bc67d8a6 6689 {
0067a569
AM
6690 unsigned int section_count;
6691 asection **sections;
6692 asection *output_section;
6693 unsigned int isec;
6694 bfd_vma matching_lma;
6695 bfd_vma suggested_lma;
6696 unsigned int j;
dc810e39 6697 bfd_size_type amt;
0067a569
AM
6698 asection *first_section;
6699 bfd_boolean first_matching_lma;
6700 bfd_boolean first_suggested_lma;
bc67d8a6
NC
6701
6702 if (segment->p_type == PT_NULL)
6703 continue;
c044fabd 6704
9f17e2a6 6705 first_section = NULL;
bc67d8a6 6706 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
6707 for (section = ibfd->sections, section_count = 0;
6708 section != NULL;
6709 section = section->next)
9f17e2a6
L
6710 {
6711 /* Find the first section in the input segment, which may be
6712 removed from the corresponding output segment. */
6713 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
6714 {
6715 if (first_section == NULL)
6716 first_section = section;
6717 if (section->output_section != NULL)
6718 ++section_count;
6719 }
6720 }
811072d8 6721
b5f852ea
NC
6722 /* Allocate a segment map big enough to contain
6723 all of the sections we have selected. */
dc810e39
AM
6724 amt = sizeof (struct elf_segment_map);
6725 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6726 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 6727 if (map == NULL)
b34976b6 6728 return FALSE;
252b5132
RH
6729
6730 /* Initialise the fields of the segment map. Default to
6731 using the physical address of the segment in the input BFD. */
0067a569
AM
6732 map->next = NULL;
6733 map->p_type = segment->p_type;
6734 map->p_flags = segment->p_flags;
bc67d8a6 6735 map->p_flags_valid = 1;
55d55ac7 6736
9f17e2a6
L
6737 /* If the first section in the input segment is removed, there is
6738 no need to preserve segment physical address in the corresponding
6739 output segment. */
945c025a 6740 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
6741 {
6742 map->p_paddr = segment->p_paddr;
5c44b38e 6743 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 6744 }
252b5132
RH
6745
6746 /* Determine if this segment contains the ELF file header
6747 and if it contains the program headers themselves. */
bc67d8a6
NC
6748 map->includes_filehdr = (segment->p_offset == 0
6749 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 6750 map->includes_phdrs = 0;
252b5132 6751
0067a569 6752 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 6753 {
bc67d8a6
NC
6754 map->includes_phdrs =
6755 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6756 && (segment->p_offset + segment->p_filesz
252b5132
RH
6757 >= ((bfd_vma) iehdr->e_phoff
6758 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 6759
bc67d8a6 6760 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 6761 phdr_included = TRUE;
252b5132
RH
6762 }
6763
bc67d8a6 6764 if (section_count == 0)
252b5132
RH
6765 {
6766 /* Special segments, such as the PT_PHDR segment, may contain
6767 no sections, but ordinary, loadable segments should contain
1ed89aa9 6768 something. They are allowed by the ELF spec however, so only
f98450c6
NC
6769 a warning is produced.
6770 There is however the valid use case of embedded systems which
6771 have segments with p_filesz of 0 and a p_memsz > 0 to initialize
6772 flash memory with zeros. No warning is shown for that case. */
6773 if (segment->p_type == PT_LOAD
6774 && (segment->p_filesz > 0 || segment->p_memsz == 0))
6775 /* xgettext:c-format */
4eca0228 6776 _bfd_error_handler (_("\
f98450c6
NC
6777%B: warning: Empty loadable segment detected at vaddr=0x%.8x, is this intentional ?"),
6778 ibfd, segment->p_vaddr);
252b5132 6779
bc67d8a6 6780 map->count = 0;
c044fabd
KH
6781 *pointer_to_map = map;
6782 pointer_to_map = &map->next;
252b5132
RH
6783
6784 continue;
6785 }
6786
6787 /* Now scan the sections in the input BFD again and attempt
6788 to add their corresponding output sections to the segment map.
6789 The problem here is how to handle an output section which has
6790 been moved (ie had its LMA changed). There are four possibilities:
6791
6792 1. None of the sections have been moved.
6793 In this case we can continue to use the segment LMA from the
6794 input BFD.
6795
6796 2. All of the sections have been moved by the same amount.
6797 In this case we can change the segment's LMA to match the LMA
6798 of the first section.
6799
6800 3. Some of the sections have been moved, others have not.
6801 In this case those sections which have not been moved can be
6802 placed in the current segment which will have to have its size,
6803 and possibly its LMA changed, and a new segment or segments will
6804 have to be created to contain the other sections.
6805
b5f852ea 6806 4. The sections have been moved, but not by the same amount.
252b5132
RH
6807 In this case we can change the segment's LMA to match the LMA
6808 of the first section and we will have to create a new segment
6809 or segments to contain the other sections.
6810
6811 In order to save time, we allocate an array to hold the section
6812 pointers that we are interested in. As these sections get assigned
6813 to a segment, they are removed from this array. */
6814
a50b1753 6815 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 6816 if (sections == NULL)
b34976b6 6817 return FALSE;
252b5132
RH
6818
6819 /* Step One: Scan for segment vs section LMA conflicts.
6820 Also add the sections to the section array allocated above.
6821 Also add the sections to the current segment. In the common
6822 case, where the sections have not been moved, this means that
6823 we have completely filled the segment, and there is nothing
6824 more to do. */
252b5132 6825 isec = 0;
72730e0c 6826 matching_lma = 0;
252b5132 6827 suggested_lma = 0;
0067a569
AM
6828 first_matching_lma = TRUE;
6829 first_suggested_lma = TRUE;
252b5132 6830
461c4b2e 6831 for (section = first_section, j = 0;
bc67d8a6
NC
6832 section != NULL;
6833 section = section->next)
252b5132 6834 {
caf47ea6 6835 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 6836 {
bc67d8a6
NC
6837 output_section = section->output_section;
6838
0067a569 6839 sections[j++] = section;
252b5132
RH
6840
6841 /* The Solaris native linker always sets p_paddr to 0.
6842 We try to catch that case here, and set it to the
5e8d7549
NC
6843 correct value. Note - some backends require that
6844 p_paddr be left as zero. */
5c44b38e 6845 if (!p_paddr_valid
4455705d 6846 && segment->p_vaddr != 0
0067a569 6847 && !bed->want_p_paddr_set_to_zero
252b5132 6848 && isec == 0
bc67d8a6 6849 && output_section->lma != 0
0067a569
AM
6850 && output_section->vma == (segment->p_vaddr
6851 + (map->includes_filehdr
6852 ? iehdr->e_ehsize
6853 : 0)
6854 + (map->includes_phdrs
6855 ? (iehdr->e_phnum
6856 * iehdr->e_phentsize)
6857 : 0)))
bc67d8a6 6858 map->p_paddr = segment->p_vaddr;
252b5132
RH
6859
6860 /* Match up the physical address of the segment with the
6861 LMA address of the output section. */
bc67d8a6 6862 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 6863 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
6864 || (bed->want_p_paddr_set_to_zero
6865 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 6866 {
0067a569
AM
6867 if (first_matching_lma || output_section->lma < matching_lma)
6868 {
6869 matching_lma = output_section->lma;
6870 first_matching_lma = FALSE;
6871 }
252b5132
RH
6872
6873 /* We assume that if the section fits within the segment
bc67d8a6 6874 then it does not overlap any other section within that
252b5132 6875 segment. */
0067a569
AM
6876 map->sections[isec++] = output_section;
6877 }
6878 else if (first_suggested_lma)
6879 {
6880 suggested_lma = output_section->lma;
6881 first_suggested_lma = FALSE;
252b5132 6882 }
147d51c2
L
6883
6884 if (j == section_count)
6885 break;
252b5132
RH
6886 }
6887 }
6888
bc67d8a6 6889 BFD_ASSERT (j == section_count);
252b5132
RH
6890
6891 /* Step Two: Adjust the physical address of the current segment,
6892 if necessary. */
bc67d8a6 6893 if (isec == section_count)
252b5132
RH
6894 {
6895 /* All of the sections fitted within the segment as currently
6896 specified. This is the default case. Add the segment to
6897 the list of built segments and carry on to process the next
6898 program header in the input BFD. */
bc67d8a6 6899 map->count = section_count;
c044fabd
KH
6900 *pointer_to_map = map;
6901 pointer_to_map = &map->next;
08a40648 6902
5c44b38e
AM
6903 if (p_paddr_valid
6904 && !bed->want_p_paddr_set_to_zero
147d51c2 6905 && matching_lma != map->p_paddr
5c44b38e
AM
6906 && !map->includes_filehdr
6907 && !map->includes_phdrs)
3271a814
NS
6908 /* There is some padding before the first section in the
6909 segment. So, we must account for that in the output
6910 segment's vma. */
6911 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 6912
252b5132
RH
6913 free (sections);
6914 continue;
6915 }
252b5132
RH
6916 else
6917 {
0067a569 6918 if (!first_matching_lma)
72730e0c
AM
6919 {
6920 /* At least one section fits inside the current segment.
6921 Keep it, but modify its physical address to match the
6922 LMA of the first section that fitted. */
bc67d8a6 6923 map->p_paddr = matching_lma;
72730e0c
AM
6924 }
6925 else
6926 {
6927 /* None of the sections fitted inside the current segment.
6928 Change the current segment's physical address to match
6929 the LMA of the first section. */
bc67d8a6 6930 map->p_paddr = suggested_lma;
72730e0c
AM
6931 }
6932
bc67d8a6
NC
6933 /* Offset the segment physical address from the lma
6934 to allow for space taken up by elf headers. */
6935 if (map->includes_filehdr)
010c8431
AM
6936 {
6937 if (map->p_paddr >= iehdr->e_ehsize)
6938 map->p_paddr -= iehdr->e_ehsize;
6939 else
6940 {
6941 map->includes_filehdr = FALSE;
6942 map->includes_phdrs = FALSE;
6943 }
6944 }
252b5132 6945
bc67d8a6
NC
6946 if (map->includes_phdrs)
6947 {
010c8431
AM
6948 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
6949 {
6950 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
6951
6952 /* iehdr->e_phnum is just an estimate of the number
6953 of program headers that we will need. Make a note
6954 here of the number we used and the segment we chose
6955 to hold these headers, so that we can adjust the
6956 offset when we know the correct value. */
6957 phdr_adjust_num = iehdr->e_phnum;
6958 phdr_adjust_seg = map;
6959 }
6960 else
6961 map->includes_phdrs = FALSE;
bc67d8a6 6962 }
252b5132
RH
6963 }
6964
6965 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 6966 those that fit to the current segment and removing them from the
252b5132
RH
6967 sections array; but making sure not to leave large gaps. Once all
6968 possible sections have been assigned to the current segment it is
6969 added to the list of built segments and if sections still remain
6970 to be assigned, a new segment is constructed before repeating
6971 the loop. */
6972 isec = 0;
6973 do
6974 {
bc67d8a6 6975 map->count = 0;
252b5132 6976 suggested_lma = 0;
0067a569 6977 first_suggested_lma = TRUE;
252b5132
RH
6978
6979 /* Fill the current segment with sections that fit. */
bc67d8a6 6980 for (j = 0; j < section_count; j++)
252b5132 6981 {
bc67d8a6 6982 section = sections[j];
252b5132 6983
bc67d8a6 6984 if (section == NULL)
252b5132
RH
6985 continue;
6986
bc67d8a6 6987 output_section = section->output_section;
252b5132 6988
bc67d8a6 6989 BFD_ASSERT (output_section != NULL);
c044fabd 6990
bc67d8a6
NC
6991 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
6992 || IS_COREFILE_NOTE (segment, section))
252b5132 6993 {
bc67d8a6 6994 if (map->count == 0)
252b5132
RH
6995 {
6996 /* If the first section in a segment does not start at
bc67d8a6
NC
6997 the beginning of the segment, then something is
6998 wrong. */
0067a569
AM
6999 if (output_section->lma
7000 != (map->p_paddr
7001 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
7002 + (map->includes_phdrs
7003 ? iehdr->e_phnum * iehdr->e_phentsize
7004 : 0)))
252b5132
RH
7005 abort ();
7006 }
7007 else
7008 {
0067a569 7009 asection *prev_sec;
252b5132 7010
bc67d8a6 7011 prev_sec = map->sections[map->count - 1];
252b5132
RH
7012
7013 /* If the gap between the end of the previous section
bc67d8a6
NC
7014 and the start of this section is more than
7015 maxpagesize then we need to start a new segment. */
eea6121a 7016 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 7017 maxpagesize)
caf47ea6 7018 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 7019 || (prev_sec->lma + prev_sec->size
079e9a2f 7020 > output_section->lma))
252b5132 7021 {
0067a569
AM
7022 if (first_suggested_lma)
7023 {
7024 suggested_lma = output_section->lma;
7025 first_suggested_lma = FALSE;
7026 }
252b5132
RH
7027
7028 continue;
7029 }
7030 }
7031
bc67d8a6 7032 map->sections[map->count++] = output_section;
252b5132
RH
7033 ++isec;
7034 sections[j] = NULL;
b34976b6 7035 section->segment_mark = TRUE;
252b5132 7036 }
0067a569
AM
7037 else if (first_suggested_lma)
7038 {
7039 suggested_lma = output_section->lma;
7040 first_suggested_lma = FALSE;
7041 }
252b5132
RH
7042 }
7043
bc67d8a6 7044 BFD_ASSERT (map->count > 0);
252b5132
RH
7045
7046 /* Add the current segment to the list of built segments. */
c044fabd
KH
7047 *pointer_to_map = map;
7048 pointer_to_map = &map->next;
252b5132 7049
bc67d8a6 7050 if (isec < section_count)
252b5132
RH
7051 {
7052 /* We still have not allocated all of the sections to
7053 segments. Create a new segment here, initialise it
7054 and carry on looping. */
dc810e39
AM
7055 amt = sizeof (struct elf_segment_map);
7056 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
5964fc3a 7057 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 7058 if (map == NULL)
5ed6aba4
NC
7059 {
7060 free (sections);
7061 return FALSE;
7062 }
252b5132
RH
7063
7064 /* Initialise the fields of the segment map. Set the physical
7065 physical address to the LMA of the first section that has
7066 not yet been assigned. */
0067a569
AM
7067 map->next = NULL;
7068 map->p_type = segment->p_type;
7069 map->p_flags = segment->p_flags;
7070 map->p_flags_valid = 1;
7071 map->p_paddr = suggested_lma;
5c44b38e 7072 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 7073 map->includes_filehdr = 0;
0067a569 7074 map->includes_phdrs = 0;
252b5132
RH
7075 }
7076 }
bc67d8a6 7077 while (isec < section_count);
252b5132
RH
7078
7079 free (sections);
7080 }
7081
12bd6957 7082 elf_seg_map (obfd) = map_first;
bc67d8a6
NC
7083
7084 /* If we had to estimate the number of program headers that were
9ad5cbcf 7085 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
7086 the offset if necessary. */
7087 if (phdr_adjust_seg != NULL)
7088 {
7089 unsigned int count;
c044fabd 7090
bc67d8a6 7091 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 7092 count++;
252b5132 7093
bc67d8a6
NC
7094 if (count > phdr_adjust_num)
7095 phdr_adjust_seg->p_paddr
7096 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
7097 }
c044fabd 7098
bc67d8a6 7099#undef SEGMENT_END
eecdbe52 7100#undef SECTION_SIZE
bc67d8a6
NC
7101#undef IS_CONTAINED_BY_VMA
7102#undef IS_CONTAINED_BY_LMA
0efc80c8 7103#undef IS_NOTE
252b5132 7104#undef IS_COREFILE_NOTE
bc67d8a6 7105#undef IS_SOLARIS_PT_INTERP
9f17e2a6 7106#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
7107#undef INCLUDE_SECTION_IN_SEGMENT
7108#undef SEGMENT_AFTER_SEGMENT
7109#undef SEGMENT_OVERLAPS
b34976b6 7110 return TRUE;
252b5132
RH
7111}
7112
84d1d650
L
7113/* Copy ELF program header information. */
7114
7115static bfd_boolean
7116copy_elf_program_header (bfd *ibfd, bfd *obfd)
7117{
7118 Elf_Internal_Ehdr *iehdr;
7119 struct elf_segment_map *map;
7120 struct elf_segment_map *map_first;
7121 struct elf_segment_map **pointer_to_map;
7122 Elf_Internal_Phdr *segment;
7123 unsigned int i;
7124 unsigned int num_segments;
7125 bfd_boolean phdr_included = FALSE;
88967714 7126 bfd_boolean p_paddr_valid;
84d1d650
L
7127
7128 iehdr = elf_elfheader (ibfd);
7129
7130 map_first = NULL;
7131 pointer_to_map = &map_first;
7132
88967714
AM
7133 /* If all the segment p_paddr fields are zero, don't set
7134 map->p_paddr_valid. */
7135 p_paddr_valid = FALSE;
84d1d650 7136 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
7137 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7138 i < num_segments;
7139 i++, segment++)
7140 if (segment->p_paddr != 0)
7141 {
7142 p_paddr_valid = TRUE;
7143 break;
7144 }
7145
84d1d650
L
7146 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7147 i < num_segments;
7148 i++, segment++)
7149 {
7150 asection *section;
7151 unsigned int section_count;
7152 bfd_size_type amt;
7153 Elf_Internal_Shdr *this_hdr;
53020534 7154 asection *first_section = NULL;
a76e6f2f 7155 asection *lowest_section;
84d1d650 7156
84d1d650
L
7157 /* Compute how many sections are in this segment. */
7158 for (section = ibfd->sections, section_count = 0;
7159 section != NULL;
7160 section = section->next)
7161 {
7162 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7163 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 7164 {
a76e6f2f
AM
7165 if (first_section == NULL)
7166 first_section = section;
3271a814
NS
7167 section_count++;
7168 }
84d1d650
L
7169 }
7170
7171 /* Allocate a segment map big enough to contain
7172 all of the sections we have selected. */
7173 amt = sizeof (struct elf_segment_map);
7174 if (section_count != 0)
7175 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 7176 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
7177 if (map == NULL)
7178 return FALSE;
7179
7180 /* Initialize the fields of the output segment map with the
7181 input segment. */
7182 map->next = NULL;
7183 map->p_type = segment->p_type;
7184 map->p_flags = segment->p_flags;
7185 map->p_flags_valid = 1;
7186 map->p_paddr = segment->p_paddr;
88967714 7187 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
7188 map->p_align = segment->p_align;
7189 map->p_align_valid = 1;
3271a814 7190 map->p_vaddr_offset = 0;
84d1d650 7191
04c3a755
NS
7192 if (map->p_type == PT_GNU_RELRO
7193 || map->p_type == PT_GNU_STACK)
b10a8ae0
L
7194 {
7195 /* The PT_GNU_RELRO segment may contain the first a few
7196 bytes in the .got.plt section even if the whole .got.plt
7197 section isn't in the PT_GNU_RELRO segment. We won't
04c3a755
NS
7198 change the size of the PT_GNU_RELRO segment.
