Mention the change in NEWS
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91 2
b90efa5b 3 Copyright (C) 1993-2015 Free Software Foundation, Inc.
252b5132 4
5e8d7549 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
5e8d7549
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
5e8d7549 10 (at your option) any later version.
252b5132 11
5e8d7549
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
5e8d7549 17 You should have received a copy of the GNU General Public License
b34976b6 18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132 22
1b74d094
BW
23/*
24SECTION
252b5132
RH
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
661a3fd4 33 haven't bothered yet. */
252b5132 34
7ee38065
MS
35/* For sparc64-cross-sparc32. */
36#define _SYSCALL32
252b5132 37#include "sysdep.h"
3db64b00 38#include "bfd.h"
252b5132
RH
39#include "bfdlink.h"
40#include "libbfd.h"
41#define ARCH_SIZE 0
42#include "elf-bfd.h"
e0e8c97f 43#include "libiberty.h"
ff59fc36 44#include "safe-ctype.h"
70a38d42 45#include "elf-linux-psinfo.h"
252b5132 46
8bc7f138
L
47#ifdef CORE_HEADER
48#include CORE_HEADER
49#endif
50
217aa764 51static int elf_sort_sections (const void *, const void *);
c84fca4d 52static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764 53static bfd_boolean prep_headers (bfd *);
ef10c3ac 54static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int) ;
718175fa
JK
55static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
56static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
57 file_ptr offset);
50b2bdb7 58
252b5132
RH
59/* Swap version information in and out. The version information is
60 currently size independent. If that ever changes, this code will
61 need to move into elfcode.h. */
62
63/* Swap in a Verdef structure. */
64
65void
217aa764
AM
66_bfd_elf_swap_verdef_in (bfd *abfd,
67 const Elf_External_Verdef *src,
68 Elf_Internal_Verdef *dst)
252b5132 69{
dc810e39
AM
70 dst->vd_version = H_GET_16 (abfd, src->vd_version);
71 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
72 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
73 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
74 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
75 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
76 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
77}
78
79/* Swap out a Verdef structure. */
80
81void
217aa764
AM
82_bfd_elf_swap_verdef_out (bfd *abfd,
83 const Elf_Internal_Verdef *src,
84 Elf_External_Verdef *dst)
252b5132 85{
dc810e39
AM
86 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
87 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
88 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
89 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
90 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
91 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
92 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
93}
94
95/* Swap in a Verdaux structure. */
96
97void
217aa764
AM
98_bfd_elf_swap_verdaux_in (bfd *abfd,
99 const Elf_External_Verdaux *src,
100 Elf_Internal_Verdaux *dst)
252b5132 101{
dc810e39
AM
102 dst->vda_name = H_GET_32 (abfd, src->vda_name);
103 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
104}
105
106/* Swap out a Verdaux structure. */
107
108void
217aa764
AM
109_bfd_elf_swap_verdaux_out (bfd *abfd,
110 const Elf_Internal_Verdaux *src,
111 Elf_External_Verdaux *dst)
252b5132 112{
dc810e39
AM
113 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
114 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
115}
116
117/* Swap in a Verneed structure. */
118
119void
217aa764
AM
120_bfd_elf_swap_verneed_in (bfd *abfd,
121 const Elf_External_Verneed *src,
122 Elf_Internal_Verneed *dst)
252b5132 123{
dc810e39
AM
124 dst->vn_version = H_GET_16 (abfd, src->vn_version);
125 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
126 dst->vn_file = H_GET_32 (abfd, src->vn_file);
127 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
128 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
129}
130
131/* Swap out a Verneed structure. */
132
133void
217aa764
AM
134_bfd_elf_swap_verneed_out (bfd *abfd,
135 const Elf_Internal_Verneed *src,
136 Elf_External_Verneed *dst)
252b5132 137{
dc810e39
AM
138 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
139 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
140 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
141 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
142 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
143}
144
145/* Swap in a Vernaux structure. */
146
147void
217aa764
AM
148_bfd_elf_swap_vernaux_in (bfd *abfd,
149 const Elf_External_Vernaux *src,
150 Elf_Internal_Vernaux *dst)
252b5132 151{
dc810e39
AM
152 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
153 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
154 dst->vna_other = H_GET_16 (abfd, src->vna_other);
155 dst->vna_name = H_GET_32 (abfd, src->vna_name);
156 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
157}
158
159/* Swap out a Vernaux structure. */
160
161void
217aa764
AM
162_bfd_elf_swap_vernaux_out (bfd *abfd,
163 const Elf_Internal_Vernaux *src,
164 Elf_External_Vernaux *dst)
252b5132 165{
dc810e39
AM
166 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
167 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
168 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
169 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
170 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
171}
172
173/* Swap in a Versym structure. */
174
175void
217aa764
AM
176_bfd_elf_swap_versym_in (bfd *abfd,
177 const Elf_External_Versym *src,
178 Elf_Internal_Versym *dst)
252b5132 179{
dc810e39 180 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
181}
182
183/* Swap out a Versym structure. */
184
185void
217aa764
AM
186_bfd_elf_swap_versym_out (bfd *abfd,
187 const Elf_Internal_Versym *src,
188 Elf_External_Versym *dst)
252b5132 189{
dc810e39 190 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
191}
192
193/* Standard ELF hash function. Do not change this function; you will
194 cause invalid hash tables to be generated. */
3a99b017 195
252b5132 196unsigned long
217aa764 197bfd_elf_hash (const char *namearg)
252b5132 198{
3a99b017 199 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
200 unsigned long h = 0;
201 unsigned long g;
202 int ch;
203
204 while ((ch = *name++) != '\0')
205 {
206 h = (h << 4) + ch;
207 if ((g = (h & 0xf0000000)) != 0)
208 {
209 h ^= g >> 24;
210 /* The ELF ABI says `h &= ~g', but this is equivalent in
211 this case and on some machines one insn instead of two. */
212 h ^= g;
213 }
214 }
32dfa85d 215 return h & 0xffffffff;
252b5132
RH
216}
217
fdc90cb4
JJ
218/* DT_GNU_HASH hash function. Do not change this function; you will
219 cause invalid hash tables to be generated. */
220
221unsigned long
222bfd_elf_gnu_hash (const char *namearg)
223{
224 const unsigned char *name = (const unsigned char *) namearg;
225 unsigned long h = 5381;
226 unsigned char ch;
227
228 while ((ch = *name++) != '\0')
229 h = (h << 5) + h + ch;
230 return h & 0xffffffff;
231}
232
0c8d6e5c
AM
233/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
234 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 235bfd_boolean
0c8d6e5c 236bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 237 size_t object_size,
4dfe6ac6 238 enum elf_target_id object_id)
252b5132 239{
0ffa91dd
NC
240 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
241 abfd->tdata.any = bfd_zalloc (abfd, object_size);
242 if (abfd->tdata.any == NULL)
243 return FALSE;
252b5132 244
0ffa91dd 245 elf_object_id (abfd) = object_id;
c0355132
AM
246 if (abfd->direction != read_direction)
247 {
248 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
249 if (o == NULL)
250 return FALSE;
251 elf_tdata (abfd)->o = o;
252 elf_program_header_size (abfd) = (bfd_size_type) -1;
253 }
b34976b6 254 return TRUE;
252b5132
RH
255}
256
0ffa91dd
NC
257
258bfd_boolean
ae95ffa6 259bfd_elf_make_object (bfd *abfd)
0ffa91dd 260{
ae95ffa6 261 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 262 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 263 bed->target_id);
0ffa91dd
NC
264}
265
b34976b6 266bfd_boolean
217aa764 267bfd_elf_mkcorefile (bfd *abfd)
252b5132 268{
c044fabd 269 /* I think this can be done just like an object file. */
228e534f
AM
270 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
271 return FALSE;
272 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
273 return elf_tdata (abfd)->core != NULL;
252b5132
RH
274}
275
72a80a16 276static char *
217aa764 277bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
278{
279 Elf_Internal_Shdr **i_shdrp;
f075ee0c 280 bfd_byte *shstrtab = NULL;
dc810e39
AM
281 file_ptr offset;
282 bfd_size_type shstrtabsize;
252b5132
RH
283
284 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
285 if (i_shdrp == 0
286 || shindex >= elf_numsections (abfd)
287 || i_shdrp[shindex] == 0)
f075ee0c 288 return NULL;
252b5132 289
f075ee0c 290 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
291 if (shstrtab == NULL)
292 {
c044fabd 293 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
294 offset = i_shdrp[shindex]->sh_offset;
295 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
296
297 /* Allocate and clear an extra byte at the end, to prevent crashes
298 in case the string table is not terminated. */
3471d59d 299 if (shstrtabsize + 1 <= 1
06614111
NC
300 || bfd_seek (abfd, offset, SEEK_SET) != 0
301 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL)
c6c60d09
JJ
302 shstrtab = NULL;
303 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
304 {
305 if (bfd_get_error () != bfd_error_system_call)
306 bfd_set_error (bfd_error_file_truncated);
06614111 307 bfd_release (abfd, shstrtab);
c6c60d09 308 shstrtab = NULL;
3471d59d
CC
309 /* Once we've failed to read it, make sure we don't keep
310 trying. Otherwise, we'll keep allocating space for
311 the string table over and over. */
312 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
313 }
314 else
315 shstrtab[shstrtabsize] = '\0';
217aa764 316 i_shdrp[shindex]->contents = shstrtab;
252b5132 317 }
f075ee0c 318 return (char *) shstrtab;
252b5132
RH
319}
320
321char *
217aa764
AM
322bfd_elf_string_from_elf_section (bfd *abfd,
323 unsigned int shindex,
324 unsigned int strindex)
252b5132
RH
325{
326 Elf_Internal_Shdr *hdr;
327
328 if (strindex == 0)
329 return "";
330
74f2e02b
AM
331 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
332 return NULL;
333
252b5132
RH
334 hdr = elf_elfsections (abfd)[shindex];
335
06614111
NC
336 if (hdr->contents == NULL)
337 {
338 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
339 {
340 /* PR 17512: file: f057ec89. */
341 _bfd_error_handler (_("%B: attempt to load strings from a non-string section (number %d)"),
342 abfd, shindex);
343 return NULL;
344 }
b1fa9dd6 345
06614111
NC
346 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
347 return NULL;
348 }
252b5132
RH
349
350 if (strindex >= hdr->sh_size)
351 {
1b3a8575 352 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 353 (*_bfd_error_handler)
d003868e
AM
354 (_("%B: invalid string offset %u >= %lu for section `%s'"),
355 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 356 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 357 ? ".shstrtab"
1b3a8575 358 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 359 return NULL;
252b5132
RH
360 }
361
362 return ((char *) hdr->contents) + strindex;
363}
364
6cdc0ccc
AM
365/* Read and convert symbols to internal format.
366 SYMCOUNT specifies the number of symbols to read, starting from
367 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
368 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
369 symbols, and symbol section index extensions, respectively.
370 Returns a pointer to the internal symbol buffer (malloced if necessary)
371 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
372
373Elf_Internal_Sym *
217aa764
AM
374bfd_elf_get_elf_syms (bfd *ibfd,
375 Elf_Internal_Shdr *symtab_hdr,
376 size_t symcount,
377 size_t symoffset,
378 Elf_Internal_Sym *intsym_buf,
379 void *extsym_buf,
380 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
381{
382 Elf_Internal_Shdr *shndx_hdr;
217aa764 383 void *alloc_ext;
df622259 384 const bfd_byte *esym;
6cdc0ccc
AM
385 Elf_External_Sym_Shndx *alloc_extshndx;
386 Elf_External_Sym_Shndx *shndx;
4dd07732 387 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
388 Elf_Internal_Sym *isym;
389 Elf_Internal_Sym *isymend;
9c5bfbb7 390 const struct elf_backend_data *bed;
6cdc0ccc
AM
391 size_t extsym_size;
392 bfd_size_type amt;
393 file_ptr pos;
394
e44a2c9c
AM
395 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
396 abort ();
397
6cdc0ccc
AM
398 if (symcount == 0)
399 return intsym_buf;
400
401 /* Normal syms might have section extension entries. */
402 shndx_hdr = NULL;
6a40cf0c
NC
403 if (elf_symtab_shndx_list (ibfd) != NULL)
404 {
405 elf_section_list * entry;
406 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
407
408 /* Find an index section that is linked to this symtab section. */
409 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
410 if (sections[entry->hdr.sh_link] == symtab_hdr)
411 {
412 shndx_hdr = & entry->hdr;
413 break;
414 };
415
416 if (shndx_hdr == NULL)
417 {
418 if (symtab_hdr == & elf_symtab_hdr (ibfd))
419 /* Not really accurate, but this was how the old code used to work. */
420 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
421 /* Otherwise we do nothing. The assumption is that
422 the index table will not be needed. */
423 }
424 }
6cdc0ccc
AM
425
426 /* Read the symbols. */
427 alloc_ext = NULL;
428 alloc_extshndx = NULL;
4dd07732 429 alloc_intsym = NULL;
6cdc0ccc
AM
430 bed = get_elf_backend_data (ibfd);
431 extsym_size = bed->s->sizeof_sym;
432 amt = symcount * extsym_size;
433 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
434 if (extsym_buf == NULL)
435 {
d0fb9a8d 436 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
437 extsym_buf = alloc_ext;
438 }
439 if (extsym_buf == NULL
440 || bfd_seek (ibfd, pos, SEEK_SET) != 0
441 || bfd_bread (extsym_buf, amt, ibfd) != amt)
442 {
443 intsym_buf = NULL;
444 goto out;
445 }
446
447 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
448 extshndx_buf = NULL;
449 else
450 {
451 amt = symcount * sizeof (Elf_External_Sym_Shndx);
452 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
453 if (extshndx_buf == NULL)
454 {
a50b1753
NC
455 alloc_extshndx = (Elf_External_Sym_Shndx *)
456 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
457 extshndx_buf = alloc_extshndx;
458 }
459 if (extshndx_buf == NULL
460 || bfd_seek (ibfd, pos, SEEK_SET) != 0
461 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
462 {
463 intsym_buf = NULL;
464 goto out;
465 }
466 }
467
468 if (intsym_buf == NULL)
469 {
a50b1753
NC
470 alloc_intsym = (Elf_Internal_Sym *)
471 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 472 intsym_buf = alloc_intsym;
6cdc0ccc
AM
473 if (intsym_buf == NULL)
474 goto out;
475 }
476
477 /* Convert the symbols to internal form. */
478 isymend = intsym_buf + symcount;
a50b1753
NC
479 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
480 shndx = extshndx_buf;
6cdc0ccc
AM
481 isym < isymend;
482 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
483 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
484 {
485 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
486 (*_bfd_error_handler) (_("%B symbol number %lu references "
487 "nonexistent SHT_SYMTAB_SHNDX section"),
488 ibfd, (unsigned long) symoffset);
4dd07732
AM
489 if (alloc_intsym != NULL)
490 free (alloc_intsym);
8384fb8f
AM
491 intsym_buf = NULL;
492 goto out;
493 }
6cdc0ccc
AM
494
495 out:
496 if (alloc_ext != NULL)
497 free (alloc_ext);
498 if (alloc_extshndx != NULL)
499 free (alloc_extshndx);
500
501 return intsym_buf;
502}
503
5cab59f6
AM
504/* Look up a symbol name. */
505const char *
be8dd2ca
AM
506bfd_elf_sym_name (bfd *abfd,
507 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
508 Elf_Internal_Sym *isym,
509 asection *sym_sec)
5cab59f6 510{
26c61ae5 511 const char *name;
5cab59f6 512 unsigned int iname = isym->st_name;
be8dd2ca 513 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 514
138f35cc
JJ
515 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
516 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 517 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
518 {
519 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
520 shindex = elf_elfheader (abfd)->e_shstrndx;
521 }
522
26c61ae5
L
523 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
524 if (name == NULL)
525 name = "(null)";
526 else if (sym_sec && *name == '\0')
527 name = bfd_section_name (abfd, sym_sec);
528
529 return name;
5cab59f6
AM
530}
531
dbb410c3
AM
532/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
533 sections. The first element is the flags, the rest are section
534 pointers. */
535
536typedef union elf_internal_group {
537 Elf_Internal_Shdr *shdr;
538 unsigned int flags;
539} Elf_Internal_Group;
540
b885599b
AM
541/* Return the name of the group signature symbol. Why isn't the
542 signature just a string? */
543
544static const char *
217aa764 545group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 546{
9dce4196 547 Elf_Internal_Shdr *hdr;
9dce4196
AM
548 unsigned char esym[sizeof (Elf64_External_Sym)];
549 Elf_External_Sym_Shndx eshndx;
550 Elf_Internal_Sym isym;
b885599b 551
13792e9d
L
552 /* First we need to ensure the symbol table is available. Make sure
553 that it is a symbol table section. */
4fbb74a6
AM
554 if (ghdr->sh_link >= elf_numsections (abfd))
555 return NULL;
13792e9d
L
556 hdr = elf_elfsections (abfd) [ghdr->sh_link];
557 if (hdr->sh_type != SHT_SYMTAB
558 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
559 return NULL;
560
9dce4196
AM
561 /* Go read the symbol. */
562 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
563 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
564 &isym, esym, &eshndx) == NULL)
b885599b 565 return NULL;
9dce4196 566
26c61ae5 567 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
568}
569
dbb410c3
AM
570/* Set next_in_group list pointer, and group name for NEWSECT. */
571
b34976b6 572static bfd_boolean
217aa764 573setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
574{
575 unsigned int num_group = elf_tdata (abfd)->num_group;
576
577 /* If num_group is zero, read in all SHT_GROUP sections. The count
578 is set to -1 if there are no SHT_GROUP sections. */
579 if (num_group == 0)
580 {
581 unsigned int i, shnum;
582
583 /* First count the number of groups. If we have a SHT_GROUP
584 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 585 shnum = elf_numsections (abfd);
dbb410c3 586 num_group = 0;
08a40648 587
44534af3 588#define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
1783205a 589 ( (shdr)->sh_type == SHT_GROUP \
44534af3 590 && (shdr)->sh_size >= minsize \
1783205a
NC
591 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
592 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 593
dbb410c3
AM
594 for (i = 0; i < shnum; i++)
595 {
596 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 597
44534af3 598 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3
AM
599 num_group += 1;
600 }
601
602 if (num_group == 0)
20dbb49d
L
603 {
604 num_group = (unsigned) -1;
605 elf_tdata (abfd)->num_group = num_group;
606 }
607 else
dbb410c3
AM
608 {
609 /* We keep a list of elf section headers for group sections,
610 so we can find them quickly. */
20dbb49d 611 bfd_size_type amt;
d0fb9a8d 612
20dbb49d 613 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
614 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
615 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 616 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 617 return FALSE;
dbb410c3
AM
618
619 num_group = 0;
620 for (i = 0; i < shnum; i++)
621 {
622 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 623
44534af3 624 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3 625 {
973ffd63 626 unsigned char *src;
dbb410c3
AM
627 Elf_Internal_Group *dest;
628
629 /* Add to list of sections. */
630 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
631 num_group += 1;
632
633 /* Read the raw contents. */
634 BFD_ASSERT (sizeof (*dest) >= 4);
635 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
636 shdr->contents = (unsigned char *)
637 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
638 /* PR binutils/4110: Handle corrupt group headers. */
639 if (shdr->contents == NULL)
640 {
641 _bfd_error_handler
493a3386 642 (_("%B: corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
1783205a 643 bfd_set_error (bfd_error_bad_value);
493a3386
NC
644 -- num_group;
645 continue;
1783205a
NC
646 }
647
648 memset (shdr->contents, 0, amt);
649
650 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
651 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
652 != shdr->sh_size))
493a3386
NC
653 {
654 _bfd_error_handler
655 (_("%B: invalid size field in group section header: 0x%lx"), abfd, shdr->sh_size);
656 bfd_set_error (bfd_error_bad_value);
657 -- num_group;
658 /* PR 17510: If the group contents are even partially
659 corrupt, do not allow any of the contents to be used. */
660 memset (shdr->contents, 0, amt);
661 continue;
662 }
708d7d0d 663
dbb410c3
AM
664 /* Translate raw contents, a flag word followed by an
665 array of elf section indices all in target byte order,
666 to the flag word followed by an array of elf section
667 pointers. */
668 src = shdr->contents + shdr->sh_size;
669 dest = (Elf_Internal_Group *) (shdr->contents + amt);
06614111 670
dbb410c3
AM
671 while (1)
672 {
673 unsigned int idx;
674
675 src -= 4;
676 --dest;
677 idx = H_GET_32 (abfd, src);
678 if (src == shdr->contents)
679 {
680 dest->flags = idx;
b885599b
AM
681 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
682 shdr->bfd_section->flags
683 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
684 break;
685 }
686 if (idx >= shnum)
687 {
688 ((*_bfd_error_handler)
d003868e 689 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
690 idx = 0;
691 }
692 dest->shdr = elf_elfsections (abfd)[idx];
693 }
694 }
695 }
493a3386
NC
696
697 /* PR 17510: Corrupt binaries might contain invalid groups. */
698 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
699 {
700 elf_tdata (abfd)->num_group = num_group;
701
702 /* If all groups are invalid then fail. */
703 if (num_group == 0)
704 {
705 elf_tdata (abfd)->group_sect_ptr = NULL;
706 elf_tdata (abfd)->num_group = num_group = -1;
707 (*_bfd_error_handler) (_("%B: no valid group sections found"), abfd);
708 bfd_set_error (bfd_error_bad_value);
709 }
710 }
dbb410c3
AM
711 }
712 }
713
714 if (num_group != (unsigned) -1)
715 {
716 unsigned int i;
717
718 for (i = 0; i < num_group; i++)
719 {
720 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
721 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
722 unsigned int n_elt = shdr->sh_size / 4;
723
724 /* Look through this group's sections to see if current
725 section is a member. */
726 while (--n_elt != 0)
727 if ((++idx)->shdr == hdr)
728 {
e0e8c97f 729 asection *s = NULL;
dbb410c3
AM
730
731 /* We are a member of this group. Go looking through
732 other members to see if any others are linked via
733 next_in_group. */
734 idx = (Elf_Internal_Group *) shdr->contents;
735 n_elt = shdr->sh_size / 4;
736 while (--n_elt != 0)
737 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 738 && elf_next_in_group (s) != NULL)
dbb410c3
AM
739 break;
740 if (n_elt != 0)
741 {
dbb410c3
AM
742 /* Snarf the group name from other member, and
743 insert current section in circular list. */
945906ff
AM
744 elf_group_name (newsect) = elf_group_name (s);
745 elf_next_in_group (newsect) = elf_next_in_group (s);
746 elf_next_in_group (s) = newsect;
dbb410c3
AM
747 }
748 else
749 {
dbb410c3
AM
750 const char *gname;
751
b885599b
AM
752 gname = group_signature (abfd, shdr);
753 if (gname == NULL)
b34976b6 754 return FALSE;
945906ff 755 elf_group_name (newsect) = gname;
dbb410c3
AM
756
757 /* Start a circular list with one element. */
945906ff 758 elf_next_in_group (newsect) = newsect;
dbb410c3 759 }
b885599b 760
9dce4196
AM
761 /* If the group section has been created, point to the
762 new member. */
dbb410c3 763 if (shdr->bfd_section != NULL)
945906ff 764 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 765
dbb410c3
AM
766 i = num_group - 1;
767 break;
768 }
769 }
770 }
771
945906ff 772 if (elf_group_name (newsect) == NULL)
dbb410c3 773 {
d003868e
AM
774 (*_bfd_error_handler) (_("%B: no group info for section %A"),
775 abfd, newsect);
493a3386 776 return FALSE;
dbb410c3 777 }
b34976b6 778 return TRUE;
dbb410c3
AM
779}
780
3d7f7666 781bfd_boolean
dd863624 782_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
783{
784 unsigned int i;
785 unsigned int num_group = elf_tdata (abfd)->num_group;
786 bfd_boolean result = TRUE;
dd863624
L
787 asection *s;
788
789 /* Process SHF_LINK_ORDER. */
790 for (s = abfd->sections; s != NULL; s = s->next)
791 {
792 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
793 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
794 {
795 unsigned int elfsec = this_hdr->sh_link;
796 /* FIXME: The old Intel compiler and old strip/objcopy may
797 not set the sh_link or sh_info fields. Hence we could
798 get the situation where elfsec is 0. */
799 if (elfsec == 0)
800 {
4fbb74a6 801 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
802 if (bed->link_order_error_handler)
803 bed->link_order_error_handler
804 (_("%B: warning: sh_link not set for section `%A'"),
805 abfd, s);
806 }
807 else
808 {
91d6fa6a 809 asection *linksec = NULL;
25bbc984 810
4fbb74a6
AM
811 if (elfsec < elf_numsections (abfd))
812 {
813 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 814 linksec = this_hdr->bfd_section;
4fbb74a6 815 }
25bbc984
L
816
817 /* PR 1991, 2008:
818 Some strip/objcopy may leave an incorrect value in
819 sh_link. We don't want to proceed. */
91d6fa6a 820 if (linksec == NULL)
25bbc984
L
821 {
822 (*_bfd_error_handler)
823 (_("%B: sh_link [%d] in section `%A' is incorrect"),
824 s->owner, s, elfsec);
825 result = FALSE;
826 }
827
91d6fa6a 828 elf_linked_to_section (s) = linksec;
dd863624
L
829 }
830 }
831 }
3d7f7666 832
dd863624 833 /* Process section groups. */
3d7f7666
L
834 if (num_group == (unsigned) -1)
835 return result;
836
837 for (i = 0; i < num_group; i++)
838 {
839 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
4b0e8a5f
NC
840 Elf_Internal_Group *idx;
841 unsigned int n_elt;
3d7f7666 842
4b0e8a5f
NC
843 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
844 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
845 {
846 (*_bfd_error_handler)
847 (_("%B: section group entry number %u is corrupt"),
848 abfd, i);
849 result = FALSE;
850 continue;
851 }
852
853 idx = (Elf_Internal_Group *) shdr->contents;
854 n_elt = shdr->sh_size / 4;
1b786873 855
3d7f7666
L
856 while (--n_elt != 0)
857 if ((++idx)->shdr->bfd_section)
858 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
859 else if (idx->shdr->sh_type == SHT_RELA
860 || idx->shdr->sh_type == SHT_REL)
861 /* We won't include relocation sections in section groups in
862 output object files. We adjust the group section size here
863 so that relocatable link will work correctly when
864 relocation sections are in section group in input object
865 files. */
866 shdr->bfd_section->size -= 4;
867 else
868 {
869 /* There are some unknown sections in the group. */
870 (*_bfd_error_handler)
d003868e
AM
871 (_("%B: unknown [%d] section `%s' in group [%s]"),
872 abfd,
3d7f7666 873 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
874 bfd_elf_string_from_elf_section (abfd,
875 (elf_elfheader (abfd)
876 ->e_shstrndx),
877 idx->shdr->sh_name),
3d7f7666
L
878 shdr->bfd_section->name);
879 result = FALSE;
880 }
881 }
882 return result;
883}
884
72adc230
AM
885bfd_boolean
886bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
887{
888 return elf_next_in_group (sec) != NULL;
889}
890
f6fe1ccd
L
891static char *
892convert_debug_to_zdebug (bfd *abfd, const char *name)
893{
894 unsigned int len = strlen (name);
895 char *new_name = bfd_alloc (abfd, len + 2);
896 if (new_name == NULL)
897 return NULL;
898 new_name[0] = '.';
899 new_name[1] = 'z';
900 memcpy (new_name + 2, name + 1, len);
901 return new_name;
902}
903
904static char *
905convert_zdebug_to_debug (bfd *abfd, const char *name)
906{
907 unsigned int len = strlen (name);
908 char *new_name = bfd_alloc (abfd, len);
909 if (new_name == NULL)
910 return NULL;
911 new_name[0] = '.';
912 memcpy (new_name + 1, name + 2, len - 1);
913 return new_name;
914}
915
252b5132
RH
916/* Make a BFD section from an ELF section. We store a pointer to the
917 BFD section in the bfd_section field of the header. */
918
b34976b6 919bfd_boolean
217aa764
AM
920_bfd_elf_make_section_from_shdr (bfd *abfd,
921 Elf_Internal_Shdr *hdr,
6dc132d9
L
922 const char *name,
923 int shindex)
252b5132
RH
924{
925 asection *newsect;
926 flagword flags;
9c5bfbb7 927 const struct elf_backend_data *bed;
252b5132
RH
928
929 if (hdr->bfd_section != NULL)
4e011fb5 930 return TRUE;
252b5132
RH
931
932 newsect = bfd_make_section_anyway (abfd, name);
933 if (newsect == NULL)
b34976b6 934 return FALSE;
252b5132 935
1829f4b2
AM
936 hdr->bfd_section = newsect;
937 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 938 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 939
2f89ff8d
L
940 /* Always use the real type/flags. */
941 elf_section_type (newsect) = hdr->sh_type;
942 elf_section_flags (newsect) = hdr->sh_flags;
943
252b5132
RH
944 newsect->filepos = hdr->sh_offset;
945
946 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
947 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
948 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 949 bfd_log2 (hdr->sh_addralign)))
b34976b6 950 return FALSE;
252b5132
RH
951
952 flags = SEC_NO_FLAGS;
953 if (hdr->sh_type != SHT_NOBITS)
954 flags |= SEC_HAS_CONTENTS;
dbb410c3 955 if (hdr->sh_type == SHT_GROUP)
b3096250 956 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
957 if ((hdr->sh_flags & SHF_ALLOC) != 0)
958 {
959 flags |= SEC_ALLOC;
960 if (hdr->sh_type != SHT_NOBITS)
961 flags |= SEC_LOAD;
962 }
963 if ((hdr->sh_flags & SHF_WRITE) == 0)
964 flags |= SEC_READONLY;
965 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
966 flags |= SEC_CODE;
967 else if ((flags & SEC_LOAD) != 0)
968 flags |= SEC_DATA;
f5fa8ca2
JJ
969 if ((hdr->sh_flags & SHF_MERGE) != 0)
970 {
971 flags |= SEC_MERGE;
972 newsect->entsize = hdr->sh_entsize;
973 if ((hdr->sh_flags & SHF_STRINGS) != 0)
974 flags |= SEC_STRINGS;
975 }
dbb410c3
AM
976 if (hdr->sh_flags & SHF_GROUP)
977 if (!setup_group (abfd, hdr, newsect))
b34976b6 978 return FALSE;
13ae64f3
JJ
979 if ((hdr->sh_flags & SHF_TLS) != 0)
980 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
981 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
982 flags |= SEC_EXCLUDE;
252b5132 983
3d2b39cf 984 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 985 {
3d2b39cf
L
986 /* The debugging sections appear to be recognized only by name,
987 not any sort of flag. Their SEC_ALLOC bits are cleared. */
3d2b39cf
L
988 if (name [0] == '.')
989 {
f073ced3
AM
990 const char *p;
991 int n;
992 if (name[1] == 'd')
993 p = ".debug", n = 6;
994 else if (name[1] == 'g' && name[2] == 'n')
995 p = ".gnu.linkonce.wi.", n = 17;
996 else if (name[1] == 'g' && name[2] == 'd')
997 p = ".gdb_index", n = 11; /* yes we really do mean 11. */
998 else if (name[1] == 'l')
999 p = ".line", n = 5;
1000 else if (name[1] == 's')
1001 p = ".stab", n = 5;
1002 else if (name[1] == 'z')
1003 p = ".zdebug", n = 7;
1004 else
1005 p = NULL, n = 0;
1006 if (p != NULL && strncmp (name, p, n) == 0)
3d2b39cf
L
1007 flags |= SEC_DEBUGGING;
1008 }
1009 }
252b5132
RH
1010
1011 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1012 only link a single copy of the section. This is used to support
1013 g++. g++ will emit each template expansion in its own section.
1014 The symbols will be defined as weak, so that multiple definitions
1015 are permitted. The GNU linker extension is to actually discard
1016 all but one of the sections. */
0112cd26 1017 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 1018 && elf_next_in_group (newsect) == NULL)
252b5132
RH
1019 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1020
fa152c49
JW
1021 bed = get_elf_backend_data (abfd);
1022 if (bed->elf_backend_section_flags)
1023 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 1024 return FALSE;
fa152c49 1025
252b5132 1026 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 1027 return FALSE;
252b5132 1028
718175fa
JK
1029 /* We do not parse the PT_NOTE segments as we are interested even in the
1030 separate debug info files which may have the segments offsets corrupted.
1031 PT_NOTEs from the core files are currently not parsed using BFD. */
1032 if (hdr->sh_type == SHT_NOTE)
1033 {
baea7ef1 1034 bfd_byte *contents;
718175fa 1035
baea7ef1 1036 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
1037 return FALSE;
1038
baea7ef1 1039 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
1040 free (contents);
1041 }
1042
252b5132
RH
1043 if ((flags & SEC_ALLOC) != 0)
1044 {
1045 Elf_Internal_Phdr *phdr;
6ffd7900
AM
1046 unsigned int i, nload;
1047
1048 /* Some ELF linkers produce binaries with all the program header
1049 p_paddr fields zero. If we have such a binary with more than
1050 one PT_LOAD header, then leave the section lma equal to vma
1051 so that we don't create sections with overlapping lma. */
1052 phdr = elf_tdata (abfd)->phdr;
1053 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1054 if (phdr->p_paddr != 0)
1055 break;
1056 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1057 ++nload;
1058 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1059 return TRUE;
252b5132 1060
252b5132
RH
1061 phdr = elf_tdata (abfd)->phdr;
1062 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1063 {
86b2281f
AM
1064 if (((phdr->p_type == PT_LOAD
1065 && (hdr->sh_flags & SHF_TLS) == 0)
1066 || phdr->p_type == PT_TLS)
9a83a553 1067 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 1068 {
88967714
AM
1069 if ((flags & SEC_LOAD) == 0)
1070 newsect->lma = (phdr->p_paddr
1071 + hdr->sh_addr - phdr->p_vaddr);
1072 else
1073 /* We used to use the same adjustment for SEC_LOAD
1074 sections, but that doesn't work if the segment
1075 is packed with code from multiple VMAs.