7199 Similarly, PT_GNU_STACK size is significant on uclinux
7200 systems. */
9433b9b1 7201 map->p_size = segment->p_memsz;
b10a8ae0
L
7202 map->p_size_valid = 1;
7203 }
7204
84d1d650
L
7205 /* Determine if this segment contains the ELF file header
7206 and if it contains the program headers themselves. */
7207 map->includes_filehdr = (segment->p_offset == 0
7208 && segment->p_filesz >= iehdr->e_ehsize);
7209
7210 map->includes_phdrs = 0;
7211 if (! phdr_included || segment->p_type != PT_LOAD)
7212 {
7213 map->includes_phdrs =
7214 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7215 && (segment->p_offset + segment->p_filesz
7216 >= ((bfd_vma) iehdr->e_phoff
7217 + iehdr->e_phnum * iehdr->e_phentsize)));
7218
7219 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7220 phdr_included = TRUE;
7221 }
7222
bbefd0a9 7223 lowest_section = NULL;
84d1d650
L
7224 if (section_count != 0)
7225 {
7226 unsigned int isec = 0;
7227
53020534 7228 for (section = first_section;
84d1d650
L
7229 section != NULL;
7230 section = section->next)
7231 {
7232 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7233 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
7234 {
7235 map->sections[isec++] = section->output_section;
a76e6f2f
AM
7236 if ((section->flags & SEC_ALLOC) != 0)
7237 {
7238 bfd_vma seg_off;
7239
bbefd0a9
AM
7240 if (lowest_section == NULL
7241 || section->lma < lowest_section->lma)
fb8a5684
AM
7242 lowest_section = section;
7243
a76e6f2f
AM
7244 /* Section lmas are set up from PT_LOAD header
7245 p_paddr in _bfd_elf_make_section_from_shdr.
7246 If this header has a p_paddr that disagrees
7247 with the section lma, flag the p_paddr as
7248 invalid. */
7249 if ((section->flags & SEC_LOAD) != 0)
7250 seg_off = this_hdr->sh_offset - segment->p_offset;
7251 else
7252 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7253 if (section->lma - segment->p_paddr != seg_off)
7254 map->p_paddr_valid = FALSE;
7255 }
53020534
L
7256 if (isec == section_count)
7257 break;
7258 }
84d1d650
L
7259 }
7260 }
7261
a76e6f2f
AM
7262 if (map->includes_filehdr && lowest_section != NULL)
7263 /* We need to keep the space used by the headers fixed. */
7264 map->header_size = lowest_section->vma - segment->p_vaddr;
d324f6d6 7265
a76e6f2f
AM
7266 if (!map->includes_phdrs
7267 && !map->includes_filehdr
7268 && map->p_paddr_valid)
7269 /* There is some other padding before the first section. */
7270 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
7271 - segment->p_paddr);
7272
84d1d650
L
7273 map->count = section_count;
7274 *pointer_to_map = map;
7275 pointer_to_map = &map->next;
7276 }
7277
12bd6957 7278 elf_seg_map (obfd) = map_first;
84d1d650
L
7279 return TRUE;
7280}
7281
7282/* Copy private BFD data. This copies or rewrites ELF program header
7283 information. */
7284
7285static bfd_boolean
7286copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7287{
84d1d650
L
7288 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7289 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7290 return TRUE;
7291
7292 if (elf_tdata (ibfd)->phdr == NULL)
7293 return TRUE;
7294
7295 if (ibfd->xvec == obfd->xvec)
7296 {
cb3ff1e5
NC
7297 /* Check to see if any sections in the input BFD
7298 covered by ELF program header have changed. */
d55ce4e2 7299 Elf_Internal_Phdr *segment;
84d1d650
L
7300 asection *section, *osec;
7301 unsigned int i, num_segments;
7302 Elf_Internal_Shdr *this_hdr;
147d51c2
L
7303 const struct elf_backend_data *bed;
7304
7305 bed = get_elf_backend_data (ibfd);
7306
7307 /* Regenerate the segment map if p_paddr is set to 0. */
7308 if (bed->want_p_paddr_set_to_zero)
7309 goto rewrite;
84d1d650
L
7310
7311 /* Initialize the segment mark field. */
7312 for (section = obfd->sections; section != NULL;
7313 section = section->next)
7314 section->segment_mark = FALSE;
7315
7316 num_segments = elf_elfheader (ibfd)->e_phnum;
7317 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7318 i < num_segments;
7319 i++, segment++)
7320 {
5f6999aa
NC
7321 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7322 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7323 which severly confuses things, so always regenerate the segment
7324 map in this case. */
7325 if (segment->p_paddr == 0
7326 && segment->p_memsz == 0
7327 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 7328 goto rewrite;
5f6999aa 7329
84d1d650
L
7330 for (section = ibfd->sections;
7331 section != NULL; section = section->next)
7332 {
7333 /* We mark the output section so that we know it comes
7334 from the input BFD. */
7335 osec = section->output_section;
7336 if (osec)
7337 osec->segment_mark = TRUE;
7338
7339 /* Check if this section is covered by the segment. */
7340 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7341 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
7342 {
7343 /* FIXME: Check if its output section is changed or
7344 removed. What else do we need to check? */
7345 if (osec == NULL
7346 || section->flags != osec->flags
7347 || section->lma != osec->lma
7348 || section->vma != osec->vma
7349 || section->size != osec->size
7350 || section->rawsize != osec->rawsize
7351 || section->alignment_power != osec->alignment_power)
7352 goto rewrite;
7353 }
7354 }
7355 }
7356
cb3ff1e5 7357 /* Check to see if any output section do not come from the
84d1d650
L
7358 input BFD. */
7359 for (section = obfd->sections; section != NULL;
7360 section = section->next)
7361 {
535b785f 7362 if (!section->segment_mark)
84d1d650
L
7363 goto rewrite;
7364 else
7365 section->segment_mark = FALSE;
7366 }
7367
7368 return copy_elf_program_header (ibfd, obfd);
7369 }
7370
7371rewrite:
f1d85785
L
7372 if (ibfd->xvec == obfd->xvec)
7373 {
7374 /* When rewriting program header, set the output maxpagesize to
7375 the maximum alignment of input PT_LOAD segments. */
7376 Elf_Internal_Phdr *segment;
7377 unsigned int i;
7378 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7379 bfd_vma maxpagesize = 0;
7380
7381 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7382 i < num_segments;
7383 i++, segment++)
7384 if (segment->p_type == PT_LOAD
7385 && maxpagesize < segment->p_align)
c86934ce
NC
7386 {
7387 /* PR 17512: file: f17299af. */
7388 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
695344c0 7389 /* xgettext:c-format */
4eca0228 7390 _bfd_error_handler (_("\
c86934ce 7391%B: warning: segment alignment of 0x%llx is too large"),
4eca0228 7392 ibfd, (long long) segment->p_align);
c86934ce
NC
7393 else
7394 maxpagesize = segment->p_align;
7395 }
f1d85785
L
7396
7397 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
7398 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
7399 }
7400
84d1d650
L
7401 return rewrite_elf_program_header (ibfd, obfd);
7402}
7403
ccd2ec6a
L
7404/* Initialize private output section information from input section. */
7405
7406bfd_boolean
7407_bfd_elf_init_private_section_data (bfd *ibfd,
7408 asection *isec,
7409 bfd *obfd,
7410 asection *osec,
7411 struct bfd_link_info *link_info)
7412
7413{
7414 Elf_Internal_Shdr *ihdr, *ohdr;
0e1862bb
L
7415 bfd_boolean final_link = (link_info != NULL
7416 && !bfd_link_relocatable (link_info));
ccd2ec6a
L
7417
7418 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7419 || obfd->xvec->flavour != bfd_target_elf_flavour)
7420 return TRUE;
7421
ba85c43e
NC
7422 BFD_ASSERT (elf_section_data (osec) != NULL);
7423
dfa7b0b8
AM
7424 /* For objcopy and relocatable link, don't copy the output ELF
7425 section type from input if the output BFD section flags have been
7426 set to something different. For a final link allow some flags
7427 that the linker clears to differ. */
42bb2e33 7428 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
7429 && (osec->flags == isec->flags
7430 || (final_link
7431 && ((osec->flags ^ isec->flags)
0814be7d 7432 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 7433 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
7434
7435 /* FIXME: Is this correct for all OS/PROC specific flags? */
7436 elf_section_flags (osec) |= (elf_section_flags (isec)
7437 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a 7438
a91e1603
L
7439 /* Copy sh_info from input for mbind section. */
7440 if (elf_section_flags (isec) & SHF_GNU_MBIND)
7441 elf_section_data (osec)->this_hdr.sh_info
7442 = elf_section_data (isec)->this_hdr.sh_info;
7443
ccd2ec6a
L
7444 /* Set things up for objcopy and relocatable link. The output
7445 SHT_GROUP section will have its elf_next_in_group pointing back
7446 to the input group members. Ignore linker created group section.
7447 See elfNN_ia64_object_p in elfxx-ia64.c. */
dfa7b0b8 7448 if (!final_link)
ccd2ec6a
L
7449 {
7450 if (elf_sec_group (isec) == NULL
7451 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
7452 {
7453 if (elf_section_flags (isec) & SHF_GROUP)
7454 elf_section_flags (osec) |= SHF_GROUP;
7455 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 7456 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a 7457 }
68f5ff89
L
7458
7459 /* If not decompress, preserve SHF_COMPRESSED. */
7460 if ((ibfd->flags & BFD_DECOMPRESS) == 0)
7461 elf_section_flags (osec) |= (elf_section_flags (isec)
7462 & SHF_COMPRESSED);
ccd2ec6a
L
7463 }
7464
7465 ihdr = &elf_section_data (isec)->this_hdr;
7466
7467 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7468 don't use the output section of the linked-to section since it
7469 may be NULL at this point. */
7470 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7471 {
7472 ohdr = &elf_section_data (osec)->this_hdr;
7473 ohdr->sh_flags |= SHF_LINK_ORDER;
7474 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7475 }
7476
7477 osec->use_rela_p = isec->use_rela_p;
7478
7479 return TRUE;
7480}
7481
252b5132
RH
7482/* Copy private section information. This copies over the entsize
7483 field, and sometimes the info field. */
7484
b34976b6 7485bfd_boolean
217aa764
AM
7486_bfd_elf_copy_private_section_data (bfd *ibfd,
7487 asection *isec,
7488 bfd *obfd,
7489 asection *osec)
252b5132
RH
7490{
7491 Elf_Internal_Shdr *ihdr, *ohdr;
7492
7493 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7494 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 7495 return TRUE;
252b5132 7496
252b5132
RH
7497 ihdr = &elf_section_data (isec)->this_hdr;
7498 ohdr = &elf_section_data (osec)->this_hdr;
7499
7500 ohdr->sh_entsize = ihdr->sh_entsize;
7501
7502 if (ihdr->sh_type == SHT_SYMTAB
7503 || ihdr->sh_type == SHT_DYNSYM
7504 || ihdr->sh_type == SHT_GNU_verneed
7505 || ihdr->sh_type == SHT_GNU_verdef)
7506 ohdr->sh_info = ihdr->sh_info;
7507
ccd2ec6a
L
7508 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7509 NULL);
252b5132
RH
7510}
7511
d0bf826b
AM
7512/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7513 necessary if we are removing either the SHT_GROUP section or any of
7514 the group member sections. DISCARDED is the value that a section's
7515 output_section has if the section will be discarded, NULL when this
7516 function is called from objcopy, bfd_abs_section_ptr when called
7517 from the linker. */
80fccad2
BW
7518
7519bfd_boolean
d0bf826b 7520_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 7521{
30288845
AM
7522 asection *isec;
7523
30288845 7524 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 7525 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
7526 {
7527 asection *first = elf_next_in_group (isec);
7528 asection *s = first;
d0bf826b
AM
7529 bfd_size_type removed = 0;
7530
30288845
AM
7531 while (s != NULL)
7532 {
415f38a6
AM
7533 /* If this member section is being output but the
7534 SHT_GROUP section is not, then clear the group info
7535 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
7536 if (s->output_section != discarded
7537 && isec->output_section == discarded)
30288845
AM
7538 {
7539 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7540 elf_group_name (s->output_section) = NULL;
7541 }
415f38a6
AM
7542 /* Conversely, if the member section is not being output
7543 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
7544 else if (s->output_section == discarded
7545 && isec->output_section != discarded)
7546 removed += 4;
30288845
AM
7547 s = elf_next_in_group (s);
7548 if (s == first)
7549 break;
7550 }
d0bf826b
AM
7551 if (removed != 0)
7552 {
7553 if (discarded != NULL)
7554 {
7555 /* If we've been called for ld -r, then we need to
7556 adjust the input section size. This function may
7557 be called multiple times, so save the original
7558 size. */
7559 if (isec->rawsize == 0)
7560 isec->rawsize = isec->size;
7561 isec->size = isec->rawsize - removed;
7562 }
7563 else
7564 {
7565 /* Adjust the output section size when called from
7566 objcopy. */
7567 isec->output_section->size -= removed;
7568 }
7569 }
30288845
AM
7570 }
7571
80fccad2
BW
7572 return TRUE;
7573}
7574
d0bf826b
AM
7575/* Copy private header information. */
7576
7577bfd_boolean
7578_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
7579{
7580 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7581 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7582 return TRUE;
7583
7584 /* Copy over private BFD data if it has not already been copied.
7585 This must be done here, rather than in the copy_private_bfd_data
7586 entry point, because the latter is called after the section
7587 contents have been set, which means that the program headers have
7588 already been worked out. */
12bd6957 7589 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
d0bf826b
AM
7590 {
7591 if (! copy_private_bfd_data (ibfd, obfd))
7592 return FALSE;
7593 }
7594
7595 return _bfd_elf_fixup_group_sections (ibfd, NULL);
7596}
7597
252b5132
RH
7598/* Copy private symbol information. If this symbol is in a section
7599 which we did not map into a BFD section, try to map the section
7600 index correctly. We use special macro definitions for the mapped
7601 section indices; these definitions are interpreted by the
7602 swap_out_syms function. */
7603
9ad5cbcf
AM
7604#define MAP_ONESYMTAB (SHN_HIOS + 1)
7605#define MAP_DYNSYMTAB (SHN_HIOS + 2)
7606#define MAP_STRTAB (SHN_HIOS + 3)
7607#define MAP_SHSTRTAB (SHN_HIOS + 4)
7608#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 7609
b34976b6 7610bfd_boolean
217aa764
AM
7611_bfd_elf_copy_private_symbol_data (bfd *ibfd,
7612 asymbol *isymarg,
7613 bfd *obfd,
7614 asymbol *osymarg)
252b5132
RH
7615{
7616 elf_symbol_type *isym, *osym;
7617
7618 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7619 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 7620 return TRUE;
252b5132
RH
7621
7622 isym = elf_symbol_from (ibfd, isymarg);
7623 osym = elf_symbol_from (obfd, osymarg);
7624
7625 if (isym != NULL
8424d8f5 7626 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
7627 && osym != NULL
7628 && bfd_is_abs_section (isym->symbol.section))
7629 {
7630 unsigned int shndx;
7631
7632 shndx = isym->internal_elf_sym.st_shndx;
7633 if (shndx == elf_onesymtab (ibfd))
7634 shndx = MAP_ONESYMTAB;
7635 else if (shndx == elf_dynsymtab (ibfd))
7636 shndx = MAP_DYNSYMTAB;
12bd6957 7637 else if (shndx == elf_strtab_sec (ibfd))
252b5132 7638 shndx = MAP_STRTAB;
12bd6957 7639 else if (shndx == elf_shstrtab_sec (ibfd))
252b5132 7640 shndx = MAP_SHSTRTAB;
6a40cf0c 7641 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
9ad5cbcf 7642 shndx = MAP_SYM_SHNDX;
252b5132
RH
7643 osym->internal_elf_sym.st_shndx = shndx;
7644 }
7645
b34976b6 7646 return TRUE;
252b5132
RH
7647}
7648
7649/* Swap out the symbols. */
7650
b34976b6 7651static bfd_boolean
217aa764 7652swap_out_syms (bfd *abfd,
ef10c3ac 7653 struct elf_strtab_hash **sttp,
217aa764 7654 int relocatable_p)
252b5132 7655{
9c5bfbb7 7656 const struct elf_backend_data *bed;
079e9a2f
AM
7657 int symcount;
7658 asymbol **syms;
ef10c3ac 7659 struct elf_strtab_hash *stt;
079e9a2f 7660 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 7661 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 7662 Elf_Internal_Shdr *symstrtab_hdr;
ef10c3ac 7663 struct elf_sym_strtab *symstrtab;
f075ee0c
AM
7664 bfd_byte *outbound_syms;
7665 bfd_byte *outbound_shndx;
ef10c3ac
L
7666 unsigned long outbound_syms_index;
7667 unsigned long outbound_shndx_index;
079e9a2f 7668 int idx;
12bd6957 7669 unsigned int num_locals;
079e9a2f 7670 bfd_size_type amt;
174fd7f9 7671 bfd_boolean name_local_sections;
252b5132 7672
12bd6957 7673 if (!elf_map_symbols (abfd, &num_locals))
b34976b6 7674 return FALSE;
252b5132 7675
c044fabd 7676 /* Dump out the symtabs. */
ef10c3ac 7677 stt = _bfd_elf_strtab_init ();
079e9a2f 7678 if (stt == NULL)
b34976b6 7679 return FALSE;
252b5132 7680
079e9a2f
AM
7681 bed = get_elf_backend_data (abfd);
7682 symcount = bfd_get_symcount (abfd);
7683 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
7684 symtab_hdr->sh_type = SHT_SYMTAB;
7685 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
7686 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
12bd6957 7687 symtab_hdr->sh_info = num_locals + 1;
72de5009 7688 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
7689
7690 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
7691 symstrtab_hdr->sh_type = SHT_STRTAB;
7692
ef10c3ac
L
7693 /* Allocate buffer to swap out the .strtab section. */
7694 symstrtab = (struct elf_sym_strtab *) bfd_malloc ((symcount + 1)
7695 * sizeof (*symstrtab));
7696 if (symstrtab == NULL)
7697 {
7698 _bfd_elf_strtab_free (stt);
7699 return FALSE;
7700 }
7701
a50b1753
NC
7702 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
7703 bed->s->sizeof_sym);
079e9a2f 7704 if (outbound_syms == NULL)
5ed6aba4 7705 {
ef10c3ac
L
7706error_return:
7707 _bfd_elf_strtab_free (stt);
7708 free (symstrtab);
5ed6aba4
NC
7709 return FALSE;
7710 }
217aa764 7711 symtab_hdr->contents = outbound_syms;
ef10c3ac 7712 outbound_syms_index = 0;
252b5132 7713
9ad5cbcf 7714 outbound_shndx = NULL;
ef10c3ac 7715 outbound_shndx_index = 0;
6a40cf0c
NC
7716
7717 if (elf_symtab_shndx_list (abfd))
9ad5cbcf 7718 {
6a40cf0c
NC
7719 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
7720 if (symtab_shndx_hdr->sh_name != 0)
7721 {
7722 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
7723 outbound_shndx = (bfd_byte *)
7724 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
7725 if (outbound_shndx == NULL)
7726 goto error_return;
5ed6aba4 7727
6a40cf0c
NC
7728 symtab_shndx_hdr->contents = outbound_shndx;
7729 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
7730 symtab_shndx_hdr->sh_size = amt;
7731 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
7732 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
7733 }
7734 /* FIXME: What about any other headers in the list ? */
9ad5cbcf
AM
7735 }
7736
589e6347 7737 /* Now generate the data (for "contents"). */
079e9a2f
AM
7738 {
7739 /* Fill in zeroth symbol and swap it out. */
7740 Elf_Internal_Sym sym;
7741 sym.st_name = 0;
7742 sym.st_value = 0;
7743 sym.st_size = 0;
7744 sym.st_info = 0;
7745 sym.st_other = 0;
7746 sym.st_shndx = SHN_UNDEF;
35fc36a8 7747 sym.st_target_internal = 0;
ef10c3ac
L
7748 symstrtab[0].sym = sym;
7749 symstrtab[0].dest_index = outbound_syms_index;
7750 symstrtab[0].destshndx_index = outbound_shndx_index;
7751 outbound_syms_index++;
9ad5cbcf 7752 if (outbound_shndx != NULL)
ef10c3ac 7753 outbound_shndx_index++;
079e9a2f 7754 }