1076 Instead we calculate the section LMA based on
1077 the segment LMA. It is assumed that the
1078 segment will contain sections with contiguous
1079 LMAs, even if the VMAs are not. */
1080 newsect->lma = (phdr->p_paddr
1081 + hdr->sh_offset - phdr->p_offset);
1082
1083 /* With contiguous segments, we can't tell from file
1084 offsets whether a section with zero size should
1085 be placed at the end of one segment or the
1086 beginning of the next. Decide based on vaddr. */
1087 if (hdr->sh_addr >= phdr->p_vaddr
1088 && (hdr->sh_addr + hdr->sh_size
1089 <= phdr->p_vaddr + phdr->p_memsz))
1090 break;
252b5132
RH
1091 }
1092 }
1093 }
1094
4a114e3e
L
1095 /* Compress/decompress DWARF debug sections with names: .debug_* and
1096 .zdebug_*, after the section flags is set. */
1097 if ((flags & SEC_DEBUGGING)
1098 && ((name[1] == 'd' && name[6] == '_')
1099 || (name[1] == 'z' && name[7] == '_')))
1100 {
1101 enum { nothing, compress, decompress } action = nothing;
151411f8 1102 int compression_header_size;
dab394de 1103 bfd_size_type uncompressed_size;
151411f8
L
1104 bfd_boolean compressed
1105 = bfd_is_section_compressed_with_header (abfd, newsect,
dab394de
L
1106 &compression_header_size,
1107 &uncompressed_size);
4a114e3e 1108
151411f8 1109 if (compressed)
4a114e3e
L
1110 {
1111 /* Compressed section. Check if we should decompress. */
1112 if ((abfd->flags & BFD_DECOMPRESS))
1113 action = decompress;
1114 }
151411f8
L
1115
1116 /* Compress the uncompressed section or convert from/to .zdebug*
1117 section. Check if we should compress. */
1118 if (action == nothing)
4a114e3e 1119 {
151411f8
L
1120 if (newsect->size != 0
1121 && (abfd->flags & BFD_COMPRESS)
1122 && compression_header_size >= 0
dab394de 1123 && uncompressed_size > 0
151411f8
L
1124 && (!compressed
1125 || ((compression_header_size > 0)
1126 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
4a114e3e 1127 action = compress;
151411f8
L
1128 else
1129 return TRUE;
4a114e3e
L
1130 }
1131
151411f8 1132 if (action == compress)
4a114e3e 1133 {
4a114e3e
L
1134 if (!bfd_init_section_compress_status (abfd, newsect))
1135 {
1136 (*_bfd_error_handler)
bc823199 1137 (_("%B: unable to initialize compress status for section %s"),
4a114e3e
L
1138 abfd, name);
1139 return FALSE;
1140 }
151411f8
L
1141 }
1142 else
1143 {
4a114e3e
L
1144 if (!bfd_init_section_decompress_status (abfd, newsect))
1145 {
1146 (*_bfd_error_handler)
bc823199 1147 (_("%B: unable to initialize decompress status for section %s"),
4a114e3e
L
1148 abfd, name);
1149 return FALSE;
1150 }
151411f8
L
1151 }
1152
f6fe1ccd 1153 if (abfd->is_linker_input)
151411f8 1154 {
f6fe1ccd
L
1155 if (name[1] == 'z'
1156 && (action == decompress
1157 || (action == compress
1158 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
4e011fb5 1159 {
f6fe1ccd
L
1160 /* Convert section name from .zdebug_* to .debug_* so
1161 that linker will consider this section as a debug
1162 section. */
1163 char *new_name = convert_zdebug_to_debug (abfd, name);
151411f8
L
1164 if (new_name == NULL)
1165 return FALSE;
f6fe1ccd 1166 bfd_rename_section (abfd, newsect, new_name);
151411f8 1167 }
4a114e3e 1168 }
f6fe1ccd
L
1169 else
1170 /* For objdump, don't rename the section. For objcopy, delay
1171 section rename to elf_fake_sections. */
1172 newsect->flags |= SEC_ELF_RENAME;
4a114e3e
L
1173 }
1174
b34976b6 1175 return TRUE;
252b5132
RH
1176}
1177
252b5132
RH
1178const char *const bfd_elf_section_type_names[] = {
1179 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1180 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1181 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1182};
1183
1049f94e 1184/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1185 output, and the reloc is against an external symbol, and nothing
1186 has given us any additional addend, the resulting reloc will also
1187 be against the same symbol. In such a case, we don't want to
1188 change anything about the way the reloc is handled, since it will
1189 all be done at final link time. Rather than put special case code
1190 into bfd_perform_relocation, all the reloc types use this howto
1191 function. It just short circuits the reloc if producing
1049f94e 1192 relocatable output against an external symbol. */
252b5132 1193
252b5132 1194bfd_reloc_status_type
217aa764
AM
1195bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1196 arelent *reloc_entry,
1197 asymbol *symbol,
1198 void *data ATTRIBUTE_UNUSED,
1199 asection *input_section,
1200 bfd *output_bfd,
1201 char **error_message ATTRIBUTE_UNUSED)
1202{
1203 if (output_bfd != NULL
252b5132
RH
1204 && (symbol->flags & BSF_SECTION_SYM) == 0
1205 && (! reloc_entry->howto->partial_inplace
1206 || reloc_entry->addend == 0))
1207 {
1208 reloc_entry->address += input_section->output_offset;
1209 return bfd_reloc_ok;
1210 }
1211
1212 return bfd_reloc_continue;
1213}
1214\f
0ac4564e
L
1215/* Copy the program header and other data from one object module to
1216 another. */
252b5132 1217
b34976b6 1218bfd_boolean
217aa764 1219_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1220{
1221 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1222 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1223 return TRUE;
2d502050 1224
57b828ef
L
1225 if (!elf_flags_init (obfd))
1226 {
1227 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1228 elf_flags_init (obfd) = TRUE;
1229 }
2d502050 1230
0ac4564e 1231 elf_gp (obfd) = elf_gp (ibfd);
57b828ef
L
1232
1233 /* Also copy the EI_OSABI field. */
1234 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1235 elf_elfheader (ibfd)->e_ident[EI_OSABI];
104d59d1
JM
1236
1237 /* Copy object attributes. */
1238 _bfd_elf_copy_obj_attributes (ibfd, obfd);
63b9bbb7
NC
1239
1240 /* This is an feature for objcopy --only-keep-debug: When a section's type
1241 is changed to NOBITS, we preserve the sh_link and sh_info fields so that
1242 they can be matched up with the original. */
1243 Elf_Internal_Shdr ** iheaders = elf_elfsections (ibfd);
1244 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1245
1246 if (iheaders != NULL && oheaders != NULL)
1247 {
1248 unsigned int i;
1249
1250 for (i = 0; i < elf_numsections (obfd); i++)
1251 {
1252 unsigned int j;
1253 Elf_Internal_Shdr * oheader = oheaders[i];
1254
1255 if (oheader == NULL
1256 || oheader->sh_type != SHT_NOBITS
1257 || oheader->sh_size == 0
1258 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1259 continue;
1260
1261 /* Scan for the matching section in the input bfd.
1262 FIXME: We could use something better than a linear scan here.
1263 Unfortunately we cannot compare names as the output string table
1264 is empty, so instead we check size, address and type. */
1265 for (j = 0; j < elf_numsections (ibfd); j++)
1266 {
1267 Elf_Internal_Shdr * iheader = iheaders[j];
1b786873 1268
d4ac1f87
L
1269 /* Since --only-keep-debug turns all non-debug sections
1270 into SHT_NOBITS sections, the output SHT_NOBITS type
1271 matches any input type. */
1272 if ((oheader->sh_type == SHT_NOBITS
64140f86 1273 || iheader->sh_type == oheader->sh_type)
d4ac1f87
L
1274 && iheader->sh_flags == oheader->sh_flags
1275 && iheader->sh_addralign == oheader->sh_addralign
1276 && iheader->sh_entsize == oheader->sh_entsize
63b9bbb7
NC
1277 && iheader->sh_size == oheader->sh_size
1278 && iheader->sh_addr == oheader->sh_addr
1279 && (iheader->sh_info != oheader->sh_info
1280 || iheader->sh_link != oheader->sh_link))
1281 {
1282 /* Note: Strictly speaking these assignments are wrong.
1283 The sh_link and sh_info fields should point to the
1284 relevent sections in the output BFD, which may not be in
1285 the same location as they were in the input BFD. But the
1286 whole point of this action is to preserve the original
1287 values of the sh_link and sh_info fields, so that they
1288 can be matched up with the section headers in the
1289 original file. So strictly speaking we may be creating
1290 an invalid ELF file, but it is only for a file that just
1291 contains debug info and only for sections without any
1292 contents. */
1293 if (oheader->sh_link == 0)
1294 oheader->sh_link = iheader->sh_link;
1295 if (oheader->sh_info == 0)
1296 oheader->sh_info = iheader->sh_info;
1297 break;
1298 }
1299 }
1300 }
1301 }
1302
b34976b6 1303 return TRUE;
2d502050
L
1304}
1305
cedc298e
L
1306static const char *
1307get_segment_type (unsigned int p_type)
1308{
1309 const char *pt;
1310 switch (p_type)
1311 {
1312 case PT_NULL: pt = "NULL"; break;
1313 case PT_LOAD: pt = "LOAD"; break;
1314 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1315 case PT_INTERP: pt = "INTERP"; break;
1316 case PT_NOTE: pt = "NOTE"; break;
1317 case PT_SHLIB: pt = "SHLIB"; break;
1318 case PT_PHDR: pt = "PHDR"; break;
1319 case PT_TLS: pt = "TLS"; break;
1320 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1321 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1322 case PT_GNU_RELRO: pt = "RELRO"; break;
1323 default: pt = NULL; break;
1324 }
1325 return pt;
1326}
1327
f0b79d91
L
1328/* Print out the program headers. */
1329
b34976b6 1330bfd_boolean
217aa764 1331_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1332{
a50b1753 1333 FILE *f = (FILE *) farg;
252b5132
RH
1334 Elf_Internal_Phdr *p;
1335 asection *s;
1336 bfd_byte *dynbuf = NULL;
1337
1338 p = elf_tdata (abfd)->phdr;
1339 if (p != NULL)
1340 {
1341 unsigned int i, c;
1342
1343 fprintf (f, _("\nProgram Header:\n"));
1344 c = elf_elfheader (abfd)->e_phnum;
1345 for (i = 0; i < c; i++, p++)
1346 {
cedc298e 1347 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1348 char buf[20];
1349
cedc298e 1350 if (pt == NULL)
252b5132 1351 {
cedc298e
L
1352 sprintf (buf, "0x%lx", p->p_type);
1353 pt = buf;
252b5132 1354 }
dc810e39 1355 fprintf (f, "%8s off 0x", pt);
60b89a18 1356 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1357 fprintf (f, " vaddr 0x");
60b89a18 1358 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1359 fprintf (f, " paddr 0x");
60b89a18 1360 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1361 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1362 fprintf (f, " filesz 0x");
60b89a18 1363 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1364 fprintf (f, " memsz 0x");
60b89a18 1365 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1366 fprintf (f, " flags %c%c%c",
1367 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1368 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1369 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1370 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1371 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1372 fprintf (f, "\n");
1373 }
1374 }
1375
1376 s = bfd_get_section_by_name (abfd, ".dynamic");
1377 if (s != NULL)
1378 {
cb33740c 1379 unsigned int elfsec;
dc810e39 1380 unsigned long shlink;
252b5132
RH
1381 bfd_byte *extdyn, *extdynend;
1382 size_t extdynsize;
217aa764 1383 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1384
1385 fprintf (f, _("\nDynamic Section:\n"));
1386
eea6121a 1387 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1388 goto error_return;
1389
1390 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1391 if (elfsec == SHN_BAD)
252b5132 1392 goto error_return;
dc810e39 1393 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1394
1395 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1396 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1397
1398 extdyn = dynbuf;
06614111
NC
1399 /* PR 17512: file: 6f427532. */
1400 if (s->size < extdynsize)
1401 goto error_return;
eea6121a 1402 extdynend = extdyn + s->size;
1036838a
NC
1403 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1404 Fix range check. */
1405 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
252b5132
RH
1406 {
1407 Elf_Internal_Dyn dyn;
ad9563d6 1408 const char *name = "";
252b5132 1409 char ab[20];
b34976b6 1410 bfd_boolean stringp;
ad9563d6 1411 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1412
217aa764 1413 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1414
1415 if (dyn.d_tag == DT_NULL)
1416 break;
1417
b34976b6 1418 stringp = FALSE;
252b5132
RH
1419 switch (dyn.d_tag)
1420 {
1421 default:
ad9563d6
CM
1422 if (bed->elf_backend_get_target_dtag)
1423 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1424
1425 if (!strcmp (name, ""))
1426 {
1427 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1428 name = ab;
1429 }
252b5132
RH
1430 break;
1431
b34976b6 1432 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1433 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1434 case DT_PLTGOT: name = "PLTGOT"; break;
1435 case DT_HASH: name = "HASH"; break;
1436 case DT_STRTAB: name = "STRTAB"; break;
1437 case DT_SYMTAB: name = "SYMTAB"; break;
1438 case DT_RELA: name = "RELA"; break;
1439 case DT_RELASZ: name = "RELASZ"; break;
1440 case DT_RELAENT: name = "RELAENT"; break;
1441 case DT_STRSZ: name = "STRSZ"; break;
1442 case DT_SYMENT: name = "SYMENT"; break;
1443 case DT_INIT: name = "INIT"; break;
1444 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1445 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1446 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1447 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1448 case DT_REL: name = "REL"; break;
1449 case DT_RELSZ: name = "RELSZ"; break;
1450 case DT_RELENT: name = "RELENT"; break;
1451 case DT_PLTREL: name = "PLTREL"; break;
1452 case DT_DEBUG: name = "DEBUG"; break;
1453 case DT_TEXTREL: name = "TEXTREL"; break;
1454 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1455 case DT_BIND_NOW: name = "BIND_NOW"; break;
1456 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1457 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1458 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1459 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1460 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1461 case DT_FLAGS: name = "FLAGS"; break;
1462 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1463 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1464 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1465 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1466 case DT_MOVEENT: name = "MOVEENT"; break;
1467 case DT_MOVESZ: name = "MOVESZ"; break;
1468 case DT_FEATURE: name = "FEATURE"; break;
1469 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1470 case DT_SYMINSZ: name = "SYMINSZ"; break;
1471 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1472 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1473 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1474 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1475 case DT_PLTPAD: name = "PLTPAD"; break;
1476 case DT_MOVETAB: name = "MOVETAB"; break;
1477 case DT_SYMINFO: name = "SYMINFO"; break;
1478 case DT_RELACOUNT: name = "RELACOUNT"; break;
1479 case DT_RELCOUNT: name = "RELCOUNT"; break;
1480 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1481 case DT_VERSYM: name = "VERSYM"; break;
1482 case DT_VERDEF: name = "VERDEF"; break;
1483 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1484 case DT_VERNEED: name = "VERNEED"; break;
1485 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1486 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1487 case DT_USED: name = "USED"; break;
b34976b6 1488 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1489 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1490 }
1491
ad9563d6 1492 fprintf (f, " %-20s ", name);
252b5132 1493 if (! stringp)
a1f3c56e
AN
1494 {
1495 fprintf (f, "0x");
1496 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1497 }
252b5132
RH
1498 else
1499 {
1500 const char *string;
dc810e39 1501 unsigned int tagv = dyn.d_un.d_val;
252b5132 1502
dc810e39 1503 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1504 if (string == NULL)
1505 goto error_return;
1506 fprintf (f, "%s", string);
1507 }
1508 fprintf (f, "\n");
1509 }
1510
1511 free (dynbuf);
1512 dynbuf = NULL;
1513 }
1514
1515 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1516 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1517 {
fc0e6df6 1518 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1519 return FALSE;
252b5132
RH
1520 }
1521
1522 if (elf_dynverdef (abfd) != 0)
1523 {
1524 Elf_Internal_Verdef *t;
1525
1526 fprintf (f, _("\nVersion definitions:\n"));
1527 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1528 {
1529 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1530 t->vd_flags, t->vd_hash,
1531 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1532 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1533 {
1534 Elf_Internal_Verdaux *a;
1535
1536 fprintf (f, "\t");
1537 for (a = t->vd_auxptr->vda_nextptr;
1538 a != NULL;
1539 a = a->vda_nextptr)
d0fb9a8d
JJ
1540 fprintf (f, "%s ",
1541 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1542 fprintf (f, "\n");
1543 }
1544 }
1545 }
1546
1547 if (elf_dynverref (abfd) != 0)
1548 {
1549 Elf_Internal_Verneed *t;
1550
1551 fprintf (f, _("\nVersion References:\n"));
1552 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1553 {
1554 Elf_Internal_Vernaux *a;
1555
d0fb9a8d
JJ
1556 fprintf (f, _(" required from %s:\n"),
1557 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1558 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1559 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1560 a->vna_flags, a->vna_other,
1561 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1562 }
1563 }
1564
b34976b6 1565 return TRUE;
252b5132
RH
1566
1567 error_return:
1568 if (dynbuf != NULL)
1569 free (dynbuf);
b34976b6 1570 return FALSE;
252b5132
RH
1571}
1572
bb4d2ac2
L
1573/* Get version string. */
1574
1575const char *
60bb06bc
L
1576_bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1577 bfd_boolean *hidden)
bb4d2ac2
L
1578{
1579 const char *version_string = NULL;
1580 if (elf_dynversym (abfd) != 0
1581 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1582 {
1583 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1584
1585 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1586 vernum &= VERSYM_VERSION;
1587
1588 if (vernum == 0)
1589 version_string = "";
1590 else if (vernum == 1)
1591 version_string = "Base";
1592 else if (vernum <= elf_tdata (abfd)->cverdefs)
1593 version_string =
1594 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1595 else
1596 {
1597 Elf_Internal_Verneed *t;
1598
1599 version_string = "";
1600 for (t = elf_tdata (abfd)->verref;
1601 t != NULL;
1602 t = t->vn_nextref)
1603 {
1604 Elf_Internal_Vernaux *a;
1605
1606 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1607 {
1608 if (a->vna_other == vernum)
1609 {
1610 version_string = a->vna_nodename;
1611 break;
1612 }
1613 }
1614 }
1615 }
1616 }
1617 return version_string;
1618}
1619
252b5132
RH
1620/* Display ELF-specific fields of a symbol. */
1621
1622void
217aa764
AM
1623bfd_elf_print_symbol (bfd *abfd,
1624 void *filep,
1625 asymbol *symbol,
1626 bfd_print_symbol_type how)
252b5132 1627{
a50b1753 1628 FILE *file = (FILE *) filep;
252b5132
RH
1629 switch (how)
1630 {
1631 case bfd_print_symbol_name:
1632 fprintf (file, "%s", symbol->name);
1633 break;
1634 case bfd_print_symbol_more:
1635 fprintf (file, "elf ");
60b89a18 1636 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1637 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1638 break;
1639 case bfd_print_symbol_all:
1640 {
4e8a9624
AM
1641 const char *section_name;
1642 const char *name = NULL;
9c5bfbb7 1643 const struct elf_backend_data *bed;
7a13edea 1644 unsigned char st_other;
dbb410c3 1645 bfd_vma val;
bb4d2ac2
L
1646 const char *version_string;
1647 bfd_boolean hidden;
c044fabd 1648
252b5132 1649 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1650
1651 bed = get_elf_backend_data (abfd);
1652 if (bed->elf_backend_print_symbol_all)
c044fabd 1653 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1654
1655 if (name == NULL)
1656 {
7ee38065 1657 name = symbol->name;
217aa764 1658 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1659 }
1660
252b5132
RH
1661 fprintf (file, " %s\t", section_name);
1662 /* Print the "other" value for a symbol. For common symbols,
1663 we've already printed the size; now print the alignment.
1664 For other symbols, we have no specified alignment, and
1665 we've printed the address; now print the size. */
dcf6c779 1666 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1667 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1668 else
1669 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1670 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1671
1672 /* If we have version information, print it. */
60bb06bc
L
1673 version_string = _bfd_elf_get_symbol_version_string (abfd,
1674 symbol,
1675 &hidden);
bb4d2ac2 1676 if (version_string)
252b5132 1677 {
bb4d2ac2 1678 if (!hidden)
252b5132
RH
1679 fprintf (file, " %-11s", version_string);
1680 else
1681 {
1682 int i;
1683
1684 fprintf (file, " (%s)", version_string);
1685 for (i = 10 - strlen (version_string); i > 0; --i)
1686 putc (' ', file);
1687 }
1688 }
1689
1690 /* If the st_other field is not zero, print it. */
7a13edea 1691 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1692
7a13edea
NC
1693 switch (st_other)
1694 {
1695 case 0: break;
1696 case STV_INTERNAL: fprintf (file, " .internal"); break;
1697 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1698 case STV_PROTECTED: fprintf (file, " .protected"); break;
1699 default:
1700 /* Some other non-defined flags are also present, so print
1701 everything hex. */
1702 fprintf (file, " 0x%02x", (unsigned int) st_other);
1703 }
252b5132 1704
587ff49e 1705 fprintf (file, " %s", name);
252b5132
RH
1706 }
1707 break;
1708 }
1709}
252b5132
RH
1710\f
1711/* ELF .o/exec file reading */
1712
c044fabd 1713/* Create a new bfd section from an ELF section header. */
252b5132 1714
b34976b6 1715bfd_boolean
217aa764 1716bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1717{
4fbb74a6
AM
1718 Elf_Internal_Shdr *hdr;
1719 Elf_Internal_Ehdr *ehdr;
1720 const struct elf_backend_data *bed;
90937f86 1721 const char *name;
bf67003b
NC
1722 bfd_boolean ret = TRUE;
1723 static bfd_boolean * sections_being_created = NULL;
5a4b0ccc 1724 static bfd * sections_being_created_abfd = NULL;
bf67003b 1725 static unsigned int nesting = 0;
252b5132 1726
4fbb74a6
AM
1727 if (shindex >= elf_numsections (abfd))
1728 return FALSE;
1729
bf67003b
NC
1730 if (++ nesting > 3)
1731 {
1732 /* PR17512: A corrupt ELF binary might contain a recursive group of
06614111 1733 sections, with each the string indicies pointing to the next in the
bf67003b
NC
1734 loop. Detect this here, by refusing to load a section that we are
1735 already in the process of loading. We only trigger this test if
1736 we have nested at least three sections deep as normal ELF binaries
5a4b0ccc
NC
1737 can expect to recurse at least once.
1738
1739 FIXME: It would be better if this array was attached to the bfd,
1740 rather than being held in a static pointer. */
1741
1742 if (sections_being_created_abfd != abfd)
1743 sections_being_created = NULL;
bf67003b
NC
1744 if (sections_being_created == NULL)
1745 {
1746 /* FIXME: It would be more efficient to attach this array to the bfd somehow. */
1747 sections_being_created = (bfd_boolean *)
1748 bfd_zalloc (abfd, elf_numsections (abfd) * sizeof (bfd_boolean));
5a4b0ccc 1749 sections_being_created_abfd = abfd;
bf67003b
NC
1750 }
1751 if (sections_being_created [shindex])
1752 {
1753 (*_bfd_error_handler)
1754 (_("%B: warning: loop in section dependencies detected"), abfd);
1755 return FALSE;
1756 }
1757 sections_being_created [shindex] = TRUE;
1758 }
1759
4fbb74a6
AM
1760 hdr = elf_elfsections (abfd)[shindex];
1761 ehdr = elf_elfheader (abfd);
1762 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1763 hdr->sh_name);
933d961a 1764 if (name == NULL)
bf67003b 1765 goto fail;
252b5132 1766
4fbb74a6 1767 bed = get_elf_backend_data (abfd);
252b5132
RH
1768 switch (hdr->sh_type)
1769 {
1770 case SHT_NULL:
1771 /* Inactive section. Throw it away. */
bf67003b 1772 goto success;
252b5132 1773
bf67003b
NC
1774 case SHT_PROGBITS: /* Normal section with contents. */
1775 case SHT_NOBITS: /* .bss section. */
1776 case SHT_HASH: /* .hash section. */
1777 case SHT_NOTE: /* .note section. */
25e27870
L
1778 case SHT_INIT_ARRAY: /* .init_array section. */
1779 case SHT_FINI_ARRAY: /* .fini_array section. */
1780 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1781 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1782 case SHT_GNU_HASH: /* .gnu.hash section. */
bf67003b
NC
1783 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1784 goto success;
252b5132 1785
797fc050 1786 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1787 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
1788 goto fail;
1789
cfcac11d
NC
1790 if (hdr->sh_link > elf_numsections (abfd))
1791 {
caa83f8b 1792 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
1793 field set to SHN_BEFORE or SHN_AFTER. */
1794 switch (bfd_get_arch (abfd))
1795 {
caa83f8b 1796 case bfd_arch_i386:
cfcac11d
NC
1797 case bfd_arch_sparc:
1798 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
1799 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
1800 break;
1801 /* Otherwise fall through. */
1802 default:
bf67003b 1803 goto fail;
cfcac11d
NC
1804 }
1805 }
1806 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
bf67003b 1807 goto fail;
cfcac11d 1808 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
1809 {
1810 Elf_Internal_Shdr *dynsymhdr;
1811
1812 /* The shared libraries distributed with hpux11 have a bogus
1813 sh_link field for the ".dynamic" section. Find the
1814 string table for the ".dynsym" section instead. */
1815 if (elf_dynsymtab (abfd) != 0)
1816 {
1817 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1818 hdr->sh_link = dynsymhdr->sh_link;
1819 }
1820 else
1821 {
1822 unsigned int i, num_sec;
1823
1824 num_sec = elf_numsections (abfd);
1825 for (i = 1; i < num_sec; i++)
1826 {
1827 dynsymhdr = elf_elfsections (abfd)[i];
1828 if (dynsymhdr->sh_type == SHT_DYNSYM)
1829 {
1830 hdr->sh_link = dynsymhdr->sh_link;
1831 break;
1832 }
1833 }
1834 }
1835 }
bf67003b 1836 goto success;
797fc050 1837
bf67003b 1838 case SHT_SYMTAB: /* A symbol table. */
252b5132 1839 if (elf_onesymtab (abfd) == shindex)
bf67003b 1840 goto success;
252b5132 1841
a50b2160 1842 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
1843 goto fail;
1844
3337c1e5 1845 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
eee3b786
AM
1846 {
1847 if (hdr->sh_size != 0)
bf67003b 1848 goto fail;
eee3b786
AM
1849 /* Some assemblers erroneously set sh_info to one with a
1850 zero sh_size. ld sees this as a global symbol count
1851 of (unsigned) -1. Fix it here. */
1852 hdr->sh_info = 0;
bf67003b 1853 goto success;
eee3b786 1854 }
bf67003b 1855
16ad13ec
NC
1856 /* PR 18854: A binary might contain more than one symbol table.
1857 Unusual, but possible. Warn, but continue. */
1858 if (elf_onesymtab (abfd) != 0)
1859 {
1860 (*_bfd_error_handler)
1861 (_("%B: warning: multiple symbol tables detected - ignoring the table in section %u"),
1862 abfd, shindex);
1863 goto success;
1864 }
252b5132 1865 elf_onesymtab (abfd) = shindex;
6a40cf0c
NC
1866 elf_symtab_hdr (abfd) = *hdr;
1867 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
252b5132
RH
1868 abfd->flags |= HAS_SYMS;
1869
1870 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1871 SHF_ALLOC is set, and this is a shared object, then we also
1872 treat this section as a BFD section. We can not base the
1873 decision purely on SHF_ALLOC, because that flag is sometimes
1874 set in a relocatable object file, which would confuse the
1875 linker. */
252b5132
RH
1876 if ((hdr->sh_flags & SHF_ALLOC) != 0
1877 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1878 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1879 shindex))
bf67003b 1880 goto fail;
252b5132 1881
1b3a8575
AM
1882 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1883 can't read symbols without that section loaded as well. It
1884 is most likely specified by the next section header. */
6a40cf0c
NC
1885 {
1886 elf_section_list * entry;
1887 unsigned int i, num_sec;
1b3a8575 1888
6a40cf0c
NC
1889 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
1890 if (entry->hdr.sh_link == shindex)
1891 goto success;
1892
1893 num_sec = elf_numsections (abfd);
1894 for (i = shindex + 1; i < num_sec; i++)
1895 {
1896 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1897
1898 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1899 && hdr2->sh_link == shindex)
1900 break;
1901 }
1902
1903 if (i == num_sec)
1904 for (i = 1; i < shindex; i++)
1b3a8575
AM
1905 {
1906 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
6a40cf0c 1907
1b3a8575
AM
1908 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1909 && hdr2->sh_link == shindex)
1910 break;
1911 }
6a40cf0c
NC
1912
1913 if (i != shindex)
1914 ret = bfd_section_from_shdr (abfd, i);
1915 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
1916 goto success;
1917 }
252b5132 1918
bf67003b 1919 case SHT_DYNSYM: /* A dynamic symbol table. */
252b5132 1920 if (elf_dynsymtab (abfd) == shindex)
bf67003b 1921 goto success;
252b5132 1922
a50b2160 1923 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
1924 goto fail;
1925
eee3b786
AM
1926 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
1927 {
1928 if (hdr->sh_size != 0)
bf67003b
NC
1929 goto fail;
1930
eee3b786
AM
1931 /* Some linkers erroneously set sh_info to one with a
1932 zero sh_size. ld sees this as a global symbol count
1933 of (unsigned) -1. Fix it here. */
1934 hdr->sh_info = 0;
bf67003b 1935 goto success;
eee3b786 1936 }
bf67003b 1937
16ad13ec
NC
1938 /* PR 18854: A binary might contain more than one dynamic symbol table.
1939 Unusual, but possible. Warn, but continue. */
1940 if (elf_dynsymtab (abfd) != 0)
1941 {
1942 (*_bfd_error_handler)
1943 (_("%B: warning: multiple dynamic symbol tables detected - ignoring the table in section %u"),
1944 abfd, shindex);
1945 goto success;
1946 }
252b5132
RH
1947 elf_dynsymtab (abfd) = shindex;
1948 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1949 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1950 abfd->flags |= HAS_SYMS;
1951
1952 /* Besides being a symbol table, we also treat this as a regular
1953 section, so that objcopy can handle it. */
bf67003b
NC
1954 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1955 goto success;
252b5132 1956
bf67003b 1957 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
6a40cf0c
NC
1958 {
1959 elf_section_list * entry;
9ad5cbcf 1960
6a40cf0c
NC
1961 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
1962 if (entry->ndx == shindex)
1963 goto success;
1964
1965 entry = bfd_alloc (abfd, sizeof * entry);
1966 if (entry == NULL)
1967 goto fail;
1968 entry->ndx = shindex;
1969 entry->hdr = * hdr;
1970 entry->next = elf_symtab_shndx_list (abfd);
1971 elf_symtab_shndx_list (abfd) = entry;
1972 elf_elfsections (abfd)[shindex] = & entry->hdr;
1973 goto success;
1974 }
9ad5cbcf 1975
bf67003b 1976 case SHT_STRTAB: /* A string table. */
252b5132 1977 if (hdr->bfd_section != NULL)
bf67003b
NC
1978 goto success;
1979
252b5132
RH
1980 if (ehdr->e_shstrndx == shindex)
1981 {
1982 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1983 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
bf67003b 1984 goto success;
252b5132 1985 }
bf67003b 1986
1b3a8575
AM
1987 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1988 {
1989 symtab_strtab:
1990 elf_tdata (abfd)->strtab_hdr = *hdr;
1991 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
bf67003b 1992 goto success;
1b3a8575 1993 }
bf67003b 1994
1b3a8575
AM
1995 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1996 {
1997 dynsymtab_strtab:
1998 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1999 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2000 elf_elfsections (abfd)[shindex] = hdr;
2001 /* We also treat this as a regular section, so that objcopy
2002 can handle it. */
bf67003b
NC
2003 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2004 shindex);
2005 goto success;
1b3a8575 2006 }
252b5132 2007
1b3a8575
AM
2008 /* If the string table isn't one of the above, then treat it as a
2009 regular section. We need to scan all the headers to be sure,
2010 just in case this strtab section appeared before the above. */
2011 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2012 {
2013 unsigned int i, num_sec;
252b5132 2014
1b3a8575
AM
2015 num_sec = elf_numsections (abfd);
2016 for (i = 1; i < num_sec; i++)
2017 {
2018 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2019 if (hdr2->sh_link == shindex)
2020 {
933d961a
JJ
2021 /* Prevent endless recursion on broken objects. */
2022 if (i == shindex)
bf67003b 2023 goto fail;
1b3a8575 2024 if (! bfd_section_from_shdr (abfd, i))
bf67003b 2025 goto fail;
1b3a8575
AM
2026 if (elf_onesymtab (abfd) == i)
2027 goto symtab_strtab;
2028 if (elf_dynsymtab (abfd) == i)
2029 goto dynsymtab_strtab;
2030 }
2031 }
2032 }
bf67003b
NC
2033 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2034 goto success;
252b5132
RH
2035
2036 case SHT_REL:
2037 case SHT_RELA:
2038 /* *These* do a lot of work -- but build no sections! */
2039 {
2040 asection *target_sect;
d4730f92 2041 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 2042 unsigned int num_sec = elf_numsections (abfd);
d4730f92
BS
2043 struct bfd_elf_section_data *esdt;
2044 bfd_size_type amt;
252b5132 2045
aa2ca951
JJ
2046 if (hdr->sh_entsize
2047 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160 2048 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
bf67003b 2049 goto fail;
a50b2160 2050
03ae5f59 2051 /* Check for a bogus link to avoid crashing. */
4fbb74a6 2052 if (hdr->sh_link >= num_sec)
03ae5f59
ILT
2053 {
2054 ((*_bfd_error_handler)
d003868e
AM
2055 (_("%B: invalid link %lu for reloc section %s (index %u)"),
2056 abfd, hdr->sh_link, name, shindex));
bf67003b
NC
2057 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2058 shindex);
2059 goto success;
03ae5f59
ILT
2060 }
2061
252b5132
RH
2062 /* For some incomprehensible reason Oracle distributes
2063 libraries for Solaris in which some of the objects have
2064 bogus sh_link fields. It would be nice if we could just
2065 reject them, but, unfortunately, some people need to use
2066 them. We scan through the section headers; if we find only
2067 one suitable symbol table, we clobber the sh_link to point
83b89087
L
2068 to it. I hope this doesn't break anything.
2069
2070 Don't do it on executable nor shared library. */
2071 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2072 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
2073 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2074 {
9ad5cbcf 2075 unsigned int scan;
252b5132
RH
2076 int found;
2077
2078 found = 0;
9ad5cbcf 2079 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2080 {
2081 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2082 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2083 {
2084 if (found != 0)
2085 {
2086 found = 0;
2087 break;
2088 }
2089 found = scan;
2090 }
2091 }
2092 if (found != 0)
2093 hdr->sh_link = found;
2094 }
2095
2096 /* Get the symbol table. */
1b3a8575
AM
2097 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2098 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2099 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
bf67003b 2100 goto fail;
252b5132
RH
2101
2102 /* If this reloc section does not use the main symbol table we
2103 don't treat it as a reloc section. BFD can't adequately
2104 represent such a section, so at least for now, we don't
c044fabd 2105 try. We just present it as a normal section. We also
60bcf0fa 2106 can't use it as a reloc section if it points to the null
83b89087
L
2107 section, an invalid section, another reloc section, or its
2108 sh_link points to the null section. */
185ef66d 2109 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 2110 || hdr->sh_link == SHN_UNDEF
185ef66d 2111 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
2112 || hdr->sh_info >= num_sec
2113 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2114 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
bf67003b
NC
2115 {
2116 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2117 shindex);
2118 goto success;
2119 }
252b5132
RH
2120
2121 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
bf67003b
NC
2122 goto fail;
2123
252b5132
RH
2124 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2125 if (target_sect == NULL)
bf67003b 2126 goto fail;
252b5132 2127
d4730f92
BS
2128 esdt = elf_section_data (target_sect);
2129 if (hdr->sh_type == SHT_RELA)
2130 p_hdr = &esdt->rela.hdr;
252b5132 2131 else
d4730f92
BS
2132 p_hdr = &esdt->rel.hdr;
2133
06614111
NC
2134 /* PR 17512: file: 0b4f81b7. */
2135 if (*p_hdr != NULL)
2136 goto fail;
d4730f92
BS
2137 amt = sizeof (*hdr2);
2138 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, amt);
2139 if (hdr2 == NULL)
bf67003b 2140 goto fail;
252b5132 2141 *hdr2 = *hdr;
d4730f92 2142 *p_hdr = hdr2;
252b5132 2143 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2144 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2145 target_sect->flags |= SEC_RELOC;
2146 target_sect->relocation = NULL;
2147 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2148 /* In the section to which the relocations apply, mark whether
2149 its relocations are of the REL or RELA variety. */
72730e0c 2150 if (hdr->sh_size != 0)
d4730f92
BS
2151 {
2152 if (hdr->sh_type == SHT_RELA)
2153 target_sect->use_rela_p = 1;
2154 }
252b5132 2155 abfd->flags |= HAS_RELOC;
bf67003b 2156 goto success;
252b5132 2157 }
252b5132
RH
2158
2159 case SHT_GNU_verdef:
2160 elf_dynverdef (abfd) = shindex;
2161 elf_tdata (abfd)->dynverdef_hdr = *hdr;
bf67003b
NC
2162 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2163 goto success;
252b5132
RH
2164
2165 case SHT_GNU_versym:
a50b2160 2166 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
bf67003b
NC
2167 goto fail;
2168
252b5132
RH
2169 elf_dynversym (abfd) = shindex;
2170 elf_tdata (abfd)->dynversym_hdr = *hdr;
bf67003b
NC
2171 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2172 goto success;
252b5132
RH
2173
2174 case SHT_GNU_verneed:
2175 elf_dynverref (abfd) = shindex;
2176 elf_tdata (abfd)->dynverref_hdr = *hdr;
bf67003b
NC
2177 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2178 goto success;
252b5132
RH
2179
2180 case SHT_SHLIB:
bf67003b 2181 goto success;
252b5132 2182
dbb410c3 2183 case SHT_GROUP:
44534af3 2184 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
bf67003b
NC
2185 goto fail;
2186
6dc132d9 2187 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2188 goto fail;
2189
dbb410c3
AM
2190 if (hdr->contents != NULL)
2191 {
2192 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
06614111 2193 unsigned int n_elt = hdr->sh_size / sizeof (* idx);
dbb410c3
AM
2194 asection *s;
2195
06614111
NC
2196 if (n_elt == 0)
2197 goto fail;
b885599b
AM
2198 if (idx->flags & GRP_COMDAT)
2199 hdr->bfd_section->flags
2200 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2201
45c5e9ed
L
2202 /* We try to keep the same section order as it comes in. */
2203 idx += n_elt;
06614111 2204
dbb410c3 2205 while (--n_elt != 0)
1783205a
NC
2206 {
2207 --idx;
2208
2209 if (idx->shdr != NULL
2210 && (s = idx->shdr->bfd_section) != NULL
2211 && elf_next_in_group (s) != NULL)
2212 {
2213 elf_next_in_group (hdr->bfd_section) = s;
2214 break;
2215 }
2216 }
dbb410c3 2217 }
bf67003b 2218 goto success;
dbb410c3 2219
252b5132 2220 default:
104d59d1
JM
2221 /* Possibly an attributes section. */
2222 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2223 || hdr->sh_type == bed->obj_attrs_section_type)
2224 {
2225 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2226 goto fail;
104d59d1 2227 _bfd_elf_parse_attributes (abfd, hdr);
bf67003b 2228 goto success;
104d59d1
JM
2229 }
2230
252b5132 2231 /* Check for any processor-specific section types. */
3eb70a79 2232 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2233 goto success;
3eb70a79
L
2234
2235 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2236 {
2237 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2238 /* FIXME: How to properly handle allocated section reserved
2239 for applications? */
2240 (*_bfd_error_handler)
2241 (_("%B: don't know how to handle allocated, application "
2242 "specific section `%s' [0x%8x]"),
2243 abfd, name, hdr->sh_type);
2244 else
bf67003b
NC
2245 {
2246 /* Allow sections reserved for applications. */
2247 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2248 shindex);
2249 goto success;
2250 }
3eb70a79
L
2251 }
2252 else if (hdr->sh_type >= SHT_LOPROC
2253 && hdr->sh_type <= SHT_HIPROC)
2254 /* FIXME: We should handle this section. */
2255 (*_bfd_error_handler)
2256 (_("%B: don't know how to handle processor specific section "
2257 "`%s' [0x%8x]"),
2258 abfd, name, hdr->sh_type);
2259 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
2260 {
2261 /* Unrecognised OS-specific sections. */
2262 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2263 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 2264 required to correctly process the section and the file should
ff15b240
NC
2265 be rejected with an error message. */
2266 (*_bfd_error_handler)
2267 (_("%B: don't know how to handle OS specific section "
2268 "`%s' [0x%8x]"),
2269 abfd, name, hdr->sh_type);
2270 else
bf67003b
NC
2271 {
2272 /* Otherwise it should be processed. */
2273 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2274 goto success;
2275 }
ff15b240 2276 }
3eb70a79
L
2277 else
2278 /* FIXME: We should handle this section. */
2279 (*_bfd_error_handler)
2280 (_("%B: don't know how to handle section `%s' [0x%8x]"),
2281 abfd, name, hdr->sh_type);
2282
bf67003b 2283 goto fail;
252b5132
RH
2284 }
2285
bf67003b
NC
2286 fail:
2287 ret = FALSE;
2288 success:
e5b470e2 2289 if (sections_being_created && sections_being_created_abfd == abfd)
bf67003b
NC
2290 sections_being_created [shindex] = FALSE;
2291 if (-- nesting == 0)
5a4b0ccc
NC
2292 {
2293 sections_being_created = NULL;
2294 sections_being_created_abfd = abfd;
2295 }
bf67003b 2296 return ret;
252b5132
RH
2297}
2298
87d72d41 2299/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2300
87d72d41
AM
2301Elf_Internal_Sym *
2302bfd_sym_from_r_symndx (struct sym_cache *cache,
2303 bfd *abfd,
2304 unsigned long r_symndx)
ec338859 2305{
ec338859
AM
2306 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2307
a5d1b3b5
AM
2308 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2309 {
2310 Elf_Internal_Shdr *symtab_hdr;
2311 unsigned char esym[sizeof (Elf64_External_Sym)];
2312 Elf_External_Sym_Shndx eshndx;
ec338859 2313
a5d1b3b5
AM
2314 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2315 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2316 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2317 return NULL;
9ad5cbcf 2318
a5d1b3b5
AM
2319 if (cache->abfd != abfd)
2320 {
2321 memset (cache->indx, -1, sizeof (cache->indx));
2322 cache->abfd = abfd;
2323 }
2324 cache->indx[ent] = r_symndx;
ec338859 2325 }
a5d1b3b5 2326
87d72d41 2327 return &cache->sym[ent];
ec338859
AM
2328}
2329
252b5132
RH
2330/* Given an ELF section number, retrieve the corresponding BFD
2331 section. */
2332
2333asection *
91d6fa6a 2334bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2335{
91d6fa6a 2336 if (sec_index >= elf_numsections (abfd))
252b5132 2337 return NULL;
91d6fa6a 2338 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2339}
2340
b35d266b 2341static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2342{
0112cd26
NC
2343 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2344 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2345};
2346
b35d266b 2347static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2348{
0112cd26
NC
2349 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2350 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2351};
2352
b35d266b 2353static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2354{
0112cd26
NC
2355 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2356 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
a9a72a65
DE
2357 /* There are more DWARF sections than these, but they needn't be added here
2358 unless you have to cope with broken compilers that don't emit section
2359 attributes or you want to help the user writing assembler. */
0112cd26
NC
2360 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2361 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2362 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2363 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2364 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2365 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2366 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2367 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2368 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2369};
2370
b35d266b 2371static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2372{
0112cd26
NC
2373 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2374 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2375 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2376};
2377
b35d266b 2378static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2379{
0112cd26 2380 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
68efed41 2381 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
0112cd26
NC
2382 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2383 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2384 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2385 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2386 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2387 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2388 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2389 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2390};
2391
b35d266b 2392static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2393{
0112cd26
NC
2394 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2395 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2396};
2397
b35d266b 2398static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2399{
0112cd26
NC
2400 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2401 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2402 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2403 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2404};
2405
b35d266b 2406static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2407{
0112cd26
NC
2408 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2409 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2410};
2411
b35d266b 2412static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2413{
0112cd26
NC
2414 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2415 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2416 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2417};
2418
b35d266b 2419static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2420{
0112cd26
NC
2421 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2422 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2423 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2424};
2425
b35d266b 2426static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2427{
0112cd26
NC
2428 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2429 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2430 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2431 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2432 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2433};
2434
b35d266b 2435static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2436{
0112cd26
NC
2437 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2438 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2439 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2440 /* See struct bfd_elf_special_section declaration for the semantics of
2441 this special case where .prefix_length != strlen (.prefix). */
2442 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2443 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2444};
2445
b35d266b 2446static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2447{
0112cd26
NC
2448 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2449 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2450 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2451 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2452};
2453
1b315056
CS
2454static const struct bfd_elf_special_section special_sections_z[] =
2455{
2456 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2457 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2458 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2459 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2460 { NULL, 0, 0, 0, 0 }
2461};
2462
e4c93b56 2463static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2464{
7f4d3958 2465 special_sections_b, /* 'b' */
98ece1b3 2466 special_sections_c, /* 'c' */
7f4d3958
L
2467 special_sections_d, /* 'd' */
2468 NULL, /* 'e' */
2469 special_sections_f, /* 'f' */
2470 special_sections_g, /* 'g' */
2471 special_sections_h, /* 'h' */
2472 special_sections_i, /* 'i' */
2473 NULL, /* 'j' */
2474 NULL, /* 'k' */
2475 special_sections_l, /* 'l' */
2476 NULL, /* 'm' */
2477 special_sections_n, /* 'n' */
2478 NULL, /* 'o' */
2479 special_sections_p, /* 'p' */
2480 NULL, /* 'q' */
2481 special_sections_r, /* 'r' */
2482 special_sections_s, /* 's' */
2483 special_sections_t, /* 't' */
1b315056
CS
2484 NULL, /* 'u' */
2485 NULL, /* 'v' */
2486 NULL, /* 'w' */
2487 NULL, /* 'x' */
2488 NULL, /* 'y' */
2489 special_sections_z /* 'z' */
7f4d3958
L
2490};
2491
551b43fd
AM
2492const struct bfd_elf_special_section *
2493_bfd_elf_get_special_section (const char *name,
2494 const struct bfd_elf_special_section *spec,
2495 unsigned int rela)
2f89ff8d
L
2496{
2497 int i;
7f4d3958 2498 int len;
7f4d3958 2499
551b43fd 2500 len = strlen (name);
7f4d3958 2501
551b43fd 2502 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2503 {
2504 int suffix_len;
551b43fd 2505 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2506
2507 if (len < prefix_len)
2508 continue;
551b43fd 2509 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2510 continue;
2511
551b43fd 2512 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2513 if (suffix_len <= 0)
2514 {
2515 if (name[prefix_len] != 0)
2516 {
2517 if (suffix_len == 0)
2518 continue;
2519 if (name[prefix_len] != '.'
2520 && (suffix_len == -2
551b43fd 2521 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2522 continue;
2523 }
2524 }
2525 else
2526 {
2527 if (len < prefix_len + suffix_len)
2528 continue;
2529 if (memcmp (name + len - suffix_len,
551b43fd 2530 spec[i].prefix + prefix_len,
7dcb9820
AM
2531 suffix_len) != 0)
2532 continue;
2533 }
551b43fd 2534 return &spec[i];
7dcb9820 2535 }
2f89ff8d
L
2536
2537 return NULL;
2538}
2539
7dcb9820 2540const struct bfd_elf_special_section *
29ef7005 2541_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2542{
551b43fd
AM
2543 int i;
2544 const struct bfd_elf_special_section *spec;
29ef7005 2545 const struct elf_backend_data *bed;
2f89ff8d
L
2546
2547 /* See if this is one of the special sections. */
551b43fd
AM
2548 if (sec->name == NULL)
2549 return NULL;
2f89ff8d 2550
29ef7005
L
2551 bed = get_elf_backend_data (abfd);
2552 spec = bed->special_sections;
2553 if (spec)
2554 {
2555 spec = _bfd_elf_get_special_section (sec->name,
2556 bed->special_sections,
2557 sec->use_rela_p);
2558 if (spec != NULL)
2559 return spec;
2560 }
2561
551b43fd
AM
2562 if (sec->name[0] != '.')
2563 return NULL;
2f89ff8d 2564
551b43fd 2565 i = sec->name[1] - 'b';
1b315056 2566 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2567 return NULL;
2568
2569 spec = special_sections[i];
2f89ff8d 2570
551b43fd
AM
2571 if (spec == NULL)
2572 return NULL;
2573
2574 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2575}
2576
b34976b6 2577bfd_boolean
217aa764 2578_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2579{
2580 struct bfd_elf_section_data *sdata;
551b43fd 2581 const struct elf_backend_data *bed;
7dcb9820 2582 const struct bfd_elf_special_section *ssect;
252b5132 2583
f0abc2a1
AM
2584 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2585 if (sdata == NULL)
2586 {
a50b1753
NC
2587 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2588 sizeof (*sdata));
f0abc2a1
AM
2589 if (sdata == NULL)
2590 return FALSE;
217aa764 2591 sec->used_by_bfd = sdata;
f0abc2a1 2592 }
bf572ba0 2593
551b43fd
AM
2594 /* Indicate whether or not this section should use RELA relocations. */
2595 bed = get_elf_backend_data (abfd);
2596 sec->use_rela_p = bed->default_use_rela_p;
2597
e843e0f8
L
2598 /* When we read a file, we don't need to set ELF section type and
2599 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2600 anyway. We will set ELF section type and flags for all linker
2601 created sections. If user specifies BFD section flags, we will
2602 set ELF section type and flags based on BFD section flags in
02ecc8e9
L
2603 elf_fake_sections. Special handling for .init_array/.fini_array
2604 output sections since they may contain .ctors/.dtors input
2605 sections. We don't want _bfd_elf_init_private_section_data to
2606 copy ELF section type from .ctors/.dtors input sections. */
2607 if (abfd->direction != read_direction
3496cb2a 2608 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2609 {
551b43fd 2610 ssect = (*bed->get_sec_type_attr) (abfd, sec);
02ecc8e9
L
2611 if (ssect != NULL
2612 && (!sec->flags
2613 || (sec->flags & SEC_LINKER_CREATED) != 0
2614 || ssect->type == SHT_INIT_ARRAY
2615 || ssect->type == SHT_FINI_ARRAY))
a31501e9
L
2616 {
2617 elf_section_type (sec) = ssect->type;
2618 elf_section_flags (sec) = ssect->attr;
2619 }
2f89ff8d
L
2620 }
2621
f592407e 2622 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2623}
2624
2625/* Create a new bfd section from an ELF program header.
2626
2627 Since program segments have no names, we generate a synthetic name
2628 of the form segment<NUM>, where NUM is generally the index in the
2629 program header table. For segments that are split (see below) we
2630 generate the names segment<NUM>a and segment<NUM>b.
2631
2632 Note that some program segments may have a file size that is different than
2633 (less than) the memory size. All this means is that at execution the
2634 system must allocate the amount of memory specified by the memory size,
2635 but only initialize it with the first "file size" bytes read from the
2636 file. This would occur for example, with program segments consisting
2637 of combined data+bss.
2638
2639 To handle the above situation, this routine generates TWO bfd sections
2640 for the single program segment. The first has the length specified by
2641 the file size of the segment, and the second has the length specified
2642 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2643 into its initialized and uninitialized parts.
252b5132
RH
2644
2645 */
2646
b34976b6 2647bfd_boolean
217aa764
AM
2648_bfd_elf_make_section_from_phdr (bfd *abfd,
2649 Elf_Internal_Phdr *hdr,
91d6fa6a 2650 int hdr_index,
a50b1753 2651 const char *type_name)
252b5132
RH
2652{
2653 asection *newsect;
2654 char *name;
2655 char namebuf[64];
d4c88bbb 2656 size_t len;
252b5132
RH
2657 int split;
2658
2659 split = ((hdr->p_memsz > 0)
2660 && (hdr->p_filesz > 0)
2661 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2662
2663 if (hdr->p_filesz > 0)
252b5132 2664 {
91d6fa6a 2665 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2666 len = strlen (namebuf) + 1;
a50b1753 2667 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2668 if (!name)
2669 return FALSE;
2670 memcpy (name, namebuf, len);
2671 newsect = bfd_make_section (abfd, name);
2672 if (newsect == NULL)
2673 return FALSE;
2674 newsect->vma = hdr->p_vaddr;
2675 newsect->lma = hdr->p_paddr;
2676 newsect->size = hdr->p_filesz;
2677 newsect->filepos = hdr->p_offset;
2678 newsect->flags |= SEC_HAS_CONTENTS;
2679 newsect->alignment_power = bfd_log2 (hdr->p_align);
2680 if (hdr->p_type == PT_LOAD)
252b5132 2681 {
d5191d0c
AM
2682 newsect->flags |= SEC_ALLOC;
2683 newsect->flags |= SEC_LOAD;
2684 if (hdr->p_flags & PF_X)
2685 {
2686 /* FIXME: all we known is that it has execute PERMISSION,
2687 may be data. */
2688 newsect->flags |= SEC_CODE;
2689 }
2690 }
2691 if (!(hdr->p_flags & PF_W))
2692 {
2693 newsect->flags |= SEC_READONLY;
252b5132 2694 }
252b5132
RH
2695 }
2696
d5191d0c 2697 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2698 {
d5191d0c
AM
2699 bfd_vma align;
2700
91d6fa6a 2701 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2702 len = strlen (namebuf) + 1;
a50b1753 2703 name = (char *) bfd_alloc (abfd, len);
252b5132 2704 if (!name)
b34976b6 2705 return FALSE;
d4c88bbb 2706 memcpy (name, namebuf, len);
252b5132
RH
2707 newsect = bfd_make_section (abfd, name);
2708 if (newsect == NULL)
b34976b6 2709 return FALSE;
252b5132
RH
2710 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2711 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2712 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2713 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2714 align = newsect->vma & -newsect->vma;
2715 if (align == 0 || align > hdr->p_align)
2716 align = hdr->p_align;
2717 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2718 if (hdr->p_type == PT_LOAD)
2719 {
d5191d0c
AM
2720 /* Hack for gdb. Segments that have not been modified do
2721 not have their contents written to a core file, on the
2722 assumption that a debugger can find the contents in the
2723 executable. We flag this case by setting the fake
2724 section size to zero. Note that "real" bss sections will
2725 always have their contents dumped to the core file. */
2726 if (bfd_get_format (abfd) == bfd_core)
2727 newsect->size = 0;
252b5132
RH
2728 newsect->flags |= SEC_ALLOC;
2729 if (hdr->p_flags & PF_X)
2730 newsect->flags |= SEC_CODE;
2731 }
2732 if (!(hdr->p_flags & PF_W))
2733 newsect->flags |= SEC_READONLY;
2734 }
2735
b34976b6 2736 return TRUE;
252b5132
RH
2737}
2738
b34976b6 2739bfd_boolean
91d6fa6a 2740bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2741{
9c5bfbb7 2742 const struct elf_backend_data *bed;
20cfcaae
NC
2743
2744 switch (hdr->p_type)
2745 {
2746 case PT_NULL:
91d6fa6a 2747 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2748
2749 case PT_LOAD:
91d6fa6a 2750 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2751
2752 case PT_DYNAMIC:
91d6fa6a 2753 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2754
2755 case PT_INTERP:
91d6fa6a 2756 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2757
2758 case PT_NOTE:
91d6fa6a 2759 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2760 return FALSE;
718175fa 2761 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2762 return FALSE;
2763 return TRUE;
20cfcaae
NC
2764
2765 case PT_SHLIB:
91d6fa6a 2766 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
2767
2768 case PT_PHDR:
91d6fa6a 2769 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 2770
811072d8 2771 case PT_GNU_EH_FRAME:
91d6fa6a 2772 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
2773 "eh_frame_hdr");
2774
2b05f1b7 2775 case PT_GNU_STACK:
91d6fa6a 2776 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 2777
8c37241b 2778 case PT_GNU_RELRO:
91d6fa6a 2779 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 2780
20cfcaae 2781 default:
8c1acd09 2782 /* Check for any processor-specific program segment types. */
20cfcaae 2783 bed = get_elf_backend_data (abfd);
91d6fa6a 2784 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
2785 }
2786}
2787
d4730f92
BS
2788/* Return the REL_HDR for SEC, assuming there is only a single one, either
2789 REL or RELA. */
2790
2791Elf_Internal_Shdr *
2792_bfd_elf_single_rel_hdr (asection *sec)
2793{
2794 if (elf_section_data (sec)->rel.hdr)
2795 {
2796 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
2797 return elf_section_data (sec)->rel.hdr;
2798 }
2799 else
2800 return elf_section_data (sec)->rela.hdr;
2801}
2802
3e19fb8f
L
2803static bfd_boolean
2804_bfd_elf_set_reloc_sh_name (bfd *abfd,
2805 Elf_Internal_Shdr *rel_hdr,
2806 const char *sec_name,
2807 bfd_boolean use_rela_p)
2808{
2809 char *name = (char *) bfd_alloc (abfd,
2810 sizeof ".rela" + strlen (sec_name));
2811 if (name == NULL)
2812 return FALSE;
2813
2814 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
2815 rel_hdr->sh_name =
2816 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
2817 FALSE);
2818 if (rel_hdr->sh_name == (unsigned int) -1)
2819 return FALSE;
2820
2821 return TRUE;
2822}
2823
d4730f92
BS
2824/* Allocate and initialize a section-header for a new reloc section,
2825 containing relocations against ASECT. It is stored in RELDATA. If
2826 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
2827 relocations. */
23bc299b 2828
5d13b3b3 2829static bfd_boolean
217aa764 2830_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 2831 struct bfd_elf_section_reloc_data *reldata,
f6fe1ccd 2832 const char *sec_name,
3e19fb8f
L
2833 bfd_boolean use_rela_p,
2834 bfd_boolean delay_st_name_p)
23bc299b 2835{
d4730f92 2836 Elf_Internal_Shdr *rel_hdr;
9c5bfbb7 2837 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92
BS
2838 bfd_size_type amt;
2839
2840 amt = sizeof (Elf_Internal_Shdr);
2841 BFD_ASSERT (reldata->hdr == NULL);
2842 rel_hdr = bfd_zalloc (abfd, amt);
2843 reldata->hdr = rel_hdr;
23bc299b 2844
3e19fb8f
L
2845 if (delay_st_name_p)
2846 rel_hdr->sh_name = (unsigned int) -1;
2847 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
2848 use_rela_p))
b34976b6 2849 return FALSE;
23bc299b
MM
2850 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2851 rel_hdr->sh_entsize = (use_rela_p
2852 ? bed->s->sizeof_rela
2853 : bed->s->sizeof_rel);
72de5009 2854 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
2855 rel_hdr->sh_flags = 0;
2856 rel_hdr->sh_addr = 0;
2857 rel_hdr->sh_size = 0;
2858 rel_hdr->sh_offset = 0;
2859
b34976b6 2860 return TRUE;
23bc299b
MM
2861}
2862
94be91de
JB
2863/* Return the default section type based on the passed in section flags. */
2864
2865int
2866bfd_elf_get_default_section_type (flagword flags)
2867{
2868 if ((flags & SEC_ALLOC) != 0
2e76e85a 2869 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
2870 return SHT_NOBITS;
2871 return SHT_PROGBITS;
2872}
2873
d4730f92
BS
2874struct fake_section_arg
2875{
2876 struct bfd_link_info *link_info;
2877 bfd_boolean failed;
2878};
2879
252b5132
RH
2880/* Set up an ELF internal section header for a section. */
2881
252b5132 2882static void
d4730f92 2883elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 2884{
d4730f92 2885 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 2886 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 2887 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 2888 Elf_Internal_Shdr *this_hdr;
0414f35b 2889 unsigned int sh_type;
0ce398f1 2890 const char *name = asect->name;
3e19fb8f 2891 bfd_boolean delay_st_name_p = FALSE;
252b5132 2892
d4730f92 2893 if (arg->failed)
252b5132
RH
2894 {
2895 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2896 loop. */
252b5132
RH
2897 return;
2898 }
2899
d4730f92 2900 this_hdr = &esd->this_hdr;
252b5132 2901
f6fe1ccd 2902 if (arg->link_info)
0ce398f1 2903 {
f6fe1ccd
L
2904 /* ld: compress DWARF debug sections with names: .debug_*. */
2905 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
2906 && (asect->flags & SEC_DEBUGGING)
2907 && name[1] == 'd'
2908 && name[6] == '_')
2909 {
2910 /* Set SEC_ELF_COMPRESS to indicate this section should be
2911 compressed. */
2912 asect->flags |= SEC_ELF_COMPRESS;
0ce398f1 2913
3e19fb8f
L
2914 /* If this section will be compressed, delay adding setion
2915 name to section name section after it is compressed in
2916 _bfd_elf_assign_file_positions_for_non_load. */
2917 delay_st_name_p = TRUE;
f6fe1ccd
L
2918 }
2919 }
2920 else if ((asect->flags & SEC_ELF_RENAME))
2921 {
2922 /* objcopy: rename output DWARF debug section. */
2923 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
2924 {
2925 /* When we decompress or compress with SHF_COMPRESSED,
2926 convert section name from .zdebug_* to .debug_* if
2927 needed. */
2928 if (name[1] == 'z')
2929 {
2930 char *new_name = convert_zdebug_to_debug (abfd, name);
2931 if (new_name == NULL)
2932 {
2933 arg->failed = TRUE;
2934 return;
2935 }
2936 name = new_name;
2937 }
2938 }
2939 else if (asect->compress_status == COMPRESS_SECTION_DONE)
0ce398f1 2940 {
f6fe1ccd
L
2941 /* PR binutils/18087: Compression does not always make a
2942 section smaller. So only rename the section when
2943 compression has actually taken place. If input section
2944 name is .zdebug_*, we should never compress it again. */
2945 char *new_name = convert_debug_to_zdebug (abfd, name);
0ce398f1
L
2946 if (new_name == NULL)
2947 {
2948 arg->failed = TRUE;
2949 return;
2950 }
f6fe1ccd
L
2951 BFD_ASSERT (name[1] != 'z');
2952 name = new_name;
0ce398f1
L
2953 }
2954 }
2955
3e19fb8f
L
2956 if (delay_st_name_p)
2957 this_hdr->sh_name = (unsigned int) -1;
2958 else
252b5132 2959 {
3e19fb8f
L
2960 this_hdr->sh_name
2961 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2962 name, FALSE);
2963 if (this_hdr->sh_name == (unsigned int) -1)
2964 {
2965 arg->failed = TRUE;
2966 return;
2967 }
252b5132
RH
2968 }
2969
a4d8e49b 2970 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2971
2972 if ((asect->flags & SEC_ALLOC) != 0
2973 || asect->user_set_vma)
2974 this_hdr->sh_addr = asect->vma;
2975 else
2976 this_hdr->sh_addr = 0;
2977
2978 this_hdr->sh_offset = 0;
eea6121a 2979 this_hdr->sh_size = asect->size;
252b5132 2980 this_hdr->sh_link = 0;
c86934ce
NC
2981 /* PR 17512: file: 0eb809fe, 8b0535ee. */
2982 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
2983 {
2984 (*_bfd_error_handler)
2985 (_("%B: error: Alignment power %d of section `%A' is too big"),
2986 abfd, asect, asect->alignment_power);
2987 arg->failed = TRUE;
2988 return;
2989 }
72de5009 2990 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
2991 /* The sh_entsize and sh_info fields may have been set already by
2992 copy_private_section_data. */
2993
2994 this_hdr->bfd_section = asect;
2995 this_hdr->contents = NULL;
2996
3cddba1e
L
2997 /* If the section type is unspecified, we set it based on
2998 asect->flags. */
98ece1b3
AM
2999 if ((asect->flags & SEC_GROUP) != 0)
3000 sh_type = SHT_GROUP;
98ece1b3 3001 else
94be91de 3002 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 3003
3cddba1e 3004 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
3005 this_hdr->sh_type = sh_type;
3006 else if (this_hdr->sh_type == SHT_NOBITS
3007 && sh_type == SHT_PROGBITS
3008 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 3009 {
98ece1b3
AM
3010 /* Warn if we are changing a NOBITS section to PROGBITS, but
3011 allow the link to proceed. This can happen when users link
3012 non-bss input sections to bss output sections, or emit data
3013 to a bss output section via a linker script. */
3014 (*_bfd_error_handler)
58f0869b 3015 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 3016 this_hdr->sh_type = sh_type;
3cddba1e
L
3017 }
3018
2f89ff8d 3019 switch (this_hdr->sh_type)
252b5132 3020 {
2f89ff8d 3021 default:
2f89ff8d
L
3022 break;
3023
3024 case SHT_STRTAB:
3025 case SHT_INIT_ARRAY:
3026 case SHT_FINI_ARRAY:
3027 case SHT_PREINIT_ARRAY:
3028 case SHT_NOTE:
3029 case SHT_NOBITS:
3030 case SHT_PROGBITS:
3031 break;
3032
3033 case SHT_HASH:
c7ac6ff8 3034 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 3035 break;
5de3bf90 3036
2f89ff8d 3037 case SHT_DYNSYM:
252b5132 3038 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