252b5132 7755
174fd7f9
RS
7756 name_local_sections
7757 = (bed->elf_backend_name_local_section_symbols
7758 && bed->elf_backend_name_local_section_symbols (abfd));
7759
079e9a2f 7760 syms = bfd_get_outsymbols (abfd);
ef10c3ac 7761 for (idx = 0; idx < symcount;)
252b5132 7762 {
252b5132 7763 Elf_Internal_Sym sym;
079e9a2f
AM
7764 bfd_vma value = syms[idx]->value;
7765 elf_symbol_type *type_ptr;
7766 flagword flags = syms[idx]->flags;
7767 int type;
252b5132 7768
174fd7f9
RS
7769 if (!name_local_sections
7770 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
7771 {
7772 /* Local section symbols have no name. */
ef10c3ac 7773 sym.st_name = (unsigned long) -1;
079e9a2f
AM
7774 }
7775 else
7776 {
ef10c3ac
L
7777 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
7778 to get the final offset for st_name. */
7779 sym.st_name
7780 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
7781 FALSE);
079e9a2f 7782 if (sym.st_name == (unsigned long) -1)
ef10c3ac 7783 goto error_return;
079e9a2f 7784 }
252b5132 7785
079e9a2f 7786 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 7787
079e9a2f
AM
7788 if ((flags & BSF_SECTION_SYM) == 0
7789 && bfd_is_com_section (syms[idx]->section))
7790 {
7791 /* ELF common symbols put the alignment into the `value' field,
7792 and the size into the `size' field. This is backwards from
7793 how BFD handles it, so reverse it here. */
7794 sym.st_size = value;
7795 if (type_ptr == NULL
7796 || type_ptr->internal_elf_sym.st_value == 0)
7797 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
7798 else
7799 sym.st_value = type_ptr->internal_elf_sym.st_value;
7800 sym.st_shndx = _bfd_elf_section_from_bfd_section
7801 (abfd, syms[idx]->section);
7802 }
7803 else
7804 {
7805 asection *sec = syms[idx]->section;
cb33740c 7806 unsigned int shndx;
252b5132 7807
079e9a2f
AM
7808 if (sec->output_section)
7809 {
7810 value += sec->output_offset;
7811 sec = sec->output_section;
7812 }
589e6347 7813
079e9a2f
AM
7814 /* Don't add in the section vma for relocatable output. */
7815 if (! relocatable_p)
7816 value += sec->vma;
7817 sym.st_value = value;
7818 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
7819
7820 if (bfd_is_abs_section (sec)
7821 && type_ptr != NULL
7822 && type_ptr->internal_elf_sym.st_shndx != 0)
7823 {
7824 /* This symbol is in a real ELF section which we did
7825 not create as a BFD section. Undo the mapping done
7826 by copy_private_symbol_data. */
7827 shndx = type_ptr->internal_elf_sym.st_shndx;
7828 switch (shndx)
7829 {
7830 case MAP_ONESYMTAB:
7831 shndx = elf_onesymtab (abfd);
7832 break;
7833 case MAP_DYNSYMTAB:
7834 shndx = elf_dynsymtab (abfd);
7835 break;
7836 case MAP_STRTAB:
12bd6957 7837 shndx = elf_strtab_sec (abfd);
079e9a2f
AM
7838 break;
7839 case MAP_SHSTRTAB:
12bd6957 7840 shndx = elf_shstrtab_sec (abfd);
079e9a2f 7841 break;
9ad5cbcf 7842 case MAP_SYM_SHNDX:
6a40cf0c
NC
7843 if (elf_symtab_shndx_list (abfd))
7844 shndx = elf_symtab_shndx_list (abfd)->ndx;
9ad5cbcf 7845 break;
079e9a2f 7846 default:
15bc576a 7847 shndx = SHN_ABS;
079e9a2f
AM
7848 break;
7849 }
7850 }
7851 else
7852 {
7853 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 7854
cb33740c 7855 if (shndx == SHN_BAD)
079e9a2f
AM
7856 {
7857 asection *sec2;
7858
7859 /* Writing this would be a hell of a lot easier if
7860 we had some decent documentation on bfd, and
7861 knew what to expect of the library, and what to
7862 demand of applications. For example, it
7863 appears that `objcopy' might not set the
7864 section of a symbol to be a section that is
7865 actually in the output file. */
7866 sec2 = bfd_get_section_by_name (abfd, sec->name);
5df1bc57
AM
7867 if (sec2 != NULL)
7868 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
7869 if (shndx == SHN_BAD)
589e6347 7870 {
695344c0 7871 /* xgettext:c-format */
589e6347
NC
7872 _bfd_error_handler (_("\
7873Unable to find equivalent output section for symbol '%s' from section '%s'"),
7874 syms[idx]->name ? syms[idx]->name : "<Local sym>",
7875 sec->name);
811072d8 7876 bfd_set_error (bfd_error_invalid_operation);
ef10c3ac 7877 goto error_return;
589e6347 7878 }
079e9a2f
AM
7879 }
7880 }
252b5132 7881
079e9a2f
AM
7882 sym.st_shndx = shndx;
7883 }
252b5132 7884
13ae64f3
JJ
7885 if ((flags & BSF_THREAD_LOCAL) != 0)
7886 type = STT_TLS;
d8045f23
NC
7887 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
7888 type = STT_GNU_IFUNC;
13ae64f3 7889 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
7890 type = STT_FUNC;
7891 else if ((flags & BSF_OBJECT) != 0)
7892 type = STT_OBJECT;
d9352518
DB
7893 else if ((flags & BSF_RELC) != 0)
7894 type = STT_RELC;
7895 else if ((flags & BSF_SRELC) != 0)
7896 type = STT_SRELC;
079e9a2f
AM
7897 else
7898 type = STT_NOTYPE;
252b5132 7899
13ae64f3
JJ
7900 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
7901 type = STT_TLS;
7902
589e6347 7903 /* Processor-specific types. */
079e9a2f
AM
7904 if (type_ptr != NULL
7905 && bed->elf_backend_get_symbol_type)
7906 type = ((*bed->elf_backend_get_symbol_type)
7907 (&type_ptr->internal_elf_sym, type));
252b5132 7908
079e9a2f
AM
7909 if (flags & BSF_SECTION_SYM)
7910 {
7911 if (flags & BSF_GLOBAL)
7912 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
7913 else
7914 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
7915 }
7916 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 7917 {
b8871f35
L
7918 if (type != STT_TLS)
7919 {
7920 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
7921 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
7922 ? STT_COMMON : STT_OBJECT);
7923 else
7924 type = ((flags & BSF_ELF_COMMON) != 0
7925 ? STT_COMMON : STT_OBJECT);
7926 }
7927 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 7928 }
079e9a2f
AM
7929 else if (bfd_is_und_section (syms[idx]->section))
7930 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
7931 ? STB_WEAK
7932 : STB_GLOBAL),
7933 type);
7934 else if (flags & BSF_FILE)
7935 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
7936 else
7937 {
7938 int bind = STB_LOCAL;
252b5132 7939
079e9a2f
AM
7940 if (flags & BSF_LOCAL)
7941 bind = STB_LOCAL;
3e7a7d11
NC
7942 else if (flags & BSF_GNU_UNIQUE)
7943 bind = STB_GNU_UNIQUE;
079e9a2f
AM
7944 else if (flags & BSF_WEAK)
7945 bind = STB_WEAK;
7946 else if (flags & BSF_GLOBAL)
7947 bind = STB_GLOBAL;
252b5132 7948
079e9a2f
AM
7949 sym.st_info = ELF_ST_INFO (bind, type);
7950 }
252b5132 7951
079e9a2f 7952 if (type_ptr != NULL)
35fc36a8
RS
7953 {
7954 sym.st_other = type_ptr->internal_elf_sym.st_other;
7955 sym.st_target_internal
7956 = type_ptr->internal_elf_sym.st_target_internal;
7957 }
079e9a2f 7958 else
35fc36a8
RS
7959 {
7960 sym.st_other = 0;
7961 sym.st_target_internal = 0;
7962 }
252b5132 7963
ef10c3ac
L
7964 idx++;
7965 symstrtab[idx].sym = sym;
7966 symstrtab[idx].dest_index = outbound_syms_index;
7967 symstrtab[idx].destshndx_index = outbound_shndx_index;
7968
7969 outbound_syms_index++;
9ad5cbcf 7970 if (outbound_shndx != NULL)
ef10c3ac
L
7971 outbound_shndx_index++;
7972 }
7973
7974 /* Finalize the .strtab section. */
7975 _bfd_elf_strtab_finalize (stt);
7976
7977 /* Swap out the .strtab section. */
7978 for (idx = 0; idx <= symcount; idx++)
7979 {
7980 struct elf_sym_strtab *elfsym = &symstrtab[idx];
7981 if (elfsym->sym.st_name == (unsigned long) -1)
7982 elfsym->sym.st_name = 0;
7983 else
7984 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
7985 elfsym->sym.st_name);
7986 bed->s->swap_symbol_out (abfd, &elfsym->sym,
7987 (outbound_syms
7988 + (elfsym->dest_index
7989 * bed->s->sizeof_sym)),
7990 (outbound_shndx
7991 + (elfsym->destshndx_index
7992 * sizeof (Elf_External_Sym_Shndx))));
079e9a2f 7993 }
ef10c3ac 7994 free (symstrtab);
252b5132 7995
079e9a2f 7996 *sttp = stt;
ef10c3ac 7997 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
079e9a2f 7998 symstrtab_hdr->sh_type = SHT_STRTAB;
84865015 7999 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
079e9a2f
AM
8000 symstrtab_hdr->sh_addr = 0;
8001 symstrtab_hdr->sh_entsize = 0;
8002 symstrtab_hdr->sh_link = 0;
8003 symstrtab_hdr->sh_info = 0;
8004 symstrtab_hdr->sh_addralign = 1;
252b5132 8005
b34976b6 8006 return TRUE;
252b5132
RH
8007}
8008
8009/* Return the number of bytes required to hold the symtab vector.
8010
8011 Note that we base it on the count plus 1, since we will null terminate
8012 the vector allocated based on this size. However, the ELF symbol table
8013 always has a dummy entry as symbol #0, so it ends up even. */
8014
8015long
217aa764 8016_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
8017{
8018 long symcount;
8019 long symtab_size;
8020 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
8021
8022 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
8023 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8024 if (symcount > 0)
8025 symtab_size -= sizeof (asymbol *);
252b5132
RH
8026
8027 return symtab_size;
8028}
8029
8030long
217aa764 8031_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
8032{
8033 long symcount;
8034 long symtab_size;
8035 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
8036
8037 if (elf_dynsymtab (abfd) == 0)
8038 {
8039 bfd_set_error (bfd_error_invalid_operation);
8040 return -1;
8041 }
8042
8043 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
8044 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8045 if (symcount > 0)
8046 symtab_size -= sizeof (asymbol *);
252b5132
RH
8047
8048 return symtab_size;
8049}
8050
8051long
217aa764
AM
8052_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
8053 sec_ptr asect)
252b5132
RH
8054{
8055 return (asect->reloc_count + 1) * sizeof (arelent *);
8056}
8057
8058/* Canonicalize the relocs. */
8059
8060long
217aa764
AM
8061_bfd_elf_canonicalize_reloc (bfd *abfd,
8062 sec_ptr section,
8063 arelent **relptr,
8064 asymbol **symbols)
252b5132
RH
8065{
8066 arelent *tblptr;
8067 unsigned int i;
9c5bfbb7 8068 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 8069
b34976b6 8070 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
8071 return -1;
8072
8073 tblptr = section->relocation;
8074 for (i = 0; i < section->reloc_count; i++)
8075 *relptr++ = tblptr++;
8076
8077 *relptr = NULL;
8078
8079 return section->reloc_count;
8080}
8081
8082long
6cee3f79 8083_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 8084{
9c5bfbb7 8085 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 8086 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
8087
8088 if (symcount >= 0)
8089 bfd_get_symcount (abfd) = symcount;
8090 return symcount;
8091}
8092
8093long
217aa764
AM
8094_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
8095 asymbol **allocation)
252b5132 8096{
9c5bfbb7 8097 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 8098 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
8099
8100 if (symcount >= 0)
8101 bfd_get_dynamic_symcount (abfd) = symcount;
8102 return symcount;
252b5132
RH
8103}
8104
8615f3f2
AM
8105/* Return the size required for the dynamic reloc entries. Any loadable
8106 section that was actually installed in the BFD, and has type SHT_REL
8107 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
8108 dynamic reloc section. */
252b5132
RH
8109
8110long
217aa764 8111_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
8112{
8113 long ret;
8114 asection *s;
8115
8116 if (elf_dynsymtab (abfd) == 0)
8117 {
8118 bfd_set_error (bfd_error_invalid_operation);
8119 return -1;
8120 }
8121
8122 ret = sizeof (arelent *);
8123 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 8124 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
8125 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8126 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 8127 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
8128 * sizeof (arelent *));
8129
8130 return ret;
8131}
8132
8615f3f2
AM
8133/* Canonicalize the dynamic relocation entries. Note that we return the
8134 dynamic relocations as a single block, although they are actually
8135 associated with particular sections; the interface, which was
8136 designed for SunOS style shared libraries, expects that there is only
8137 one set of dynamic relocs. Any loadable section that was actually
8138 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8139 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
8140
8141long
217aa764
AM
8142_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
8143 arelent **storage,
8144 asymbol **syms)
252b5132 8145{
217aa764 8146 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
8147 asection *s;
8148 long ret;
8149
8150 if (elf_dynsymtab (abfd) == 0)
8151 {
8152 bfd_set_error (bfd_error_invalid_operation);
8153 return -1;
8154 }
8155
8156 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
8157 ret = 0;
8158 for (s = abfd->sections; s != NULL; s = s->next)
8159 {
266b05cf 8160 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
8161 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8162 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8163 {
8164 arelent *p;
8165 long count, i;
8166
b34976b6 8167 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 8168 return -1;
eea6121a 8169 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
8170 p = s->relocation;
8171 for (i = 0; i < count; i++)
8172 *storage++ = p++;
8173 ret += count;
8174 }
8175 }
8176
8177 *storage = NULL;
8178
8179 return ret;
8180}
8181\f
8182/* Read in the version information. */
8183
b34976b6 8184bfd_boolean
fc0e6df6 8185_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
8186{
8187 bfd_byte *contents = NULL;
fc0e6df6
PB
8188 unsigned int freeidx = 0;
8189
8190 if (elf_dynverref (abfd) != 0)
8191 {
8192 Elf_Internal_Shdr *hdr;
8193 Elf_External_Verneed *everneed;
8194 Elf_Internal_Verneed *iverneed;
8195 unsigned int i;
d0fb9a8d 8196 bfd_byte *contents_end;
fc0e6df6
PB
8197
8198 hdr = &elf_tdata (abfd)->dynverref_hdr;
8199
601a03ba 8200 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verneed))
d0fb9a8d 8201 {
601a03ba 8202error_return_bad_verref:
4eca0228 8203 _bfd_error_handler
601a03ba
AM
8204 (_("%B: .gnu.version_r invalid entry"), abfd);
8205 bfd_set_error (bfd_error_bad_value);
d0fb9a8d
JJ
8206error_return_verref:
8207 elf_tdata (abfd)->verref = NULL;
8208 elf_tdata (abfd)->cverrefs = 0;
8209 goto error_return;
8210 }
601a03ba
AM
8211
8212 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
8213 if (contents == NULL)
8214 goto error_return_verref;
8215
fc0e6df6
PB
8216 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
8217 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 8218 goto error_return_verref;
fc0e6df6 8219
601a03ba
AM
8220 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
8221 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
8222
8223 if (elf_tdata (abfd)->verref == NULL)
d0fb9a8d
JJ
8224 goto error_return_verref;
8225
8226 BFD_ASSERT (sizeof (Elf_External_Verneed)
8227 == sizeof (Elf_External_Vernaux));
8228 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
8229 everneed = (Elf_External_Verneed *) contents;
8230 iverneed = elf_tdata (abfd)->verref;
8231 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8232 {
8233 Elf_External_Vernaux *evernaux;
8234 Elf_Internal_Vernaux *ivernaux;
8235 unsigned int j;
8236
8237 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8238
8239 iverneed->vn_bfd = abfd;
8240
8241 iverneed->vn_filename =
8242 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8243 iverneed->vn_file);
8244 if (iverneed->vn_filename == NULL)
601a03ba 8245 goto error_return_bad_verref;
fc0e6df6 8246
d0fb9a8d
JJ
8247 if (iverneed->vn_cnt == 0)
8248 iverneed->vn_auxptr = NULL;
8249 else
8250 {
a50b1753
NC
8251 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
8252 bfd_alloc2 (abfd, iverneed->vn_cnt,
8253 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
8254 if (iverneed->vn_auxptr == NULL)
8255 goto error_return_verref;
8256 }
8257
8258 if (iverneed->vn_aux
8259 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8260 goto error_return_bad_verref;
fc0e6df6
PB
8261
8262 evernaux = ((Elf_External_Vernaux *)
8263 ((bfd_byte *) everneed + iverneed->vn_aux));
8264 ivernaux = iverneed->vn_auxptr;
8265 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8266 {
8267 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8268
8269 ivernaux->vna_nodename =
8270 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8271 ivernaux->vna_name);
8272 if (ivernaux->vna_nodename == NULL)
601a03ba 8273 goto error_return_bad_verref;
fc0e6df6 8274
25ff461f
AM
8275 if (ivernaux->vna_other > freeidx)
8276 freeidx = ivernaux->vna_other;
8277
8278 ivernaux->vna_nextptr = NULL;
8279 if (ivernaux->vna_next == 0)
8280 {
8281 iverneed->vn_cnt = j + 1;
8282 break;
8283 }
fc0e6df6
PB
8284 if (j + 1 < iverneed->vn_cnt)
8285 ivernaux->vna_nextptr = ivernaux + 1;
fc0e6df6 8286
d0fb9a8d
JJ
8287 if (ivernaux->vna_next
8288 > (size_t) (contents_end - (bfd_byte *) evernaux))
601a03ba 8289 goto error_return_bad_verref;
d0fb9a8d 8290
fc0e6df6
PB
8291 evernaux = ((Elf_External_Vernaux *)
8292 ((bfd_byte *) evernaux + ivernaux->vna_next));
fc0e6df6
PB
8293 }
8294
25ff461f
AM
8295 iverneed->vn_nextref = NULL;
8296 if (iverneed->vn_next == 0)
8297 break;
fc0e6df6
PB
8298 if (i + 1 < hdr->sh_info)
8299 iverneed->vn_nextref = iverneed + 1;
fc0e6df6 8300
d0fb9a8d
JJ
8301 if (iverneed->vn_next
8302 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8303 goto error_return_bad_verref;
d0fb9a8d 8304
fc0e6df6
PB
8305 everneed = ((Elf_External_Verneed *)
8306 ((bfd_byte *) everneed + iverneed->vn_next));
8307 }
25ff461f 8308 elf_tdata (abfd)->cverrefs = i;
fc0e6df6
PB
8309
8310 free (contents);
8311 contents = NULL;
8312 }
252b5132
RH
8313
8314 if (elf_dynverdef (abfd) != 0)
8315 {
8316 Elf_Internal_Shdr *hdr;
8317 Elf_External_Verdef *everdef;
8318 Elf_Internal_Verdef *iverdef;
f631889e
UD
8319 Elf_Internal_Verdef *iverdefarr;
8320 Elf_Internal_Verdef iverdefmem;
252b5132 8321 unsigned int i;
062e2358 8322 unsigned int maxidx;
d0fb9a8d 8323 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
8324
8325 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8326
601a03ba
AM
8327 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
8328 {
8329 error_return_bad_verdef:
4eca0228 8330 _bfd_error_handler
601a03ba
AM
8331 (_("%B: .gnu.version_d invalid entry"), abfd);
8332 bfd_set_error (bfd_error_bad_value);
8333 error_return_verdef:
8334 elf_tdata (abfd)->verdef = NULL;
8335 elf_tdata (abfd)->cverdefs = 0;
8336 goto error_return;
8337 }
8338
a50b1753 8339 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132 8340 if (contents == NULL)
601a03ba 8341 goto error_return_verdef;
252b5132 8342 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 8343 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
601a03ba 8344 goto error_return_verdef;
d0fb9a8d
JJ
8345
8346 BFD_ASSERT (sizeof (Elf_External_Verdef)
8347 >= sizeof (Elf_External_Verdaux));
8348 contents_end_def = contents + hdr->sh_size
8349 - sizeof (Elf_External_Verdef);
8350 contents_end_aux = contents + hdr->sh_size
8351 - sizeof (Elf_External_Verdaux);
8352
f631889e
UD
8353 /* We know the number of entries in the section but not the maximum
8354 index. Therefore we have to run through all entries and find
8355 the maximum. */