3039 break;
3040
3041 case SHT_DYNAMIC:
252b5132 3042 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
3043 break;
3044
3045 case SHT_RELA:
3046 if (get_elf_backend_data (abfd)->may_use_rela_p)
3047 this_hdr->sh_entsize = bed->s->sizeof_rela;
3048 break;
3049
3050 case SHT_REL:
3051 if (get_elf_backend_data (abfd)->may_use_rel_p)
3052 this_hdr->sh_entsize = bed->s->sizeof_rel;
3053 break;
3054
3055 case SHT_GNU_versym:
252b5132 3056 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
3057 break;
3058
3059 case SHT_GNU_verdef:
252b5132
RH
3060 this_hdr->sh_entsize = 0;
3061 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3062 cverdefs. The linker will set cverdefs, but sh_info will be
3063 zero. */
252b5132
RH
3064 if (this_hdr->sh_info == 0)
3065 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3066 else
3067 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3068 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
3069 break;
3070
3071 case SHT_GNU_verneed:
252b5132
RH
3072 this_hdr->sh_entsize = 0;
3073 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3074 cverrefs. The linker will set cverrefs, but sh_info will be
3075 zero. */
252b5132
RH
3076 if (this_hdr->sh_info == 0)
3077 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3078 else
3079 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3080 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
3081 break;
3082
3083 case SHT_GROUP:
1783205a 3084 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 3085 break;
fdc90cb4
JJ
3086
3087 case SHT_GNU_HASH:
3088 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3089 break;
dbb410c3 3090 }
252b5132
RH
3091
3092 if ((asect->flags & SEC_ALLOC) != 0)
3093 this_hdr->sh_flags |= SHF_ALLOC;
3094 if ((asect->flags & SEC_READONLY) == 0)
3095 this_hdr->sh_flags |= SHF_WRITE;
3096 if ((asect->flags & SEC_CODE) != 0)
3097 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
3098 if ((asect->flags & SEC_MERGE) != 0)
3099 {
3100 this_hdr->sh_flags |= SHF_MERGE;
3101 this_hdr->sh_entsize = asect->entsize;
3102 if ((asect->flags & SEC_STRINGS) != 0)
3103 this_hdr->sh_flags |= SHF_STRINGS;
3104 }
1126897b 3105 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 3106 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 3107 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
3108 {
3109 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
3110 if (asect->size == 0
3111 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 3112 {
3a800eb9 3113 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 3114
704afa60 3115 this_hdr->sh_size = 0;
3a800eb9
AM
3116 if (o != NULL)
3117 {
704afa60 3118 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
3119 if (this_hdr->sh_size != 0)
3120 this_hdr->sh_type = SHT_NOBITS;
3121 }
704afa60
JJ
3122 }
3123 }
18ae9cc1
L
3124 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3125 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 3126
d4730f92
BS
3127 /* If the section has relocs, set up a section header for the
3128 SHT_REL[A] section. If two relocation sections are required for
3129 this section, it is up to the processor-specific back-end to
3130 create the other. */
3131 if ((asect->flags & SEC_RELOC) != 0)
3132 {
3133 /* When doing a relocatable link, create both REL and RELA sections if
3134 needed. */
3135 if (arg->link_info
3136 /* Do the normal setup if we wouldn't create any sections here. */
3137 && esd->rel.count + esd->rela.count > 0
0e1862bb
L
3138 && (bfd_link_relocatable (arg->link_info)
3139 || arg->link_info->emitrelocations))
d4730f92
BS
3140 {
3141 if (esd->rel.count && esd->rel.hdr == NULL
3e19fb8f
L
3142 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name, FALSE,
3143 delay_st_name_p))
d4730f92
BS
3144 {
3145 arg->failed = TRUE;
3146 return;
3147 }
3148 if (esd->rela.count && esd->rela.hdr == NULL
3e19fb8f
L
3149 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name, TRUE,
3150 delay_st_name_p))
d4730f92
BS
3151 {
3152 arg->failed = TRUE;
3153 return;
3154 }
3155 }
3156 else if (!_bfd_elf_init_reloc_shdr (abfd,
3157 (asect->use_rela_p
3158 ? &esd->rela : &esd->rel),
f6fe1ccd 3159 name,
3e19fb8f
L
3160 asect->use_rela_p,
3161 delay_st_name_p))
d4730f92
BS
3162 arg->failed = TRUE;
3163 }
3164
252b5132 3165 /* Check for processor-specific section types. */
0414f35b 3166 sh_type = this_hdr->sh_type;
e1fddb6b
AO
3167 if (bed->elf_backend_fake_sections
3168 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
d4730f92 3169 arg->failed = TRUE;
252b5132 3170
42bb2e33 3171 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
3172 {
3173 /* Don't change the header type from NOBITS if we are being
42bb2e33 3174 called for objcopy --only-keep-debug. */
0414f35b
AM
3175 this_hdr->sh_type = sh_type;
3176 }
252b5132
RH
3177}
3178
bcacc0f5
AM
3179/* Fill in the contents of a SHT_GROUP section. Called from
3180 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3181 when ELF targets use the generic linker, ld. Called for ld -r
3182 from bfd_elf_final_link. */
dbb410c3 3183
1126897b 3184void
217aa764 3185bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 3186{
a50b1753 3187 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 3188 asection *elt, *first;
dbb410c3 3189 unsigned char *loc;
b34976b6 3190 bfd_boolean gas;
dbb410c3 3191
7e4111ad
L
3192 /* Ignore linker created group section. See elfNN_ia64_object_p in
3193 elfxx-ia64.c. */
3194 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
3195 || *failedptr)
3196 return;
3197
bcacc0f5
AM
3198 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3199 {
3200 unsigned long symindx = 0;
3201
3202 /* elf_group_id will have been set up by objcopy and the
3203 generic linker. */
3204 if (elf_group_id (sec) != NULL)
3205 symindx = elf_group_id (sec)->udata.i;
1126897b 3206
bcacc0f5
AM
3207 if (symindx == 0)
3208 {
3209 /* If called from the assembler, swap_out_syms will have set up
3210 elf_section_syms. */
3211 BFD_ASSERT (elf_section_syms (abfd) != NULL);
3212 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3213 }
3214 elf_section_data (sec)->this_hdr.sh_info = symindx;
3215 }
3216 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 3217 {
bcacc0f5
AM
3218 /* The ELF backend linker sets sh_info to -2 when the group
3219 signature symbol is global, and thus the index can't be
3220 set until all local symbols are output. */
3221 asection *igroup = elf_sec_group (elf_next_in_group (sec));
3222 struct bfd_elf_section_data *sec_data = elf_section_data (igroup);
3223 unsigned long symndx = sec_data->this_hdr.sh_info;
3224 unsigned long extsymoff = 0;
3225 struct elf_link_hash_entry *h;
3226
3227 if (!elf_bad_symtab (igroup->owner))
3228 {
3229 Elf_Internal_Shdr *symtab_hdr;
3230
3231 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3232 extsymoff = symtab_hdr->sh_info;
3233 }
3234 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3235 while (h->root.type == bfd_link_hash_indirect
3236 || h->root.type == bfd_link_hash_warning)
3237 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3238
3239 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 3240 }
dbb410c3 3241
1126897b 3242 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 3243 gas = TRUE;
dbb410c3
AM
3244 if (sec->contents == NULL)
3245 {
b34976b6 3246 gas = FALSE;
a50b1753 3247 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
3248
3249 /* Arrange for the section to be written out. */
3250 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
3251 if (sec->contents == NULL)
3252 {
b34976b6 3253 *failedptr = TRUE;
dbb410c3
AM
3254 return;
3255 }
3256 }
3257
eea6121a 3258 loc = sec->contents + sec->size;
dbb410c3 3259
9dce4196
AM
3260 /* Get the pointer to the first section in the group that gas
3261 squirreled away here. objcopy arranges for this to be set to the
3262 start of the input section group. */
3263 first = elt = elf_next_in_group (sec);
dbb410c3
AM
3264
3265 /* First element is a flag word. Rest of section is elf section
3266 indices for all the sections of the group. Write them backwards
3267 just to keep the group in the same order as given in .section
3268 directives, not that it matters. */
3269 while (elt != NULL)
3270 {
9dce4196 3271 asection *s;
9dce4196 3272
9dce4196 3273 s = elt;
415f38a6
AM
3274 if (!gas)
3275 s = s->output_section;
3276 if (s != NULL
3277 && !bfd_is_abs_section (s))
01e1a5bc 3278 {
415f38a6
AM
3279 unsigned int idx = elf_section_data (s)->this_idx;
3280
01e1a5bc 3281 loc -= 4;
01e1a5bc
NC
3282 H_PUT_32 (abfd, idx, loc);
3283 }
945906ff 3284 elt = elf_next_in_group (elt);
9dce4196
AM
3285 if (elt == first)
3286 break;
dbb410c3
AM
3287 }
3288
3d7f7666 3289 if ((loc -= 4) != sec->contents)
9dce4196 3290 abort ();
dbb410c3 3291
9dce4196 3292 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
3293}
3294
bd53a53a
L
3295/* Return the section which RELOC_SEC applies to. */
3296
3297asection *
3298_bfd_elf_get_reloc_section (asection *reloc_sec)
3299{
3300 const char *name;
3301 unsigned int type;
3302 bfd *abfd;
3303
3304 if (reloc_sec == NULL)
3305 return NULL;
3306
3307 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3308 if (type != SHT_REL && type != SHT_RELA)
3309 return NULL;
3310
3311 /* We look up the section the relocs apply to by name. */
3312 name = reloc_sec->name;
3313 if (type == SHT_REL)
3314 name += 4;
3315 else
3316 name += 5;
3317
3318 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3319 section apply to .got.plt section. */
3320 abfd = reloc_sec->owner;
3321 if (get_elf_backend_data (abfd)->want_got_plt
3322 && strcmp (name, ".plt") == 0)
87070c08
AM
3323 {
3324 /* .got.plt is a linker created input section. It may be mapped
3325 to some other output section. Try two likely sections. */
3326 name = ".got.plt";
3327 reloc_sec = bfd_get_section_by_name (abfd, name);
3328 if (reloc_sec != NULL)
3329 return reloc_sec;
3330 name = ".got";
3331 }
bd53a53a
L
3332
3333 reloc_sec = bfd_get_section_by_name (abfd, name);
3334 return reloc_sec;
3335}
3336
252b5132
RH
3337/* Assign all ELF section numbers. The dummy first section is handled here
3338 too. The link/info pointers for the standard section types are filled
3339 in here too, while we're at it. */
3340
b34976b6 3341static bfd_boolean
da9f89d4 3342assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
3343{
3344 struct elf_obj_tdata *t = elf_tdata (abfd);
3345 asection *sec;
3e19fb8f 3346 unsigned int section_number;
252b5132 3347 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 3348 struct bfd_elf_section_data *d;
3516e984 3349 bfd_boolean need_symtab;
252b5132
RH
3350
3351 section_number = 1;
3352
2b0f7ef9
JJ
3353 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3354
da9f89d4 3355 /* SHT_GROUP sections are in relocatable files only. */
0e1862bb 3356 if (link_info == NULL || bfd_link_relocatable (link_info))
252b5132 3357 {
da9f89d4 3358 /* Put SHT_GROUP sections first. */
04dd1667 3359 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 3360 {
5daa8fe7 3361 d = elf_section_data (sec);
da9f89d4
L
3362
3363 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 3364 {
5daa8fe7 3365 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
3366 {
3367 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 3368 bfd_section_list_remove (abfd, sec);
da9f89d4 3369 abfd->section_count--;
da9f89d4 3370 }
08a40648 3371 else
4fbb74a6 3372 d->this_idx = section_number++;
da9f89d4 3373 }
47cc2cf5
PB
3374 }
3375 }
3376
3377 for (sec = abfd->sections; sec; sec = sec->next)
3378 {
3379 d = elf_section_data (sec);
3380
3381 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 3382 d->this_idx = section_number++;
3e19fb8f
L
3383 if (d->this_hdr.sh_name != (unsigned int) -1)
3384 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 3385 if (d->rel.hdr)
2b0f7ef9 3386 {
d4730f92 3387 d->rel.idx = section_number++;
3e19fb8f
L
3388 if (d->rel.hdr->sh_name != (unsigned int) -1)
3389 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 3390 }
d4730f92
BS
3391 else
3392 d->rel.idx = 0;
23bc299b 3393
d4730f92 3394 if (d->rela.hdr)
2b0f7ef9 3395 {
d4730f92 3396 d->rela.idx = section_number++;
3e19fb8f
L
3397 if (d->rela.hdr->sh_name != (unsigned int) -1)
3398 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 3399 }
23bc299b 3400 else
d4730f92 3401 d->rela.idx = 0;
252b5132
RH
3402 }
3403
12bd6957 3404 elf_shstrtab_sec (abfd) = section_number++;
2b0f7ef9 3405 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
12bd6957 3406 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
252b5132 3407
3516e984
L
3408 need_symtab = (bfd_get_symcount (abfd) > 0
3409 || (link_info == NULL
3410 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3411 == HAS_RELOC)));
3412 if (need_symtab)
252b5132 3413 {
12bd6957 3414 elf_onesymtab (abfd) = section_number++;
2b0f7ef9 3415 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 3416 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 3417 {
6a40cf0c
NC
3418 elf_section_list * entry;
3419
3420 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3421
3422 entry = bfd_zalloc (abfd, sizeof * entry);
3423 entry->ndx = section_number++;
3424 elf_symtab_shndx_list (abfd) = entry;
3425 entry->hdr.sh_name
9ad5cbcf 3426 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3427 ".symtab_shndx", FALSE);
6a40cf0c 3428 if (entry->hdr.sh_name == (unsigned int) -1)
b34976b6 3429 return FALSE;
9ad5cbcf 3430 }
12bd6957 3431 elf_strtab_sec (abfd) = section_number++;
2b0f7ef9 3432 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3433 }
3434
1c52a645
L
3435 if (section_number >= SHN_LORESERVE)
3436 {
3437 _bfd_error_handler (_("%B: too many sections: %u"),
3438 abfd, section_number);
3439 return FALSE;
3440 }
3441
9ad5cbcf 3442 elf_numsections (abfd) = section_number;
252b5132
RH
3443 elf_elfheader (abfd)->e_shnum = section_number;
3444
3445 /* Set up the list of section header pointers, in agreement with the
3446 indices. */
a50b1753
NC
3447 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
3448 sizeof (Elf_Internal_Shdr *));
252b5132 3449 if (i_shdrp == NULL)
b34976b6 3450 return FALSE;
252b5132 3451
a50b1753
NC
3452 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3453 sizeof (Elf_Internal_Shdr));
252b5132
RH
3454 if (i_shdrp[0] == NULL)
3455 {
3456 bfd_release (abfd, i_shdrp);
b34976b6 3457 return FALSE;
252b5132 3458 }
252b5132
RH
3459
3460 elf_elfsections (abfd) = i_shdrp;
3461
12bd6957 3462 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3516e984 3463 if (need_symtab)
252b5132 3464 {
12bd6957 3465 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
4fbb74a6 3466 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf 3467 {
6a40cf0c
NC
3468 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3469 BFD_ASSERT (entry != NULL);
3470 i_shdrp[entry->ndx] = & entry->hdr;
3471 entry->hdr.sh_link = elf_onesymtab (abfd);
9ad5cbcf 3472 }
12bd6957
AM
3473 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3474 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
252b5132 3475 }
38ce5b11 3476
252b5132
RH
3477 for (sec = abfd->sections; sec; sec = sec->next)
3478 {
252b5132 3479 asection *s;
252b5132 3480
91d6fa6a
NC
3481 d = elf_section_data (sec);
3482
252b5132 3483 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3484 if (d->rel.idx != 0)
3485 i_shdrp[d->rel.idx] = d->rel.hdr;
3486 if (d->rela.idx != 0)
3487 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3488
3489 /* Fill in the sh_link and sh_info fields while we're at it. */
3490
3491 /* sh_link of a reloc section is the section index of the symbol
3492 table. sh_info is the section index of the section to which
3493 the relocation entries apply. */
d4730f92 3494 if (d->rel.idx != 0)
252b5132 3495 {
12bd6957 3496 d->rel.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3497 d->rel.hdr->sh_info = d->this_idx;
9ef5d938 3498 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
252b5132 3499 }
d4730f92 3500 if (d->rela.idx != 0)
23bc299b 3501 {
12bd6957 3502 d->rela.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3503 d->rela.hdr->sh_info = d->this_idx;
9ef5d938 3504 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
23bc299b 3505 }
252b5132 3506
38ce5b11
L
3507 /* We need to set up sh_link for SHF_LINK_ORDER. */
3508 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3509 {
3510 s = elf_linked_to_section (sec);
3511 if (s)
38ce5b11 3512 {
f2876037 3513 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3514 if (link_info != NULL)
38ce5b11 3515 {
f2876037 3516 /* Check discarded linkonce section. */
dbaa2011 3517 if (discarded_section (s))
38ce5b11 3518 {
ccd2ec6a
L
3519 asection *kept;
3520 (*_bfd_error_handler)
3521 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3522 abfd, d->this_hdr.bfd_section,
3523 s, s->owner);
3524 /* Point to the kept section if it has the same
3525 size as the discarded one. */
c0f00686 3526 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3527 if (kept == NULL)
185d09ad 3528 {
ccd2ec6a
L
3529 bfd_set_error (bfd_error_bad_value);
3530 return FALSE;
185d09ad 3531 }
ccd2ec6a 3532 s = kept;
38ce5b11 3533 }
e424ecc8 3534
ccd2ec6a
L
3535 s = s->output_section;
3536 BFD_ASSERT (s != NULL);
38ce5b11 3537 }
f2876037
L
3538 else
3539 {
3540 /* Handle objcopy. */
3541 if (s->output_section == NULL)
3542 {
3543 (*_bfd_error_handler)
3544 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
3545 abfd, d->this_hdr.bfd_section, s, s->owner);
3546 bfd_set_error (bfd_error_bad_value);
3547 return FALSE;
3548 }
3549 s = s->output_section;
3550 }
ccd2ec6a
L
3551 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3552 }
3553 else
3554 {
3555 /* PR 290:
3556 The Intel C compiler generates SHT_IA_64_UNWIND with
3557 SHF_LINK_ORDER. But it doesn't set the sh_link or
3558 sh_info fields. Hence we could get the situation
08a40648 3559 where s is NULL. */
ccd2ec6a
L
3560 const struct elf_backend_data *bed
3561 = get_elf_backend_data (abfd);
3562 if (bed->link_order_error_handler)
3563 bed->link_order_error_handler
3564 (_("%B: warning: sh_link not set for section `%A'"),
3565 abfd, sec);
38ce5b11
L
3566 }
3567 }
3568
252b5132
RH
3569 switch (d->this_hdr.sh_type)
3570 {
3571 case SHT_REL:
3572 case SHT_RELA:
3573 /* A reloc section which we are treating as a normal BFD
3574 section. sh_link is the section index of the symbol
3575 table. sh_info is the section index of the section to
3576 which the relocation entries apply. We assume that an
3577 allocated reloc section uses the dynamic symbol table.
3578 FIXME: How can we be sure? */
3579 s = bfd_get_section_by_name (abfd, ".dynsym");
3580 if (s != NULL)
3581 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3582
bd53a53a 3583 s = get_elf_backend_data (abfd)->get_reloc_section (sec);
252b5132 3584 if (s != NULL)
9ef5d938
L
3585 {
3586 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3587 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3588 }
252b5132
RH
3589 break;
3590
3591 case SHT_STRTAB:
3592 /* We assume that a section named .stab*str is a stabs
3593 string section. We look for a section with the same name
3594 but without the trailing ``str'', and set its sh_link
3595 field to point to this section. */
0112cd26 3596 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3597 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3598 {
3599 size_t len;
3600 char *alc;
3601
3602 len = strlen (sec->name);
a50b1753 3603 alc = (char *) bfd_malloc (len - 2);
252b5132 3604 if (alc == NULL)
b34976b6 3605 return FALSE;
d4c88bbb 3606 memcpy (alc, sec->name, len - 3);
252b5132
RH
3607 alc[len - 3] = '\0';
3608 s = bfd_get_section_by_name (abfd, alc);
3609 free (alc);
3610 if (s != NULL)
3611 {
3612 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3613
3614 /* This is a .stab section. */
0594c12d
AM
3615 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3616 elf_section_data (s)->this_hdr.sh_entsize
3617 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3618 }
3619 }
3620 break;
3621
3622 case SHT_DYNAMIC:
3623 case SHT_DYNSYM:
3624 case SHT_GNU_verneed:
3625 case SHT_GNU_verdef:
3626 /* sh_link is the section header index of the string table
3627 used for the dynamic entries, or the symbol table, or the
3628 version strings. */
3629 s = bfd_get_section_by_name (abfd, ".dynstr");
3630 if (s != NULL)
3631 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3632 break;
3633
7f1204bb
JJ
3634 case SHT_GNU_LIBLIST:
3635 /* sh_link is the section header index of the prelink library
08a40648
AM
3636 list used for the dynamic entries, or the symbol table, or
3637 the version strings. */
7f1204bb
JJ
3638 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3639 ? ".dynstr" : ".gnu.libstr");
3640 if (s != NULL)
3641 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3642 break;
3643
252b5132 3644 case SHT_HASH:
fdc90cb4 3645 case SHT_GNU_HASH:
252b5132
RH
3646 case SHT_GNU_versym:
3647 /* sh_link is the section header index of the symbol table
3648 this hash table or version table is for. */
3649 s = bfd_get_section_by_name (abfd, ".dynsym");
3650 if (s != NULL)
3651 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3652 break;
dbb410c3
AM
3653
3654 case SHT_GROUP:
12bd6957 3655 d->this_hdr.sh_link = elf_onesymtab (abfd);
252b5132
RH
3656 }
3657 }
3658
3e19fb8f
L
3659 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
3660 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
3661 debug section name from .debug_* to .zdebug_* if needed. */
3662
b34976b6 3663 return TRUE;
252b5132
RH
3664}
3665
5372391b 3666static bfd_boolean
217aa764 3667sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3668{
3669 /* If the backend has a special mapping, use it. */
9c5bfbb7 3670 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3671 if (bed->elf_backend_sym_is_global)
3672 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3673
e47bf690 3674 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3675 || bfd_is_und_section (bfd_get_section (sym))
3676 || bfd_is_com_section (bfd_get_section (sym)));
3677}
3678
5372391b 3679/* Don't output section symbols for sections that are not going to be
c6d8cab4 3680 output, that are duplicates or there is no BFD section. */
5372391b
AM
3681
3682static bfd_boolean
3683ignore_section_sym (bfd *abfd, asymbol *sym)
3684{
c6d8cab4
L
3685 elf_symbol_type *type_ptr;
3686
3687 if ((sym->flags & BSF_SECTION_SYM) == 0)
3688 return FALSE;
3689
3690 type_ptr = elf_symbol_from (abfd, sym);
3691 return ((type_ptr != NULL
3692 && type_ptr->internal_elf_sym.st_shndx != 0
3693 && bfd_is_abs_section (sym->section))
3694 || !(sym->section->owner == abfd
0f0a5e58 3695 || (sym->section->output_section->owner == abfd
2633a79c
AM
3696 && sym->section->output_offset == 0)
3697 || bfd_is_abs_section (sym->section)));
5372391b
AM
3698}
3699
2633a79c
AM
3700/* Map symbol from it's internal number to the external number, moving
3701 all local symbols to be at the head of the list. */
3702
b34976b6 3703static bfd_boolean
12bd6957 3704elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
252b5132 3705{
dc810e39 3706 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3707 asymbol **syms = bfd_get_outsymbols (abfd);
3708 asymbol **sect_syms;
dc810e39
AM
3709 unsigned int num_locals = 0;
3710 unsigned int num_globals = 0;
3711 unsigned int num_locals2 = 0;
3712 unsigned int num_globals2 = 0;
7292b3ac 3713 unsigned int max_index = 0;
dc810e39 3714 unsigned int idx;
252b5132
RH
3715 asection *asect;
3716 asymbol **new_syms;
252b5132
RH
3717
3718#ifdef DEBUG
3719 fprintf (stderr, "elf_map_symbols\n");
3720 fflush (stderr);
3721#endif
3722
252b5132
RH
3723 for (asect = abfd->sections; asect; asect = asect->next)
3724 {
3725 if (max_index < asect->index)
3726 max_index = asect->index;
3727 }
3728
3729 max_index++;
a50b1753 3730 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3731 if (sect_syms == NULL)
b34976b6 3732 return FALSE;
252b5132 3733 elf_section_syms (abfd) = sect_syms;
4e89ac30 3734 elf_num_section_syms (abfd) = max_index;
252b5132 3735
079e9a2f
AM
3736 /* Init sect_syms entries for any section symbols we have already
3737 decided to output. */
252b5132
RH
3738 for (idx = 0; idx < symcount; idx++)
3739 {
dc810e39 3740 asymbol *sym = syms[idx];
c044fabd 3741
252b5132 3742 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 3743 && sym->value == 0
2633a79c
AM
3744 && !ignore_section_sym (abfd, sym)
3745 && !bfd_is_abs_section (sym->section))
252b5132 3746 {
5372391b 3747 asection *sec = sym->section;
252b5132 3748
5372391b
AM
3749 if (sec->owner != abfd)
3750 sec = sec->output_section;
252b5132 3751
5372391b 3752 sect_syms[sec->index] = syms[idx];
252b5132
RH
3753 }
3754 }
3755
252b5132
RH
3756 /* Classify all of the symbols. */
3757 for (idx = 0; idx < symcount; idx++)
3758 {
2633a79c 3759 if (sym_is_global (abfd, syms[idx]))
252b5132 3760 num_globals++;
2633a79c
AM
3761 else if (!ignore_section_sym (abfd, syms[idx]))
3762 num_locals++;
252b5132 3763 }
079e9a2f 3764
5372391b 3765 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3766 sections will already have a section symbol in outsymbols, but
3767 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3768 at least in that case. */
252b5132
RH
3769 for (asect = abfd->sections; asect; asect = asect->next)
3770 {
079e9a2f 3771 if (sect_syms[asect->index] == NULL)
252b5132 3772 {
079e9a2f 3773 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3774 num_locals++;
3775 else
3776 num_globals++;
252b5132
RH
3777 }
3778 }
3779
3780 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
3781 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
3782 sizeof (asymbol *));
dc810e39 3783
252b5132 3784 if (new_syms == NULL)
b34976b6 3785 return FALSE;
252b5132
RH
3786
3787 for (idx = 0; idx < symcount; idx++)
3788 {
3789 asymbol *sym = syms[idx];
dc810e39 3790 unsigned int i;
252b5132 3791
2633a79c
AM
3792 if (sym_is_global (abfd, sym))
3793 i = num_locals + num_globals2++;
3794 else if (!ignore_section_sym (abfd, sym))
252b5132
RH
3795 i = num_locals2++;
3796 else
2633a79c 3797 continue;
252b5132
RH
3798 new_syms[i] = sym;
3799 sym->udata.i = i + 1;
3800 }
3801 for (asect = abfd->sections; asect; asect = asect->next)
3802 {
079e9a2f 3803 if (sect_syms[asect->index] == NULL)
252b5132 3804 {
079e9a2f 3805 asymbol *sym = asect->symbol;
dc810e39 3806 unsigned int i;
252b5132 3807
079e9a2f 3808 sect_syms[asect->index] = sym;
252b5132
RH
3809 if (!sym_is_global (abfd, sym))
3810 i = num_locals2++;
3811 else
3812 i = num_locals + num_globals2++;
3813 new_syms[i] = sym;
3814 sym->udata.i = i + 1;
3815 }
3816 }
3817
3818 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3819
12bd6957 3820 *pnum_locals = num_locals;
b34976b6 3821 return TRUE;
252b5132
RH
3822}
3823
3824/* Align to the maximum file alignment that could be required for any
3825 ELF data structure. */
3826
268b6b39 3827static inline file_ptr
217aa764 3828align_file_position (file_ptr off, int align)
252b5132
RH
3829{
3830 return (off + align - 1) & ~(align - 1);
3831}
3832
3833/* Assign a file position to a section, optionally aligning to the
3834 required section alignment. */
3835
217aa764
AM
3836file_ptr
3837_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3838 file_ptr offset,
3839 bfd_boolean align)
252b5132 3840{
72de5009
AM
3841 if (align && i_shdrp->sh_addralign > 1)
3842 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
3843 i_shdrp->sh_offset = offset;
3844 if (i_shdrp->bfd_section != NULL)
3845 i_shdrp->bfd_section->filepos = offset;
3846 if (i_shdrp->sh_type != SHT_NOBITS)
3847 offset += i_shdrp->sh_size;
3848 return offset;
3849}
3850
3851/* Compute the file positions we are going to put the sections at, and
3852 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3853 is not NULL, this is being called by the ELF backend linker. */
3854
b34976b6 3855bfd_boolean
217aa764
AM
3856_bfd_elf_compute_section_file_positions (bfd *abfd,
3857 struct bfd_link_info *link_info)
252b5132 3858{
9c5bfbb7 3859 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3860 struct fake_section_arg fsargs;
b34976b6 3861 bfd_boolean failed;
ef10c3ac 3862 struct elf_strtab_hash *strtab = NULL;
252b5132 3863 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 3864 bfd_boolean need_symtab;
252b5132
RH
3865
3866 if (abfd->output_has_begun)
b34976b6 3867 return TRUE;
252b5132
RH
3868
3869 /* Do any elf backend specific processing first. */
3870 if (bed->elf_backend_begin_write_processing)
3871 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3872
3873 if (! prep_headers (abfd))
b34976b6 3874 return FALSE;
252b5132 3875
e6c51ed4 3876 /* Post process the headers if necessary. */
78245035 3877 (*bed->elf_backend_post_process_headers) (abfd, link_info);
e6c51ed4 3878
d4730f92
BS
3879 fsargs.failed = FALSE;
3880 fsargs.link_info = link_info;
3881 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
3882 if (fsargs.failed)
b34976b6 3883 return FALSE;
252b5132 3884
da9f89d4 3885 if (!assign_section_numbers (abfd, link_info))
b34976b6 3886 return FALSE;
252b5132
RH
3887
3888 /* The backend linker builds symbol table information itself. */
3516e984
L
3889 need_symtab = (link_info == NULL
3890 && (bfd_get_symcount (abfd) > 0
3891 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3892 == HAS_RELOC)));
3893 if (need_symtab)
252b5132
RH
3894 {
3895 /* Non-zero if doing a relocatable link. */
3896 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3897
3898 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3899 return FALSE;
252b5132
RH
3900 }
3901
d4730f92 3902 failed = FALSE;
1126897b 3903 if (link_info == NULL)
dbb410c3 3904 {
1126897b 3905 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3906 if (failed)
b34976b6 3907 return FALSE;
dbb410c3
AM
3908 }
3909
252b5132
RH
3910 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3911 /* sh_name was set in prep_headers. */
3912 shstrtab_hdr->sh_type = SHT_STRTAB;
3913 shstrtab_hdr->sh_flags = 0;
3914 shstrtab_hdr->sh_addr = 0;
946748d5 3915 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
3916 shstrtab_hdr->sh_entsize = 0;
3917 shstrtab_hdr->sh_link = 0;
3918 shstrtab_hdr->sh_info = 0;
3e19fb8f 3919 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
3920 shstrtab_hdr->sh_addralign = 1;
3921
c84fca4d 3922 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3923 return FALSE;
252b5132 3924
3516e984 3925 if (need_symtab)
252b5132
RH
3926 {
3927 file_ptr off;
3928 Elf_Internal_Shdr *hdr;
3929
12bd6957 3930 off = elf_next_file_pos (abfd);
252b5132 3931
6a40cf0c 3932 hdr = & elf_symtab_hdr (abfd);
b34976b6 3933 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3934
6a40cf0c
NC
3935 if (elf_symtab_shndx_list (abfd) != NULL)
3936 {
3937 hdr = & elf_symtab_shndx_list (abfd)->hdr;
3938 if (hdr->sh_size != 0)
3939 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
3940 /* FIXME: What about other symtab_shndx sections in the list ? */
3941 }
9ad5cbcf 3942
252b5132 3943 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3944 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3945
12bd6957 3946 elf_next_file_pos (abfd) = off;
252b5132
RH
3947
3948 /* Now that we know where the .strtab section goes, write it
08a40648 3949 out. */
252b5132 3950 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
ef10c3ac 3951 || ! _bfd_elf_strtab_emit (abfd, strtab))
b34976b6 3952 return FALSE;
ef10c3ac 3953 _bfd_elf_strtab_free (strtab);
252b5132
RH
3954 }
3955
b34976b6 3956 abfd->output_has_begun = TRUE;
252b5132 3957
b34976b6 3958 return TRUE;
252b5132
RH
3959}
3960
8ded5a0f
AM
3961/* Make an initial estimate of the size of the program header. If we
3962 get the number wrong here, we'll redo section placement. */
3963
3964static bfd_size_type
3965get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3966{
3967 size_t segs;
3968 asection *s;
2b05f1b7 3969 const struct elf_backend_data *bed;
8ded5a0f
AM
3970
3971 /* Assume we will need exactly two PT_LOAD segments: one for text
3972 and one for data. */
3973 segs = 2;
3974
3975 s = bfd_get_section_by_name (abfd, ".interp");
3976 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3977 {
3978 /* If we have a loadable interpreter section, we need a
3979 PT_INTERP segment. In this case, assume we also need a
3980 PT_PHDR segment, although that may not be true for all
3981 targets. */
3982 segs += 2;
3983 }
3984
3985 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3986 {
3987 /* We need a PT_DYNAMIC segment. */
3988 ++segs;
f210dcff 3989 }
08a40648 3990
ceae84aa 3991 if (info != NULL && info->relro)
f210dcff
L
3992 {
3993 /* We need a PT_GNU_RELRO segment. */
3994 ++segs;
8ded5a0f
AM
3995 }
3996
12bd6957 3997 if (elf_eh_frame_hdr (abfd))
8ded5a0f
AM
3998 {
3999 /* We need a PT_GNU_EH_FRAME segment. */
4000 ++segs;
4001 }
4002
12bd6957 4003 if (elf_stack_flags (abfd))
8ded5a0f 4004 {
2b05f1b7
L
4005 /* We need a PT_GNU_STACK segment. */
4006 ++segs;
4007 }
94b11780 4008
2b05f1b7
L
4009 for (s = abfd->sections; s != NULL; s = s->next)
4010 {
8ded5a0f 4011 if ((s->flags & SEC_LOAD) != 0
0112cd26 4012 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
4013 {
4014 /* We need a PT_NOTE segment. */
4015 ++segs;
1c5265b5
JJ
4016 /* Try to create just one PT_NOTE segment
4017 for all adjacent loadable .note* sections.
4018 gABI requires that within a PT_NOTE segment
4019 (and also inside of each SHT_NOTE section)
4020 each note is padded to a multiple of 4 size,
4021 so we check whether the sections are correctly
4022 aligned. */
4023 if (s->alignment_power == 2)
4024 while (s->next != NULL
4025 && s->next->alignment_power == 2
4026 && (s->next->flags & SEC_LOAD) != 0
4027 && CONST_STRNEQ (s->next->name, ".note"))
4028 s = s->next;
8ded5a0f
AM
4029 }
4030 }
4031
4032 for (s = abfd->sections; s != NULL; s = s->next)
4033 {
4034 if (s->flags & SEC_THREAD_LOCAL)
4035 {
4036 /* We need a PT_TLS segment. */
4037 ++segs;
4038 break;
4039 }
4040 }
4041
4042 /* Let the backend count up any program headers it might need. */
2b05f1b7 4043 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
4044 if (bed->elf_backend_additional_program_headers)
4045 {
4046 int a;
4047
4048 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4049 if (a == -1)
4050 abort ();
4051 segs += a;
4052 }
4053
4054 return segs * bed->s->sizeof_phdr;
4055}
4056
2ea37f1c
NC
4057/* Find the segment that contains the output_section of section. */
4058
4059Elf_Internal_Phdr *
4060_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4061{
4062 struct elf_segment_map *m;
4063 Elf_Internal_Phdr *p;
4064
12bd6957 4065 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
2ea37f1c
NC
4066 m != NULL;
4067 m = m->next, p++)
4068 {
4069 int i;
4070
4071 for (i = m->count - 1; i >= 0; i--)
4072 if (m->sections[i] == section)
4073 return p;
4074 }
4075
4076 return NULL;
4077}
4078
252b5132
RH
4079/* Create a mapping from a set of sections to a program segment. */
4080
217aa764
AM
4081static struct elf_segment_map *
4082make_mapping (bfd *abfd,
4083 asection **sections,
4084 unsigned int from,
4085 unsigned int to,
4086 bfd_boolean phdr)
252b5132
RH
4087{
4088 struct elf_segment_map *m;
4089 unsigned int i;
4090 asection **hdrpp;
dc810e39 4091 bfd_size_type amt;
252b5132 4092
dc810e39
AM
4093 amt = sizeof (struct elf_segment_map);
4094 amt += (to - from - 1) * sizeof (asection *);
a50b1753 4095 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4096 if (m == NULL)
4097 return NULL;
4098 m->next = NULL;
4099 m->p_type = PT_LOAD;
4100 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4101 m->sections[i - from] = *hdrpp;
4102 m->count = to - from;
4103
4104 if (from == 0 && phdr)
4105 {
4106 /* Include the headers in the first PT_LOAD segment. */
4107 m->includes_filehdr = 1;
4108 m->includes_phdrs = 1;
4109 }
4110
4111 return m;
4112}
4113
229fcec5
MM
4114/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4115 on failure. */
4116
4117struct elf_segment_map *
4118_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4119{
4120 struct elf_segment_map *m;
4121
a50b1753
NC
4122 m = (struct elf_segment_map *) bfd_zalloc (abfd,
4123 sizeof (struct elf_segment_map));
229fcec5
MM
4124 if (m == NULL)
4125 return NULL;
4126 m->next = NULL;
4127 m->p_type = PT_DYNAMIC;
4128 m->count = 1;
4129 m->sections[0] = dynsec;
08a40648 4130
229fcec5
MM
4131 return m;
4132}
4133
8ded5a0f 4134/* Possibly add or remove segments from the segment map. */
252b5132 4135
b34976b6 4136static bfd_boolean
3dea8fca
AM
4137elf_modify_segment_map (bfd *abfd,
4138 struct bfd_link_info *info,
4139 bfd_boolean remove_empty_load)
252b5132 4140{
252e386e 4141 struct elf_segment_map **m;
8ded5a0f 4142 const struct elf_backend_data *bed;
252b5132 4143
8ded5a0f
AM
4144 /* The placement algorithm assumes that non allocated sections are
4145 not in PT_LOAD segments. We ensure this here by removing such
4146 sections from the segment map. We also remove excluded
252e386e
AM
4147 sections. Finally, any PT_LOAD segment without sections is
4148 removed. */
12bd6957 4149 m = &elf_seg_map (abfd);
252e386e 4150 while (*m)
8ded5a0f
AM
4151 {
4152 unsigned int i, new_count;
252b5132 4153
252e386e 4154 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 4155 {
252e386e
AM
4156 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4157 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4158 || (*m)->p_type != PT_LOAD))
8ded5a0f 4159 {
252e386e
AM
4160 (*m)->sections[new_count] = (*m)->sections[i];
4161 new_count++;
8ded5a0f
AM
4162 }
4163 }
252e386e 4164 (*m)->count = new_count;
252b5132 4165
3dea8fca 4166 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
4167 *m = (*m)->next;
4168 else
4169 m = &(*m)->next;
8ded5a0f 4170 }
252b5132 4171
8ded5a0f
AM
4172 bed = get_elf_backend_data (abfd);
4173 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 4174 {
252e386e 4175 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 4176 return FALSE;
252b5132 4177 }
252b5132 4178
8ded5a0f
AM
4179 return TRUE;
4180}
252b5132 4181
8ded5a0f 4182/* Set up a mapping from BFD sections to program segments. */
252b5132 4183
8ded5a0f
AM
4184bfd_boolean
4185_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4186{
4187 unsigned int count;
4188 struct elf_segment_map *m;
4189 asection **sections = NULL;
4190 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 4191 bfd_boolean no_user_phdrs;
252b5132 4192
12bd6957 4193 no_user_phdrs = elf_seg_map (abfd) == NULL;
d324f6d6
RM
4194
4195 if (info != NULL)
4196 info->user_phdrs = !no_user_phdrs;
4197
3dea8fca 4198 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 4199 {
8ded5a0f
AM
4200 asection *s;
4201 unsigned int i;
4202 struct elf_segment_map *mfirst;
4203 struct elf_segment_map **pm;
4204 asection *last_hdr;
4205 bfd_vma last_size;
4206 unsigned int phdr_index;
4207 bfd_vma maxpagesize;
4208 asection **hdrpp;
4209 bfd_boolean phdr_in_segment = TRUE;
4210 bfd_boolean writable;
4211 int tls_count = 0;
4212 asection *first_tls = NULL;
4213 asection *dynsec, *eh_frame_hdr;
4214 bfd_size_type amt;
8d06853e 4215 bfd_vma addr_mask, wrap_to = 0;
252b5132 4216
8ded5a0f 4217 /* Select the allocated sections, and sort them. */
252b5132 4218
a50b1753
NC
4219 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
4220 sizeof (asection *));
8ded5a0f 4221 if (sections == NULL)
252b5132 4222 goto error_return;
252b5132 4223
8d06853e
AM
4224 /* Calculate top address, avoiding undefined behaviour of shift
4225 left operator when shift count is equal to size of type
4226 being shifted. */
4227 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4228 addr_mask = (addr_mask << 1) + 1;
4229
8ded5a0f
AM
4230 i = 0;
4231 for (s = abfd->sections; s != NULL; s = s->next)
4232 {
4233 if ((s->flags & SEC_ALLOC) != 0)
4234 {
4235 sections[i] = s;
4236 ++i;
8d06853e
AM
4237 /* A wrapping section potentially clashes with header. */
4238 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
4239 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
4240 }
4241 }
4242 BFD_ASSERT (i <= bfd_count_sections (abfd));
4243 count = i;
252b5132 4244
8ded5a0f 4245 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 4246
8ded5a0f 4247 /* Build the mapping. */
252b5132 4248
8ded5a0f
AM
4249 mfirst = NULL;
4250 pm = &mfirst;
252b5132 4251
8ded5a0f
AM
4252 /* If we have a .interp section, then create a PT_PHDR segment for
4253 the program headers and a PT_INTERP segment for the .interp
4254 section. */
4255 s = bfd_get_section_by_name (abfd, ".interp");
4256 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4257 {
4258 amt = sizeof (struct elf_segment_map);
a50b1753 4259 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4260 if (m == NULL)
4261 goto error_return;
4262 m->next = NULL;
4263 m->p_type = PT_PHDR;
4264 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
4265 m->p_flags = PF_R | PF_X;
4266 m->p_flags_valid = 1;
4267 m->includes_phdrs = 1;
252b5132 4268
8ded5a0f
AM
4269 *pm = m;
4270 pm = &m->next;
252b5132 4271
8ded5a0f 4272 amt = sizeof (struct elf_segment_map);
a50b1753 4273 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4274 if (m == NULL)
4275 goto error_return;
4276 m->next = NULL;
4277 m->p_type = PT_INTERP;
4278 m->count = 1;
4279 m->sections[0] = s;
4280
4281 *pm = m;
4282 pm = &m->next;
252b5132 4283 }
8ded5a0f
AM
4284
4285 /* Look through the sections. We put sections in the same program
4286 segment when the start of the second section can be placed within
4287 a few bytes of the end of the first section. */
4288 last_hdr = NULL;
4289 last_size = 0;
4290 phdr_index = 0;
4291 maxpagesize = bed->maxpagesize;
063bb025
NC
4292 /* PR 17512: file: c8455299.
4293 Avoid divide-by-zero errors later on.
4294 FIXME: Should we abort if the maxpagesize is zero ? */
4295 if (maxpagesize == 0)
4296 maxpagesize = 1;
8ded5a0f
AM
4297 writable = FALSE;
4298 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4299 if (dynsec != NULL
4300 && (dynsec->flags & SEC_LOAD) == 0)
4301 dynsec = NULL;
4302
4303 /* Deal with -Ttext or something similar such that the first section
4304 is not adjacent to the program headers. This is an
4305 approximation, since at this point we don't know exactly how many
4306 program headers we will need. */
4307 if (count > 0)
252b5132 4308 {
12bd6957 4309 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 4310
62d7a5f6 4311 if (phdr_size == (bfd_size_type) -1)
8ded5a0f 4312 phdr_size = get_program_header_size (abfd, info);
d2bcb0d1 4313 phdr_size += bed->s->sizeof_ehdr;
8ded5a0f 4314 if ((abfd->flags & D_PAGED) == 0
8d06853e
AM
4315 || (sections[0]->lma & addr_mask) < phdr_size
4316 || ((sections[0]->lma & addr_mask) % maxpagesize
4317 < phdr_size % maxpagesize)
4318 || (sections[0]->lma & addr_mask & -maxpagesize) < wrap_to)
8ded5a0f 4319 phdr_in_segment = FALSE;
252b5132
RH
4320 }
4321
8ded5a0f 4322 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 4323 {
8ded5a0f
AM
4324 asection *hdr;
4325 bfd_boolean new_segment;
4326
4327 hdr = *hdrpp;
4328
4329 /* See if this section and the last one will fit in the same
4330 segment. */
4331
4332 if (last_hdr == NULL)
4333 {
4334 /* If we don't have a segment yet, then we don't need a new
4335 one (we build the last one after this loop). */
4336 new_segment = FALSE;
4337 }
4338 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4339 {
4340 /* If this section has a different relation between the
4341 virtual address and the load address, then we need a new
4342 segment. */
4343 new_segment = TRUE;
4344 }
b5599592
AM
4345 else if (hdr->lma < last_hdr->lma + last_size
4346 || last_hdr->lma + last_size < last_hdr->lma)
4347 {
4348 /* If this section has a load address that makes it overlap
4349 the previous section, then we need a new segment. */
4350 new_segment = TRUE;
4351 }
39948a60
NC
4352 /* In the next test we have to be careful when last_hdr->lma is close
4353 to the end of the address space. If the aligned address wraps
4354 around to the start of the address space, then there are no more
4355 pages left in memory and it is OK to assume that the current
4356 section can be included in the current segment. */
4357 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4358 > last_hdr->lma)
4359 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 4360 <= hdr->lma))
8ded5a0f
AM
4361 {
4362 /* If putting this section in this segment would force us to
4363 skip a page in the segment, then we need a new segment. */
4364 new_segment = TRUE;
4365 }
4366 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
e5654c0f
AM
4367 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0
4368 && ((abfd->flags & D_PAGED) == 0
4369 || (((last_hdr->lma + last_size - 1) & -maxpagesize)
4370 != (hdr->lma & -maxpagesize))))
8ded5a0f 4371 {
e5654c0f
AM
4372 /* We don't want to put a loaded section after a
4373 nonloaded (ie. bss style) section in the same segment
4374 as that will force the non-loaded section to be loaded.
4375 Consider .tbss sections as loaded for this purpose.
4376 However, like the writable/non-writable case below,
4377 if they are on the same page then they must be put
4378 in the same segment. */
8ded5a0f
AM
4379 new_segment = TRUE;
4380 }
4381 else if ((abfd->flags & D_PAGED) == 0)
4382 {
4383 /* If the file is not demand paged, which means that we
4384 don't require the sections to be correctly aligned in the
4385 file, then there is no other reason for a new segment. */
4386 new_segment = FALSE;
4387 }
4388 else if (! writable
4389 && (hdr->flags & SEC_READONLY) == 0
8d06853e
AM
4390 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4391 != (hdr->lma & -maxpagesize)))
8ded5a0f
AM
4392 {
4393 /* We don't want to put a writable section in a read only
4394 segment, unless they are on the same page in memory
4395 anyhow. We already know that the last section does not
4396 bring us past the current section on the page, so the
4397 only case in which the new section is not on the same
4398 page as the previous section is when the previous section
4399 ends precisely on a page boundary. */
4400 new_segment = TRUE;
4401 }
4402 else
4403 {
4404 /* Otherwise, we can use the same segment. */
4405 new_segment = FALSE;
4406 }
4407
2889e75b 4408 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
4409 if (last_hdr != NULL
4410 && info != NULL
4411 && info->callbacks->override_segment_assignment != NULL)
4412 new_segment
4413 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4414 last_hdr,
4415 new_segment);
2889e75b 4416
8ded5a0f
AM
4417 if (! new_segment)
4418 {
4419 if ((hdr->flags & SEC_READONLY) == 0)
4420 writable = TRUE;
4421 last_hdr = hdr;
4422 /* .tbss sections effectively have zero size. */
4423 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4424 != SEC_THREAD_LOCAL)
4425 last_size = hdr->size;
4426 else
4427 last_size = 0;
4428 continue;
4429 }
4430
4431 /* We need a new program segment. We must create a new program
4432 header holding all the sections from phdr_index until hdr. */
4433
4434 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4435 if (m == NULL)
4436 goto error_return;
4437
4438 *pm = m;
4439 pm = &m->next;
4440
252b5132 4441 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 4442 writable = TRUE;
8ded5a0f
AM
4443 else
4444 writable = FALSE;
4445
baaff79e
JJ
4446 last_hdr = hdr;
4447 /* .tbss sections effectively have zero size. */
e5caec89 4448 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 4449 last_size = hdr->size;
baaff79e
JJ
4450 else
4451 last_size = 0;
8ded5a0f
AM
4452 phdr_index = i;
4453 phdr_in_segment = FALSE;
252b5132
RH
4454 }
4455
86b2281f
AM
4456 /* Create a final PT_LOAD program segment, but not if it's just
4457 for .tbss. */
4458 if (last_hdr != NULL
4459 && (i - phdr_index != 1
4460 || ((last_hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4461 != SEC_THREAD_LOCAL)))
8ded5a0f
AM
4462 {
4463 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4464 if (m == NULL)
4465 goto error_return;
252b5132 4466
8ded5a0f
AM
4467 *pm = m;
4468 pm = &m->next;
4469 }
252b5132 4470
8ded5a0f
AM
4471 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4472 if (dynsec != NULL)
4473 {
4474 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4475 if (m == NULL)
4476 goto error_return;
4477 *pm = m;
4478 pm = &m->next;
4479 }
252b5132 4480
1c5265b5
JJ
4481 /* For each batch of consecutive loadable .note sections,
4482 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4483 because if we link together nonloadable .note sections and
4484 loadable .note sections, we will generate two .note sections
4485 in the output file. FIXME: Using names for section types is
4486 bogus anyhow. */
8ded5a0f
AM
4487 for (s = abfd->sections; s != NULL; s = s->next)
4488 {
4489 if ((s->flags & SEC_LOAD) != 0
0112cd26 4490 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 4491 {
1c5265b5 4492 asection *s2;
91d6fa6a
NC
4493
4494 count = 1;
8ded5a0f 4495 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
4496 if (s->alignment_power == 2)
4497 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
4498 {
4499 if (s2->next->alignment_power == 2
4500 && (s2->next->flags & SEC_LOAD) != 0
4501 && CONST_STRNEQ (s2->next->name, ".note")
8d06853e
AM
4502 && align_power (s2->lma + s2->size, 2)
4503 == s2->next->lma)
55b581a6
JJ
4504 count++;
4505 else
4506 break;
4507 }
1c5265b5 4508 amt += (count - 1) * sizeof (asection *);
a50b1753 4509 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4510 if (m == NULL)
4511 goto error_return;
4512 m->next = NULL;
4513 m->p_type = PT_NOTE;
1c5265b5
JJ
4514 m->count = count;
4515 while (count > 1)
4516 {
4517 m->sections[m->count - count--] = s;
4518 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
4519 s = s->next;
4520 }
4521 m->sections[m->count - 1] = s;
4522 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
4523 *pm = m;
4524 pm = &m->next;
4525 }
4526 if (s->flags & SEC_THREAD_LOCAL)
4527 {
4528 if (! tls_count)
4529 first_tls = s;
4530 tls_count++;
4531 }
4532 }
252b5132 4533
8ded5a0f
AM
4534 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
4535 if (tls_count > 0)
4536 {
8ded5a0f
AM
4537 amt = sizeof (struct elf_segment_map);
4538 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 4539 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4540 if (m == NULL)
4541 goto error_return;
4542 m->next = NULL;
4543 m->p_type = PT_TLS;
4544 m->count = tls_count;
4545 /* Mandated PF_R. */
4546 m->p_flags = PF_R;
4547 m->p_flags_valid = 1;
d923cae0 4548 s = first_tls;
91d6fa6a 4549 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f 4550 {
d923cae0
L
4551 if ((s->flags & SEC_THREAD_LOCAL) == 0)
4552 {
4553 _bfd_error_handler
4554 (_("%B: TLS sections are not adjacent:"), abfd);
4555 s = first_tls;
4556 i = 0;
4557 while (i < (unsigned int) tls_count)
4558 {
4559 if ((s->flags & SEC_THREAD_LOCAL) != 0)
4560 {
4561 _bfd_error_handler (_(" TLS: %A"), s);
4562 i++;
4563 }
4564 else
4565 _bfd_error_handler (_(" non-TLS: %A"), s);
4566 s = s->next;
4567 }
4568 bfd_set_error (bfd_error_bad_value);
4569 goto error_return;
4570 }
4571 m->sections[i] = s;
4572 s = s->next;
8ded5a0f 4573 }
252b5132 4574
8ded5a0f
AM
4575 *pm = m;
4576 pm = &m->next;
4577 }
252b5132 4578
8ded5a0f
AM
4579 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4580 segment. */
12bd6957 4581 eh_frame_hdr = elf_eh_frame_hdr (abfd);
8ded5a0f
AM
4582 if (eh_frame_hdr != NULL
4583 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 4584 {
dc810e39 4585 amt = sizeof (struct elf_segment_map);
a50b1753 4586 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4587 if (m == NULL)
4588 goto error_return;
4589 m->next = NULL;
8ded5a0f 4590 m->p_type = PT_GNU_EH_FRAME;
252b5132 4591 m->count = 1;
8ded5a0f 4592 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
4593
4594 *pm = m;
4595 pm = &m->next;
4596 }
13ae64f3 4597
12bd6957 4598 if (elf_stack_flags (abfd))
13ae64f3 4599 {
8ded5a0f 4600 amt = sizeof (struct elf_segment_map);
a50b1753 4601 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4602 if (m == NULL)
4603 goto error_return;
4604 m->next = NULL;
2b05f1b7 4605 m->p_type = PT_GNU_STACK;
12bd6957 4606 m->p_flags = elf_stack_flags (abfd);
04c3a755 4607 m->p_align = bed->stack_align;
8ded5a0f 4608 m->p_flags_valid = 1;
04c3a755
NS
4609 m->p_align_valid = m->p_align != 0;
4610 if (info->stacksize > 0)
4611 {
4612 m->p_size = info->stacksize;
4613 m->p_size_valid = 1;
4614 }
252b5132 4615
8ded5a0f
AM
4616 *pm = m;
4617 pm = &m->next;
4618 }
65765700 4619
ceae84aa 4620 if (info != NULL && info->relro)
8ded5a0f 4621 {
f210dcff
L
4622 for (m = mfirst; m != NULL; m = m->next)
4623 {
3832a4d8
AM
4624 if (m->p_type == PT_LOAD
4625 && m->count != 0
4626 && m->sections[0]->vma >= info->relro_start
4627 && m->sections[0]->vma < info->relro_end)
f210dcff 4628 {
3832a4d8
AM
4629 i = m->count;
4630 while (--i != (unsigned) -1)
4631 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
4632 == (SEC_LOAD | SEC_HAS_CONTENTS))
4633 break;
4634
43a8475c 4635 if (i != (unsigned) -1)
f210dcff
L
4636 break;
4637 }
be01b344 4638 }
f210dcff
L
4639
4640 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
4641 if (m != NULL)
4642 {
4643 amt = sizeof (struct elf_segment_map);
a50b1753 4644 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
4645 if (m == NULL)
4646 goto error_return;
4647 m->next = NULL;
4648 m->p_type = PT_GNU_RELRO;
4649 m->p_flags = PF_R;
4650 m->p_flags_valid = 1;
4651
4652 *pm = m;
4653 pm = &m->next;
4654 }
8ded5a0f 4655 }
9ee5e499 4656
8ded5a0f 4657 free (sections);
12bd6957 4658 elf_seg_map (abfd) = mfirst;
9ee5e499
JJ
4659 }
4660
3dea8fca 4661 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 4662 return FALSE;
8c37241b 4663
12bd6957 4664 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
8ded5a0f 4665 ++count;
12bd6957 4666 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
252b5132 4667
b34976b6 4668 return TRUE;
252b5132
RH
4669
4670 error_return:
4671 if (sections != NULL)
4672 free (sections);
b34976b6 4673 return FALSE;
252b5132
RH
4674}
4675
4676/* Sort sections by address. */
4677
4678static int
217aa764 4679elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4680{
4681 const asection *sec1 = *(const asection **) arg1;
4682 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4683 bfd_size_type size1, size2;
252b5132
RH
4684
4685 /* Sort by LMA first, since this is the address used to
4686 place the section into a segment. */
4687 if (sec1->lma < sec2->lma)
4688 return -1;
4689 else if (sec1->lma > sec2->lma)
4690 return 1;
4691
4692 /* Then sort by VMA. Normally the LMA and the VMA will be
4693 the same, and this will do nothing. */
4694 if (sec1->vma < sec2->vma)
4695 return -1;
4696 else if (sec1->vma > sec2->vma)
4697 return 1;
4698
4699 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4700
07c6e936 4701#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4702
4703 if (TOEND (sec1))
4704 {
4705 if (TOEND (sec2))
00a7cdc5
NC
4706 {
4707 /* If the indicies are the same, do not return 0
4708 here, but continue to try the next comparison. */
4709 if (sec1->target_index - sec2->target_index != 0)
4710 return sec1->target_index - sec2->target_index;
4711 }
252b5132
RH
4712 else
4713 return 1;
4714 }
00a7cdc5 4715 else if (TOEND (sec2))
252b5132
RH
4716 return -1;
4717
4718#undef TOEND
4719
00a7cdc5
NC
4720 /* Sort by size, to put zero sized sections
4721 before others at the same address. */
252b5132 4722
eea6121a
AM
4723 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4724 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4725
4726 if (size1 < size2)
252b5132 4727 return -1;
eecdbe52 4728 if (size1 > size2)
252b5132
RH
4729 return 1;
4730
4731 return sec1->target_index - sec2->target_index;
4732}
4733
340b6d91
AC
4734/* Ian Lance Taylor writes:
4735
4736 We shouldn't be using % with a negative signed number. That's just
4737 not good. We have to make sure either that the number is not
4738 negative, or that the number has an unsigned type. When the types
4739 are all the same size they wind up as unsigned. When file_ptr is a
4740 larger signed type, the arithmetic winds up as signed long long,
4741 which is wrong.
4742
4743 What we're trying to say here is something like ``increase OFF by
4744 the least amount that will cause it to be equal to the VMA modulo
4745 the page size.'' */
4746/* In other words, something like:
4747
4748 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4749 off_offset = off % bed->maxpagesize;
4750 if (vma_offset < off_offset)
4751 adjustment = vma_offset + bed->maxpagesize - off_offset;
4752 else
4753 adjustment = vma_offset - off_offset;
08a40648 4754
340b6d91
AC
4755 which can can be collapsed into the expression below. */
4756
4757static file_ptr
4758vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4759{
dc9155b2
NC
4760 /* PR binutils/16199: Handle an alignment of zero. */
4761 if (maxpagesize == 0)
4762 maxpagesize = 1;
340b6d91
AC
4763 return ((vma - off) % maxpagesize);
4764}
4765
6d33f217
L
4766static void
4767print_segment_map (const struct elf_segment_map *m)
4768{
4769 unsigned int j;
4770 const char *pt = get_segment_type (m->p_type);
4771 char buf[32];
4772
4773 if (pt == NULL)
4774 {
4775 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4776 sprintf (buf, "LOPROC+%7.7x",
4777 (unsigned int) (m->p_type - PT_LOPROC));
4778 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4779 sprintf (buf, "LOOS+%7.7x",
4780 (unsigned int) (m->p_type - PT_LOOS));
4781 else
4782 snprintf (buf, sizeof (buf), "%8.8x",
4783 (unsigned int) m->p_type);
4784 pt = buf;
4785 }
4a97a0e5 4786 fflush (stdout);
6d33f217
L
4787 fprintf (stderr, "%s:", pt);
4788 for (j = 0; j < m->count; j++)
4789 fprintf (stderr, " %s", m->sections [j]->name);
4790 putc ('\n',stderr);
4a97a0e5 4791 fflush (stderr);
6d33f217
L
4792}
4793
32812159
AM
4794static bfd_boolean
4795write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
4796{
4797 void *buf;
4798 bfd_boolean ret;
4799
4800 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
4801 return FALSE;
4802 buf = bfd_zmalloc (len);
4803 if (buf == NULL)
4804 return FALSE;
4805 ret = bfd_bwrite (buf, len, abfd) == len;
4806 free (buf);
4807 return ret;
4808}
4809
252b5132
RH
4810/* Assign file positions to the sections based on the mapping from
4811 sections to segments. This function also sets up some fields in
f3520d2f 4812 the file header. */
252b5132 4813
b34976b6 4814static bfd_boolean
f3520d2f
AM
4815assign_file_positions_for_load_sections (bfd *abfd,
4816 struct bfd_link_info *link_info)
252b5132
RH
4817{
4818 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4819 struct elf_segment_map *m;
252b5132 4820 Elf_Internal_Phdr *phdrs;
252b5132 4821 Elf_Internal_Phdr *p;
02bf8d82 4822 file_ptr off;
3f570048 4823 bfd_size_type maxpagesize;
f3520d2f 4824 unsigned int alloc;
0920dee7 4825 unsigned int i, j;
2b0bc088 4826 bfd_vma header_pad = 0;
252b5132 4827
e36284ab 4828 if (link_info == NULL
ceae84aa 4829 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 4830 return FALSE;
252b5132 4831
8ded5a0f 4832 alloc = 0;
12bd6957 4833 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
2b0bc088
NC
4834 {
4835 ++alloc;
4836 if (m->header_size)
4837 header_pad = m->header_size;
4838 }
252b5132 4839
82f2dbf7
NC
4840 if (alloc)
4841 {
4842 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4843 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4844 }
4845 else
4846 {
4847 /* PR binutils/12467. */
4848 elf_elfheader (abfd)->e_phoff = 0;
4849 elf_elfheader (abfd)->e_phentsize = 0;
4850 }
d324f6d6 4851
8ded5a0f 4852 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4853
12bd6957
AM
4854 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
4855 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
8ded5a0f 4856 else
12bd6957 4857 BFD_ASSERT (elf_program_header_size (abfd)
59e0647f 4858 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4859
4860 if (alloc == 0)
f3520d2f 4861 {
12bd6957 4862 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
8ded5a0f 4863 return TRUE;
f3520d2f 4864 }
252b5132 4865
12bd6957 4866 /* We're writing the size in elf_program_header_size (abfd),
57268894
HPN
4867 see assign_file_positions_except_relocs, so make sure we have
4868 that amount allocated, with trailing space cleared.
12bd6957
AM
4869 The variable alloc contains the computed need, while
4870 elf_program_header_size (abfd) contains the size used for the
57268894
HPN
4871 layout.
4872 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
4873 where the layout is forced to according to a larger size in the
4874 last iterations for the testcase ld-elf/header. */
12bd6957 4875 BFD_ASSERT (elf_program_header_size (abfd) % bed->s->sizeof_phdr
57268894 4876 == 0);
a50b1753
NC
4877 phdrs = (Elf_Internal_Phdr *)
4878 bfd_zalloc2 (abfd,
12bd6957 4879 (elf_program_header_size (abfd) / bed->s->sizeof_phdr),
a50b1753 4880 sizeof (Elf_Internal_Phdr));
f3520d2f 4881 elf_tdata (abfd)->phdr = phdrs;
252b5132 4882 if (phdrs == NULL)
b34976b6 4883 return FALSE;
252b5132 4884
3f570048
AM
4885 maxpagesize = 1;
4886 if ((abfd->flags & D_PAGED) != 0)
4887 maxpagesize = bed->maxpagesize;
4888
252b5132
RH
4889 off = bed->s->sizeof_ehdr;
4890 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4891 if (header_pad < (bfd_vma) off)
4892 header_pad = 0;
4893 else
4894 header_pad -= off;
4895 off += header_pad;
252b5132 4896
12bd6957 4897 for (m = elf_seg_map (abfd), p = phdrs, j = 0;
252b5132 4898 m != NULL;
0920dee7 4899 m = m->next, p++, j++)
252b5132 4900 {
252b5132 4901 asection **secpp;
bf988460
AM
4902 bfd_vma off_adjust;
4903 bfd_boolean no_contents;
252b5132
RH
4904
4905 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4906 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4907 not be done to the PT_NOTE section of a corefile, which may
4908 contain several pseudo-sections artificially created by bfd.
4909 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4910 if (m->count > 1
4911 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4912 && m->p_type == PT_NOTE))
252b5132
RH
4913 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4914 elf_sort_sections);
4915
b301b248
AM
4916 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4917 number of sections with contents contributing to both p_filesz
4918 and p_memsz, followed by a number of sections with no contents
4919 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4920 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4921 p->p_type = m->p_type;
28a7f3e7 4922 p->p_flags = m->p_flags;
252b5132 4923
3f570048
AM
4924 if (m->count == 0)
4925 p->p_vaddr = 0;
4926 else
3271a814 4927 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4928
4929 if (m->p_paddr_valid)
4930 p->p_paddr = m->p_paddr;
4931 else if (m->count == 0)
4932 p->p_paddr = 0;
4933 else
08a40648 4934 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4935
4936 if (p->p_type == PT_LOAD
4937 && (abfd->flags & D_PAGED) != 0)
4938 {
4939 /* p_align in demand paged PT_LOAD segments effectively stores
4940 the maximum page size. When copying an executable with
4941 objcopy, we set m->p_align from the input file. Use this
4942 value for maxpagesize rather than bed->maxpagesize, which
4943 may be different. Note that we use maxpagesize for PT_TLS
4944 segment alignment later in this function, so we are relying
4945 on at least one PT_LOAD segment appearing before a PT_TLS
4946 segment. */
4947 if (m->p_align_valid)
4948 maxpagesize = m->p_align;
4949
4950 p->p_align = maxpagesize;
4951 }
3271a814
NS
4952 else if (m->p_align_valid)
4953 p->p_align = m->p_align;
e970b90a
DJ
4954 else if (m->count == 0)
4955 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4956 else
4957 p->p_align = 0;
4958
bf988460
AM
4959 no_contents = FALSE;
4960 off_adjust = 0;
252b5132 4961 if (p->p_type == PT_LOAD
b301b248 4962 && m->count > 0)
252b5132 4963 {
b301b248 4964 bfd_size_type align;
a49e53ed 4965 unsigned int align_power = 0;
b301b248 4966
3271a814
NS
4967 if (m->p_align_valid)
4968 align = p->p_align;
4969 else
252b5132 4970 {
3271a814
NS
4971 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4972 {
4973 unsigned int secalign;
08a40648 4974
3271a814
NS
4975 secalign = bfd_get_section_alignment (abfd, *secpp);
4976 if (secalign > align_power)
4977 align_power = secalign;
4978 }
4979 align = (bfd_size_type) 1 << align_power;
4980 if (align < maxpagesize)
4981 align = maxpagesize;
b301b248 4982 }
252b5132 4983
02bf8d82
AM
4984 for (i = 0; i < m->count; i++)
4985 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4986 /* If we aren't making room for this section, then
4987 it must be SHT_NOBITS regardless of what we've
4988 set via struct bfd_elf_special_section. */
4989 elf_section_type (m->sections[i]) = SHT_NOBITS;
4990
bf988460 4991 /* Find out whether this segment contains any loadable
aea274d3
AM
4992 sections. */
4993 no_contents = TRUE;
4994 for (i = 0; i < m->count; i++)
4995 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
4996 {
4997 no_contents = FALSE;
4998 break;
4999 }
bf988460 5000
85cfcbfb 5001 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
bf988460
AM
5002 off += off_adjust;
5003 if (no_contents)
5004 {
5005 /* We shouldn't need to align the segment on disk since
5006 the segment doesn't need file space, but the gABI
5007 arguably requires the alignment and glibc ld.so
5008 checks it. So to comply with the alignment
5009 requirement but not waste file space, we adjust
5010 p_offset for just this segment. (OFF_ADJUST is
5011 subtracted from OFF later.) This may put p_offset
5012 past the end of file, but that shouldn't matter. */
5013 }
5014 else
5015 off_adjust = 0;
252b5132 5016 }
b1a6d0b1
NC
5017 /* Make sure the .dynamic section is the first section in the
5018 PT_DYNAMIC segment. */
5019 else if (p->p_type == PT_DYNAMIC
5020 && m->count > 1
5021 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5022 {
5023 _bfd_error_handler
b301b248
AM
5024 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
5025 abfd);
b1a6d0b1
NC
5026 bfd_set_error (bfd_error_bad_value);
5027 return FALSE;
5028 }
3f001e84
JK
5029 /* Set the note section type to SHT_NOTE. */
5030 else if (p->p_type == PT_NOTE)
5031 for (i = 0; i < m->count; i++)
5032 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 5033
252b5132
RH
5034 p->p_offset = 0;
5035 p->p_filesz = 0;
5036 p->p_memsz = 0;
5037
5038 if (m->includes_filehdr)
5039 {
bf988460 5040 if (!m->p_flags_valid)
252b5132 5041 p->p_flags |= PF_R;
252b5132
RH
5042 p->p_filesz = bed->s->sizeof_ehdr;
5043 p->p_memsz = bed->s->sizeof_ehdr;
5044 if (m->count > 0)
5045 {
252b5132
RH
5046 if (p->p_vaddr < (bfd_vma) off)
5047 {
caf47ea6 5048 (*_bfd_error_handler)
b301b248
AM
5049 (_("%B: Not enough room for program headers, try linking with -N"),
5050 abfd);
252b5132 5051 bfd_set_error (bfd_error_bad_value);
b34976b6 5052 return FALSE;
252b5132
RH
5053 }
5054
5055 p->p_vaddr -= off;
bf988460 5056 if (!m->p_paddr_valid)
252b5132
RH
5057 p->p_paddr -= off;
5058 }
252b5132
RH
5059 }
5060
5061 if (m->includes_phdrs)
5062 {
bf988460 5063 if (!m->p_flags_valid)
252b5132
RH
5064 p->p_flags |= PF_R;
5065
f3520d2f 5066 if (!m->includes_filehdr)
252b5132
RH
5067 {
5068 p->p_offset = bed->s->sizeof_ehdr;
5069
5070 if (m->count > 0)
5071 {
252b5132 5072 p->p_vaddr -= off - p->p_offset;
bf988460 5073 if (!m->p_paddr_valid)
252b5132
RH
5074 p->p_paddr -= off - p->p_offset;
5075 }
252b5132
RH
5076 }
5077
5078 p->p_filesz += alloc * bed->s->sizeof_phdr;
5079 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
5080 if (m->count)
5081 {
5082 p->p_filesz += header_pad;
5083 p->p_memsz += header_pad;
5084 }
252b5132
RH
5085 }
5086
5087 if (p->p_type == PT_LOAD
5088 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5089 {
bf988460 5090 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 5091 p->p_offset = off;
252b5132
RH
5092 else
5093 {
5094 file_ptr adjust;
5095
5096 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
5097 if (!no_contents)
5098 p->p_filesz += adjust;
252b5132
RH
5099 p->p_memsz += adjust;
5100 }
5101 }
5102
1ea63fd2
AM
5103 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5104 maps. Set filepos for sections in PT_LOAD segments, and in
5105 core files, for sections in PT_NOTE segments.
5106 assign_file_positions_for_non_load_sections will set filepos
5107 for other sections and update p_filesz for other segments. */
252b5132
RH
5108 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5109 {
5110 asection *sec;
252b5132 5111 bfd_size_type align;
627b32bc 5112 Elf_Internal_Shdr *this_hdr;
252b5132
RH
5113
5114 sec = *secpp;
02bf8d82 5115 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 5116 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 5117
88967714
AM
5118 if ((p->p_type == PT_LOAD
5119 || p->p_type == PT_TLS)
5120 && (this_hdr->sh_type != SHT_NOBITS
5121 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5122 && ((this_hdr->sh_flags & SHF_TLS) == 0
5123 || p->p_type == PT_TLS))))
252b5132 5124 {
b5599592
AM
5125 bfd_vma p_start = p->p_paddr;
5126 bfd_vma p_end = p_start + p->p_memsz;
5127 bfd_vma s_start = sec->lma;
5128 bfd_vma adjust = s_start - p_end;
252b5132 5129
a2d1e028
L
5130 if (adjust != 0
5131 && (s_start < p_end
5132 || p_end < p_start))
252b5132 5133 {
88967714 5134 (*_bfd_error_handler)
b5599592
AM
5135 (_("%B: section %A lma %#lx adjusted to %#lx"), abfd, sec,
5136 (unsigned long) s_start, (unsigned long) p_end);
88967714 5137 adjust = 0;
b5599592 5138 sec->lma = p_end;
1cfb7d1e 5139 }
3ac9b6c9 5140 p->p_memsz += adjust;
1cfb7d1e 5141
88967714
AM
5142 if (this_hdr->sh_type != SHT_NOBITS)
5143 {
32812159
AM
5144 if (p->p_filesz + adjust < p->p_memsz)
5145 {
5146 /* We have a PROGBITS section following NOBITS ones.