252b5132 8356 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
8357 maxidx = 0;
8358 for (i = 0; i < hdr->sh_info; ++i)
8359 {
8360 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8361
601a03ba
AM
8362 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
8363 goto error_return_bad_verdef;
062e2358
AM
8364 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
8365 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 8366
25ff461f
AM
8367 if (iverdefmem.vd_next == 0)
8368 break;
8369
d0fb9a8d
JJ
8370 if (iverdefmem.vd_next
8371 > (size_t) (contents_end_def - (bfd_byte *) everdef))
601a03ba 8372 goto error_return_bad_verdef;
d0fb9a8d 8373
f631889e
UD
8374 everdef = ((Elf_External_Verdef *)
8375 ((bfd_byte *) everdef + iverdefmem.vd_next));
8376 }
8377
fc0e6df6
PB
8378 if (default_imported_symver)
8379 {
8380 if (freeidx > maxidx)
8381 maxidx = ++freeidx;
8382 else
8383 freeidx = ++maxidx;
8384 }
201159ec 8385
601a03ba
AM
8386 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
8387 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e 8388 if (elf_tdata (abfd)->verdef == NULL)
601a03ba 8389 goto error_return_verdef;
f631889e
UD
8390
8391 elf_tdata (abfd)->cverdefs = maxidx;
8392
8393 everdef = (Elf_External_Verdef *) contents;
8394 iverdefarr = elf_tdata (abfd)->verdef;
8395 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
8396 {
8397 Elf_External_Verdaux *everdaux;
8398 Elf_Internal_Verdaux *iverdaux;
8399 unsigned int j;
8400
f631889e
UD
8401 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8402
d0fb9a8d 8403 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
601a03ba 8404 goto error_return_bad_verdef;
d0fb9a8d 8405
f631889e 8406 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
595bce75 8407 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
252b5132
RH
8408
8409 iverdef->vd_bfd = abfd;
8410
d0fb9a8d
JJ
8411 if (iverdef->vd_cnt == 0)
8412 iverdef->vd_auxptr = NULL;
8413 else
8414 {
a50b1753
NC
8415 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
8416 bfd_alloc2 (abfd, iverdef->vd_cnt,
8417 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
8418 if (iverdef->vd_auxptr == NULL)
8419 goto error_return_verdef;
8420 }
8421
8422 if (iverdef->vd_aux
8423 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
601a03ba 8424 goto error_return_bad_verdef;
252b5132
RH
8425
8426 everdaux = ((Elf_External_Verdaux *)
8427 ((bfd_byte *) everdef + iverdef->vd_aux));
8428 iverdaux = iverdef->vd_auxptr;
8429 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
8430 {
8431 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
8432
8433 iverdaux->vda_nodename =
8434 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8435 iverdaux->vda_name);
8436 if (iverdaux->vda_nodename == NULL)
601a03ba 8437 goto error_return_bad_verdef;
252b5132 8438
25ff461f
AM
8439 iverdaux->vda_nextptr = NULL;
8440 if (iverdaux->vda_next == 0)
8441 {
8442 iverdef->vd_cnt = j + 1;
8443 break;
8444 }
252b5132
RH
8445 if (j + 1 < iverdef->vd_cnt)
8446 iverdaux->vda_nextptr = iverdaux + 1;
252b5132 8447
d0fb9a8d
JJ
8448 if (iverdaux->vda_next
8449 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
601a03ba 8450 goto error_return_bad_verdef;
d0fb9a8d 8451
252b5132
RH
8452 everdaux = ((Elf_External_Verdaux *)
8453 ((bfd_byte *) everdaux + iverdaux->vda_next));
8454 }
8455
595bce75 8456 iverdef->vd_nodename = NULL;
d0fb9a8d
JJ
8457 if (iverdef->vd_cnt)
8458 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 8459
25ff461f
AM
8460 iverdef->vd_nextdef = NULL;
8461 if (iverdef->vd_next == 0)
8462 break;
d0fb9a8d 8463 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132 8464 iverdef->vd_nextdef = iverdef + 1;
252b5132
RH
8465
8466 everdef = ((Elf_External_Verdef *)
8467 ((bfd_byte *) everdef + iverdef->vd_next));
8468 }
8469
8470 free (contents);
8471 contents = NULL;
8472 }
fc0e6df6 8473 else if (default_imported_symver)
252b5132 8474 {
fc0e6df6
PB
8475 if (freeidx < 3)
8476 freeidx = 3;
8477 else
8478 freeidx++;
252b5132 8479
a50b1753
NC
8480 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
8481 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 8482 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
8483 goto error_return;
8484
fc0e6df6
PB
8485 elf_tdata (abfd)->cverdefs = freeidx;
8486 }
252b5132 8487
fc0e6df6
PB
8488 /* Create a default version based on the soname. */
8489 if (default_imported_symver)
8490 {
8491 Elf_Internal_Verdef *iverdef;
8492 Elf_Internal_Verdaux *iverdaux;
252b5132 8493
5bb3703f 8494 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
252b5132 8495
fc0e6df6
PB
8496 iverdef->vd_version = VER_DEF_CURRENT;
8497 iverdef->vd_flags = 0;
8498 iverdef->vd_ndx = freeidx;
8499 iverdef->vd_cnt = 1;
252b5132 8500
fc0e6df6 8501 iverdef->vd_bfd = abfd;
252b5132 8502
fc0e6df6
PB
8503 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
8504 if (iverdef->vd_nodename == NULL)
d0fb9a8d 8505 goto error_return_verdef;
fc0e6df6 8506 iverdef->vd_nextdef = NULL;
601a03ba
AM
8507 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
8508 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
d0fb9a8d
JJ
8509 if (iverdef->vd_auxptr == NULL)
8510 goto error_return_verdef;
252b5132 8511
fc0e6df6
PB
8512 iverdaux = iverdef->vd_auxptr;
8513 iverdaux->vda_nodename = iverdef->vd_nodename;
252b5132
RH
8514 }
8515
b34976b6 8516 return TRUE;
252b5132
RH
8517
8518 error_return:
5ed6aba4 8519 if (contents != NULL)
252b5132 8520 free (contents);
b34976b6 8521 return FALSE;
252b5132
RH
8522}
8523\f
8524asymbol *
217aa764 8525_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
8526{
8527 elf_symbol_type *newsym;
8528
201159ec 8529 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof * newsym);
252b5132
RH
8530 if (!newsym)
8531 return NULL;
201159ec
NC
8532 newsym->symbol.the_bfd = abfd;
8533 return &newsym->symbol;
252b5132
RH
8534}
8535
8536void
217aa764
AM
8537_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
8538 asymbol *symbol,
8539 symbol_info *ret)
252b5132
RH
8540{
8541 bfd_symbol_info (symbol, ret);
8542}
8543
8544/* Return whether a symbol name implies a local symbol. Most targets
8545 use this function for the is_local_label_name entry point, but some
8546 override it. */
8547
b34976b6 8548bfd_boolean
217aa764
AM
8549_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
8550 const char *name)
252b5132
RH
8551{
8552 /* Normal local symbols start with ``.L''. */
8553 if (name[0] == '.' && name[1] == 'L')
b34976b6 8554 return TRUE;
252b5132
RH
8555
8556 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
8557 DWARF debugging symbols starting with ``..''. */
8558 if (name[0] == '.' && name[1] == '.')
b34976b6 8559 return TRUE;
252b5132
RH
8560
8561 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
8562 emitting DWARF debugging output. I suspect this is actually a
8563 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
8564 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
8565 underscore to be emitted on some ELF targets). For ease of use,
8566 we treat such symbols as local. */
8567 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 8568 return TRUE;
252b5132 8569
b1fa9dd6
NC
8570 /* Treat assembler generated fake symbols, dollar local labels and
8571 forward-backward labels (aka local labels) as locals.
8572 These labels have the form:
8573
8574 L0^A.* (fake symbols)
8575
8576 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
8577
8578 Versions which start with .L will have already been matched above,
8579 so we only need to match the rest. */
8580 if (name[0] == 'L' && ISDIGIT (name[1]))
8581 {
8582 bfd_boolean ret = FALSE;
8583 const char * p;
8584 char c;
8585
8586 for (p = name + 2; (c = *p); p++)
8587 {
8588 if (c == 1 || c == 2)
8589 {
8590 if (c == 1 && p == name + 2)
8591 /* A fake symbol. */
8592 return TRUE;
8593
8594 /* FIXME: We are being paranoid here and treating symbols like
8595 L0^Bfoo as if there were non-local, on the grounds that the
8596 assembler will never generate them. But can any symbol
8597 containing an ASCII value in the range 1-31 ever be anything
8598 other than some kind of local ? */
8599 ret = TRUE;
8600 }
8601
8602 if (! ISDIGIT (c))
8603 {
8604 ret = FALSE;
8605 break;
8606 }
8607 }
8608 return ret;
8609 }
ffa54770 8610
b34976b6 8611 return FALSE;
252b5132
RH
8612}
8613
8614alent *
217aa764
AM
8615_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
8616 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
8617{
8618 abort ();
8619 return NULL;
8620}
8621
b34976b6 8622bfd_boolean
217aa764
AM
8623_bfd_elf_set_arch_mach (bfd *abfd,
8624 enum bfd_architecture arch,
8625 unsigned long machine)
252b5132
RH
8626{
8627 /* If this isn't the right architecture for this backend, and this
8628 isn't the generic backend, fail. */
8629 if (arch != get_elf_backend_data (abfd)->arch
8630 && arch != bfd_arch_unknown
8631 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 8632 return FALSE;
252b5132
RH
8633
8634 return bfd_default_set_arch_mach (abfd, arch, machine);
8635}
8636
d1fad7c6
NC
8637/* Find the nearest line to a particular section and offset,
8638 for error reporting. */
8639
b34976b6 8640bfd_boolean
217aa764 8641_bfd_elf_find_nearest_line (bfd *abfd,
217aa764 8642 asymbol **symbols,
fb167eb2 8643 asection *section,
217aa764
AM
8644 bfd_vma offset,
8645 const char **filename_ptr,
8646 const char **functionname_ptr,
fb167eb2
AM
8647 unsigned int *line_ptr,
8648 unsigned int *discriminator_ptr)
d1fad7c6 8649{
b34976b6 8650 bfd_boolean found;
d1fad7c6 8651
fb167eb2 8652 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
4e8a9624 8653 filename_ptr, functionname_ptr,
fb167eb2
AM
8654 line_ptr, discriminator_ptr,
8655 dwarf_debug_sections, 0,
e00e8198
AM
8656 &elf_tdata (abfd)->dwarf2_find_line_info)
8657 || _bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
8658 filename_ptr, functionname_ptr,
8659 line_ptr))
d1fad7c6
NC
8660 {
8661 if (!*functionname_ptr)
e00e8198
AM
8662 _bfd_elf_find_function (abfd, symbols, section, offset,
8663 *filename_ptr ? NULL : filename_ptr,
8664 functionname_ptr);
b34976b6 8665 return TRUE;
d1fad7c6
NC
8666 }
8667
8668 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
8669 &found, filename_ptr,
8670 functionname_ptr, line_ptr,
8671 &elf_tdata (abfd)->line_info))
b34976b6 8672 return FALSE;
dc43ada5 8673 if (found && (*functionname_ptr || *line_ptr))
b34976b6 8674 return TRUE;
d1fad7c6
NC
8675
8676 if (symbols == NULL)
b34976b6 8677 return FALSE;
d1fad7c6 8678
e00e8198
AM
8679 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
8680 filename_ptr, functionname_ptr))
b34976b6 8681 return FALSE;
d1fad7c6 8682
252b5132 8683 *line_ptr = 0;
b34976b6 8684 return TRUE;
252b5132
RH
8685}
8686
5420f73d
L
8687/* Find the line for a symbol. */
8688
8689bfd_boolean
8690_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
8691 const char **filename_ptr, unsigned int *line_ptr)
9b8d1a36 8692{
fb167eb2
AM
8693 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
8694 filename_ptr, NULL, line_ptr, NULL,
8695 dwarf_debug_sections, 0,
8696 &elf_tdata (abfd)->dwarf2_find_line_info);
5420f73d
L
8697}
8698
4ab527b0
FF
8699/* After a call to bfd_find_nearest_line, successive calls to
8700 bfd_find_inliner_info can be used to get source information about
8701 each level of function inlining that terminated at the address
8702 passed to bfd_find_nearest_line. Currently this is only supported
8703 for DWARF2 with appropriate DWARF3 extensions. */
8704
8705bfd_boolean
8706_bfd_elf_find_inliner_info (bfd *abfd,
8707 const char **filename_ptr,
8708 const char **functionname_ptr,
8709 unsigned int *line_ptr)
8710{
8711 bfd_boolean found;
8712 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
8713 functionname_ptr, line_ptr,
8714 & elf_tdata (abfd)->dwarf2_find_line_info);
8715 return found;
8716}
8717
252b5132 8718int
a6b96beb 8719_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 8720{
8ded5a0f
AM
8721 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8722 int ret = bed->s->sizeof_ehdr;
252b5132 8723
0e1862bb 8724 if (!bfd_link_relocatable (info))
8ded5a0f 8725 {
12bd6957 8726 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 8727
62d7a5f6
AM
8728 if (phdr_size == (bfd_size_type) -1)
8729 {
8730 struct elf_segment_map *m;
8731
8732 phdr_size = 0;
12bd6957 8733 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62d7a5f6 8734 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 8735
62d7a5f6
AM
8736 if (phdr_size == 0)
8737 phdr_size = get_program_header_size (abfd, info);
8738 }
8ded5a0f 8739
12bd6957 8740 elf_program_header_size (abfd) = phdr_size;
8ded5a0f
AM
8741 ret += phdr_size;
8742 }
8743
252b5132
RH
8744 return ret;
8745}
8746
b34976b6 8747bfd_boolean
217aa764
AM
8748_bfd_elf_set_section_contents (bfd *abfd,
8749 sec_ptr section,
0f867abe 8750 const void *location,
217aa764
AM
8751 file_ptr offset,
8752 bfd_size_type count)
252b5132
RH
8753{
8754 Elf_Internal_Shdr *hdr;
1b6aeedb 8755 file_ptr pos;
252b5132
RH
8756
8757 if (! abfd->output_has_begun
217aa764 8758 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 8759 return FALSE;
252b5132 8760
0ce398f1
L
8761 if (!count)
8762 return TRUE;
8763
252b5132 8764 hdr = &elf_section_data (section)->this_hdr;
0ce398f1
L
8765 if (hdr->sh_offset == (file_ptr) -1)
8766 {
8767 /* We must compress this section. Write output to the buffer. */
8768 unsigned char *contents = hdr->contents;
8769 if ((offset + count) > hdr->sh_size
8770 || (section->flags & SEC_ELF_COMPRESS) == 0
8771 || contents == NULL)
8772 abort ();
8773 memcpy (contents + offset, location, count);
8774 return TRUE;
8775 }
dc810e39
AM
8776 pos = hdr->sh_offset + offset;
8777 if (bfd_seek (abfd, pos, SEEK_SET) != 0
8778 || bfd_bwrite (location, count, abfd) != count)
b34976b6 8779 return FALSE;
252b5132 8780
b34976b6 8781 return TRUE;
252b5132
RH
8782}
8783
8784void
217aa764
AM
8785_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
8786 arelent *cache_ptr ATTRIBUTE_UNUSED,
8787 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
8788{
8789 abort ();
8790}
8791
252b5132
RH
8792/* Try to convert a non-ELF reloc into an ELF one. */
8793
b34976b6 8794bfd_boolean
217aa764 8795_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 8796{
c044fabd 8797 /* Check whether we really have an ELF howto. */
252b5132
RH
8798
8799 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
8800 {
8801 bfd_reloc_code_real_type code;
8802 reloc_howto_type *howto;
8803
8804 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 8805 equivalent ELF reloc. */
252b5132
RH
8806
8807 if (areloc->howto->pc_relative)
8808 {
8809 switch (areloc->howto->bitsize)
8810 {
8811 case 8:
8812 code = BFD_RELOC_8_PCREL;
8813 break;
8814 case 12:
8815 code = BFD_RELOC_12_PCREL;
8816 break;
8817 case 16:
8818 code = BFD_RELOC_16_PCREL;
8819 break;
8820 case 24:
8821 code = BFD_RELOC_24_PCREL;
8822 break;
8823 case 32:
8824 code = BFD_RELOC_32_PCREL;
8825 break;
8826 case 64:
8827 code = BFD_RELOC_64_PCREL;
8828 break;
8829 default:
8830 goto fail;
8831 }
8832
8833 howto = bfd_reloc_type_lookup (abfd, code);
8834
8835 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
8836 {
8837 if (howto->pcrel_offset)
8838 areloc->addend += areloc->address;
8839 else
8840 areloc->addend -= areloc->address; /* addend is unsigned!! */
8841 }
8842 }
8843 else
8844 {
8845 switch (areloc->howto->bitsize)
8846 {
8847 case 8:
8848 code = BFD_RELOC_8;
8849 break;
8850 case 14:
8851 code = BFD_RELOC_14;
8852 break;
8853 case 16:
8854 code = BFD_RELOC_16;
8855 break;
8856 case 26:
8857 code = BFD_RELOC_26;
8858 break;
8859 case 32:
8860 code = BFD_RELOC_32;
8861 break;
8862 case 64:
8863 code = BFD_RELOC_64;
8864 break;
8865 default:
8866 goto fail;
8867 }
8868
8869 howto = bfd_reloc_type_lookup (abfd, code);
8870 }
8871
8872 if (howto)
8873 areloc->howto = howto;
8874 else
8875 goto fail;
8876 }
8877
b34976b6 8878 return TRUE;
252b5132
RH
8879
8880 fail:
4eca0228 8881 _bfd_error_handler
695344c0 8882 /* xgettext:c-format */
d003868e
AM
8883 (_("%B: unsupported relocation type %s"),
8884 abfd, areloc->howto->name);
252b5132 8885 bfd_set_error (bfd_error_bad_value);
b34976b6 8886 return FALSE;
252b5132
RH
8887}
8888
b34976b6 8889bfd_boolean
217aa764 8890_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132 8891{
d9071b0c
TG
8892 struct elf_obj_tdata *tdata = elf_tdata (abfd);
8893 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
252b5132 8894 {
c0355132 8895 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 8896 _bfd_elf_strtab_free (elf_shstrtab (abfd));
d9071b0c 8897 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
252b5132
RH
8898 }
8899
8900 return _bfd_generic_close_and_cleanup (abfd);
8901}
8902
8903/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
8904 in the relocation's offset. Thus we cannot allow any sort of sanity
8905 range-checking to interfere. There is nothing else to do in processing
8906 this reloc. */
8907
8908bfd_reloc_status_type
217aa764
AM
8909_bfd_elf_rel_vtable_reloc_fn
8910 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 8911 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
8912 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
8913 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
8914{
8915 return bfd_reloc_ok;
8916}
252b5132
RH
8917\f
8918/* Elf core file support. Much of this only works on native
8919 toolchains, since we rely on knowing the
8920 machine-dependent procfs structure in order to pick
c044fabd 8921 out details about the corefile. */
252b5132
RH
8922
8923#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
8924/* Needed for new procfs interface on sparc-solaris. */
8925# define _STRUCTURED_PROC 1
252b5132
RH
8926# include <sys/procfs.h>
8927#endif
8928
261b8d08
PA
8929/* Return a PID that identifies a "thread" for threaded cores, or the
8930 PID of the main process for non-threaded cores. */
252b5132
RH
8931
8932static int
217aa764 8933elfcore_make_pid (bfd *abfd)
252b5132 8934{
261b8d08
PA
8935 int pid;
8936
228e534f 8937 pid = elf_tdata (abfd)->core->lwpid;
261b8d08 8938 if (pid == 0)
228e534f 8939 pid = elf_tdata (abfd)->core->pid;
261b8d08
PA
8940
8941 return pid;
252b5132
RH
8942}
8943
252b5132
RH
8944/* If there isn't a section called NAME, make one, using
8945 data from SECT. Note, this function will generate a
8946 reference to NAME, so you shouldn't deallocate or
c044fabd 8947 overwrite it. */
252b5132 8948
b34976b6 8949static bfd_boolean
217aa764 8950elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 8951{
c044fabd 8952 asection *sect2;
252b5132
RH
8953
8954 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 8955 return TRUE;
252b5132 8956
117ed4f8 8957 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 8958 if (sect2 == NULL)
b34976b6 8959 return FALSE;
252b5132 8960
eea6121a 8961 sect2->size = sect->size;
252b5132 8962 sect2->filepos = sect->filepos;
252b5132 8963 sect2->alignment_power = sect->alignment_power;
b34976b6 8964 return TRUE;
252b5132
RH
8965}
8966
bb0082d6
AM
8967/* Create a pseudosection containing SIZE bytes at FILEPOS. This
8968 actually creates up to two pseudosections:
8969 - For the single-threaded case, a section named NAME, unless
8970 such a section already exists.
8971 - For the multi-threaded case, a section named "NAME/PID", where
8972 PID is elfcore_make_pid (abfd).
8973 Both pseudosections have identical contents. */
b34976b6 8974bfd_boolean
217aa764
AM
8975_bfd_elfcore_make_pseudosection (bfd *abfd,
8976 char *name,
8977 size_t size,
8978 ufile_ptr filepos)
bb0082d6
AM
8979{
8980 char buf[100];
8981 char *threaded_name;
d4c88bbb 8982 size_t len;
bb0082d6
AM
8983 asection *sect;
8984
8985 /* Build the section name. */
8986
8987 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 8988 len = strlen (buf) + 1;
a50b1753 8989 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 8990 if (threaded_name == NULL)
b34976b6 8991 return FALSE;
d4c88bbb 8992 memcpy (threaded_name, buf, len);
bb0082d6 8993
117ed4f8
AM
8994 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
8995 SEC_HAS_CONTENTS);
bb0082d6 8996 if (sect == NULL)
b34976b6 8997 return FALSE;
eea6121a 8998 sect->size = size;
bb0082d6 8999 sect->filepos = filepos;
bb0082d6
AM
9000 sect->alignment_power = 2;
9001
936e320b 9002 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
9003}
9004
252b5132 9005/* prstatus_t exists on:
4a938328 9006 solaris 2.5+
252b5132
RH
9007 linux 2.[01] + glibc
9008 unixware 4.2
9009*/
9010
9011#if defined (HAVE_PRSTATUS_T)
a7b97311 9012
b34976b6 9013static bfd_boolean
217aa764 9014elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 9015{
eea6121a 9016 size_t size;
7ee38065 9017 int offset;
252b5132 9018
4a938328
MS
9019 if (note->descsz == sizeof (prstatus_t))
9020 {
9021 prstatus_t prstat;
252b5132 9022
eea6121a 9023 size = sizeof (prstat.pr_reg);
7ee38065 9024 offset = offsetof (prstatus_t, pr_reg);
4a938328 9025 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 9026
fa49d224
NC
9027 /* Do not overwrite the core signal if it
9028 has already been set by another thread. */
228e534f
AM
9029 if (elf_tdata (abfd)->core->signal == 0)
9030 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9031 if (elf_tdata (abfd)->core->pid == 0)
9032 elf_tdata (abfd)->core->pid = prstat.pr_pid;
252b5132 9033
4a938328
MS
9034 /* pr_who exists on:
9035 solaris 2.5+
9036 unixware 4.2
9037 pr_who doesn't exist on:
9038 linux 2.[01]
9039 */
252b5132 9040#if defined (HAVE_PRSTATUS_T_PR_WHO)
228e534f 9041 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 9042#else
228e534f 9043 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
252b5132 9044#endif
4a938328 9045 }
7ee38065 9046#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
9047 else if (note->descsz == sizeof (prstatus32_t))
9048 {
9049 /* 64-bit host, 32-bit corefile */
9050 prstatus32_t prstat;
9051
eea6121a 9052 size = sizeof (prstat.pr_reg);
7ee38065 9053 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
9054 memcpy (&prstat, note->descdata, sizeof (prstat));
9055
fa49d224
NC
9056 /* Do not overwrite the core signal if it
9057 has already been set by another thread. */
228e534f
AM
9058 if (elf_tdata (abfd)->core->signal == 0)
9059 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9060 if (elf_tdata (abfd)->core->pid == 0)
9061 elf_tdata (abfd)->core->pid = prstat.pr_pid;
4a938328
MS
9062
9063 /* pr_who exists on:
9064 solaris 2.5+
9065 unixware 4.2
9066 pr_who doesn't exist on:
9067 linux 2.[01]
9068 */
7ee38065 9069#if defined (HAVE_PRSTATUS32_T_PR_WHO)
228e534f 9070 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 9071#else
228e534f 9072 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
4a938328
MS
9073#endif
9074 }
7ee38065 9075#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
9076 else
9077 {
9078 /* Fail - we don't know how to handle any other
9079 note size (ie. data object type). */
b34976b6 9080 return TRUE;
4a938328 9081 }
252b5132 9082
bb0082d6 9083 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 9084 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 9085 size, note->descpos + offset);
252b5132
RH
9086}
9087#endif /* defined (HAVE_PRSTATUS_T) */
9088
bb0082d6 9089/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 9090static bfd_boolean
217aa764
AM
9091elfcore_make_note_pseudosection (bfd *abfd,
9092 char *name,
9093 Elf_Internal_Note *note)
252b5132 9094{
936e320b
AM
9095 return _bfd_elfcore_make_pseudosection (abfd, name,
9096 note->descsz, note->descpos);
252b5132
RH
9097}
9098
ff08c6bb
JB
9099/* There isn't a consistent prfpregset_t across platforms,
9100 but it doesn't matter, because we don't have to pick this
c044fabd
KH
9101 data structure apart. */
9102
b34976b6 9103static bfd_boolean
217aa764 9104elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
9105{
9106 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9107}
9108
ff08c6bb 9109/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 9110 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 9111 literally. */
c044fabd 9112
b34976b6 9113static bfd_boolean
217aa764 9114elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
9115{
9116 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9117}
9118
4339cae0
L
9119/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9120 with a note type of NT_X86_XSTATE. Just include the whole note's
9121 contents literally. */
9122
9123static bfd_boolean
9124elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
9125{
9126 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
9127}
9128
97753bd5
AM
9129static bfd_boolean
9130elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
9131{
9132 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
9133}
9134
89eeb0bc
LM
9135static bfd_boolean
9136elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
9137{
9138 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
9139}
97753bd5 9140
0675e188
UW
9141static bfd_boolean
9142elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
9143{
9144 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
9145}
9146
d7eeb400
MS
9147static bfd_boolean
9148elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
9149{
9150 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
9151}
9152
9153static bfd_boolean
9154elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
9155{
9156 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
9157}
9158
9159static bfd_boolean
9160elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
9161{
9162 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
9163}
9164
9165static bfd_boolean
9166elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
9167{
9168 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
9169}
9170
9171static bfd_boolean
9172elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9173{
9174 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9175}
9176
355b81d9
UW
9177static bfd_boolean
9178elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9179{
9180 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9181}
9182
9183static bfd_boolean
9184elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9185{
9186 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9187}
9188
abb3f6cc
NC
9189static bfd_boolean
9190elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9191{
9192 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9193}
9194
4ef9f41a
AA
9195static bfd_boolean
9196elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
9197{
9198 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
9199}
9200
9201static bfd_boolean
9202elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
9203{
9204 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
9205}
9206
faa9a424
UW
9207static bfd_boolean
9208elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
9209{
9210 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
9211}
9212
652451f8
YZ
9213static bfd_boolean
9214elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
9215{
9216 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
9217}
9218
9219static bfd_boolean
9220elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
9221{
9222 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
9223}
9224
9225static bfd_boolean
9226elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
9227{
9228 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
9229}
9230
252b5132 9231#if defined (HAVE_PRPSINFO_T)
4a938328 9232typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 9233#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9234typedef prpsinfo32_t elfcore_psinfo32_t;
9235#endif
252b5132
RH
9236#endif
9237
9238#if defined (HAVE_PSINFO_T)
4a938328 9239typedef psinfo_t elfcore_psinfo_t;
7ee38065 9240#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9241typedef psinfo32_t elfcore_psinfo32_t;
9242#endif
252b5132
RH
9243#endif
9244
252b5132
RH
9245/* return a malloc'ed copy of a string at START which is at
9246 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 9247 the copy will always have a terminating '\0'. */
252b5132 9248
936e320b 9249char *
217aa764 9250_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 9251{
dc810e39 9252 char *dups;
a50b1753 9253 char *end = (char *) memchr (start, '\0', max);
dc810e39 9254 size_t len;
252b5132
RH
9255
9256 if (end == NULL)
9257 len = max;
9258 else
9259 len = end - start;
9260
a50b1753 9261 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 9262 if (dups == NULL)
252b5132
RH
9263 return NULL;
9264
dc810e39
AM
9265 memcpy (dups, start, len);
9266 dups[len] = '\0';
252b5132 9267
dc810e39 9268 return dups;
252b5132
RH
9269}
9270
bb0082d6 9271#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 9272static bfd_boolean
217aa764 9273elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 9274{
4a938328
MS
9275 if (note->descsz == sizeof (elfcore_psinfo_t))
9276 {
9277 elfcore_psinfo_t psinfo;
252b5132 9278
7ee38065 9279 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9280
335e41d4 9281#if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
228e534f 9282 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9283#endif
228e534f 9284 elf_tdata (abfd)->core->program
936e320b
AM
9285 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9286 sizeof (psinfo.pr_fname));
252b5132 9287
228e534f 9288 elf_tdata (abfd)->core->command
936e320b
AM
9289 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9290 sizeof (psinfo.pr_psargs));
4a938328 9291 }
7ee38065 9292#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
9293 else if (note->descsz == sizeof (elfcore_psinfo32_t))
9294 {
9295 /* 64-bit host, 32-bit corefile */
9296 elfcore_psinfo32_t psinfo;
9297
7ee38065 9298 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9299
335e41d4 9300#if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
228e534f 9301 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9302#endif
228e534f 9303 elf_tdata (abfd)->core->program
936e320b
AM
9304 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9305 sizeof (psinfo.pr_fname));
4a938328 9306
228e534f 9307 elf_tdata (abfd)->core->command
936e320b
AM
9308 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9309 sizeof (psinfo.pr_psargs));
4a938328
MS
9310 }
9311#endif
9312
9313 else
9314 {
9315 /* Fail - we don't know how to handle any other
9316 note size (ie. data object type). */
b34976b6 9317 return TRUE;
4a938328 9318 }
252b5132
RH
9319
9320 /* Note that for some reason, a spurious space is tacked
9321 onto the end of the args in some (at least one anyway)
c044fabd 9322 implementations, so strip it off if it exists. */
252b5132
RH
9323
9324 {
228e534f 9325 char *command = elf_tdata (abfd)->core->command;
252b5132
RH
9326 int n = strlen (command);
9327
9328 if (0 < n && command[n - 1] == ' ')
9329 command[n - 1] = '\0';
9330 }
9331
b34976b6 9332 return TRUE;
252b5132
RH
9333}
9334#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
9335
252b5132 9336#if defined (HAVE_PSTATUS_T)
b34976b6 9337static bfd_boolean
217aa764 9338elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 9339{
f572a39d
AM
9340 if (note->descsz == sizeof (pstatus_t)
9341#if defined (HAVE_PXSTATUS_T)
9342 || note->descsz == sizeof (pxstatus_t)
9343#endif
9344 )
4a938328
MS
9345 {
9346 pstatus_t pstat;
252b5132 9347
4a938328 9348 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9349
228e534f 9350 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328 9351 }
7ee38065 9352#if defined (HAVE_PSTATUS32_T)
4a938328
MS
9353 else if (note->descsz == sizeof (pstatus32_t))
9354 {
9355 /* 64-bit host, 32-bit corefile */
9356 pstatus32_t pstat;
252b5132 9357
4a938328 9358 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9359
228e534f 9360 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328
MS
9361 }
9362#endif
252b5132
RH
9363 /* Could grab some more details from the "representative"
9364 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 9365 NT_LWPSTATUS note, presumably. */
252b5132 9366
b34976b6 9367 return TRUE;
252b5132
RH
9368}
9369#endif /* defined (HAVE_PSTATUS_T) */
9370
252b5132 9371#if defined (HAVE_LWPSTATUS_T)
b34976b6 9372static bfd_boolean
217aa764 9373elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
9374{
9375 lwpstatus_t lwpstat;
9376 char buf[100];
c044fabd 9377 char *name;
d4c88bbb 9378 size_t len;
c044fabd 9379 asection *sect;
252b5132 9380
f572a39d
AM
9381 if (note->descsz != sizeof (lwpstat)
9382#if defined (HAVE_LWPXSTATUS_T)
9383 && note->descsz != sizeof (lwpxstatus_t)
9384#endif
9385 )
b34976b6 9386 return TRUE;
252b5132
RH
9387
9388 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
9389
228e534f 9390 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
a1504221
JB
9391 /* Do not overwrite the core signal if it has already been set by
9392 another thread. */
228e534f
AM
9393 if (elf_tdata (abfd)->core->signal == 0)
9394 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
252b5132 9395
c044fabd 9396 /* Make a ".reg/999" section. */
252b5132
RH
9397
9398 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 9399 len = strlen (buf) + 1;
217aa764 9400 name = bfd_alloc (abfd, len);
252b5132 9401 if (name == NULL)
b34976b6 9402 return FALSE;
d4c88bbb 9403 memcpy (name, buf, len);
252b5132 9404
117ed4f8 9405 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9406 if (sect == NULL)
b34976b6 9407 return FALSE;
252b5132
RH
9408
9409#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9410 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
9411 sect->filepos = note->descpos
9412 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
9413#endif
9414
9415#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 9416 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
9417 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
9418#endif
9419
252b5132
RH
9420 sect->alignment_power = 2;
9421
9422 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9423 return FALSE;
252b5132
RH
9424
9425 /* Make a ".reg2/999" section */
9426
9427 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 9428 len = strlen (buf) + 1;
217aa764 9429 name = bfd_alloc (abfd, len);
252b5132 9430 if (name == NULL)
b34976b6 9431 return FALSE;
d4c88bbb 9432 memcpy (name, buf, len);
252b5132 9433
117ed4f8 9434 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9435 if (sect == NULL)
b34976b6 9436 return FALSE;
252b5132
RH
9437
9438#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9439 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
9440 sect->filepos = note->descpos
9441 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
9442#endif
9443
9444#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 9445 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
9446 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
9447#endif
9448
252b5132
RH
9449 sect->alignment_power = 2;
9450
936e320b 9451 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
9452}
9453#endif /* defined (HAVE_LWPSTATUS_T) */
9454
b34976b6 9455static bfd_boolean
217aa764 9456elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
9457{
9458 char buf[30];
c044fabd 9459 char *name;
d4c88bbb 9460 size_t len;
c044fabd 9461 asection *sect;
4a6636fb
PA
9462 int type;
9463 int is_active_thread;
9464 bfd_vma base_addr;
16e9c715 9465
4a6636fb 9466 if (note->descsz < 728)
b34976b6 9467 return TRUE;
16e9c715 9468
4a6636fb
PA
9469 if (! CONST_STRNEQ (note->namedata, "win32"))
9470 return TRUE;
9471
9472 type = bfd_get_32 (abfd, note->descdata);
c044fabd 9473
4a6636fb 9474 switch (type)
16e9c715 9475 {
4a6636fb 9476 case 1 /* NOTE_INFO_PROCESS */:
228e534f 9477 /* FIXME: need to add ->core->command. */
4a6636fb 9478 /* process_info.pid */
228e534f 9479 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
4a6636fb 9480 /* process_info.signal */
228e534f 9481 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 9482 break;
16e9c715 9483
4a6636fb 9484 case 2 /* NOTE_INFO_THREAD */:
16e9c715 9485 /* Make a ".reg/999" section. */
4a6636fb
PA
9486 /* thread_info.tid */
9487 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 9488
d4c88bbb 9489 len = strlen (buf) + 1;
a50b1753 9490 name = (char *) bfd_alloc (abfd, len);
16e9c715 9491 if (name == NULL)
b34976b6 9492 return FALSE;
c044fabd 9493
d4c88bbb 9494 memcpy (name, buf, len);
16e9c715 9495
117ed4f8 9496 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 9497 if (sect == NULL)
b34976b6 9498 return FALSE;
c044fabd 9499
4a6636fb
PA
9500 /* sizeof (thread_info.thread_context) */
9501 sect->size = 716;
9502 /* offsetof (thread_info.thread_context) */
9503 sect->filepos = note->descpos + 12;
16e9c715
NC
9504 sect->alignment_power = 2;
9505
4a6636fb
PA
9506 /* thread_info.is_active_thread */
9507 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
9508
9509 if (is_active_thread)
16e9c715 9510 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9511 return FALSE;
16e9c715
NC
9512 break;
9513
4a6636fb 9514 case 3 /* NOTE_INFO_MODULE */:
16e9c715 9515 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
9516 /* module_info.base_address */
9517 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 9518 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 9519
d4c88bbb 9520 len = strlen (buf) + 1;
a50b1753 9521 name = (char *) bfd_alloc (abfd, len);
16e9c715 9522 if (name == NULL)
b34976b6 9523 return FALSE;
c044fabd 9524
d4c88bbb 9525 memcpy (name, buf, len);
252b5132 9526
117ed4f8 9527 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 9528
16e9c715 9529 if (sect == NULL)
b34976b6 9530 return FALSE;
c044fabd 9531
eea6121a 9532 sect->size = note->descsz;
16e9c715 9533 sect->filepos = note->descpos;
16e9c715
NC
9534 sect->alignment_power = 2;
9535 break;
9536
9537 default:
b34976b6 9538 return TRUE;
16e9c715
NC
9539 }
9540
b34976b6 9541 return TRUE;
16e9c715 9542}
252b5132 9543
b34976b6 9544static bfd_boolean
217aa764 9545elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 9546{
9c5bfbb7 9547 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 9548
252b5132
RH
9549 switch (note->type)
9550 {
9551 default:
b34976b6 9552 return TRUE;
252b5132 9553
252b5132 9554 case NT_PRSTATUS:
bb0082d6
AM
9555 if (bed->elf_backend_grok_prstatus)
9556 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 9557 return TRUE;
bb0082d6 9558#if defined (HAVE_PRSTATUS_T)
252b5132 9559 return elfcore_grok_prstatus (abfd, note);
bb0082d6 9560#else
b34976b6 9561 return TRUE;
252b5132
RH
9562#endif
9563
9564#if defined (HAVE_PSTATUS_T)
9565 case NT_PSTATUS:
9566 return elfcore_grok_pstatus (abfd, note);
9567#endif
9568
9569#if defined (HAVE_LWPSTATUS_T)
9570 case NT_LWPSTATUS:
9571 return elfcore_grok_lwpstatus (abfd, note);
9572#endif
9573
9574 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
9575 return elfcore_grok_prfpreg (abfd, note);
9576
c044fabd 9577 case NT_WIN32PSTATUS:
16e9c715 9578 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 9579
c044fabd 9580 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
9581 if (note->namesz == 6
9582 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
9583 return elfcore_grok_prxfpreg (abfd, note);
9584 else
b34976b6 9585 return TRUE;
ff08c6bb 9586
4339cae0
L
9587 case NT_X86_XSTATE: /* Linux XSAVE extension */
9588 if (note->namesz == 6
9589 && strcmp (note->namedata, "LINUX") == 0)
9590 return elfcore_grok_xstatereg (abfd, note);
9591 else
9592 return TRUE;
9593
97753bd5
AM
9594 case NT_PPC_VMX:
9595 if (note->namesz == 6
9596 && strcmp (note->namedata, "LINUX") == 0)
9597 return elfcore_grok_ppc_vmx (abfd, note);