5147 Allocate file space for the NOBITS section(s) and
5148 zero it. */
5149 adjust = p->p_memsz - p->p_filesz;
5150 if (!write_zeros (abfd, off, adjust))
5151 return FALSE;
5152 }
88967714
AM
5153 off += adjust;
5154 p->p_filesz += adjust;
252b5132 5155 }
252b5132
RH
5156 }
5157
5158 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5159 {
b301b248
AM
5160 /* The section at i == 0 is the one that actually contains
5161 everything. */
4a938328
MS
5162 if (i == 0)
5163 {
627b32bc 5164 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
5165 off += this_hdr->sh_size;
5166 p->p_filesz = this_hdr->sh_size;
b301b248
AM
5167 p->p_memsz = 0;
5168 p->p_align = 1;
252b5132 5169 }
4a938328 5170 else
252b5132 5171 {
b301b248 5172 /* The rest are fake sections that shouldn't be written. */
252b5132 5173 sec->filepos = 0;
eea6121a 5174 sec->size = 0;
b301b248
AM
5175 sec->flags = 0;
5176 continue;
252b5132 5177 }
252b5132
RH
5178 }
5179 else
5180 {
1e951488 5181 if (p->p_type == PT_LOAD)
b301b248 5182 {
1e951488
AM
5183 this_hdr->sh_offset = sec->filepos = off;
5184 if (this_hdr->sh_type != SHT_NOBITS)
5185 off += this_hdr->sh_size;
5186 }
5187 else if (this_hdr->sh_type == SHT_NOBITS
5188 && (this_hdr->sh_flags & SHF_TLS) != 0
5189 && this_hdr->sh_offset == 0)
5190 {
5191 /* This is a .tbss section that didn't get a PT_LOAD.
5192 (See _bfd_elf_map_sections_to_segments "Create a
5193 final PT_LOAD".) Set sh_offset to the value it
5194 would have if we had created a zero p_filesz and
5195 p_memsz PT_LOAD header for the section. This
5196 also makes the PT_TLS header have the same
5197 p_offset value. */
5198 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5199 off, align);
5200 this_hdr->sh_offset = sec->filepos = off + adjust;
b301b248 5201 }
252b5132 5202
02bf8d82 5203 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 5204 {
6a3cd2b4 5205 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
5206 /* A load section without SHF_ALLOC is something like
5207 a note section in a PT_NOTE segment. These take
5208 file space but are not loaded into memory. */
5209 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 5210 p->p_memsz += this_hdr->sh_size;
b301b248 5211 }
6a3cd2b4 5212 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 5213 {
6a3cd2b4
AM
5214 if (p->p_type == PT_TLS)
5215 p->p_memsz += this_hdr->sh_size;
5216
5217 /* .tbss is special. It doesn't contribute to p_memsz of
5218 normal segments. */
5219 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5220 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
5221 }
5222
b10a8ae0
L
5223 if (align > p->p_align
5224 && !m->p_align_valid
5225 && (p->p_type != PT_LOAD
5226 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
5227 p->p_align = align;
5228 }
5229
bf988460 5230 if (!m->p_flags_valid)
252b5132
RH
5231 {
5232 p->p_flags |= PF_R;
02bf8d82 5233 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 5234 p->p_flags |= PF_X;
02bf8d82 5235 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
5236 p->p_flags |= PF_W;
5237 }
5238 }
43a8475c 5239
bf988460 5240 off -= off_adjust;
0920dee7 5241
7c928300
AM
5242 /* Check that all sections are in a PT_LOAD segment.
5243 Don't check funky gdb generated core files. */
5244 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
5245 {
5246 bfd_boolean check_vma = TRUE;
5247
5248 for (i = 1; i < m->count; i++)
5249 if (m->sections[i]->vma == m->sections[i - 1]->vma
5250 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5251 ->this_hdr), p) != 0
5252 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5253 ->this_hdr), p) != 0)
0920dee7 5254 {
9a83a553
AM
5255 /* Looks like we have overlays packed into the segment. */
5256 check_vma = FALSE;
5257 break;
0920dee7 5258 }
9a83a553
AM
5259
5260 for (i = 0; i < m->count; i++)
5261 {
5262 Elf_Internal_Shdr *this_hdr;
5263 asection *sec;
5264
5265 sec = m->sections[i];
5266 this_hdr = &(elf_section_data(sec)->this_hdr);
86b2281f
AM
5267 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5268 && !ELF_TBSS_SPECIAL (this_hdr, p))
9a83a553
AM
5269 {
5270 (*_bfd_error_handler)
5271 (_("%B: section `%A' can't be allocated in segment %d"),
5272 abfd, sec, j);
5273 print_segment_map (m);
5274 }
5275 }
5276 }
252b5132
RH
5277 }
5278
12bd6957 5279 elf_next_file_pos (abfd) = off;
f3520d2f
AM
5280 return TRUE;
5281}
5282
5283/* Assign file positions for the other sections. */
5284
5285static bfd_boolean
5286assign_file_positions_for_non_load_sections (bfd *abfd,
5287 struct bfd_link_info *link_info)
5288{
5289 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5290 Elf_Internal_Shdr **i_shdrpp;
e06efbf1 5291 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
f3520d2f
AM
5292 Elf_Internal_Phdr *phdrs;
5293 Elf_Internal_Phdr *p;
5294 struct elf_segment_map *m;
62655c7b 5295 struct elf_segment_map *hdrs_segment;
f3520d2f
AM
5296 bfd_vma filehdr_vaddr, filehdr_paddr;
5297 bfd_vma phdrs_vaddr, phdrs_paddr;
5298 file_ptr off;
f3520d2f
AM
5299 unsigned int count;
5300
5c182d5f 5301 i_shdrpp = elf_elfsections (abfd);
e06efbf1 5302 end_hdrpp = i_shdrpp + elf_numsections (abfd);
12bd6957 5303 off = elf_next_file_pos (abfd);
e06efbf1 5304 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
5c182d5f 5305 {
5c182d5f
AM
5306 Elf_Internal_Shdr *hdr;
5307
5308 hdr = *hdrpp;
5309 if (hdr->bfd_section != NULL
252e386e
AM
5310 && (hdr->bfd_section->filepos != 0
5311 || (hdr->sh_type == SHT_NOBITS
5312 && hdr->contents == NULL)))
627b32bc 5313 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
5314 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
5315 {
e8d2ba53
AM
5316 if (hdr->sh_size != 0)
5317 (*_bfd_error_handler)
5318 (_("%B: warning: allocated section `%s' not in segment"),
5319 abfd,
5320 (hdr->bfd_section == NULL
5321 ? "*unknown*"
5322 : hdr->bfd_section->name));
3ba71138
L
5323 /* We don't need to page align empty sections. */
5324 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
5325 off += vma_page_aligned_bias (hdr->sh_addr, off,
5326 bed->maxpagesize);
5327 else
5328 off += vma_page_aligned_bias (hdr->sh_addr, off,
5329 hdr->sh_addralign);
5330 off = _bfd_elf_assign_file_position_for_section (hdr, off,
5331 FALSE);
5332 }
5333 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5334 && hdr->bfd_section == NULL)
0ce398f1
L
5335 || (hdr->bfd_section != NULL
5336 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS))
5337 /* Compress DWARF debug sections. */
12bd6957 5338 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6a40cf0c
NC
5339 || (elf_symtab_shndx_list (abfd) != NULL
5340 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
5341 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
5342 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
5c182d5f
AM
5343 hdr->sh_offset = -1;
5344 else
5345 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
5346 }
5347
252b5132
RH
5348 /* Now that we have set the section file positions, we can set up
5349 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
5350 count = 0;
5351 filehdr_vaddr = 0;
5352 filehdr_paddr = 0;
5353 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
5354 phdrs_paddr = 0;
62655c7b 5355 hdrs_segment = NULL;
f3520d2f 5356 phdrs = elf_tdata (abfd)->phdr;
12bd6957 5357 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
f3520d2f
AM
5358 {
5359 ++count;
5360 if (p->p_type != PT_LOAD)
5361 continue;
5362
5363 if (m->includes_filehdr)
5364 {
5365 filehdr_vaddr = p->p_vaddr;
5366 filehdr_paddr = p->p_paddr;
5367 }
5368 if (m->includes_phdrs)
5369 {
5370 phdrs_vaddr = p->p_vaddr;
5371 phdrs_paddr = p->p_paddr;
5372 if (m->includes_filehdr)
5373 {
62655c7b 5374 hdrs_segment = m;
f3520d2f
AM
5375 phdrs_vaddr += bed->s->sizeof_ehdr;
5376 phdrs_paddr += bed->s->sizeof_ehdr;
5377 }
5378 }
5379 }
5380
62655c7b
RM
5381 if (hdrs_segment != NULL && link_info != NULL)
5382 {
5383 /* There is a segment that contains both the file headers and the
5384 program headers, so provide a symbol __ehdr_start pointing there.
5385 A program can use this to examine itself robustly. */
5386
5387 struct elf_link_hash_entry *hash
5388 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5389 FALSE, FALSE, TRUE);
5390 /* If the symbol was referenced and not defined, define it. */
5391 if (hash != NULL
5392 && (hash->root.type == bfd_link_hash_new
5393 || hash->root.type == bfd_link_hash_undefined
5394 || hash->root.type == bfd_link_hash_undefweak
5395 || hash->root.type == bfd_link_hash_common))
5396 {
5397 asection *s = NULL;
5398 if (hdrs_segment->count != 0)
5399 /* The segment contains sections, so use the first one. */
5400 s = hdrs_segment->sections[0];
5401 else
5402 /* Use the first (i.e. lowest-addressed) section in any segment. */
12bd6957 5403 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62655c7b
RM
5404 if (m->count != 0)
5405 {
5406 s = m->sections[0];
5407 break;
5408 }
5409
5410 if (s != NULL)
5411 {
5412 hash->root.u.def.value = filehdr_vaddr - s->vma;
5413 hash->root.u.def.section = s;
5414 }
5415 else
5416 {
5417 hash->root.u.def.value = filehdr_vaddr;
5418 hash->root.u.def.section = bfd_abs_section_ptr;
5419 }
5420
5421 hash->root.type = bfd_link_hash_defined;
5422 hash->def_regular = 1;
5423 hash->non_elf = 0;
5424 }
5425 }
5426
12bd6957 5427 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
252b5132 5428 {
129af99f 5429 if (p->p_type == PT_GNU_RELRO)
252b5132 5430 {
b84a33b5 5431 const Elf_Internal_Phdr *lp;
3146fac4 5432 struct elf_segment_map *lm;
1ea63fd2 5433
129af99f 5434 if (link_info != NULL)
8c37241b 5435 {
129af99f
AS
5436 /* During linking the range of the RELRO segment is passed
5437 in link_info. */
12bd6957 5438 for (lm = elf_seg_map (abfd), lp = phdrs;
3146fac4
AM
5439 lm != NULL;
5440 lm = lm->next, lp++)
8c37241b
JJ
5441 {
5442 if (lp->p_type == PT_LOAD
b84a33b5 5443 && lp->p_vaddr < link_info->relro_end
3146fac4
AM
5444 && lm->count != 0
5445 && lm->sections[0]->vma >= link_info->relro_start)
8c37241b
JJ
5446 break;
5447 }
8981c88a 5448
3146fac4 5449 BFD_ASSERT (lm != NULL);
8c37241b 5450 }
129af99f
AS
5451 else
5452 {
5453 /* Otherwise we are copying an executable or shared
b84a33b5 5454 library, but we need to use the same linker logic. */
129af99f
AS
5455 for (lp = phdrs; lp < phdrs + count; ++lp)
5456 {
5457 if (lp->p_type == PT_LOAD
5458 && lp->p_paddr == p->p_paddr)
5459 break;
5460 }
b84a33b5
AM
5461 }
5462
5463 if (lp < phdrs + count)
5464 {
5465 p->p_vaddr = lp->p_vaddr;
5466 p->p_paddr = lp->p_paddr;
5467 p->p_offset = lp->p_offset;
5468 if (link_info != NULL)
5469 p->p_filesz = link_info->relro_end - lp->p_vaddr;
5470 else if (m->p_size_valid)
5471 p->p_filesz = m->p_size;
129af99f
AS
5472 else
5473 abort ();
b84a33b5 5474 p->p_memsz = p->p_filesz;
f3944f72
L
5475 /* Preserve the alignment and flags if they are valid. The
5476 gold linker generates RW/4 for the PT_GNU_RELRO section.
5477 It is better for objcopy/strip to honor these attributes
5478 otherwise gdb will choke when using separate debug files.
5479 */
5480 if (!m->p_align_valid)
5481 p->p_align = 1;
5482 if (!m->p_flags_valid)
5483 p->p_flags = (lp->p_flags & ~PF_W);
129af99f 5484 }
9433b9b1 5485 else
b84a33b5
AM
5486 {
5487 memset (p, 0, sizeof *p);
5488 p->p_type = PT_NULL;
5489 }
129af99f 5490 }
04c3a755
NS
5491 else if (p->p_type == PT_GNU_STACK)
5492 {
5493 if (m->p_size_valid)
5494 p->p_memsz = m->p_size;
5495 }
129af99f
AS
5496 else if (m->count != 0)
5497 {
e06efbf1 5498 unsigned int i;
129af99f
AS
5499 if (p->p_type != PT_LOAD
5500 && (p->p_type != PT_NOTE
5501 || bfd_get_format (abfd) != bfd_core))
5502 {
c86934ce
NC
5503 if (m->includes_filehdr || m->includes_phdrs)
5504 {
b1fa9dd6 5505 /* PR 17512: file: 2195325e. */
c86934ce
NC
5506 (*_bfd_error_handler)
5507 (_("%B: warning: non-load segment includes file header and/or program header"),
5508 abfd);
5509 return FALSE;
5510 }
129af99f 5511
86b2281f 5512 p->p_filesz = 0;
129af99f 5513 p->p_offset = m->sections[0]->filepos;
86b2281f
AM
5514 for (i = m->count; i-- != 0;)
5515 {
5516 asection *sect = m->sections[i];
5517 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
5518 if (hdr->sh_type != SHT_NOBITS)
5519 {
5520 p->p_filesz = (sect->filepos - m->sections[0]->filepos
5521 + hdr->sh_size);
5522 break;
5523 }
5524 }
129af99f
AS
5525 }
5526 }
5527 else if (m->includes_filehdr)
5528 {
5529 p->p_vaddr = filehdr_vaddr;
5530 if (! m->p_paddr_valid)
5531 p->p_paddr = filehdr_paddr;
5532 }
5533 else if (m->includes_phdrs)
5534 {
5535 p->p_vaddr = phdrs_vaddr;
5536 if (! m->p_paddr_valid)
5537 p->p_paddr = phdrs_paddr;
252b5132
RH
5538 }
5539 }
5540
12bd6957 5541 elf_next_file_pos (abfd) = off;
252b5132 5542
b34976b6 5543 return TRUE;
252b5132
RH
5544}
5545
6a40cf0c
NC
5546static elf_section_list *
5547find_section_in_list (unsigned int i, elf_section_list * list)
5548{
5549 for (;list != NULL; list = list->next)
5550 if (list->ndx == i)
5551 break;
5552 return list;
5553}
5554
252b5132
RH
5555/* Work out the file positions of all the sections. This is called by
5556 _bfd_elf_compute_section_file_positions. All the section sizes and
5557 VMAs must be known before this is called.
5558
e0638f70
AM
5559 Reloc sections come in two flavours: Those processed specially as
5560 "side-channel" data attached to a section to which they apply, and
5561 those that bfd doesn't process as relocations. The latter sort are
5562 stored in a normal bfd section by bfd_section_from_shdr. We don't
5563 consider the former sort here, unless they form part of the loadable
5564 image. Reloc sections not assigned here will be handled later by
5565 assign_file_positions_for_relocs.
252b5132
RH
5566
5567 We also don't set the positions of the .symtab and .strtab here. */
5568
b34976b6 5569static bfd_boolean
c84fca4d
AO
5570assign_file_positions_except_relocs (bfd *abfd,
5571 struct bfd_link_info *link_info)
252b5132 5572{
5c182d5f
AM
5573 struct elf_obj_tdata *tdata = elf_tdata (abfd);
5574 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
9c5bfbb7 5575 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5576
5577 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
5578 && bfd_get_format (abfd) != bfd_core)
5579 {
5c182d5f
AM
5580 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
5581 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
5582 Elf_Internal_Shdr **hdrpp;
5583 unsigned int i;
a485e98e 5584 file_ptr off;
252b5132
RH
5585
5586 /* Start after the ELF header. */
5587 off = i_ehdrp->e_ehsize;
5588
5589 /* We are not creating an executable, which means that we are
5590 not creating a program header, and that the actual order of
5591 the sections in the file is unimportant. */
9ad5cbcf 5592 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
5593 {
5594 Elf_Internal_Shdr *hdr;
5595
5596 hdr = *hdrpp;
e0638f70
AM
5597 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5598 && hdr->bfd_section == NULL)
0ce398f1
L
5599 || (hdr->bfd_section != NULL
5600 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS))
5601 /* Compress DWARF debug sections. */
12bd6957 5602 || i == elf_onesymtab (abfd)
6a40cf0c
NC
5603 || (elf_symtab_shndx_list (abfd) != NULL
5604 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
5605 || i == elf_strtab_sec (abfd)
5606 || i == elf_shstrtab_sec (abfd))
252b5132
RH
5607 {
5608 hdr->sh_offset = -1;
252b5132 5609 }
9ad5cbcf 5610 else
b34976b6 5611 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 5612 }
a485e98e
AM
5613
5614 elf_next_file_pos (abfd) = off;
252b5132
RH
5615 }
5616 else
5617 {
f3520d2f
AM
5618 unsigned int alloc;
5619
252b5132 5620 /* Assign file positions for the loaded sections based on the
08a40648 5621 assignment of sections to segments. */
f3520d2f
AM
5622 if (!assign_file_positions_for_load_sections (abfd, link_info))
5623 return FALSE;
5624
5625 /* And for non-load sections. */
5626 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
5627 return FALSE;
5628
e36284ab
AM
5629 if (bed->elf_backend_modify_program_headers != NULL)
5630 {
5631 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
5632 return FALSE;
5633 }
5634
58e7ebac 5635 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=. */
0e1862bb 5636 if (link_info != NULL && bfd_link_pie (link_info))
58e7ebac
L
5637 {
5638 unsigned int num_segments = elf_elfheader (abfd)->e_phnum;
5639 Elf_Internal_Phdr *segment = elf_tdata (abfd)->phdr;
5640 Elf_Internal_Phdr *end_segment = &segment[num_segments];
5641
5642 /* Find the lowest p_vaddr in PT_LOAD segments. */
5643 bfd_vma p_vaddr = (bfd_vma) -1;
5644 for (; segment < end_segment; segment++)
5645 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
5646 p_vaddr = segment->p_vaddr;
5647
5648 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
5649 segments is non-zero. */
5650 if (p_vaddr)
5651 i_ehdrp->e_type = ET_EXEC;
5652 }
5653
f3520d2f 5654 /* Write out the program headers. */
12bd6957 5655 alloc = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
f3520d2f
AM
5656 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
5657 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 5658 return FALSE;
252b5132
RH
5659 }
5660
b34976b6 5661 return TRUE;
252b5132
RH
5662}
5663
b34976b6 5664static bfd_boolean
217aa764 5665prep_headers (bfd *abfd)
252b5132 5666{
3d540e93 5667 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 5668 struct elf_strtab_hash *shstrtab;
9c5bfbb7 5669 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5670
5671 i_ehdrp = elf_elfheader (abfd);
252b5132 5672
2b0f7ef9 5673 shstrtab = _bfd_elf_strtab_init ();
252b5132 5674 if (shstrtab == NULL)
b34976b6 5675 return FALSE;
252b5132
RH
5676
5677 elf_shstrtab (abfd) = shstrtab;
5678
5679 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
5680 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
5681 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
5682 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
5683
5684 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
5685 i_ehdrp->e_ident[EI_DATA] =
5686 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
5687 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
5688
252b5132
RH
5689 if ((abfd->flags & DYNAMIC) != 0)
5690 i_ehdrp->e_type = ET_DYN;
5691 else if ((abfd->flags & EXEC_P) != 0)
5692 i_ehdrp->e_type = ET_EXEC;
5693 else if (bfd_get_format (abfd) == bfd_core)
5694 i_ehdrp->e_type = ET_CORE;
5695 else
5696 i_ehdrp->e_type = ET_REL;
5697
5698 switch (bfd_get_arch (abfd))
5699 {
5700 case bfd_arch_unknown:
5701 i_ehdrp->e_machine = EM_NONE;
5702 break;
aa4f99bb
AO
5703
5704 /* There used to be a long list of cases here, each one setting
5705 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
5706 in the corresponding bfd definition. To avoid duplication,
5707 the switch was removed. Machines that need special handling
5708 can generally do it in elf_backend_final_write_processing(),
5709 unless they need the information earlier than the final write.
5710 Such need can generally be supplied by replacing the tests for
5711 e_machine with the conditions used to determine it. */
252b5132 5712 default:
9c5bfbb7
AM
5713 i_ehdrp->e_machine = bed->elf_machine_code;
5714 }
aa4f99bb 5715
252b5132
RH
5716 i_ehdrp->e_version = bed->s->ev_current;
5717 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
5718
c044fabd 5719 /* No program header, for now. */
252b5132
RH
5720 i_ehdrp->e_phoff = 0;
5721 i_ehdrp->e_phentsize = 0;
5722 i_ehdrp->e_phnum = 0;
5723
c044fabd 5724 /* Each bfd section is section header entry. */
252b5132
RH
5725 i_ehdrp->e_entry = bfd_get_start_address (abfd);
5726 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
5727
c044fabd 5728 /* If we're building an executable, we'll need a program header table. */
252b5132 5729 if (abfd->flags & EXEC_P)
0e71e495
BE
5730 /* It all happens later. */
5731 ;
252b5132
RH
5732 else
5733 {
5734 i_ehdrp->e_phentsize = 0;
252b5132
RH
5735 i_ehdrp->e_phoff = 0;
5736 }
5737
5738 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 5739 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 5740 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 5741 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 5742 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 5743 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132 5744 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
17ca87fc 5745 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
252b5132 5746 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 5747 return FALSE;
252b5132 5748
b34976b6 5749 return TRUE;
252b5132
RH
5750}
5751
5752/* Assign file positions for all the reloc sections which are not part
a485e98e 5753 of the loadable file image, and the file position of section headers. */
252b5132 5754
0ce398f1
L
5755static bfd_boolean
5756_bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
252b5132
RH
5757{
5758 file_ptr off;
e06efbf1 5759 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
3e19fb8f 5760 Elf_Internal_Shdr *shdrp;
a485e98e
AM
5761 Elf_Internal_Ehdr *i_ehdrp;
5762 const struct elf_backend_data *bed;
252b5132 5763
12bd6957 5764 off = elf_next_file_pos (abfd);
252b5132 5765
e06efbf1
L
5766 shdrpp = elf_elfsections (abfd);
5767 end_shdrpp = shdrpp + elf_numsections (abfd);
5768 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
252b5132 5769 {
252b5132 5770 shdrp = *shdrpp;
0ce398f1
L
5771 if (shdrp->sh_offset == -1)
5772 {
3e19fb8f 5773 asection *sec = shdrp->bfd_section;
0ce398f1
L
5774 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
5775 || shdrp->sh_type == SHT_RELA);
5776 if (is_rel
3e19fb8f 5777 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
0ce398f1
L
5778 {
5779 if (!is_rel)
5780 {
3e19fb8f
L
5781 const char *name = sec->name;
5782 struct bfd_elf_section_data *d;
5783
0ce398f1 5784 /* Compress DWARF debug sections. */
3e19fb8f 5785 if (!bfd_compress_section (abfd, sec,
0ce398f1
L
5786 shdrp->contents))
5787 return FALSE;
3e19fb8f
L
5788
5789 if (sec->compress_status == COMPRESS_SECTION_DONE
5790 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
5791 {
5792 /* If section is compressed with zlib-gnu, convert
5793 section name from .debug_* to .zdebug_*. */
5794 char *new_name
5795 = convert_debug_to_zdebug (abfd, name);
5796 if (new_name == NULL)
5797 return FALSE;
5798 name = new_name;
5799 }
5800 /* Add setion name to section name section. */
5801 if (shdrp->sh_name != (unsigned int) -1)
5802 abort ();
5803 shdrp->sh_name
5804 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
5805 name, FALSE);
5806 d = elf_section_data (sec);
5807
5808 /* Add reloc setion name to section name section. */
5809 if (d->rel.hdr
5810 && !_bfd_elf_set_reloc_sh_name (abfd,
5811 d->rel.hdr,
5812 name, FALSE))
5813 return FALSE;
5814 if (d->rela.hdr
5815 && !_bfd_elf_set_reloc_sh_name (abfd,
5816 d->rela.hdr,
91cb26da 5817 name, TRUE))
3e19fb8f
L
5818 return FALSE;
5819
0ce398f1 5820 /* Update section size and contents. */
3e19fb8f
L
5821 shdrp->sh_size = sec->size;
5822 shdrp->contents = sec->contents;
0ce398f1
L
5823 shdrp->bfd_section->contents = NULL;
5824 }
5825 off = _bfd_elf_assign_file_position_for_section (shdrp,
5826 off,
5827 TRUE);
5828 }
5829 }
252b5132
RH
5830 }
5831
3e19fb8f
L
5832 /* Place section name section after DWARF debug sections have been
5833 compressed. */
5834 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
5835 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
5836 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
5837 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
5838
5839 /* Place the section headers. */
a485e98e
AM
5840 i_ehdrp = elf_elfheader (abfd);
5841 bed = get_elf_backend_data (abfd);
5842 off = align_file_position (off, 1 << bed->s->log_file_align);
5843 i_ehdrp->e_shoff = off;
5844 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
12bd6957 5845 elf_next_file_pos (abfd) = off;
0ce398f1
L
5846
5847 return TRUE;
252b5132
RH
5848}
5849
b34976b6 5850bfd_boolean
217aa764 5851_bfd_elf_write_object_contents (bfd *abfd)
252b5132 5852{
9c5bfbb7 5853 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5854 Elf_Internal_Shdr **i_shdrp;
b34976b6 5855 bfd_boolean failed;
9ad5cbcf 5856 unsigned int count, num_sec;
30e8ee25 5857 struct elf_obj_tdata *t;
252b5132
RH
5858
5859 if (! abfd->output_has_begun
217aa764 5860 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 5861 return FALSE;
252b5132
RH
5862
5863 i_shdrp = elf_elfsections (abfd);
252b5132 5864
b34976b6 5865 failed = FALSE;
252b5132
RH
5866 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
5867 if (failed)
b34976b6 5868 return FALSE;
252b5132 5869
0ce398f1
L
5870 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
5871 return FALSE;
252b5132 5872
c044fabd 5873 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
5874 num_sec = elf_numsections (abfd);
5875 for (count = 1; count < num_sec; count++)
252b5132 5876 {
3e19fb8f
L
5877 i_shdrp[count]->sh_name
5878 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
5879 i_shdrp[count]->sh_name);
252b5132
RH
5880 if (bed->elf_backend_section_processing)
5881 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5882 if (i_shdrp[count]->contents)
5883 {
dc810e39
AM
5884 bfd_size_type amt = i_shdrp[count]->sh_size;
5885
252b5132 5886 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5887 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5888 return FALSE;
252b5132
RH
5889 }
5890 }
5891
5892 /* Write out the section header names. */
30e8ee25 5893 t = elf_tdata (abfd);
26ae6d5e 5894 if (elf_shstrtab (abfd) != NULL
30e8ee25 5895 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 5896 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5897 return FALSE;
252b5132
RH
5898
5899 if (bed->elf_backend_final_write_processing)
12bd6957 5900 (*bed->elf_backend_final_write_processing) (abfd, elf_linker (abfd));
252b5132 5901
ff59fc36
RM
5902 if (!bed->s->write_shdrs_and_ehdr (abfd))
5903 return FALSE;
5904
5905 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
c0355132
AM
5906 if (t->o->build_id.after_write_object_contents != NULL)
5907 return (*t->o->build_id.after_write_object_contents) (abfd);
ff59fc36
RM
5908
5909 return TRUE;
252b5132
RH
5910}
5911
b34976b6 5912bfd_boolean
217aa764 5913_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5914{
c044fabd 5915 /* Hopefully this can be done just like an object file. */
252b5132
RH
5916 return _bfd_elf_write_object_contents (abfd);
5917}
c044fabd
KH
5918
5919/* Given a section, search the header to find them. */
5920
cb33740c 5921unsigned int
198beae2 5922_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5923{
9c5bfbb7 5924 const struct elf_backend_data *bed;
91d6fa6a 5925 unsigned int sec_index;
252b5132 5926
9ad5cbcf
AM
5927 if (elf_section_data (asect) != NULL
5928 && elf_section_data (asect)->this_idx != 0)
5929 return elf_section_data (asect)->this_idx;
5930
5931 if (bfd_is_abs_section (asect))
91d6fa6a 5932 sec_index = SHN_ABS;
af746e92 5933 else if (bfd_is_com_section (asect))
91d6fa6a 5934 sec_index = SHN_COMMON;
af746e92 5935 else if (bfd_is_und_section (asect))
91d6fa6a 5936 sec_index = SHN_UNDEF;
af746e92 5937 else
91d6fa6a 5938 sec_index = SHN_BAD;
252b5132 5939
af746e92 5940 bed = get_elf_backend_data (abfd);
252b5132
RH
5941 if (bed->elf_backend_section_from_bfd_section)
5942 {
91d6fa6a 5943 int retval = sec_index;
9ad5cbcf 5944
af746e92
AM
5945 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5946 return retval;
252b5132
RH
5947 }
5948
91d6fa6a 5949 if (sec_index == SHN_BAD)
af746e92 5950 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5951
91d6fa6a 5952 return sec_index;
252b5132
RH
5953}
5954
5955/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5956 on error. */
5957
5958int
217aa764 5959_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5960{
5961 asymbol *asym_ptr = *asym_ptr_ptr;
5962 int idx;
5963 flagword flags = asym_ptr->flags;
5964
5965 /* When gas creates relocations against local labels, it creates its
5966 own symbol for the section, but does put the symbol into the
5967 symbol chain, so udata is 0. When the linker is generating
5968 relocatable output, this section symbol may be for one of the
5969 input sections rather than the output section. */
5970 if (asym_ptr->udata.i == 0
5971 && (flags & BSF_SECTION_SYM)
5972 && asym_ptr->section)
5973 {
5372391b 5974 asection *sec;
252b5132
RH
5975 int indx;
5976
5372391b
AM
5977 sec = asym_ptr->section;
5978 if (sec->owner != abfd && sec->output_section != NULL)
5979 sec = sec->output_section;
5980 if (sec->owner == abfd
5981 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5982 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5983 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5984 }
5985
5986 idx = asym_ptr->udata.i;
5987
5988 if (idx == 0)
5989 {
5990 /* This case can occur when using --strip-symbol on a symbol
08a40648 5991 which is used in a relocation entry. */
252b5132 5992 (*_bfd_error_handler)
d003868e
AM
5993 (_("%B: symbol `%s' required but not present"),
5994 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5995 bfd_set_error (bfd_error_no_symbols);
5996 return -1;
5997 }
5998
5999#if DEBUG & 4
6000 {
6001 fprintf (stderr,
9ccb8af9
AM
6002 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx\n",
6003 (long) asym_ptr, asym_ptr->name, idx, (long) flags);
252b5132
RH
6004 fflush (stderr);
6005 }
6006#endif
6007
6008 return idx;
6009}
6010
84d1d650 6011/* Rewrite program header information. */
252b5132 6012
b34976b6 6013static bfd_boolean
84d1d650 6014rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 6015{
b34976b6
AM
6016 Elf_Internal_Ehdr *iehdr;
6017 struct elf_segment_map *map;
6018 struct elf_segment_map *map_first;
6019 struct elf_segment_map **pointer_to_map;
6020 Elf_Internal_Phdr *segment;
6021 asection *section;
6022 unsigned int i;
6023 unsigned int num_segments;
6024 bfd_boolean phdr_included = FALSE;
5c44b38e 6025 bfd_boolean p_paddr_valid;
b34976b6
AM
6026 bfd_vma maxpagesize;
6027 struct elf_segment_map *phdr_adjust_seg = NULL;
6028 unsigned int phdr_adjust_num = 0;
9c5bfbb7 6029 const struct elf_backend_data *bed;
bc67d8a6 6030
caf47ea6 6031 bed = get_elf_backend_data (ibfd);
252b5132
RH
6032 iehdr = elf_elfheader (ibfd);
6033
bc67d8a6 6034 map_first = NULL;
c044fabd 6035 pointer_to_map = &map_first;
252b5132
RH
6036
6037 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
6038 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6039
6040 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
6041#define SEGMENT_END(segment, start) \
6042 (start + (segment->p_memsz > segment->p_filesz \
6043 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 6044
eecdbe52
JJ
6045#define SECTION_SIZE(section, segment) \
6046 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6047 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 6048 ? section->size : 0)
eecdbe52 6049
b34976b6 6050 /* Returns TRUE if the given section is contained within
bc67d8a6 6051 the given segment. VMA addresses are compared. */
aecc8f8a
AM
6052#define IS_CONTAINED_BY_VMA(section, segment) \
6053 (section->vma >= segment->p_vaddr \
eecdbe52 6054 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 6055 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 6056
b34976b6 6057 /* Returns TRUE if the given section is contained within
bc67d8a6 6058 the given segment. LMA addresses are compared. */
aecc8f8a
AM
6059#define IS_CONTAINED_BY_LMA(section, segment, base) \
6060 (section->lma >= base \
eecdbe52 6061 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 6062 <= SEGMENT_END (segment, base)))
252b5132 6063
0efc80c8
L
6064 /* Handle PT_NOTE segment. */
6065#define IS_NOTE(p, s) \
aecc8f8a 6066 (p->p_type == PT_NOTE \
0efc80c8 6067 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 6068 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6069 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6070 <= p->p_offset + p->p_filesz))
252b5132 6071
0efc80c8
L
6072 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6073 etc. */
6074#define IS_COREFILE_NOTE(p, s) \
6075 (IS_NOTE (p, s) \
6076 && bfd_get_format (ibfd) == bfd_core \
6077 && s->vma == 0 \
6078 && s->lma == 0)
6079
252b5132
RH
6080 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6081 linker, which generates a PT_INTERP section with p_vaddr and
6082 p_memsz set to 0. */
aecc8f8a
AM
6083#define IS_SOLARIS_PT_INTERP(p, s) \
6084 (p->p_vaddr == 0 \
6085 && p->p_paddr == 0 \
6086 && p->p_memsz == 0 \
6087 && p->p_filesz > 0 \
6088 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 6089 && s->size > 0 \
aecc8f8a 6090 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6091 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6092 <= p->p_offset + p->p_filesz))
5c440b1e 6093
bc67d8a6
NC
6094 /* Decide if the given section should be included in the given segment.