9598 else
9599 return TRUE;
9600
89eeb0bc
LM
9601 case NT_PPC_VSX:
9602 if (note->namesz == 6
9603 && strcmp (note->namedata, "LINUX") == 0)
9604 return elfcore_grok_ppc_vsx (abfd, note);
9605 else
9606 return TRUE;
9607
0675e188
UW
9608 case NT_S390_HIGH_GPRS:
9609 if (note->namesz == 6
9610 && strcmp (note->namedata, "LINUX") == 0)
9611 return elfcore_grok_s390_high_gprs (abfd, note);
9612 else
9613 return TRUE;
9614
d7eeb400
MS
9615 case NT_S390_TIMER:
9616 if (note->namesz == 6
9617 && strcmp (note->namedata, "LINUX") == 0)
9618 return elfcore_grok_s390_timer (abfd, note);
9619 else
9620 return TRUE;
9621
9622 case NT_S390_TODCMP:
9623 if (note->namesz == 6
9624 && strcmp (note->namedata, "LINUX") == 0)
9625 return elfcore_grok_s390_todcmp (abfd, note);
9626 else
9627 return TRUE;
9628
9629 case NT_S390_TODPREG:
9630 if (note->namesz == 6
9631 && strcmp (note->namedata, "LINUX") == 0)
9632 return elfcore_grok_s390_todpreg (abfd, note);
9633 else
9634 return TRUE;
9635
9636 case NT_S390_CTRS:
9637 if (note->namesz == 6
9638 && strcmp (note->namedata, "LINUX") == 0)
9639 return elfcore_grok_s390_ctrs (abfd, note);
9640 else
9641 return TRUE;
9642
9643 case NT_S390_PREFIX:
9644 if (note->namesz == 6
9645 && strcmp (note->namedata, "LINUX") == 0)
9646 return elfcore_grok_s390_prefix (abfd, note);
9647 else
9648 return TRUE;
9649
355b81d9
UW
9650 case NT_S390_LAST_BREAK:
9651 if (note->namesz == 6
9652 && strcmp (note->namedata, "LINUX") == 0)
9653 return elfcore_grok_s390_last_break (abfd, note);
9654 else
9655 return TRUE;
9656
9657 case NT_S390_SYSTEM_CALL:
9658 if (note->namesz == 6
9659 && strcmp (note->namedata, "LINUX") == 0)
9660 return elfcore_grok_s390_system_call (abfd, note);
9661 else
9662 return TRUE;
9663
abb3f6cc
NC
9664 case NT_S390_TDB:
9665 if (note->namesz == 6
9666 && strcmp (note->namedata, "LINUX") == 0)
9667 return elfcore_grok_s390_tdb (abfd, note);
9668 else
9669 return TRUE;
9670
4ef9f41a
AA
9671 case NT_S390_VXRS_LOW:
9672 if (note->namesz == 6
9673 && strcmp (note->namedata, "LINUX") == 0)
9674 return elfcore_grok_s390_vxrs_low (abfd, note);
9675 else
9676 return TRUE;
9677
9678 case NT_S390_VXRS_HIGH:
9679 if (note->namesz == 6
9680 && strcmp (note->namedata, "LINUX") == 0)
9681 return elfcore_grok_s390_vxrs_high (abfd, note);
9682 else
9683 return TRUE;
9684
faa9a424
UW
9685 case NT_ARM_VFP:
9686 if (note->namesz == 6
9687 && strcmp (note->namedata, "LINUX") == 0)
9688 return elfcore_grok_arm_vfp (abfd, note);
9689 else
9690 return TRUE;
9691
652451f8
YZ
9692 case NT_ARM_TLS:
9693 if (note->namesz == 6
9694 && strcmp (note->namedata, "LINUX") == 0)
9695 return elfcore_grok_aarch_tls (abfd, note);
9696 else
9697 return TRUE;
9698
9699 case NT_ARM_HW_BREAK:
9700 if (note->namesz == 6
9701 && strcmp (note->namedata, "LINUX") == 0)
9702 return elfcore_grok_aarch_hw_break (abfd, note);
9703 else
9704 return TRUE;
9705
9706 case NT_ARM_HW_WATCH:
9707 if (note->namesz == 6
9708 && strcmp (note->namedata, "LINUX") == 0)
9709 return elfcore_grok_aarch_hw_watch (abfd, note);
9710 else
9711 return TRUE;
9712
252b5132
RH
9713 case NT_PRPSINFO:
9714 case NT_PSINFO:
bb0082d6
AM
9715 if (bed->elf_backend_grok_psinfo)
9716 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 9717 return TRUE;
bb0082d6 9718#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 9719 return elfcore_grok_psinfo (abfd, note);
bb0082d6 9720#else
b34976b6 9721 return TRUE;
252b5132 9722#endif
3333a7c3
RM
9723
9724 case NT_AUXV:
9725 {
117ed4f8
AM
9726 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9727 SEC_HAS_CONTENTS);
3333a7c3
RM
9728
9729 if (sect == NULL)
9730 return FALSE;
eea6121a 9731 sect->size = note->descsz;
3333a7c3 9732 sect->filepos = note->descpos;
3333a7c3
RM
9733 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9734
9735 return TRUE;
9736 }
9015683b 9737
451b7c33
TT
9738 case NT_FILE:
9739 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
9740 note);
9741
9015683b
TT
9742 case NT_SIGINFO:
9743 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
9744 note);
5b2c414d 9745
252b5132
RH
9746 }
9747}
9748
718175fa
JK
9749static bfd_boolean
9750elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
9751{
c74f7d1c 9752 struct bfd_build_id* build_id;
30e8ee25
AM
9753
9754 if (note->descsz == 0)
9755 return FALSE;
9756
c74f7d1c
JT
9757 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
9758 if (build_id == NULL)
718175fa
JK
9759 return FALSE;
9760
c74f7d1c
JT
9761 build_id->size = note->descsz;
9762 memcpy (build_id->data, note->descdata, note->descsz);
9763 abfd->build_id = build_id;
718175fa
JK
9764
9765 return TRUE;
9766}
9767
9768static bfd_boolean
9769elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
9770{
9771 switch (note->type)
9772 {
9773 default:
9774 return TRUE;
9775
46bed679
L
9776 case NT_GNU_PROPERTY_TYPE_0:
9777 return _bfd_elf_parse_gnu_properties (abfd, note);
9778
718175fa
JK
9779 case NT_GNU_BUILD_ID:
9780 return elfobj_grok_gnu_build_id (abfd, note);
9781 }
9782}
9783
e21e5835
NC
9784static bfd_boolean
9785elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
9786{
9787 struct sdt_note *cur =
9788 (struct sdt_note *) bfd_alloc (abfd, sizeof (struct sdt_note)
9789 + note->descsz);
9790
9791 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
9792 cur->size = (bfd_size_type) note->descsz;
9793 memcpy (cur->data, note->descdata, note->descsz);
9794
9795 elf_tdata (abfd)->sdt_note_head = cur;
9796
9797 return TRUE;
9798}
9799
9800static bfd_boolean
9801elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
9802{
9803 switch (note->type)
9804 {
9805 case NT_STAPSDT:
9806 return elfobj_grok_stapsdt_note_1 (abfd, note);
9807
9808 default:
9809 return TRUE;
9810 }
9811}
9812
aa1ed4a9
JB
9813static bfd_boolean
9814elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
9815{
9816 size_t offset;
9817
b5430a3c 9818 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
aa1ed4a9 9819 {
b5430a3c 9820 case ELFCLASS32:
0064d223
JB
9821 if (note->descsz < 108)
9822 return FALSE;
aa1ed4a9
JB
9823 break;
9824
b5430a3c 9825 case ELFCLASS64:
0064d223
JB
9826 if (note->descsz < 120)
9827 return FALSE;
aa1ed4a9
JB
9828 break;
9829
9830 default:
9831 return FALSE;
9832 }
9833
0064d223
JB
9834 /* Check for version 1 in pr_version. */
9835 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
9836 return FALSE;
9837 offset = 4;
9838
9839 /* Skip over pr_psinfosz. */
b5430a3c 9840 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
0064d223
JB
9841 offset += 4;
9842 else
9843 {
9844 offset += 4; /* Padding before pr_psinfosz. */
9845 offset += 8;
9846 }
9847
aa1ed4a9
JB
9848 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
9849 elf_tdata (abfd)->core->program
9850 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
9851 offset += 17;
9852
9853 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
9854 elf_tdata (abfd)->core->command
9855 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
0064d223
JB
9856 offset += 81;
9857
9858 /* Padding before pr_pid. */
9859 offset += 2;
9860
9861 /* The pr_pid field was added in version "1a". */
9862 if (note->descsz < offset + 4)
9863 return TRUE;
9864
9865 elf_tdata (abfd)->core->pid
9866 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
aa1ed4a9
JB
9867
9868 return TRUE;
9869}
9870
9871static bfd_boolean
9872elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
9873{
9874 size_t offset;
9875 size_t size;
9876
9877 /* Check for version 1 in pr_version. */
9878 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
9879 return FALSE;
9880 offset = 4;
9881
9882 /* Skip over pr_statussz. */
b5430a3c 9883 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
aa1ed4a9 9884 {
b5430a3c 9885 case ELFCLASS32:
aa1ed4a9
JB
9886 offset += 4;
9887 break;
9888
b5430a3c 9889 case ELFCLASS64:
aa1ed4a9
JB
9890 offset += 4; /* Padding before pr_statussz. */
9891 offset += 8;
9892 break;
9893
9894 default:
9895 return FALSE;
9896 }
9897
9898 /* Extract size of pr_reg from pr_gregsetsz. */
b5430a3c 9899 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
aa1ed4a9
JB
9900 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
9901 else
9902 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
9903
9904 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
b5430a3c
JB
9905 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
9906 offset += 4 * 2;
9907 else
9908 offset += 8 * 2;
aa1ed4a9
JB
9909
9910 /* Skip over pr_osreldate. */
9911 offset += 4;
9912
9913 /* Read signal from pr_cursig. */
9914 if (elf_tdata (abfd)->core->signal == 0)
9915 elf_tdata (abfd)->core->signal
9916 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
9917 offset += 4;
9918
9919 /* Read TID from pr_pid. */
9920 elf_tdata (abfd)->core->lwpid
9921 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
9922 offset += 4;
9923
9924 /* Padding before pr_reg. */
b5430a3c 9925 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS64)
aa1ed4a9
JB
9926 offset += 4;
9927
9928 /* Make a ".reg/999" section and a ".reg" section. */
9929 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
9930 size, note->descpos + offset);
9931}
9932
9933static bfd_boolean
9934elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
9935{
9936 switch (note->type)
9937 {
9938 case NT_PRSTATUS:
9939 return elfcore_grok_freebsd_prstatus (abfd, note);
9940
9941 case NT_FPREGSET:
9942 return elfcore_grok_prfpreg (abfd, note);
9943
9944 case NT_PRPSINFO:
9945 return elfcore_grok_freebsd_psinfo (abfd, note);
9946
9947 case NT_FREEBSD_THRMISC:
9948 if (note->namesz == 8)
9949 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
9950 else
9951 return TRUE;
9952
3350c5f5
JB
9953 case NT_FREEBSD_PROCSTAT_AUXV:
9954 {
9955 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9956 SEC_HAS_CONTENTS);
9957
9958 if (sect == NULL)
9959 return FALSE;
9960 sect->size = note->descsz - 4;
9961 sect->filepos = note->descpos + 4;
9962 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9963
9964 return TRUE;
9965 }
9966
aa1ed4a9
JB
9967 case NT_X86_XSTATE:
9968 if (note->namesz == 8)
9969 return elfcore_grok_xstatereg (abfd, note);
9970 else
9971 return TRUE;
9972
9973 default:
9974 return TRUE;
9975 }
9976}
9977
b34976b6 9978static bfd_boolean
217aa764 9979elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
9980{
9981 char *cp;
9982
9983 cp = strchr (note->namedata, '@');
9984 if (cp != NULL)
9985 {
d2b64500 9986 *lwpidp = atoi(cp + 1);
b34976b6 9987 return TRUE;
50b2bdb7 9988 }
b34976b6 9989 return FALSE;
50b2bdb7
AM
9990}
9991
b34976b6 9992static bfd_boolean
217aa764 9993elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 9994{
50b2bdb7 9995 /* Signal number at offset 0x08. */
228e534f 9996 elf_tdata (abfd)->core->signal
50b2bdb7
AM
9997 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
9998
9999 /* Process ID at offset 0x50. */
228e534f 10000 elf_tdata (abfd)->core->pid
50b2bdb7
AM
10001 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
10002
10003 /* Command name at 0x7c (max 32 bytes, including nul). */
228e534f 10004 elf_tdata (abfd)->core->command
50b2bdb7
AM
10005 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
10006
7720ba9f
MK
10007 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
10008 note);
50b2bdb7
AM
10009}
10010
b34976b6 10011static bfd_boolean
217aa764 10012elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
10013{
10014 int lwp;
10015
10016 if (elfcore_netbsd_get_lwpid (note, &lwp))
228e534f 10017 elf_tdata (abfd)->core->lwpid = lwp;
50b2bdb7 10018
b4db1224 10019 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
10020 {
10021 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
10022 find this note before any of the others, which is fine,
10023 since the kernel writes this note out first when it
10024 creates a core file. */
47d9a591 10025
50b2bdb7
AM
10026 return elfcore_grok_netbsd_procinfo (abfd, note);
10027 }
10028
b4db1224
JT
10029 /* As of Jan 2002 there are no other machine-independent notes
10030 defined for NetBSD core files. If the note type is less
10031 than the start of the machine-dependent note types, we don't
10032 understand it. */
47d9a591 10033
b4db1224 10034 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 10035 return TRUE;
50b2bdb7
AM
10036
10037
10038 switch (bfd_get_arch (abfd))
10039 {
08a40648
AM
10040 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
10041 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
10042
10043 case bfd_arch_alpha:
10044 case bfd_arch_sparc:
10045 switch (note->type)
08a40648
AM
10046 {
10047 case NT_NETBSDCORE_FIRSTMACH+0:
10048 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 10049
08a40648
AM
10050 case NT_NETBSDCORE_FIRSTMACH+2:
10051 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 10052
08a40648
AM
10053 default:
10054 return TRUE;
10055 }
50b2bdb7 10056
08a40648
AM
10057 /* On all other arch's, PT_GETREGS == mach+1 and
10058 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
10059
10060 default:
10061 switch (note->type)
08a40648
AM
10062 {
10063 case NT_NETBSDCORE_FIRSTMACH+1:
10064 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 10065
08a40648
AM
10066 case NT_NETBSDCORE_FIRSTMACH+3:
10067 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 10068
08a40648
AM
10069 default:
10070 return TRUE;
10071 }
50b2bdb7
AM
10072 }
10073 /* NOTREACHED */
10074}
10075
67cc5033
MK
10076static bfd_boolean
10077elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10078{
10079 /* Signal number at offset 0x08. */
228e534f 10080 elf_tdata (abfd)->core->signal
67cc5033
MK
10081 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10082
10083 /* Process ID at offset 0x20. */
228e534f 10084 elf_tdata (abfd)->core->pid
67cc5033
MK
10085 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
10086
10087 /* Command name at 0x48 (max 32 bytes, including nul). */
228e534f 10088 elf_tdata (abfd)->core->command
67cc5033
MK
10089 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
10090
10091 return TRUE;
10092}
10093
10094static bfd_boolean
10095elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
10096{
10097 if (note->type == NT_OPENBSD_PROCINFO)
10098 return elfcore_grok_openbsd_procinfo (abfd, note);
10099
10100 if (note->type == NT_OPENBSD_REGS)
10101 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10102
10103 if (note->type == NT_OPENBSD_FPREGS)
10104 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10105
10106 if (note->type == NT_OPENBSD_XFPREGS)
10107 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
10108
10109 if (note->type == NT_OPENBSD_AUXV)
10110 {
10111 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
10112 SEC_HAS_CONTENTS);
10113
10114 if (sect == NULL)
10115 return FALSE;
10116 sect->size = note->descsz;
10117 sect->filepos = note->descpos;
10118 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10119
10120 return TRUE;
10121 }
10122
10123 if (note->type == NT_OPENBSD_WCOOKIE)
10124 {
10125 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
10126 SEC_HAS_CONTENTS);
10127
10128 if (sect == NULL)
10129 return FALSE;
10130 sect->size = note->descsz;
10131 sect->filepos = note->descpos;
10132 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10133
10134 return TRUE;
10135 }
10136
10137 return TRUE;
10138}
10139
07c6e936 10140static bfd_boolean
d3fd4074 10141elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
10142{
10143 void *ddata = note->descdata;
10144 char buf[100];
10145 char *name;
10146 asection *sect;
f8843e87
AM
10147 short sig;
10148 unsigned flags;
07c6e936
NC
10149
10150 /* nto_procfs_status 'pid' field is at offset 0. */
228e534f 10151 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
07c6e936 10152
f8843e87
AM
10153 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
10154 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
10155
10156 /* nto_procfs_status 'flags' field is at offset 8. */
10157 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
10158
10159 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
10160 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
10161 {
228e534f
AM
10162 elf_tdata (abfd)->core->signal = sig;
10163 elf_tdata (abfd)->core->lwpid = *tid;
f8843e87 10164 }
07c6e936 10165
f8843e87
AM
10166 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
10167 do not come from signals so we make sure we set the current
10168 thread just in case. */
10169 if (flags & 0x00000080)
228e534f 10170 elf_tdata (abfd)->core->lwpid = *tid;
07c6e936
NC
10171
10172 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 10173 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 10174
a50b1753 10175 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10176 if (name == NULL)
10177 return FALSE;
10178 strcpy (name, buf);
10179
117ed4f8 10180 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10181 if (sect == NULL)
10182 return FALSE;
10183
eea6121a 10184 sect->size = note->descsz;
07c6e936 10185 sect->filepos = note->descpos;
07c6e936
NC
10186 sect->alignment_power = 2;
10187
10188 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
10189}
10190
10191static bfd_boolean
d69f560c
KW
10192elfcore_grok_nto_regs (bfd *abfd,
10193 Elf_Internal_Note *note,
d3fd4074 10194 long tid,
d69f560c 10195 char *base)
07c6e936
NC
10196{
10197 char buf[100];
10198 char *name;
10199 asection *sect;
10200
d69f560c 10201 /* Make a "(base)/%d" section. */
d3fd4074 10202 sprintf (buf, "%s/%ld", base, tid);
07c6e936 10203
a50b1753 10204 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10205 if (name == NULL)
10206 return FALSE;
10207 strcpy (name, buf);
10208
117ed4f8 10209 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10210 if (sect == NULL)
10211 return FALSE;
10212
eea6121a 10213 sect->size = note->descsz;
07c6e936 10214 sect->filepos = note->descpos;
07c6e936
NC
10215 sect->alignment_power = 2;
10216
f8843e87 10217 /* This is the current thread. */
228e534f 10218 if (elf_tdata (abfd)->core->lwpid == tid)
d69f560c 10219 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
10220
10221 return TRUE;
07c6e936
NC
10222}
10223
10224#define BFD_QNT_CORE_INFO 7
10225#define BFD_QNT_CORE_STATUS 8
10226#define BFD_QNT_CORE_GREG 9
10227#define BFD_QNT_CORE_FPREG 10
10228
10229static bfd_boolean
217aa764 10230elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
10231{
10232 /* Every GREG section has a STATUS section before it. Store the
811072d8 10233 tid from the previous call to pass down to the next gregs
07c6e936 10234 function. */
d3fd4074 10235 static long tid = 1;
07c6e936
NC
10236
10237 switch (note->type)
10238 {
d69f560c
KW
10239 case BFD_QNT_CORE_INFO:
10240 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
10241 case BFD_QNT_CORE_STATUS:
10242 return elfcore_grok_nto_status (abfd, note, &tid);
10243 case BFD_QNT_CORE_GREG:
10244 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
10245 case BFD_QNT_CORE_FPREG:
10246 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
10247 default:
10248 return TRUE;
07c6e936
NC
10249 }
10250}
10251
b15fa79e
AM
10252static bfd_boolean
10253elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
10254{
10255 char *name;
10256 asection *sect;
10257 size_t len;
10258
10259 /* Use note name as section name. */
10260 len = note->namesz;
a50b1753 10261 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
10262 if (name == NULL)
10263 return FALSE;
10264 memcpy (name, note->namedata, len);
10265 name[len - 1] = '\0';
10266
10267 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10268 if (sect == NULL)
10269 return FALSE;
10270
10271 sect->size = note->descsz;
10272 sect->filepos = note->descpos;
10273 sect->alignment_power = 1;
10274
10275 return TRUE;
10276}
10277
7c76fa91
MS
10278/* Function: elfcore_write_note
10279
47d9a591 10280 Inputs:
a39f3346 10281 buffer to hold note, and current size of buffer
7c76fa91
MS
10282 name of note
10283 type of note
10284 data for note
10285 size of data for note
10286
a39f3346
AM
10287 Writes note to end of buffer. ELF64 notes are written exactly as
10288 for ELF32, despite the current (as of 2006) ELF gabi specifying
10289 that they ought to have 8-byte namesz and descsz field, and have
10290 8-byte alignment. Other writers, eg. Linux kernel, do the same.
10291
7c76fa91 10292 Return:
a39f3346 10293 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
10294
10295char *
a39f3346 10296elfcore_write_note (bfd *abfd,
217aa764 10297 char *buf,
a39f3346 10298 int *bufsiz,
217aa764 10299 const char *name,
a39f3346 10300 int type,
217aa764 10301 const void *input,
a39f3346 10302 int size)
7c76fa91
MS
10303{
10304 Elf_External_Note *xnp;
d4c88bbb 10305 size_t namesz;
d4c88bbb 10306 size_t newspace;
a39f3346 10307 char *dest;
7c76fa91 10308
d4c88bbb 10309 namesz = 0;
d4c88bbb 10310 if (name != NULL)
a39f3346 10311 namesz = strlen (name) + 1;
d4c88bbb 10312
a39f3346 10313 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 10314
a50b1753 10315 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
10316 if (buf == NULL)
10317 return buf;
a39f3346 10318 dest = buf + *bufsiz;
7c76fa91
MS
10319 *bufsiz += newspace;
10320 xnp = (Elf_External_Note *) dest;
10321 H_PUT_32 (abfd, namesz, xnp->namesz);
10322 H_PUT_32 (abfd, size, xnp->descsz);
10323 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
10324 dest = xnp->name;
10325 if (name != NULL)
10326 {
10327 memcpy (dest, name, namesz);
10328 dest += namesz;
a39f3346 10329 while (namesz & 3)
d4c88bbb
AM
10330 {
10331 *dest++ = '\0';
a39f3346 10332 ++namesz;
d4c88bbb
AM
10333 }
10334 }
10335 memcpy (dest, input, size);
a39f3346
AM
10336 dest += size;
10337 while (size & 3)
10338 {
10339 *dest++ = '\0';
10340 ++size;
10341 }
10342 return buf;
7c76fa91
MS
10343}
10344
7c76fa91 10345char *
217aa764
AM
10346elfcore_write_prpsinfo (bfd *abfd,
10347 char *buf,
10348 int *bufsiz,
10349 const char *fname,
10350 const char *psargs)
7c76fa91 10351{
183e98be
AM
10352 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10353
10354 if (bed->elf_backend_write_core_note != NULL)
10355 {
10356 char *ret;
10357 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
10358 NT_PRPSINFO, fname, psargs);
10359 if (ret != NULL)
10360 return ret;
10361 }
7c76fa91 10362
1f20dca5 10363#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
183e98be
AM
10364#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
10365 if (bed->s->elfclass == ELFCLASS32)
10366 {
10367#if defined (HAVE_PSINFO32_T)
10368 psinfo32_t data;
10369 int note_type = NT_PSINFO;
10370#else
10371 prpsinfo32_t data;
10372 int note_type = NT_PRPSINFO;
10373#endif
10374
10375 memset (&data, 0, sizeof (data));
10376 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
10377 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
10378 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 10379 "CORE", note_type, &data, sizeof (data));
183e98be
AM
10380 }
10381 else
10382#endif
10383 {
7c76fa91 10384#if defined (HAVE_PSINFO_T)
183e98be
AM
10385 psinfo_t data;
10386 int note_type = NT_PSINFO;
7c76fa91 10387#else
183e98be
AM
10388 prpsinfo_t data;
10389 int note_type = NT_PRPSINFO;
7c76fa91
MS
10390#endif
10391
183e98be
AM
10392 memset (&data, 0, sizeof (data));
10393 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
10394 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
10395 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 10396 "CORE", note_type, &data, sizeof (data));
183e98be 10397 }
7c76fa91
MS
10398#endif /* PSINFO_T or PRPSINFO_T */
10399
1f20dca5
UW
10400 free (buf);
10401 return NULL;
10402}
10403
70a38d42
SDJ
10404char *
10405elfcore_write_linux_prpsinfo32
10406 (bfd *abfd, char *buf, int *bufsiz,
10407 const struct elf_internal_linux_prpsinfo *prpsinfo)
10408{
10409 struct elf_external_linux_prpsinfo32 data;
10410
aeb70569 10411 swap_linux_prpsinfo32_out (abfd, prpsinfo, &data);
70a38d42
SDJ
10412 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
10413 &data, sizeof (data));
10414}
10415
10416char *
10417elfcore_write_linux_prpsinfo64
10418 (bfd *abfd, char *buf, int *bufsiz,
10419 const struct elf_internal_linux_prpsinfo *prpsinfo)
10420{
10421 struct elf_external_linux_prpsinfo64 data;
10422
aeb70569 10423 swap_linux_prpsinfo64_out (abfd, prpsinfo, &data);
70a38d42
SDJ
10424 return elfcore_write_note (abfd, buf, bufsiz,
10425 "CORE", NT_PRPSINFO, &data, sizeof (data));
10426}
10427
7c76fa91 10428char *
217aa764
AM
10429elfcore_write_prstatus (bfd *abfd,
10430 char *buf,
10431 int *bufsiz,
10432 long pid,
10433 int cursig,
10434 const void *gregs)
7c76fa91 10435{
183e98be 10436 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 10437
183e98be
AM
10438 if (bed->elf_backend_write_core_note != NULL)
10439 {
10440 char *ret;
10441 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
10442 NT_PRSTATUS,
10443 pid, cursig, gregs);
10444 if (ret != NULL)
10445 return ret;
10446 }
10447
1f20dca5 10448#if defined (HAVE_PRSTATUS_T)
183e98be
AM
10449#if defined (HAVE_PRSTATUS32_T)
10450 if (bed->s->elfclass == ELFCLASS32)
10451 {
10452 prstatus32_t prstat;
10453
10454 memset (&prstat, 0, sizeof (prstat));
10455 prstat.pr_pid = pid;
10456 prstat.pr_cursig = cursig;
10457 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 10458 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
10459 NT_PRSTATUS, &prstat, sizeof (prstat));
10460 }
10461 else
10462#endif
10463 {
10464 prstatus_t prstat;
10465
10466 memset (&prstat, 0, sizeof (prstat));
10467 prstat.pr_pid = pid;
10468 prstat.pr_cursig = cursig;
10469 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 10470 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
10471 NT_PRSTATUS, &prstat, sizeof (prstat));
10472 }
7c76fa91
MS
10473#endif /* HAVE_PRSTATUS_T */
10474
1f20dca5
UW
10475 free (buf);
10476 return NULL;
10477}
10478
51316059
MS
10479#if defined (HAVE_LWPSTATUS_T)
10480char *
217aa764
AM
10481elfcore_write_lwpstatus (bfd *abfd,
10482 char *buf,
10483 int *bufsiz,
10484 long pid,
10485 int cursig,
10486 const void *gregs)
51316059
MS
10487{
10488 lwpstatus_t lwpstat;
183e98be 10489 const char *note_name = "CORE";
51316059
MS
10490
10491 memset (&lwpstat, 0, sizeof (lwpstat));
10492 lwpstat.pr_lwpid = pid >> 16;
10493 lwpstat.pr_cursig = cursig;
10494#if defined (HAVE_LWPSTATUS_T_PR_REG)
d1e8523e 10495 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
51316059
MS
10496#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10497#if !defined(gregs)
10498 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
10499 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
10500#else
10501 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
10502 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
10503#endif
10504#endif
47d9a591 10505 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
10506 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
10507}
10508#endif /* HAVE_LWPSTATUS_T */
10509
7c76fa91
MS
10510#if defined (HAVE_PSTATUS_T)
10511char *
217aa764
AM
10512elfcore_write_pstatus (bfd *abfd,
10513 char *buf,
10514 int *bufsiz,
10515 long pid,
6c10990d
NC
10516 int cursig ATTRIBUTE_UNUSED,
10517 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 10518{
183e98be
AM
10519 const char *note_name = "CORE";
10520#if defined (HAVE_PSTATUS32_T)
10521 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 10522
183e98be
AM
10523 if (bed->s->elfclass == ELFCLASS32)
10524 {
10525 pstatus32_t pstat;
10526
10527 memset (&pstat, 0, sizeof (pstat));
10528 pstat.pr_pid = pid & 0xffff;
10529 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
10530 NT_PSTATUS, &pstat, sizeof (pstat));
10531 return buf;
10532 }
10533 else
10534#endif
10535 {
10536 pstatus_t pstat;
10537
10538 memset (&pstat, 0, sizeof (pstat));
10539 pstat.pr_pid = pid & 0xffff;
10540 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
10541 NT_PSTATUS, &pstat, sizeof (pstat));
10542 return buf;
10543 }
7c76fa91
MS
10544}
10545#endif /* HAVE_PSTATUS_T */
10546
10547char *
217aa764
AM
10548elfcore_write_prfpreg (bfd *abfd,
10549 char *buf,
10550 int *bufsiz,
10551 const void *fpregs,
10552 int size)
7c76fa91 10553{
183e98be 10554 const char *note_name = "CORE";
47d9a591 10555 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
10556 note_name, NT_FPREGSET, fpregs, size);
10557}
10558
10559char *
217aa764
AM
10560elfcore_write_prxfpreg (bfd *abfd,
10561 char *buf,
10562 int *bufsiz,
10563 const void *xfpregs,
10564 int size)
7c76fa91
MS
10565{
10566 char *note_name = "LINUX";
47d9a591 10567 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
10568 note_name, NT_PRXFPREG, xfpregs, size);
10569}
10570
4339cae0
L
10571char *
10572elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
10573 const void *xfpregs, int size)
10574{
97de3545
JB
10575 char *note_name;
10576 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
10577 note_name = "FreeBSD";
10578 else
10579 note_name = "LINUX";
4339cae0
L
10580 return elfcore_write_note (abfd, buf, bufsiz,
10581 note_name, NT_X86_XSTATE, xfpregs, size);
10582}
10583
97753bd5
AM
10584char *
10585elfcore_write_ppc_vmx (bfd *abfd,
10586 char *buf,
10587 int *bufsiz,
10588 const void *ppc_vmx,
10589 int size)
10590{
10591 char *note_name = "LINUX";
10592 return elfcore_write_note (abfd, buf, bufsiz,
10593 note_name, NT_PPC_VMX, ppc_vmx, size);
10594}
10595
89eeb0bc
LM
10596char *
10597elfcore_write_ppc_vsx (bfd *abfd,
10598 char *buf,
10599 int *bufsiz,
10600 const void *ppc_vsx,
10601 int size)
10602{
10603 char *note_name = "LINUX";
10604 return elfcore_write_note (abfd, buf, bufsiz,
10605 note_name, NT_PPC_VSX, ppc_vsx, size);
10606}
10607
0675e188
UW
10608static char *
10609elfcore_write_s390_high_gprs (bfd *abfd,
10610 char *buf,
10611 int *bufsiz,
10612 const void *s390_high_gprs,
10613 int size)
10614{
10615 char *note_name = "LINUX";
10616 return elfcore_write_note (abfd, buf, bufsiz,
10617 note_name, NT_S390_HIGH_GPRS,
10618 s390_high_gprs, size);
10619}
10620
d7eeb400
MS
10621char *
10622elfcore_write_s390_timer (bfd *abfd,
10623 char *buf,
10624 int *bufsiz,
10625 const void *s390_timer,
10626 int size)
10627{
10628 char *note_name = "LINUX";
10629 return elfcore_write_note (abfd, buf, bufsiz,
10630 note_name, NT_S390_TIMER, s390_timer, size);
10631}
10632
10633char *
10634elfcore_write_s390_todcmp (bfd *abfd,
10635 char *buf,
10636 int *bufsiz,
10637 const void *s390_todcmp,
10638 int size)
10639{
10640 char *note_name = "LINUX";
10641 return elfcore_write_note (abfd, buf, bufsiz,
10642 note_name, NT_S390_TODCMP, s390_todcmp, size);
10643}
10644
10645char *
10646elfcore_write_s390_todpreg (bfd *abfd,
10647 char *buf,
10648 int *bufsiz,
10649 const void *s390_todpreg,
10650 int size)
10651{
10652 char *note_name = "LINUX";
10653 return elfcore_write_note (abfd, buf, bufsiz,
10654 note_name, NT_S390_TODPREG, s390_todpreg, size);
10655}
10656
10657char *
10658elfcore_write_s390_ctrs (bfd *abfd,
10659 char *buf,
10660 int *bufsiz,
10661 const void *s390_ctrs,
10662 int size)
10663{
10664 char *note_name = "LINUX";
10665 return elfcore_write_note (abfd, buf, bufsiz,
10666 note_name, NT_S390_CTRS, s390_ctrs, size);
10667}
10668
10669char *
10670elfcore_write_s390_prefix (bfd *abfd,
10671 char *buf,
10672 int *bufsiz,
10673 const void *s390_prefix,
10674 int size)
10675{
10676 char *note_name = "LINUX";
10677 return elfcore_write_note (abfd, buf, bufsiz,
10678 note_name, NT_S390_PREFIX, s390_prefix, size);
10679}
10680
355b81d9
UW
10681char *
10682elfcore_write_s390_last_break (bfd *abfd,
10683 char *buf,
10684 int *bufsiz,
10685 const void *s390_last_break,
10686 int size)
10687{
10688 char *note_name = "LINUX";
10689 return elfcore_write_note (abfd, buf, bufsiz,
10690 note_name, NT_S390_LAST_BREAK,
10691 s390_last_break, size);
10692}
10693
10694char *
10695elfcore_write_s390_system_call (bfd *abfd,
10696 char *buf,
10697 int *bufsiz,
10698 const void *s390_system_call,
10699 int size)
10700{
10701 char *note_name = "LINUX";
10702 return elfcore_write_note (abfd, buf, bufsiz,
10703 note_name, NT_S390_SYSTEM_CALL,
10704 s390_system_call, size);
10705}
10706
abb3f6cc
NC
10707char *
10708elfcore_write_s390_tdb (bfd *abfd,
10709 char *buf,
10710 int *bufsiz,
10711 const void *s390_tdb,
10712 int size)
10713{
10714 char *note_name = "LINUX";
10715 return elfcore_write_note (abfd, buf, bufsiz,
10716 note_name, NT_S390_TDB, s390_tdb, size);
10717}
10718
4ef9f41a
AA
10719char *
10720elfcore_write_s390_vxrs_low (bfd *abfd,
10721 char *buf,
10722 int *bufsiz,
10723 const void *s390_vxrs_low,
10724 int size)
10725{
10726 char *note_name = "LINUX";
10727 return elfcore_write_note (abfd, buf, bufsiz,
10728 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
10729}
10730
10731char *
10732elfcore_write_s390_vxrs_high (bfd *abfd,
10733 char *buf,
10734 int *bufsiz,
10735 const void *s390_vxrs_high,
10736 int size)
10737{
10738 char *note_name = "LINUX";
10739 return elfcore_write_note (abfd, buf, bufsiz,
10740 note_name, NT_S390_VXRS_HIGH,
10741 s390_vxrs_high, size);
10742}
10743
faa9a424
UW
10744char *
10745elfcore_write_arm_vfp (bfd *abfd,
10746 char *buf,
10747 int *bufsiz,
10748 const void *arm_vfp,
10749 int size)
10750{
10751 char *note_name = "LINUX";
10752 return elfcore_write_note (abfd, buf, bufsiz,
10753 note_name, NT_ARM_VFP, arm_vfp, size);
10754}
10755
652451f8
YZ
10756char *
10757elfcore_write_aarch_tls (bfd *abfd,
10758 char *buf,
10759 int *bufsiz,
10760 const void *aarch_tls,
10761 int size)
10762{
10763 char *note_name = "LINUX";
10764 return elfcore_write_note (abfd, buf, bufsiz,
10765 note_name, NT_ARM_TLS, aarch_tls, size);
10766}
10767
10768char *
10769elfcore_write_aarch_hw_break (bfd *abfd,
10770 char *buf,
10771 int *bufsiz,
10772 const void *aarch_hw_break,
10773 int size)
10774{
10775 char *note_name = "LINUX";
10776 return elfcore_write_note (abfd, buf, bufsiz,
10777 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
10778}
10779
10780char *
10781elfcore_write_aarch_hw_watch (bfd *abfd,
10782 char *buf,
10783 int *bufsiz,
10784 const void *aarch_hw_watch,
10785 int size)
10786{
10787 char *note_name = "LINUX";
10788 return elfcore_write_note (abfd, buf, bufsiz,
10789 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
10790}
10791
bb864ac1
CES
10792char *
10793elfcore_write_register_note (bfd *abfd,
10794 char *buf,
10795 int *bufsiz,
10796 const char *section,
10797 const void *data,
10798 int size)
10799{
10800 if (strcmp (section, ".reg2") == 0)
10801 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
10802 if (strcmp (section, ".reg-xfp") == 0)
10803 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
10804 if (strcmp (section, ".reg-xstate") == 0)
10805 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
10806 if (strcmp (section, ".reg-ppc-vmx") == 0)
10807 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
10808 if (strcmp (section, ".reg-ppc-vsx") == 0)
10809 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
10810 if (strcmp (section, ".reg-s390-high-gprs") == 0)
10811 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
10812 if (strcmp (section, ".reg-s390-timer") == 0)
10813 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
10814 if (strcmp (section, ".reg-s390-todcmp") == 0)
10815 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
10816 if (strcmp (section, ".reg-s390-todpreg") == 0)
10817 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
10818 if (strcmp (section, ".reg-s390-ctrs") == 0)
10819 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
10820 if (strcmp (section, ".reg-s390-prefix") == 0)
10821 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
355b81d9
UW
10822 if (strcmp (section, ".reg-s390-last-break") == 0)
10823 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
10824 if (strcmp (section, ".reg-s390-system-call") == 0)
10825 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
abb3f6cc
NC
10826 if (strcmp (section, ".reg-s390-tdb") == 0)
10827 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
4ef9f41a
AA
10828 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
10829 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
10830 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
10831 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
faa9a424
UW
10832 if (strcmp (section, ".reg-arm-vfp") == 0)
10833 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
652451f8
YZ
10834 if (strcmp (section, ".reg-aarch-tls") == 0)
10835 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
10836 if (strcmp (section, ".reg-aarch-hw-break") == 0)