6095 A section will be included if:
f5ffc919 6096 1. It is within the address space of the segment -- we use the LMA
08a40648 6097 if that is set for the segment and the VMA otherwise,
0efc80c8 6098 2. It is an allocated section or a NOTE section in a PT_NOTE
d324f6d6 6099 segment.
bc67d8a6 6100 3. There is an output section associated with it,
eecdbe52 6101 4. The section has not already been allocated to a previous segment.
2b05f1b7 6102 5. PT_GNU_STACK segments do not include any sections.
03394ac9 6103 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
6104 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6105 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 6106 (with the possible exception of .dynamic). */
9f17e2a6 6107#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
6108 ((((segment->p_paddr \
6109 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
6110 : IS_CONTAINED_BY_VMA (section, segment)) \
6111 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 6112 || IS_NOTE (segment, section)) \
2b05f1b7
L
6113 && segment->p_type != PT_GNU_STACK \
6114 && (segment->p_type != PT_TLS \
6115 || (section->flags & SEC_THREAD_LOCAL)) \
6116 && (segment->p_type == PT_LOAD \
6117 || segment->p_type == PT_TLS \
6118 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6119 && (segment->p_type != PT_DYNAMIC \
6120 || SECTION_SIZE (section, segment) > 0 \
6121 || (segment->p_paddr \
6122 ? segment->p_paddr != section->lma \
6123 : segment->p_vaddr != section->vma) \
6124 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
6125 == 0)) \
0067a569 6126 && !section->segment_mark)
bc67d8a6 6127
9f17e2a6
L
6128/* If the output section of a section in the input segment is NULL,
6129 it is removed from the corresponding output segment. */
6130#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
6131 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
6132 && section->output_section != NULL)
6133
b34976b6 6134 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
6135#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6136 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6137
6138 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6139 their VMA address ranges and their LMA address ranges overlap.
6140 It is possible to have overlapping VMA ranges without overlapping LMA
6141 ranges. RedBoot images for example can have both .data and .bss mapped
6142 to the same VMA range, but with the .data section mapped to a different
6143 LMA. */
aecc8f8a 6144#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 6145 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 6146 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 6147 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 6148 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
6149
6150 /* Initialise the segment mark field. */
6151 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 6152 section->segment_mark = FALSE;
bc67d8a6 6153
5c44b38e
AM
6154 /* The Solaris linker creates program headers in which all the
6155 p_paddr fields are zero. When we try to objcopy or strip such a
6156 file, we get confused. Check for this case, and if we find it
6157 don't set the p_paddr_valid fields. */
6158 p_paddr_valid = FALSE;
6159 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6160 i < num_segments;
6161 i++, segment++)
6162 if (segment->p_paddr != 0)
6163 {
6164 p_paddr_valid = TRUE;
6165 break;
6166 }
6167
252b5132 6168 /* Scan through the segments specified in the program header
bc67d8a6 6169 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 6170 in the loadable segments. These can be created by weird
aecc8f8a 6171 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
6172 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6173 i < num_segments;
c044fabd 6174 i++, segment++)
252b5132 6175 {
252b5132 6176 unsigned int j;
c044fabd 6177 Elf_Internal_Phdr *segment2;
252b5132 6178
aecc8f8a
AM
6179 if (segment->p_type == PT_INTERP)
6180 for (section = ibfd->sections; section; section = section->next)
6181 if (IS_SOLARIS_PT_INTERP (segment, section))
6182 {
6183 /* Mininal change so that the normal section to segment
4cc11e76 6184 assignment code will work. */
aecc8f8a
AM
6185 segment->p_vaddr = section->vma;
6186 break;
6187 }
6188
bc67d8a6 6189 if (segment->p_type != PT_LOAD)
b10a8ae0
L
6190 {
6191 /* Remove PT_GNU_RELRO segment. */
6192 if (segment->p_type == PT_GNU_RELRO)
6193 segment->p_type = PT_NULL;
6194 continue;
6195 }
c044fabd 6196
bc67d8a6 6197 /* Determine if this segment overlaps any previous segments. */
0067a569 6198 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
6199 {
6200 bfd_signed_vma extra_length;
c044fabd 6201
bc67d8a6 6202 if (segment2->p_type != PT_LOAD
0067a569 6203 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 6204 continue;
c044fabd 6205
bc67d8a6
NC
6206 /* Merge the two segments together. */
6207 if (segment2->p_vaddr < segment->p_vaddr)
6208 {
c044fabd 6209 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 6210 SEGMENT. */
0067a569
AM
6211 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
6212 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 6213
bc67d8a6
NC
6214 if (extra_length > 0)
6215 {
0067a569 6216 segment2->p_memsz += extra_length;
bc67d8a6
NC
6217 segment2->p_filesz += extra_length;
6218 }
c044fabd 6219
bc67d8a6 6220 segment->p_type = PT_NULL;
c044fabd 6221
bc67d8a6
NC
6222 /* Since we have deleted P we must restart the outer loop. */
6223 i = 0;
6224 segment = elf_tdata (ibfd)->phdr;
6225 break;
6226 }
6227 else
6228 {
c044fabd 6229 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 6230 SEGMENT2. */
0067a569
AM
6231 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
6232 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 6233
bc67d8a6
NC
6234 if (extra_length > 0)
6235 {
0067a569 6236 segment->p_memsz += extra_length;
bc67d8a6
NC
6237 segment->p_filesz += extra_length;
6238 }
c044fabd 6239
bc67d8a6
NC
6240 segment2->p_type = PT_NULL;
6241 }
6242 }
6243 }
c044fabd 6244
bc67d8a6
NC
6245 /* The second scan attempts to assign sections to segments. */
6246 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6247 i < num_segments;
0067a569 6248 i++, segment++)
bc67d8a6 6249 {
0067a569
AM
6250 unsigned int section_count;
6251 asection **sections;
6252 asection *output_section;
6253 unsigned int isec;
6254 bfd_vma matching_lma;
6255 bfd_vma suggested_lma;
6256 unsigned int j;
dc810e39 6257 bfd_size_type amt;
0067a569
AM
6258 asection *first_section;
6259 bfd_boolean first_matching_lma;
6260 bfd_boolean first_suggested_lma;
bc67d8a6
NC
6261
6262 if (segment->p_type == PT_NULL)
6263 continue;
c044fabd 6264
9f17e2a6 6265 first_section = NULL;
bc67d8a6 6266 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
6267 for (section = ibfd->sections, section_count = 0;
6268 section != NULL;
6269 section = section->next)
9f17e2a6
L
6270 {
6271 /* Find the first section in the input segment, which may be
6272 removed from the corresponding output segment. */
6273 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
6274 {
6275 if (first_section == NULL)
6276 first_section = section;
6277 if (section->output_section != NULL)
6278 ++section_count;
6279 }
6280 }
811072d8 6281
b5f852ea
NC
6282 /* Allocate a segment map big enough to contain
6283 all of the sections we have selected. */
dc810e39
AM
6284 amt = sizeof (struct elf_segment_map);
6285 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6286 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 6287 if (map == NULL)
b34976b6 6288 return FALSE;
252b5132
RH
6289
6290 /* Initialise the fields of the segment map. Default to
6291 using the physical address of the segment in the input BFD. */
0067a569
AM
6292 map->next = NULL;
6293 map->p_type = segment->p_type;
6294 map->p_flags = segment->p_flags;
bc67d8a6 6295 map->p_flags_valid = 1;
55d55ac7 6296
9f17e2a6
L
6297 /* If the first section in the input segment is removed, there is
6298 no need to preserve segment physical address in the corresponding
6299 output segment. */
945c025a 6300 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
6301 {
6302 map->p_paddr = segment->p_paddr;
5c44b38e 6303 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 6304 }
252b5132
RH
6305
6306 /* Determine if this segment contains the ELF file header
6307 and if it contains the program headers themselves. */
bc67d8a6
NC
6308 map->includes_filehdr = (segment->p_offset == 0
6309 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 6310 map->includes_phdrs = 0;
252b5132 6311
0067a569 6312 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 6313 {
bc67d8a6
NC
6314 map->includes_phdrs =
6315 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6316 && (segment->p_offset + segment->p_filesz
252b5132
RH
6317 >= ((bfd_vma) iehdr->e_phoff
6318 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 6319
bc67d8a6 6320 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 6321 phdr_included = TRUE;
252b5132
RH
6322 }
6323
bc67d8a6 6324 if (section_count == 0)
252b5132
RH
6325 {
6326 /* Special segments, such as the PT_PHDR segment, may contain
6327 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
6328 something. They are allowed by the ELF spec however, so only
6329 a warning is produced. */
bc67d8a6 6330 if (segment->p_type == PT_LOAD)
c86934ce
NC
6331 (*_bfd_error_handler) (_("\
6332%B: warning: Empty loadable segment detected, is this intentional ?"),
0067a569 6333 ibfd);
252b5132 6334
bc67d8a6 6335 map->count = 0;
c044fabd
KH
6336 *pointer_to_map = map;
6337 pointer_to_map = &map->next;
252b5132
RH
6338
6339 continue;
6340 }
6341
6342 /* Now scan the sections in the input BFD again and attempt
6343 to add their corresponding output sections to the segment map.
6344 The problem here is how to handle an output section which has
6345 been moved (ie had its LMA changed). There are four possibilities:
6346
6347 1. None of the sections have been moved.
6348 In this case we can continue to use the segment LMA from the
6349 input BFD.
6350
6351 2. All of the sections have been moved by the same amount.
6352 In this case we can change the segment's LMA to match the LMA
6353 of the first section.
6354
6355 3. Some of the sections have been moved, others have not.
6356 In this case those sections which have not been moved can be
6357 placed in the current segment which will have to have its size,
6358 and possibly its LMA changed, and a new segment or segments will
6359 have to be created to contain the other sections.
6360
b5f852ea 6361 4. The sections have been moved, but not by the same amount.
252b5132
RH
6362 In this case we can change the segment's LMA to match the LMA
6363 of the first section and we will have to create a new segment
6364 or segments to contain the other sections.
6365
6366 In order to save time, we allocate an array to hold the section
6367 pointers that we are interested in. As these sections get assigned
6368 to a segment, they are removed from this array. */
6369
a50b1753 6370 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 6371 if (sections == NULL)
b34976b6 6372 return FALSE;
252b5132
RH
6373
6374 /* Step One: Scan for segment vs section LMA conflicts.
6375 Also add the sections to the section array allocated above.
6376 Also add the sections to the current segment. In the common
6377 case, where the sections have not been moved, this means that
6378 we have completely filled the segment, and there is nothing
6379 more to do. */
252b5132 6380 isec = 0;
72730e0c 6381 matching_lma = 0;
252b5132 6382 suggested_lma = 0;
0067a569
AM
6383 first_matching_lma = TRUE;
6384 first_suggested_lma = TRUE;
252b5132 6385
147d51c2 6386 for (section = ibfd->sections;
bc67d8a6
NC
6387 section != NULL;
6388 section = section->next)
147d51c2
L
6389 if (section == first_section)
6390 break;
6391
6392 for (j = 0; section != NULL; section = section->next)
252b5132 6393 {
caf47ea6 6394 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 6395 {
bc67d8a6
NC
6396 output_section = section->output_section;
6397
0067a569 6398 sections[j++] = section;
252b5132
RH
6399
6400 /* The Solaris native linker always sets p_paddr to 0.
6401 We try to catch that case here, and set it to the
5e8d7549
NC
6402 correct value. Note - some backends require that
6403 p_paddr be left as zero. */
5c44b38e 6404 if (!p_paddr_valid
4455705d 6405 && segment->p_vaddr != 0
0067a569 6406 && !bed->want_p_paddr_set_to_zero
252b5132 6407 && isec == 0
bc67d8a6 6408 && output_section->lma != 0
0067a569
AM
6409 && output_section->vma == (segment->p_vaddr
6410 + (map->includes_filehdr
6411 ? iehdr->e_ehsize
6412 : 0)
6413 + (map->includes_phdrs
6414 ? (iehdr->e_phnum
6415 * iehdr->e_phentsize)
6416 : 0)))
bc67d8a6 6417 map->p_paddr = segment->p_vaddr;
252b5132
RH
6418
6419 /* Match up the physical address of the segment with the
6420 LMA address of the output section. */
bc67d8a6 6421 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 6422 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
6423 || (bed->want_p_paddr_set_to_zero
6424 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 6425 {
0067a569
AM
6426 if (first_matching_lma || output_section->lma < matching_lma)
6427 {
6428 matching_lma = output_section->lma;
6429 first_matching_lma = FALSE;
6430 }
252b5132
RH
6431
6432 /* We assume that if the section fits within the segment
bc67d8a6 6433 then it does not overlap any other section within that
252b5132 6434 segment. */
0067a569
AM
6435 map->sections[isec++] = output_section;
6436 }
6437 else if (first_suggested_lma)
6438 {
6439 suggested_lma = output_section->lma;
6440 first_suggested_lma = FALSE;
252b5132 6441 }
147d51c2
L
6442
6443 if (j == section_count)
6444 break;
252b5132
RH
6445 }
6446 }
6447
bc67d8a6 6448 BFD_ASSERT (j == section_count);
252b5132
RH
6449
6450 /* Step Two: Adjust the physical address of the current segment,
6451 if necessary. */
bc67d8a6 6452 if (isec == section_count)
252b5132
RH
6453 {
6454 /* All of the sections fitted within the segment as currently
6455 specified. This is the default case. Add the segment to
6456 the list of built segments and carry on to process the next
6457 program header in the input BFD. */
bc67d8a6 6458 map->count = section_count;
c044fabd
KH
6459 *pointer_to_map = map;
6460 pointer_to_map = &map->next;
08a40648 6461
5c44b38e
AM
6462 if (p_paddr_valid
6463 && !bed->want_p_paddr_set_to_zero
147d51c2 6464 && matching_lma != map->p_paddr
5c44b38e
AM
6465 && !map->includes_filehdr
6466 && !map->includes_phdrs)
3271a814
NS
6467 /* There is some padding before the first section in the
6468 segment. So, we must account for that in the output
6469 segment's vma. */
6470 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 6471
252b5132
RH
6472 free (sections);
6473 continue;
6474 }
252b5132
RH
6475 else
6476 {
0067a569 6477 if (!first_matching_lma)
72730e0c
AM
6478 {
6479 /* At least one section fits inside the current segment.
6480 Keep it, but modify its physical address to match the
6481 LMA of the first section that fitted. */
bc67d8a6 6482 map->p_paddr = matching_lma;
72730e0c
AM
6483 }
6484 else
6485 {
6486 /* None of the sections fitted inside the current segment.
6487 Change the current segment's physical address to match
6488 the LMA of the first section. */
bc67d8a6 6489 map->p_paddr = suggested_lma;
72730e0c
AM
6490 }
6491
bc67d8a6
NC
6492 /* Offset the segment physical address from the lma
6493 to allow for space taken up by elf headers. */
6494 if (map->includes_filehdr)
010c8431
AM
6495 {
6496 if (map->p_paddr >= iehdr->e_ehsize)
6497 map->p_paddr -= iehdr->e_ehsize;
6498 else
6499 {
6500 map->includes_filehdr = FALSE;
6501 map->includes_phdrs = FALSE;
6502 }
6503 }
252b5132 6504
bc67d8a6
NC
6505 if (map->includes_phdrs)
6506 {
010c8431
AM
6507 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
6508 {
6509 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
6510
6511 /* iehdr->e_phnum is just an estimate of the number
6512 of program headers that we will need. Make a note
6513 here of the number we used and the segment we chose
6514 to hold these headers, so that we can adjust the
6515 offset when we know the correct value. */
6516 phdr_adjust_num = iehdr->e_phnum;
6517 phdr_adjust_seg = map;
6518 }
6519 else
6520 map->includes_phdrs = FALSE;
bc67d8a6 6521 }
252b5132
RH
6522 }
6523
6524 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 6525 those that fit to the current segment and removing them from the
252b5132
RH
6526 sections array; but making sure not to leave large gaps. Once all
6527 possible sections have been assigned to the current segment it is
6528 added to the list of built segments and if sections still remain
6529 to be assigned, a new segment is constructed before repeating
6530 the loop. */
6531 isec = 0;
6532 do
6533 {
bc67d8a6 6534 map->count = 0;
252b5132 6535 suggested_lma = 0;
0067a569 6536 first_suggested_lma = TRUE;
252b5132
RH
6537
6538 /* Fill the current segment with sections that fit. */
bc67d8a6 6539 for (j = 0; j < section_count; j++)
252b5132 6540 {
bc67d8a6 6541 section = sections[j];
252b5132 6542
bc67d8a6 6543 if (section == NULL)
252b5132
RH
6544 continue;
6545
bc67d8a6 6546 output_section = section->output_section;
252b5132 6547
bc67d8a6 6548 BFD_ASSERT (output_section != NULL);
c044fabd 6549
bc67d8a6
NC
6550 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
6551 || IS_COREFILE_NOTE (segment, section))
252b5132 6552 {
bc67d8a6 6553 if (map->count == 0)
252b5132
RH
6554 {
6555 /* If the first section in a segment does not start at
bc67d8a6
NC
6556 the beginning of the segment, then something is
6557 wrong. */
0067a569
AM
6558 if (output_section->lma
6559 != (map->p_paddr
6560 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
6561 + (map->includes_phdrs
6562 ? iehdr->e_phnum * iehdr->e_phentsize
6563 : 0)))
252b5132
RH
6564 abort ();
6565 }
6566 else
6567 {
0067a569 6568 asection *prev_sec;
252b5132 6569
bc67d8a6 6570 prev_sec = map->sections[map->count - 1];
252b5132
RH
6571
6572 /* If the gap between the end of the previous section
bc67d8a6
NC
6573 and the start of this section is more than
6574 maxpagesize then we need to start a new segment. */
eea6121a 6575 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 6576 maxpagesize)
caf47ea6 6577 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 6578 || (prev_sec->lma + prev_sec->size
079e9a2f 6579 > output_section->lma))
252b5132 6580 {
0067a569
AM
6581 if (first_suggested_lma)
6582 {
6583 suggested_lma = output_section->lma;
6584 first_suggested_lma = FALSE;
6585 }
252b5132
RH
6586
6587 continue;
6588 }
6589 }
6590
bc67d8a6 6591 map->sections[map->count++] = output_section;
252b5132
RH
6592 ++isec;
6593 sections[j] = NULL;
b34976b6 6594 section->segment_mark = TRUE;
252b5132 6595 }
0067a569
AM
6596 else if (first_suggested_lma)
6597 {
6598 suggested_lma = output_section->lma;
6599 first_suggested_lma = FALSE;
6600 }
252b5132
RH
6601 }
6602
bc67d8a6 6603 BFD_ASSERT (map->count > 0);
252b5132
RH
6604
6605 /* Add the current segment to the list of built segments. */
c044fabd
KH
6606 *pointer_to_map = map;
6607 pointer_to_map = &map->next;
252b5132 6608
bc67d8a6 6609 if (isec < section_count)
252b5132
RH
6610 {
6611 /* We still have not allocated all of the sections to
6612 segments. Create a new segment here, initialise it
6613 and carry on looping. */
dc810e39
AM
6614 amt = sizeof (struct elf_segment_map);
6615 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
5964fc3a 6616 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 6617 if (map == NULL)
5ed6aba4
NC
6618 {
6619 free (sections);
6620 return FALSE;
6621 }
252b5132
RH
6622
6623 /* Initialise the fields of the segment map. Set the physical
6624 physical address to the LMA of the first section that has
6625 not yet been assigned. */
0067a569
AM
6626 map->next = NULL;
6627 map->p_type = segment->p_type;
6628 map->p_flags = segment->p_flags;
6629 map->p_flags_valid = 1;
6630 map->p_paddr = suggested_lma;
5c44b38e 6631 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 6632 map->includes_filehdr = 0;
0067a569 6633 map->includes_phdrs = 0;
252b5132
RH
6634 }
6635 }
bc67d8a6 6636 while (isec < section_count);
252b5132
RH
6637
6638 free (sections);
6639 }
6640
12bd6957 6641 elf_seg_map (obfd) = map_first;
bc67d8a6
NC
6642
6643 /* If we had to estimate the number of program headers that were
9ad5cbcf 6644 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
6645 the offset if necessary. */
6646 if (phdr_adjust_seg != NULL)
6647 {
6648 unsigned int count;
c044fabd 6649
bc67d8a6 6650 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 6651 count++;
252b5132 6652
bc67d8a6
NC
6653 if (count > phdr_adjust_num)
6654 phdr_adjust_seg->p_paddr
6655 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
6656 }
c044fabd 6657
bc67d8a6 6658#undef SEGMENT_END
eecdbe52 6659#undef SECTION_SIZE
bc67d8a6
NC
6660#undef IS_CONTAINED_BY_VMA
6661#undef IS_CONTAINED_BY_LMA
0efc80c8 6662#undef IS_NOTE
252b5132 6663#undef IS_COREFILE_NOTE
bc67d8a6 6664#undef IS_SOLARIS_PT_INTERP
9f17e2a6 6665#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
6666#undef INCLUDE_SECTION_IN_SEGMENT
6667#undef SEGMENT_AFTER_SEGMENT
6668#undef SEGMENT_OVERLAPS
b34976b6 6669 return TRUE;
252b5132
RH
6670}
6671
84d1d650
L
6672/* Copy ELF program header information. */
6673
6674static bfd_boolean
6675copy_elf_program_header (bfd *ibfd, bfd *obfd)
6676{
6677 Elf_Internal_Ehdr *iehdr;
6678 struct elf_segment_map *map;
6679 struct elf_segment_map *map_first;
6680 struct elf_segment_map **pointer_to_map;
6681 Elf_Internal_Phdr *segment;
6682 unsigned int i;
6683 unsigned int num_segments;
6684 bfd_boolean phdr_included = FALSE;
88967714 6685 bfd_boolean p_paddr_valid;
84d1d650
L
6686
6687 iehdr = elf_elfheader (ibfd);
6688
6689 map_first = NULL;
6690 pointer_to_map = &map_first;
6691
88967714
AM
6692 /* If all the segment p_paddr fields are zero, don't set
6693 map->p_paddr_valid. */
6694 p_paddr_valid = FALSE;
84d1d650 6695 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
6696 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6697 i < num_segments;
6698 i++, segment++)
6699 if (segment->p_paddr != 0)
6700 {
6701 p_paddr_valid = TRUE;
6702 break;
6703 }
6704
84d1d650
L
6705 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6706 i < num_segments;
6707 i++, segment++)
6708 {
6709 asection *section;
6710 unsigned int section_count;
6711 bfd_size_type amt;
6712 Elf_Internal_Shdr *this_hdr;
53020534 6713 asection *first_section = NULL;
a76e6f2f 6714 asection *lowest_section;
84d1d650 6715
84d1d650
L
6716 /* Compute how many sections are in this segment. */
6717 for (section = ibfd->sections, section_count = 0;
6718 section != NULL;
6719 section = section->next)
6720 {
6721 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6722 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 6723 {
a76e6f2f
AM
6724 if (first_section == NULL)
6725 first_section = section;
3271a814
NS
6726 section_count++;
6727 }
84d1d650
L
6728 }
6729
6730 /* Allocate a segment map big enough to contain
6731 all of the sections we have selected. */
6732 amt = sizeof (struct elf_segment_map);
6733 if (section_count != 0)
6734 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6735 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
6736 if (map == NULL)
6737 return FALSE;
6738
6739 /* Initialize the fields of the output segment map with the
6740 input segment. */
6741 map->next = NULL;
6742 map->p_type = segment->p_type;
6743 map->p_flags = segment->p_flags;
6744 map->p_flags_valid = 1;
6745 map->p_paddr = segment->p_paddr;
88967714 6746 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
6747 map->p_align = segment->p_align;
6748 map->p_align_valid = 1;
3271a814 6749 map->p_vaddr_offset = 0;
84d1d650 6750
04c3a755
NS
6751 if (map->p_type == PT_GNU_RELRO
6752 || map->p_type == PT_GNU_STACK)
b10a8ae0
L
6753 {
6754 /* The PT_GNU_RELRO segment may contain the first a few
6755 bytes in the .got.plt section even if the whole .got.plt
6756 section isn't in the PT_GNU_RELRO segment. We won't
04c3a755
NS
6757 change the size of the PT_GNU_RELRO segment.
6758 Similarly, PT_GNU_STACK size is significant on uclinux
6759 systems. */
9433b9b1 6760 map->p_size = segment->p_memsz;
b10a8ae0
L
6761 map->p_size_valid = 1;
6762 }
6763
84d1d650
L
6764 /* Determine if this segment contains the ELF file header
6765 and if it contains the program headers themselves. */
6766 map->includes_filehdr = (segment->p_offset == 0
6767 && segment->p_filesz >= iehdr->e_ehsize);
6768
6769 map->includes_phdrs = 0;
6770 if (! phdr_included || segment->p_type != PT_LOAD)
6771 {
6772 map->includes_phdrs =
6773 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6774 && (segment->p_offset + segment->p_filesz
6775 >= ((bfd_vma) iehdr->e_phoff
6776 + iehdr->e_phnum * iehdr->e_phentsize)));
6777
6778 if (segment->p_type == PT_LOAD && map->includes_phdrs)
6779 phdr_included = TRUE;
6780 }
6781
bbefd0a9 6782 lowest_section = NULL;
84d1d650
L
6783 if (section_count != 0)
6784 {
6785 unsigned int isec = 0;
6786
53020534 6787 for (section = first_section;
84d1d650
L
6788 section != NULL;
6789 section = section->next)
6790 {
6791 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6792 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
6793 {
6794 map->sections[isec++] = section->output_section;
a76e6f2f
AM
6795 if ((section->flags & SEC_ALLOC) != 0)
6796 {
6797 bfd_vma seg_off;
6798
bbefd0a9
AM
6799 if (lowest_section == NULL
6800 || section->lma < lowest_section->lma)
fb8a5684
AM
6801 lowest_section = section;
6802
a76e6f2f
AM
6803 /* Section lmas are set up from PT_LOAD header
6804 p_paddr in _bfd_elf_make_section_from_shdr.
6805 If this header has a p_paddr that disagrees
6806 with the section lma, flag the p_paddr as
6807 invalid. */
6808 if ((section->flags & SEC_LOAD) != 0)
6809 seg_off = this_hdr->sh_offset - segment->p_offset;
6810 else
6811 seg_off = this_hdr->sh_addr - segment->p_vaddr;
6812 if (section->lma - segment->p_paddr != seg_off)
6813 map->p_paddr_valid = FALSE;
6814 }
53020534
L
6815 if (isec == section_count)
6816 break;
6817 }
84d1d650
L
6818 }
6819 }
6820
a76e6f2f
AM
6821 if (map->includes_filehdr && lowest_section != NULL)
6822 /* We need to keep the space used by the headers fixed. */
6823 map->header_size = lowest_section->vma - segment->p_vaddr;
d324f6d6 6824
a76e6f2f
AM
6825 if (!map->includes_phdrs
6826 && !map->includes_filehdr
6827 && map->p_paddr_valid)
6828 /* There is some other padding before the first section. */
6829 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
6830 - segment->p_paddr);
6831
84d1d650
L
6832 map->count = section_count;
6833 *pointer_to_map = map;
6834 pointer_to_map = &map->next;
6835 }
6836
12bd6957 6837 elf_seg_map (obfd) = map_first;
84d1d650
L
6838 return TRUE;
6839}
6840
6841/* Copy private BFD data. This copies or rewrites ELF program header
6842 information. */
6843
6844static bfd_boolean
6845copy_private_bfd_data (bfd *ibfd, bfd *obfd)
6846{
84d1d650
L
6847 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6848 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6849 return TRUE;
6850
6851 if (elf_tdata (ibfd)->phdr == NULL)
6852 return TRUE;
6853
6854 if (ibfd->xvec == obfd->xvec)
6855 {
cb3ff1e5
NC
6856 /* Check to see if any sections in the input BFD
6857 covered by ELF program header have changed. */
d55ce4e2 6858 Elf_Internal_Phdr *segment;
84d1d650
L
6859 asection *section, *osec;
6860 unsigned int i, num_segments;
6861 Elf_Internal_Shdr *this_hdr;
147d51c2
L
6862 const struct elf_backend_data *bed;
6863
6864 bed = get_elf_backend_data (ibfd);
6865
6866 /* Regenerate the segment map if p_paddr is set to 0. */
6867 if (bed->want_p_paddr_set_to_zero)
6868 goto rewrite;
84d1d650
L
6869
6870 /* Initialize the segment mark field. */
6871 for (section = obfd->sections; section != NULL;
6872 section = section->next)
6873 section->segment_mark = FALSE;
6874
6875 num_segments = elf_elfheader (ibfd)->e_phnum;
6876 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6877 i < num_segments;
6878 i++, segment++)
6879 {
5f6999aa
NC
6880 /* PR binutils/3535. The Solaris linker always sets the p_paddr
6881 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
6882 which severly confuses things, so always regenerate the segment
6883 map in this case. */
6884 if (segment->p_paddr == 0
6885 && segment->p_memsz == 0
6886 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 6887 goto rewrite;
5f6999aa 6888
84d1d650
L
6889 for (section = ibfd->sections;
6890 section != NULL; section = section->next)
6891 {
6892 /* We mark the output section so that we know it comes
6893 from the input BFD. */
6894 osec = section->output_section;
6895 if (osec)
6896 osec->segment_mark = TRUE;
6897
6898 /* Check if this section is covered by the segment. */
6899 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6900 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
6901 {
6902 /* FIXME: Check if its output section is changed or
6903 removed. What else do we need to check? */
6904 if (osec == NULL
6905 || section->flags != osec->flags
6906 || section->lma != osec->lma
6907 || section->vma != osec->vma
6908 || section->size != osec->size
6909 || section->rawsize != osec->rawsize
6910 || section->alignment_power != osec->alignment_power)
6911 goto rewrite;
6912 }
6913 }
6914 }
6915
cb3ff1e5 6916 /* Check to see if any output section do not come from the
84d1d650
L
6917 input BFD. */
6918 for (section = obfd->sections; section != NULL;
6919 section = section->next)
6920 {
6921 if (section->segment_mark == FALSE)
6922 goto rewrite;
6923 else
6924 section->segment_mark = FALSE;
6925 }
6926
6927 return copy_elf_program_header (ibfd, obfd);
6928 }
6929
6930rewrite:
f1d85785
L
6931 if (ibfd->xvec == obfd->xvec)
6932 {
6933 /* When rewriting program header, set the output maxpagesize to
6934 the maximum alignment of input PT_LOAD segments. */
6935 Elf_Internal_Phdr *segment;
6936 unsigned int i;
6937 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
6938 bfd_vma maxpagesize = 0;
6939
6940 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6941 i < num_segments;
6942 i++, segment++)
6943 if (segment->p_type == PT_LOAD
6944 && maxpagesize < segment->p_align)
c86934ce
NC
6945 {
6946 /* PR 17512: file: f17299af. */
6947 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
6948 (*_bfd_error_handler) (_("\
6949%B: warning: segment alignment of 0x%llx is too large"),
6950 ibfd, (long long) segment->p_align);
6951 else
6952 maxpagesize = segment->p_align;
6953 }
f1d85785
L
6954
6955 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
6956 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
6957 }
6958
84d1d650
L
6959 return rewrite_elf_program_header (ibfd, obfd);
6960}
6961
ccd2ec6a
L
6962/* Initialize private output section information from input section. */
6963
6964bfd_boolean
6965_bfd_elf_init_private_section_data (bfd *ibfd,
6966 asection *isec,
6967 bfd *obfd,
6968 asection *osec,
6969 struct bfd_link_info *link_info)
6970
6971{
6972 Elf_Internal_Shdr *ihdr, *ohdr;
0e1862bb
L
6973 bfd_boolean final_link = (link_info != NULL
6974 && !bfd_link_relocatable (link_info));
ccd2ec6a
L
6975
6976 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6977 || obfd->xvec->flavour != bfd_target_elf_flavour)
6978 return TRUE;
6979
ba85c43e
NC
6980 BFD_ASSERT (elf_section_data (osec) != NULL);
6981
dfa7b0b8
AM
6982 /* For objcopy and relocatable link, don't copy the output ELF
6983 section type from input if the output BFD section flags have been
6984 set to something different. For a final link allow some flags
6985 that the linker clears to differ. */
42bb2e33 6986 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
6987 && (osec->flags == isec->flags
6988 || (final_link
6989 && ((osec->flags ^ isec->flags)
0814be7d 6990 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 6991 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
6992
6993 /* FIXME: Is this correct for all OS/PROC specific flags? */
6994 elf_section_flags (osec) |= (elf_section_flags (isec)
6995 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
6996
6997 /* Set things up for objcopy and relocatable link. The output
6998 SHT_GROUP section will have its elf_next_in_group pointing back
6999 to the input group members. Ignore linker created group section.