10837 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
10838 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
10839 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
bb864ac1
CES
10840 return NULL;
10841}
10842
b34976b6 10843static bfd_boolean
718175fa 10844elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 10845{
c044fabd 10846 char *p;
252b5132 10847
252b5132
RH
10848 p = buf;
10849 while (p < buf + size)
10850 {
c044fabd
KH
10851 /* FIXME: bad alignment assumption. */
10852 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
10853 Elf_Internal_Note in;
10854
baea7ef1
AM
10855 if (offsetof (Elf_External_Note, name) > buf - p + size)
10856 return FALSE;
10857
dc810e39 10858 in.type = H_GET_32 (abfd, xnp->type);
252b5132 10859
dc810e39 10860 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 10861 in.namedata = xnp->name;
baea7ef1
AM
10862 if (in.namesz > buf - in.namedata + size)
10863 return FALSE;
252b5132 10864
dc810e39 10865 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
10866 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
10867 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
10868 if (in.descsz != 0
10869 && (in.descdata >= buf + size
10870 || in.descsz > buf - in.descdata + size))
10871 return FALSE;
252b5132 10872
718175fa
JK
10873 switch (bfd_get_format (abfd))
10874 {
10875 default:
10876 return TRUE;
10877
10878 case bfd_core:
f64e188b 10879 {
8acbedd6 10880#define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
f64e188b 10881 struct
718175fa 10882 {
f64e188b 10883 const char * string;
8acbedd6 10884 size_t len;
f64e188b 10885 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
718175fa 10886 }
f64e188b 10887 grokers[] =
b15fa79e 10888 {
8acbedd6 10889 GROKER_ELEMENT ("", elfcore_grok_note),
aa1ed4a9 10890 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
8acbedd6
KS
10891 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
10892 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
10893 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
10894 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note)
f64e188b 10895 };
8acbedd6 10896#undef GROKER_ELEMENT
f64e188b
NC
10897 int i;
10898
10899 for (i = ARRAY_SIZE (grokers); i--;)
8acbedd6
KS
10900 {
10901 if (in.namesz >= grokers[i].len
10902 && strncmp (in.namedata, grokers[i].string,
10903 grokers[i].len) == 0)
10904 {
10905 if (! grokers[i].func (abfd, & in))
10906 return FALSE;
10907 break;
10908 }
10909 }
f64e188b
NC
10910 break;
10911 }
718175fa
JK
10912
10913 case bfd_object:
10914 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
10915 {
10916 if (! elfobj_grok_gnu_note (abfd, &in))
10917 return FALSE;
10918 }
e21e5835
NC
10919 else if (in.namesz == sizeof "stapsdt"
10920 && strcmp (in.namedata, "stapsdt") == 0)
10921 {
10922 if (! elfobj_grok_stapsdt_note (abfd, &in))
10923 return FALSE;
10924 }
718175fa 10925 break;
08a40648 10926 }
252b5132
RH
10927
10928 p = in.descdata + BFD_ALIGN (in.descsz, 4);
10929 }
10930
718175fa
JK
10931 return TRUE;
10932}
10933
10934static bfd_boolean
10935elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
10936{
10937 char *buf;
10938
10939 if (size <= 0)
10940 return TRUE;
10941
10942 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
10943 return FALSE;
10944
f64e188b 10945 buf = (char *) bfd_malloc (size + 1);
718175fa
JK
10946 if (buf == NULL)
10947 return FALSE;
10948
f64e188b
NC
10949 /* PR 17512: file: ec08f814
10950 0-termintate the buffer so that string searches will not overflow. */
10951 buf[size] = 0;
10952
718175fa
JK
10953 if (bfd_bread (buf, size, abfd) != size
10954 || !elf_parse_notes (abfd, buf, size, offset))
10955 {
10956 free (buf);
10957 return FALSE;
10958 }
10959
252b5132 10960 free (buf);
b34976b6 10961 return TRUE;
252b5132 10962}
98d8431c
JB
10963\f
10964/* Providing external access to the ELF program header table. */
10965
10966/* Return an upper bound on the number of bytes required to store a
10967 copy of ABFD's program header table entries. Return -1 if an error
10968 occurs; bfd_get_error will return an appropriate code. */
c044fabd 10969
98d8431c 10970long
217aa764 10971bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
10972{
10973 if (abfd->xvec->flavour != bfd_target_elf_flavour)
10974 {
10975 bfd_set_error (bfd_error_wrong_format);
10976 return -1;
10977 }
10978
936e320b 10979 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
10980}
10981
98d8431c
JB
10982/* Copy ABFD's program header table entries to *PHDRS. The entries
10983 will be stored as an array of Elf_Internal_Phdr structures, as
10984 defined in include/elf/internal.h. To find out how large the
10985 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
10986
10987 Return the number of program header table entries read, or -1 if an
10988 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 10989
98d8431c 10990int
217aa764 10991bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
10992{
10993 int num_phdrs;
10994
10995 if (abfd->xvec->flavour != bfd_target_elf_flavour)
10996 {
10997 bfd_set_error (bfd_error_wrong_format);
10998 return -1;
10999 }
11000
11001 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 11002 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
11003 num_phdrs * sizeof (Elf_Internal_Phdr));
11004
11005 return num_phdrs;
11006}
ae4221d7 11007
db6751f2 11008enum elf_reloc_type_class
7e612e98
AM
11009_bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
11010 const asection *rel_sec ATTRIBUTE_UNUSED,
11011 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
11012{
11013 return reloc_class_normal;
11014}
f8df10f4 11015
47d9a591 11016/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
11017 relocation against a local symbol. */
11018
11019bfd_vma
217aa764
AM
11020_bfd_elf_rela_local_sym (bfd *abfd,
11021 Elf_Internal_Sym *sym,
8517fae7 11022 asection **psec,
217aa764 11023 Elf_Internal_Rela *rel)
f8df10f4 11024{
8517fae7 11025 asection *sec = *psec;
f8df10f4
JJ
11026 bfd_vma relocation;
11027
11028 relocation = (sec->output_section->vma
11029 + sec->output_offset
11030 + sym->st_value);
11031 if ((sec->flags & SEC_MERGE)
c629eae0 11032 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 11033 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
f8df10f4 11034 {
f8df10f4 11035 rel->r_addend =
8517fae7 11036 _bfd_merged_section_offset (abfd, psec,
65765700 11037 elf_section_data (sec)->sec_info,
753731ee
AM
11038 sym->st_value + rel->r_addend);
11039 if (sec != *psec)
11040 {
11041 /* If we have changed the section, and our original section is
11042 marked with SEC_EXCLUDE, it means that the original
11043 SEC_MERGE section has been completely subsumed in some
11044 other SEC_MERGE section. In this case, we need to leave
11045 some info around for --emit-relocs. */
11046 if ((sec->flags & SEC_EXCLUDE) != 0)
11047 sec->kept_section = *psec;
11048 sec = *psec;
11049 }
8517fae7
AM
11050 rel->r_addend -= relocation;
11051 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
11052 }
11053 return relocation;
11054}
c629eae0
JJ
11055
11056bfd_vma
217aa764
AM
11057_bfd_elf_rel_local_sym (bfd *abfd,
11058 Elf_Internal_Sym *sym,
11059 asection **psec,
11060 bfd_vma addend)
47d9a591 11061{
c629eae0
JJ
11062 asection *sec = *psec;
11063
dbaa2011 11064 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
c629eae0
JJ
11065 return sym->st_value + addend;
11066
11067 return _bfd_merged_section_offset (abfd, psec,
65765700 11068 elf_section_data (sec)->sec_info,
753731ee 11069 sym->st_value + addend);
c629eae0
JJ
11070}
11071
37b01f6a
DG
11072/* Adjust an address within a section. Given OFFSET within SEC, return
11073 the new offset within the section, based upon changes made to the
11074 section. Returns -1 if the offset is now invalid.
11075 The offset (in abnd out) is in target sized bytes, however big a
11076 byte may be. */
11077
c629eae0 11078bfd_vma
217aa764 11079_bfd_elf_section_offset (bfd *abfd,
92e4ec35 11080 struct bfd_link_info *info,
217aa764
AM
11081 asection *sec,
11082 bfd_vma offset)
c629eae0 11083{
68bfbfcc 11084 switch (sec->sec_info_type)
65765700 11085 {
dbaa2011 11086 case SEC_INFO_TYPE_STABS:
eea6121a
AM
11087 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
11088 offset);
dbaa2011 11089 case SEC_INFO_TYPE_EH_FRAME:
92e4ec35 11090 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
37b01f6a 11091
65765700 11092 default:
310fd250
L
11093 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
11094 {
37b01f6a 11095 /* Reverse the offset. */
310fd250
L
11096 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11097 bfd_size_type address_size = bed->s->arch_size / 8;
37b01f6a
DG
11098
11099 /* address_size and sec->size are in octets. Convert
11100 to bytes before subtracting the original offset. */
11101 offset = (sec->size - address_size) / bfd_octets_per_byte (abfd) - offset;
310fd250 11102 }
65765700
JJ
11103 return offset;
11104 }
c629eae0 11105}
3333a7c3
RM
11106\f
11107/* Create a new BFD as if by bfd_openr. Rather than opening a file,
11108 reconstruct an ELF file by reading the segments out of remote memory
11109 based on the ELF file header at EHDR_VMA and the ELF program headers it
11110 points to. If not null, *LOADBASEP is filled in with the difference
11111 between the VMAs from which the segments were read, and the VMAs the
11112 file headers (and hence BFD's idea of each section's VMA) put them at.
11113
11114 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
11115 remote memory at target address VMA into the local buffer at MYADDR; it
11116 should return zero on success or an `errno' code on failure. TEMPL must
11117 be a BFD for an ELF target with the word size and byte order found in
11118 the remote memory. */
11119
11120bfd *
217aa764
AM
11121bfd_elf_bfd_from_remote_memory
11122 (bfd *templ,
11123 bfd_vma ehdr_vma,
f0a5d95a 11124 bfd_size_type size,
217aa764 11125 bfd_vma *loadbasep,
fe78531d 11126 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
3333a7c3
RM
11127{
11128 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
5979d6b6 11129 (templ, ehdr_vma, size, loadbasep, target_read_memory);
3333a7c3 11130}
4c45e5c9
JJ
11131\f
11132long
c9727e01
AM
11133_bfd_elf_get_synthetic_symtab (bfd *abfd,
11134 long symcount ATTRIBUTE_UNUSED,
11135 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 11136 long dynsymcount,
c9727e01
AM
11137 asymbol **dynsyms,
11138 asymbol **ret)
4c45e5c9
JJ
11139{
11140 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11141 asection *relplt;
11142 asymbol *s;
11143 const char *relplt_name;
11144 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
11145 arelent *p;
11146 long count, i, n;
11147 size_t size;
11148 Elf_Internal_Shdr *hdr;
11149 char *names;
11150 asection *plt;
11151
8615f3f2
AM
11152 *ret = NULL;
11153
90e3cdf2
JJ
11154 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
11155 return 0;
11156
8615f3f2
AM
11157 if (dynsymcount <= 0)
11158 return 0;
11159
4c45e5c9
JJ
11160 if (!bed->plt_sym_val)
11161 return 0;
11162
11163 relplt_name = bed->relplt_name;
11164 if (relplt_name == NULL)
d35fd659 11165 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
11166 relplt = bfd_get_section_by_name (abfd, relplt_name);
11167 if (relplt == NULL)
11168 return 0;
11169
11170 hdr = &elf_section_data (relplt)->this_hdr;
11171 if (hdr->sh_link != elf_dynsymtab (abfd)
11172 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
11173 return 0;
11174
11175 plt = bfd_get_section_by_name (abfd, ".plt");
11176 if (plt == NULL)
11177 return 0;
11178
11179 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 11180 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
11181 return -1;
11182
eea6121a 11183 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
11184 size = count * sizeof (asymbol);
11185 p = relplt->relocation;
cb53bf42 11186 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
11187 {
11188 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
11189 if (p->addend != 0)
11190 {
11191#ifdef BFD64
11192 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
11193#else
11194 size += sizeof ("+0x") - 1 + 8;
11195#endif
11196 }
11197 }
4c45e5c9 11198
a50b1753 11199 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
11200 if (s == NULL)
11201 return -1;
11202
11203 names = (char *) (s + count);
11204 p = relplt->relocation;
11205 n = 0;
cb53bf42 11206 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
11207 {
11208 size_t len;
11209 bfd_vma addr;
11210
11211 addr = bed->plt_sym_val (i, plt, p);
11212 if (addr == (bfd_vma) -1)
11213 continue;
11214
11215 *s = **p->sym_ptr_ptr;
65a7a66f
AM
11216 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
11217 we are defining a symbol, ensure one of them is set. */
11218 if ((s->flags & BSF_LOCAL) == 0)
11219 s->flags |= BSF_GLOBAL;
6ba2a415 11220 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
11221 s->section = plt;
11222 s->value = addr - plt->vma;
11223 s->name = names;
8f39ba8e 11224 s->udata.p = NULL;
4c45e5c9
JJ
11225 len = strlen ((*p->sym_ptr_ptr)->name);
11226 memcpy (names, (*p->sym_ptr_ptr)->name, len);
11227 names += len;
041de40d
AM
11228 if (p->addend != 0)
11229 {
1d770845 11230 char buf[30], *a;
d324f6d6 11231
041de40d
AM
11232 memcpy (names, "+0x", sizeof ("+0x") - 1);
11233 names += sizeof ("+0x") - 1;
1d770845
L
11234 bfd_sprintf_vma (abfd, buf, p->addend);
11235 for (a = buf; *a == '0'; ++a)
11236 ;
11237 len = strlen (a);
11238 memcpy (names, a, len);
11239 names += len;
041de40d 11240 }
4c45e5c9
JJ
11241 memcpy (names, "@plt", sizeof ("@plt"));
11242 names += sizeof ("@plt");
8f39ba8e 11243 ++s, ++n;
4c45e5c9
JJ
11244 }
11245
11246 return n;
11247}
3d7f7666 11248
821e6ff6
AM
11249/* It is only used by x86-64 so far.
11250 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
7eacd66b
AM
11251 but current usage would allow all of _bfd_std_section to be zero. */
11252static const asymbol lcomm_sym
11253 = GLOBAL_SYM_INIT ("LARGE_COMMON", &_bfd_elf_large_com_section);
3b22753a 11254asection _bfd_elf_large_com_section
7eacd66b 11255 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, &lcomm_sym,
821e6ff6 11256 "LARGE_COMMON", 0, SEC_IS_COMMON);
ecca9871 11257
d1036acb 11258void
78245035
L
11259_bfd_elf_post_process_headers (bfd * abfd,
11260 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
d1036acb
L
11261{
11262 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
11263
11264 i_ehdrp = elf_elfheader (abfd);
11265
11266 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
11267
11268 /* To make things simpler for the loader on Linux systems we set the
9c55345c 11269 osabi field to ELFOSABI_GNU if the binary contains symbols of
f64b2e8d 11270 the STT_GNU_IFUNC type or STB_GNU_UNIQUE binding. */
d8045f23 11271 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
f64b2e8d 11272 && elf_tdata (abfd)->has_gnu_symbols)
9c55345c 11273 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
d1036acb 11274}
fcb93ecf
PB
11275
11276
11277/* Return TRUE for ELF symbol types that represent functions.
11278 This is the default version of this function, which is sufficient for
d8045f23 11279 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
11280
11281bfd_boolean
11282_bfd_elf_is_function_type (unsigned int type)
11283{
d8045f23
NC
11284 return (type == STT_FUNC
11285 || type == STT_GNU_IFUNC);
fcb93ecf 11286}
9f296da3 11287
aef36ac1
AM
11288/* If the ELF symbol SYM might be a function in SEC, return the
11289 function size and set *CODE_OFF to the function's entry point,
11290 otherwise return zero. */
9f296da3 11291
aef36ac1
AM
11292bfd_size_type
11293_bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
11294 bfd_vma *code_off)
9f296da3 11295{
aef36ac1
AM
11296 bfd_size_type size;
11297
ff9e0f5b 11298 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
aef36ac1
AM
11299 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
11300 || sym->section != sec)
11301 return 0;
ff9e0f5b 11302
ff9e0f5b 11303 *code_off = sym->value;
aef36ac1
AM
11304 size = 0;
11305 if (!(sym->flags & BSF_SYNTHETIC))
11306 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
11307 if (size == 0)
11308 size = 1;
11309 return size;
9f296da3 11310}
This page took 2.688183 seconds and 4 git commands to generate.