7000 See elfNN_ia64_object_p in elfxx-ia64.c. */
dfa7b0b8 7001 if (!final_link)
ccd2ec6a
L
7002 {
7003 if (elf_sec_group (isec) == NULL
7004 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
7005 {
7006 if (elf_section_flags (isec) & SHF_GROUP)
7007 elf_section_flags (osec) |= SHF_GROUP;
7008 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 7009 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a 7010 }
68f5ff89
L
7011
7012 /* If not decompress, preserve SHF_COMPRESSED. */
7013 if ((ibfd->flags & BFD_DECOMPRESS) == 0)
7014 elf_section_flags (osec) |= (elf_section_flags (isec)
7015 & SHF_COMPRESSED);
ccd2ec6a
L
7016 }
7017
7018 ihdr = &elf_section_data (isec)->this_hdr;
7019
7020 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7021 don't use the output section of the linked-to section since it
7022 may be NULL at this point. */
7023 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7024 {
7025 ohdr = &elf_section_data (osec)->this_hdr;
7026 ohdr->sh_flags |= SHF_LINK_ORDER;
7027 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7028 }
7029
7030 osec->use_rela_p = isec->use_rela_p;
7031
7032 return TRUE;
7033}
7034
252b5132
RH
7035/* Copy private section information. This copies over the entsize
7036 field, and sometimes the info field. */
7037
b34976b6 7038bfd_boolean
217aa764
AM
7039_bfd_elf_copy_private_section_data (bfd *ibfd,
7040 asection *isec,
7041 bfd *obfd,
7042 asection *osec)
252b5132
RH
7043{
7044 Elf_Internal_Shdr *ihdr, *ohdr;
7045
7046 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7047 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 7048 return TRUE;
252b5132 7049
252b5132
RH
7050 ihdr = &elf_section_data (isec)->this_hdr;
7051 ohdr = &elf_section_data (osec)->this_hdr;
7052
7053 ohdr->sh_entsize = ihdr->sh_entsize;
7054
7055 if (ihdr->sh_type == SHT_SYMTAB
7056 || ihdr->sh_type == SHT_DYNSYM
7057 || ihdr->sh_type == SHT_GNU_verneed
7058 || ihdr->sh_type == SHT_GNU_verdef)
7059 ohdr->sh_info = ihdr->sh_info;
7060
ccd2ec6a
L
7061 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7062 NULL);
252b5132
RH
7063}
7064
d0bf826b
AM
7065/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7066 necessary if we are removing either the SHT_GROUP section or any of
7067 the group member sections. DISCARDED is the value that a section's
7068 output_section has if the section will be discarded, NULL when this
7069 function is called from objcopy, bfd_abs_section_ptr when called
7070 from the linker. */
80fccad2
BW
7071
7072bfd_boolean
d0bf826b 7073_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 7074{
30288845
AM
7075 asection *isec;
7076
30288845 7077 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 7078 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
7079 {
7080 asection *first = elf_next_in_group (isec);
7081 asection *s = first;
d0bf826b
AM
7082 bfd_size_type removed = 0;
7083
30288845
AM
7084 while (s != NULL)
7085 {
415f38a6
AM
7086 /* If this member section is being output but the
7087 SHT_GROUP section is not, then clear the group info
7088 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
7089 if (s->output_section != discarded
7090 && isec->output_section == discarded)
30288845
AM
7091 {
7092 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7093 elf_group_name (s->output_section) = NULL;
7094 }
415f38a6
AM
7095 /* Conversely, if the member section is not being output
7096 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
7097 else if (s->output_section == discarded
7098 && isec->output_section != discarded)
7099 removed += 4;
30288845
AM
7100 s = elf_next_in_group (s);
7101 if (s == first)
7102 break;
7103 }
d0bf826b
AM
7104 if (removed != 0)
7105 {
7106 if (discarded != NULL)
7107 {
7108 /* If we've been called for ld -r, then we need to
7109 adjust the input section size. This function may
7110 be called multiple times, so save the original
7111 size. */
7112 if (isec->rawsize == 0)
7113 isec->rawsize = isec->size;
7114 isec->size = isec->rawsize - removed;
7115 }
7116 else
7117 {
7118 /* Adjust the output section size when called from
7119 objcopy. */
7120 isec->output_section->size -= removed;
7121 }
7122 }
30288845
AM
7123 }
7124
80fccad2
BW
7125 return TRUE;
7126}
7127
d0bf826b
AM
7128/* Copy private header information. */
7129
7130bfd_boolean
7131_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
7132{
7133 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7134 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7135 return TRUE;
7136
7137 /* Copy over private BFD data if it has not already been copied.
7138 This must be done here, rather than in the copy_private_bfd_data
7139 entry point, because the latter is called after the section
7140 contents have been set, which means that the program headers have
7141 already been worked out. */
12bd6957 7142 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
d0bf826b
AM
7143 {
7144 if (! copy_private_bfd_data (ibfd, obfd))
7145 return FALSE;
7146 }
7147
7148 return _bfd_elf_fixup_group_sections (ibfd, NULL);
7149}
7150
252b5132
RH
7151/* Copy private symbol information. If this symbol is in a section
7152 which we did not map into a BFD section, try to map the section
7153 index correctly. We use special macro definitions for the mapped
7154 section indices; these definitions are interpreted by the
7155 swap_out_syms function. */
7156
9ad5cbcf
AM
7157#define MAP_ONESYMTAB (SHN_HIOS + 1)
7158#define MAP_DYNSYMTAB (SHN_HIOS + 2)
7159#define MAP_STRTAB (SHN_HIOS + 3)
7160#define MAP_SHSTRTAB (SHN_HIOS + 4)
7161#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 7162
b34976b6 7163bfd_boolean
217aa764
AM
7164_bfd_elf_copy_private_symbol_data (bfd *ibfd,
7165 asymbol *isymarg,
7166 bfd *obfd,
7167 asymbol *osymarg)
252b5132
RH
7168{
7169 elf_symbol_type *isym, *osym;
7170
7171 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7172 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 7173 return TRUE;
252b5132
RH
7174
7175 isym = elf_symbol_from (ibfd, isymarg);
7176 osym = elf_symbol_from (obfd, osymarg);
7177
7178 if (isym != NULL
8424d8f5 7179 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
7180 && osym != NULL
7181 && bfd_is_abs_section (isym->symbol.section))
7182 {
7183 unsigned int shndx;
7184
7185 shndx = isym->internal_elf_sym.st_shndx;
7186 if (shndx == elf_onesymtab (ibfd))
7187 shndx = MAP_ONESYMTAB;
7188 else if (shndx == elf_dynsymtab (ibfd))
7189 shndx = MAP_DYNSYMTAB;
12bd6957 7190 else if (shndx == elf_strtab_sec (ibfd))
252b5132 7191 shndx = MAP_STRTAB;
12bd6957 7192 else if (shndx == elf_shstrtab_sec (ibfd))
252b5132 7193 shndx = MAP_SHSTRTAB;
6a40cf0c 7194 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
9ad5cbcf 7195 shndx = MAP_SYM_SHNDX;
252b5132
RH
7196 osym->internal_elf_sym.st_shndx = shndx;
7197 }
7198
b34976b6 7199 return TRUE;
252b5132
RH
7200}
7201
7202/* Swap out the symbols. */
7203
b34976b6 7204static bfd_boolean
217aa764 7205swap_out_syms (bfd *abfd,
ef10c3ac 7206 struct elf_strtab_hash **sttp,
217aa764 7207 int relocatable_p)
252b5132 7208{
9c5bfbb7 7209 const struct elf_backend_data *bed;
079e9a2f
AM
7210 int symcount;
7211 asymbol **syms;
ef10c3ac 7212 struct elf_strtab_hash *stt;
079e9a2f 7213 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 7214 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 7215 Elf_Internal_Shdr *symstrtab_hdr;
ef10c3ac 7216 struct elf_sym_strtab *symstrtab;
f075ee0c
AM
7217 bfd_byte *outbound_syms;
7218 bfd_byte *outbound_shndx;
ef10c3ac
L
7219 unsigned long outbound_syms_index;
7220 unsigned long outbound_shndx_index;
079e9a2f 7221 int idx;
12bd6957 7222 unsigned int num_locals;
079e9a2f 7223 bfd_size_type amt;
174fd7f9 7224 bfd_boolean name_local_sections;
252b5132 7225
12bd6957 7226 if (!elf_map_symbols (abfd, &num_locals))
b34976b6 7227 return FALSE;
252b5132 7228
c044fabd 7229 /* Dump out the symtabs. */
ef10c3ac 7230 stt = _bfd_elf_strtab_init ();
079e9a2f 7231 if (stt == NULL)
b34976b6 7232 return FALSE;
252b5132 7233
079e9a2f
AM
7234 bed = get_elf_backend_data (abfd);
7235 symcount = bfd_get_symcount (abfd);
7236 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
7237 symtab_hdr->sh_type = SHT_SYMTAB;
7238 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
7239 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
12bd6957 7240 symtab_hdr->sh_info = num_locals + 1;
72de5009 7241 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
7242
7243 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
7244 symstrtab_hdr->sh_type = SHT_STRTAB;
7245
ef10c3ac
L
7246 /* Allocate buffer to swap out the .strtab section. */
7247 symstrtab = (struct elf_sym_strtab *) bfd_malloc ((symcount + 1)
7248 * sizeof (*symstrtab));
7249 if (symstrtab == NULL)
7250 {
7251 _bfd_elf_strtab_free (stt);
7252 return FALSE;
7253 }
7254
a50b1753
NC
7255 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
7256 bed->s->sizeof_sym);
079e9a2f 7257 if (outbound_syms == NULL)
5ed6aba4 7258 {
ef10c3ac
L
7259error_return:
7260 _bfd_elf_strtab_free (stt);
7261 free (symstrtab);
5ed6aba4
NC
7262 return FALSE;
7263 }
217aa764 7264 symtab_hdr->contents = outbound_syms;
ef10c3ac 7265 outbound_syms_index = 0;
252b5132 7266
9ad5cbcf 7267 outbound_shndx = NULL;
ef10c3ac 7268 outbound_shndx_index = 0;
6a40cf0c
NC
7269
7270 if (elf_symtab_shndx_list (abfd))
9ad5cbcf 7271 {
6a40cf0c
NC
7272 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
7273 if (symtab_shndx_hdr->sh_name != 0)
7274 {
7275 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
7276 outbound_shndx = (bfd_byte *)
7277 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
7278 if (outbound_shndx == NULL)
7279 goto error_return;
5ed6aba4 7280
6a40cf0c
NC
7281 symtab_shndx_hdr->contents = outbound_shndx;
7282 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
7283 symtab_shndx_hdr->sh_size = amt;
7284 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
7285 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
7286 }
7287 /* FIXME: What about any other headers in the list ? */
9ad5cbcf
AM
7288 }
7289
589e6347 7290 /* Now generate the data (for "contents"). */
079e9a2f
AM
7291 {
7292 /* Fill in zeroth symbol and swap it out. */
7293 Elf_Internal_Sym sym;
7294 sym.st_name = 0;
7295 sym.st_value = 0;
7296 sym.st_size = 0;
7297 sym.st_info = 0;
7298 sym.st_other = 0;
7299 sym.st_shndx = SHN_UNDEF;
35fc36a8 7300 sym.st_target_internal = 0;
ef10c3ac
L
7301 symstrtab[0].sym = sym;
7302 symstrtab[0].dest_index = outbound_syms_index;
7303 symstrtab[0].destshndx_index = outbound_shndx_index;
7304 outbound_syms_index++;
9ad5cbcf 7305 if (outbound_shndx != NULL)
ef10c3ac 7306 outbound_shndx_index++;
079e9a2f 7307 }
252b5132 7308
174fd7f9
RS
7309 name_local_sections
7310 = (bed->elf_backend_name_local_section_symbols
7311 && bed->elf_backend_name_local_section_symbols (abfd));
7312
079e9a2f 7313 syms = bfd_get_outsymbols (abfd);
ef10c3ac 7314 for (idx = 0; idx < symcount;)
252b5132 7315 {
252b5132 7316 Elf_Internal_Sym sym;
079e9a2f
AM
7317 bfd_vma value = syms[idx]->value;
7318 elf_symbol_type *type_ptr;
7319 flagword flags = syms[idx]->flags;
7320 int type;
252b5132 7321
174fd7f9
RS
7322 if (!name_local_sections
7323 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
7324 {
7325 /* Local section symbols have no name. */
ef10c3ac 7326 sym.st_name = (unsigned long) -1;
079e9a2f
AM
7327 }
7328 else
7329 {
ef10c3ac
L
7330 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
7331 to get the final offset for st_name. */
7332 sym.st_name
7333 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
7334 FALSE);
079e9a2f 7335 if (sym.st_name == (unsigned long) -1)
ef10c3ac 7336 goto error_return;
079e9a2f 7337 }
252b5132 7338
079e9a2f 7339 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 7340
079e9a2f
AM
7341 if ((flags & BSF_SECTION_SYM) == 0
7342 && bfd_is_com_section (syms[idx]->section))
7343 {
7344 /* ELF common symbols put the alignment into the `value' field,
7345 and the size into the `size' field. This is backwards from
7346 how BFD handles it, so reverse it here. */
7347 sym.st_size = value;
7348 if (type_ptr == NULL
7349 || type_ptr->internal_elf_sym.st_value == 0)
7350 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
7351 else
7352 sym.st_value = type_ptr->internal_elf_sym.st_value;
7353 sym.st_shndx = _bfd_elf_section_from_bfd_section
7354 (abfd, syms[idx]->section);
7355 }
7356 else
7357 {
7358 asection *sec = syms[idx]->section;
cb33740c 7359 unsigned int shndx;
252b5132 7360
079e9a2f
AM
7361 if (sec->output_section)
7362 {
7363 value += sec->output_offset;
7364 sec = sec->output_section;
7365 }
589e6347 7366
079e9a2f
AM
7367 /* Don't add in the section vma for relocatable output. */
7368 if (! relocatable_p)
7369 value += sec->vma;
7370 sym.st_value = value;
7371 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
7372
7373 if (bfd_is_abs_section (sec)
7374 && type_ptr != NULL
7375 && type_ptr->internal_elf_sym.st_shndx != 0)
7376 {
7377 /* This symbol is in a real ELF section which we did
7378 not create as a BFD section. Undo the mapping done
7379 by copy_private_symbol_data. */
7380 shndx = type_ptr->internal_elf_sym.st_shndx;
7381 switch (shndx)
7382 {
7383 case MAP_ONESYMTAB:
7384 shndx = elf_onesymtab (abfd);
7385 break;
7386 case MAP_DYNSYMTAB:
7387 shndx = elf_dynsymtab (abfd);
7388 break;
7389 case MAP_STRTAB:
12bd6957 7390 shndx = elf_strtab_sec (abfd);
079e9a2f
AM
7391 break;
7392 case MAP_SHSTRTAB:
12bd6957 7393 shndx = elf_shstrtab_sec (abfd);
079e9a2f 7394 break;
9ad5cbcf 7395 case MAP_SYM_SHNDX:
6a40cf0c
NC
7396 if (elf_symtab_shndx_list (abfd))
7397 shndx = elf_symtab_shndx_list (abfd)->ndx;
9ad5cbcf 7398 break;
079e9a2f 7399 default:
15bc576a 7400 shndx = SHN_ABS;
079e9a2f
AM
7401 break;
7402 }
7403 }
7404 else
7405 {
7406 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 7407
cb33740c 7408 if (shndx == SHN_BAD)
079e9a2f
AM
7409 {
7410 asection *sec2;
7411
7412 /* Writing this would be a hell of a lot easier if
7413 we had some decent documentation on bfd, and
7414 knew what to expect of the library, and what to
7415 demand of applications. For example, it
7416 appears that `objcopy' might not set the
7417 section of a symbol to be a section that is
7418 actually in the output file. */
7419 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
7420 if (sec2 == NULL)
7421 {
7422 _bfd_error_handler (_("\
7423Unable to find equivalent output section for symbol '%s' from section '%s'"),
7424 syms[idx]->name ? syms[idx]->name : "<Local sym>",
7425 sec->name);
811072d8 7426 bfd_set_error (bfd_error_invalid_operation);
ef10c3ac 7427 goto error_return;
589e6347 7428 }
811072d8 7429
079e9a2f 7430 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
cb33740c 7431 BFD_ASSERT (shndx != SHN_BAD);
079e9a2f
AM
7432 }
7433 }
252b5132 7434
079e9a2f
AM
7435 sym.st_shndx = shndx;
7436 }
252b5132 7437
13ae64f3
JJ
7438 if ((flags & BSF_THREAD_LOCAL) != 0)
7439 type = STT_TLS;
d8045f23
NC
7440 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
7441 type = STT_GNU_IFUNC;
13ae64f3 7442 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
7443 type = STT_FUNC;
7444 else if ((flags & BSF_OBJECT) != 0)
7445 type = STT_OBJECT;
d9352518
DB
7446 else if ((flags & BSF_RELC) != 0)
7447 type = STT_RELC;
7448 else if ((flags & BSF_SRELC) != 0)
7449 type = STT_SRELC;
079e9a2f
AM
7450 else
7451 type = STT_NOTYPE;
252b5132 7452
13ae64f3
JJ
7453 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
7454 type = STT_TLS;
7455
589e6347 7456 /* Processor-specific types. */
079e9a2f
AM
7457 if (type_ptr != NULL
7458 && bed->elf_backend_get_symbol_type)
7459 type = ((*bed->elf_backend_get_symbol_type)
7460 (&type_ptr->internal_elf_sym, type));
252b5132 7461
079e9a2f
AM
7462 if (flags & BSF_SECTION_SYM)
7463 {
7464 if (flags & BSF_GLOBAL)
7465 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
7466 else
7467 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
7468 }
7469 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 7470 {
504b7d20 7471#ifdef USE_STT_COMMON
0a40daed
MK
7472 if (type == STT_OBJECT)
7473 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_COMMON);
7474 else
504b7d20 7475#endif
c91e322a 7476 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 7477 }
079e9a2f
AM
7478 else if (bfd_is_und_section (syms[idx]->section))
7479 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
7480 ? STB_WEAK
7481 : STB_GLOBAL),
7482 type);
7483 else if (flags & BSF_FILE)
7484 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
7485 else
7486 {
7487 int bind = STB_LOCAL;
252b5132 7488
079e9a2f
AM
7489 if (flags & BSF_LOCAL)
7490 bind = STB_LOCAL;
3e7a7d11
NC
7491 else if (flags & BSF_GNU_UNIQUE)
7492 bind = STB_GNU_UNIQUE;
079e9a2f
AM
7493 else if (flags & BSF_WEAK)
7494 bind = STB_WEAK;
7495 else if (flags & BSF_GLOBAL)
7496 bind = STB_GLOBAL;
252b5132 7497
079e9a2f
AM
7498 sym.st_info = ELF_ST_INFO (bind, type);
7499 }
252b5132 7500
079e9a2f 7501 if (type_ptr != NULL)
35fc36a8
RS
7502 {
7503 sym.st_other = type_ptr->internal_elf_sym.st_other;
7504 sym.st_target_internal
7505 = type_ptr->internal_elf_sym.st_target_internal;
7506 }
079e9a2f 7507 else
35fc36a8
RS
7508 {
7509 sym.st_other = 0;
7510 sym.st_target_internal = 0;
7511 }
252b5132 7512
ef10c3ac
L
7513 idx++;
7514 symstrtab[idx].sym = sym;
7515 symstrtab[idx].dest_index = outbound_syms_index;
7516 symstrtab[idx].destshndx_index = outbound_shndx_index;
7517
7518 outbound_syms_index++;
9ad5cbcf 7519 if (outbound_shndx != NULL)
ef10c3ac
L
7520 outbound_shndx_index++;
7521 }
7522
7523 /* Finalize the .strtab section. */
7524 _bfd_elf_strtab_finalize (stt);
7525
7526 /* Swap out the .strtab section. */
7527 for (idx = 0; idx <= symcount; idx++)
7528 {
7529 struct elf_sym_strtab *elfsym = &symstrtab[idx];
7530 if (elfsym->sym.st_name == (unsigned long) -1)
7531 elfsym->sym.st_name = 0;
7532 else
7533 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
7534 elfsym->sym.st_name);
7535 bed->s->swap_symbol_out (abfd, &elfsym->sym,
7536 (outbound_syms
7537 + (elfsym->dest_index
7538 * bed->s->sizeof_sym)),
7539 (outbound_shndx
7540 + (elfsym->destshndx_index
7541 * sizeof (Elf_External_Sym_Shndx))));
079e9a2f 7542 }
ef10c3ac 7543 free (symstrtab);
252b5132 7544
079e9a2f 7545 *sttp = stt;
ef10c3ac 7546 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
079e9a2f 7547 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 7548
079e9a2f
AM
7549 symstrtab_hdr->sh_flags = 0;
7550 symstrtab_hdr->sh_addr = 0;
7551 symstrtab_hdr->sh_entsize = 0;
7552 symstrtab_hdr->sh_link = 0;
7553 symstrtab_hdr->sh_info = 0;
7554 symstrtab_hdr->sh_addralign = 1;
252b5132 7555
b34976b6 7556 return TRUE;
252b5132
RH
7557}
7558
7559/* Return the number of bytes required to hold the symtab vector.
7560
7561 Note that we base it on the count plus 1, since we will null terminate
7562 the vector allocated based on this size. However, the ELF symbol table
7563 always has a dummy entry as symbol #0, so it ends up even. */
7564
7565long
217aa764 7566_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
7567{
7568 long symcount;
7569 long symtab_size;
7570 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
7571
7572 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
7573 symtab_size = (symcount + 1) * (sizeof (asymbol *));
7574 if (symcount > 0)
7575 symtab_size -= sizeof (asymbol *);
252b5132
RH
7576
7577 return symtab_size;
7578}
7579
7580long
217aa764 7581_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
7582{
7583 long symcount;
7584 long symtab_size;
7585 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
7586
7587 if (elf_dynsymtab (abfd) == 0)
7588 {
7589 bfd_set_error (bfd_error_invalid_operation);
7590 return -1;
7591 }
7592
7593 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
7594 symtab_size = (symcount + 1) * (sizeof (asymbol *));
7595 if (symcount > 0)
7596 symtab_size -= sizeof (asymbol *);
252b5132
RH
7597
7598 return symtab_size;
7599}
7600
7601long
217aa764
AM
7602_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
7603 sec_ptr asect)
252b5132
RH
7604{
7605 return (asect->reloc_count + 1) * sizeof (arelent *);
7606}
7607
7608/* Canonicalize the relocs. */
7609
7610long
217aa764
AM
7611_bfd_elf_canonicalize_reloc (bfd *abfd,
7612 sec_ptr section,
7613 arelent **relptr,
7614 asymbol **symbols)
252b5132
RH
7615{
7616 arelent *tblptr;
7617 unsigned int i;
9c5bfbb7 7618 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 7619
b34976b6 7620 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
7621 return -1;
7622
7623 tblptr = section->relocation;
7624 for (i = 0; i < section->reloc_count; i++)
7625 *relptr++ = tblptr++;
7626
7627 *relptr = NULL;
7628
7629 return section->reloc_count;
7630}
7631
7632long
6cee3f79 7633_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 7634{
9c5bfbb7 7635 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 7636 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
7637
7638 if (symcount >= 0)
7639 bfd_get_symcount (abfd) = symcount;
7640 return symcount;
7641}
7642
7643long
217aa764
AM
7644_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
7645 asymbol **allocation)
252b5132 7646{
9c5bfbb7 7647 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 7648 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
7649
7650 if (symcount >= 0)
7651 bfd_get_dynamic_symcount (abfd) = symcount;
7652 return symcount;
252b5132
RH
7653}
7654
8615f3f2
AM
7655/* Return the size required for the dynamic reloc entries. Any loadable
7656 section that was actually installed in the BFD, and has type SHT_REL
7657 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
7658 dynamic reloc section. */
252b5132
RH
7659
7660long
217aa764 7661_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
7662{
7663 long ret;
7664 asection *s;
7665
7666 if (elf_dynsymtab (abfd) == 0)
7667 {
7668 bfd_set_error (bfd_error_invalid_operation);
7669 return -1;
7670 }
7671
7672 ret = sizeof (arelent *);
7673 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 7674 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
7675 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
7676 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 7677 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
7678 * sizeof (arelent *));
7679
7680 return ret;
7681}
7682
8615f3f2
AM
7683/* Canonicalize the dynamic relocation entries. Note that we return the
7684 dynamic relocations as a single block, although they are actually
7685 associated with particular sections; the interface, which was
7686 designed for SunOS style shared libraries, expects that there is only
7687 one set of dynamic relocs. Any loadable section that was actually
7688 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
7689 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
7690
7691long
217aa764
AM
7692_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
7693 arelent **storage,
7694 asymbol **syms)
252b5132 7695{
217aa764 7696 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
7697 asection *s;
7698 long ret;
7699
7700 if (elf_dynsymtab (abfd) == 0)
7701 {
7702 bfd_set_error (bfd_error_invalid_operation);
7703 return -1;
7704 }
7705
7706 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
7707 ret = 0;
7708 for (s = abfd->sections; s != NULL; s = s->next)
7709 {
266b05cf 7710 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
7711 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
7712 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
7713 {
7714 arelent *p;
7715 long count, i;
7716
b34976b6 7717 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 7718 return -1;
eea6121a 7719 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
7720 p = s->relocation;
7721 for (i = 0; i < count; i++)
7722 *storage++ = p++;
7723 ret += count;
7724 }
7725 }
7726
7727 *storage = NULL;
7728
7729 return ret;
7730}
7731\f
7732/* Read in the version information. */
7733
b34976b6 7734bfd_boolean
fc0e6df6 7735_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
7736{
7737 bfd_byte *contents = NULL;
fc0e6df6
PB
7738 unsigned int freeidx = 0;
7739
7740 if (elf_dynverref (abfd) != 0)
7741 {
7742 Elf_Internal_Shdr *hdr;
7743 Elf_External_Verneed *everneed;
7744 Elf_Internal_Verneed *iverneed;
7745 unsigned int i;
d0fb9a8d 7746 bfd_byte *contents_end;
fc0e6df6
PB
7747
7748 hdr = &elf_tdata (abfd)->dynverref_hdr;
7749
601a03ba 7750 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verneed))
d0fb9a8d 7751 {
601a03ba
AM
7752error_return_bad_verref:
7753 (*_bfd_error_handler)
7754 (_("%B: .gnu.version_r invalid entry"), abfd);
7755 bfd_set_error (bfd_error_bad_value);
d0fb9a8d
JJ
7756error_return_verref:
7757 elf_tdata (abfd)->verref = NULL;
7758 elf_tdata (abfd)->cverrefs = 0;
7759 goto error_return;
7760 }
601a03ba
AM
7761
7762 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
7763 if (contents == NULL)
7764 goto error_return_verref;
7765
fc0e6df6
PB
7766 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
7767 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 7768 goto error_return_verref;
fc0e6df6 7769
601a03ba
AM
7770 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
7771 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
7772
7773 if (elf_tdata (abfd)->verref == NULL)
d0fb9a8d
JJ
7774 goto error_return_verref;
7775
7776 BFD_ASSERT (sizeof (Elf_External_Verneed)
7777 == sizeof (Elf_External_Vernaux));
7778 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
7779 everneed = (Elf_External_Verneed *) contents;
7780 iverneed = elf_tdata (abfd)->verref;
7781 for (i = 0; i < hdr->sh_info; i++, iverneed++)
7782 {
7783 Elf_External_Vernaux *evernaux;
7784 Elf_Internal_Vernaux *ivernaux;
7785 unsigned int j;
7786
7787 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
7788
7789 iverneed->vn_bfd = abfd;
7790
7791 iverneed->vn_filename =
7792 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7793 iverneed->vn_file);
7794 if (iverneed->vn_filename == NULL)
601a03ba 7795 goto error_return_bad_verref;
fc0e6df6 7796
d0fb9a8d
JJ
7797 if (iverneed->vn_cnt == 0)
7798 iverneed->vn_auxptr = NULL;
7799 else
7800 {
a50b1753
NC
7801 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
7802 bfd_alloc2 (abfd, iverneed->vn_cnt,
7803 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
7804 if (iverneed->vn_auxptr == NULL)
7805 goto error_return_verref;
7806 }
7807
7808 if (iverneed->vn_aux
7809 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 7810 goto error_return_bad_verref;
fc0e6df6
PB
7811
7812 evernaux = ((Elf_External_Vernaux *)
7813 ((bfd_byte *) everneed + iverneed->vn_aux));
7814 ivernaux = iverneed->vn_auxptr;
7815 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
7816 {
7817 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
7818
7819 ivernaux->vna_nodename =
7820 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7821 ivernaux->vna_name);
7822 if (ivernaux->vna_nodename == NULL)
601a03ba 7823 goto error_return_bad_verref;
fc0e6df6 7824
25ff461f
AM
7825 if (ivernaux->vna_other > freeidx)
7826 freeidx = ivernaux->vna_other;
7827
7828 ivernaux->vna_nextptr = NULL;
7829 if (ivernaux->vna_next == 0)
7830 {
7831 iverneed->vn_cnt = j + 1;
7832 break;
7833 }
fc0e6df6
PB
7834 if (j + 1 < iverneed->vn_cnt)
7835 ivernaux->vna_nextptr = ivernaux + 1;
fc0e6df6 7836
d0fb9a8d
JJ
7837 if (ivernaux->vna_next
7838 > (size_t) (contents_end - (bfd_byte *) evernaux))
601a03ba 7839 goto error_return_bad_verref;
d0fb9a8d 7840
fc0e6df6
PB
7841 evernaux = ((Elf_External_Vernaux *)
7842 ((bfd_byte *) evernaux + ivernaux->vna_next));
fc0e6df6
PB
7843 }
7844
25ff461f
AM
7845 iverneed->vn_nextref = NULL;
7846 if (iverneed->vn_next == 0)
7847 break;
fc0e6df6
PB
7848 if (i + 1 < hdr->sh_info)
7849 iverneed->vn_nextref = iverneed + 1;
fc0e6df6 7850
d0fb9a8d
JJ
7851 if (iverneed->vn_next
7852 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 7853 goto error_return_bad_verref;
d0fb9a8d 7854
fc0e6df6
PB
7855 everneed = ((Elf_External_Verneed *)
7856 ((bfd_byte *) everneed + iverneed->vn_next));
7857 }
25ff461f 7858 elf_tdata (abfd)->cverrefs = i;
fc0e6df6
PB
7859
7860 free (contents);
7861 contents = NULL;
7862 }
252b5132
RH
7863
7864 if (elf_dynverdef (abfd) != 0)
7865 {
7866 Elf_Internal_Shdr *hdr;
7867 Elf_External_Verdef *everdef;
7868 Elf_Internal_Verdef *iverdef;
f631889e
UD
7869 Elf_Internal_Verdef *iverdefarr;
7870 Elf_Internal_Verdef iverdefmem;
252b5132 7871 unsigned int i;
062e2358 7872 unsigned int maxidx;
d0fb9a8d 7873 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
7874
7875 hdr = &elf_tdata (abfd)->dynverdef_hdr;
7876
601a03ba
AM
7877 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
7878 {
7879 error_return_bad_verdef:
7880 (*_bfd_error_handler)
7881 (_("%B: .gnu.version_d invalid entry"), abfd);
7882 bfd_set_error (bfd_error_bad_value);
7883 error_return_verdef:
7884 elf_tdata (abfd)->verdef = NULL;
7885 elf_tdata (abfd)->cverdefs = 0;
7886 goto error_return;
7887 }
7888
a50b1753 7889 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132 7890 if (contents == NULL)
601a03ba 7891 goto error_return_verdef;
252b5132 7892 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 7893 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
601a03ba 7894 goto error_return_verdef;
d0fb9a8d
JJ
7895
7896 BFD_ASSERT (sizeof (Elf_External_Verdef)
7897 >= sizeof (Elf_External_Verdaux));
7898 contents_end_def = contents + hdr->sh_size
7899 - sizeof (Elf_External_Verdef);
7900 contents_end_aux = contents + hdr->sh_size
7901 - sizeof (Elf_External_Verdaux);
7902
f631889e
UD
7903 /* We know the number of entries in the section but not the maximum
7904 index. Therefore we have to run through all entries and find
7905 the maximum. */
252b5132 7906 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
7907 maxidx = 0;
7908 for (i = 0; i < hdr->sh_info; ++i)
7909 {
7910 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7911
601a03ba
AM
7912 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
7913 goto error_return_bad_verdef;
062e2358
AM
7914 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
7915 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 7916
25ff461f
AM
7917 if (iverdefmem.vd_next == 0)
7918 break;
7919
d0fb9a8d
JJ
7920 if (iverdefmem.vd_next
7921 > (size_t) (contents_end_def - (bfd_byte *) everdef))
601a03ba 7922 goto error_return_bad_verdef;
d0fb9a8d 7923
f631889e
UD
7924 everdef = ((Elf_External_Verdef *)
7925 ((bfd_byte *) everdef + iverdefmem.vd_next));
7926 }
7927
fc0e6df6
PB
7928 if (default_imported_symver)
7929 {
7930 if (freeidx > maxidx)
7931 maxidx = ++freeidx;
7932 else
7933 freeidx = ++maxidx;
7934 }
201159ec 7935
601a03ba
AM
7936 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7937 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e 7938 if (elf_tdata (abfd)->verdef == NULL)
601a03ba 7939 goto error_return_verdef;
f631889e
UD
7940
7941 elf_tdata (abfd)->cverdefs = maxidx;
7942
7943 everdef = (Elf_External_Verdef *) contents;
7944 iverdefarr = elf_tdata (abfd)->verdef;
7945 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
7946 {
7947 Elf_External_Verdaux *everdaux;
7948 Elf_Internal_Verdaux *iverdaux;
7949 unsigned int j;
7950
f631889e
UD
7951 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7952
d0fb9a8d 7953 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
601a03ba 7954 goto error_return_bad_verdef;
d0fb9a8d 7955
f631889e 7956 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
595bce75 7957 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
252b5132
RH
7958
7959 iverdef->vd_bfd = abfd;
7960
d0fb9a8d
JJ
7961 if (iverdef->vd_cnt == 0)
7962 iverdef->vd_auxptr = NULL;
7963 else
7964 {
a50b1753
NC
7965 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7966 bfd_alloc2 (abfd, iverdef->vd_cnt,
7967 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7968 if (iverdef->vd_auxptr == NULL)
7969 goto error_return_verdef;
7970 }
7971
7972 if (iverdef->vd_aux
7973 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
601a03ba 7974 goto error_return_bad_verdef;
252b5132
RH
7975
7976 everdaux = ((Elf_External_Verdaux *)
7977 ((bfd_byte *) everdef + iverdef->vd_aux));
7978 iverdaux = iverdef->vd_auxptr;
7979 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
7980 {
7981 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
7982
7983 iverdaux->vda_nodename =
7984 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7985 iverdaux->vda_name);
7986 if (iverdaux->vda_nodename == NULL)
601a03ba 7987 goto error_return_bad_verdef;
252b5132 7988
25ff461f
AM
7989 iverdaux->vda_nextptr = NULL;
7990 if (iverdaux->vda_next == 0)
7991 {
7992 iverdef->vd_cnt = j + 1;
7993 break;
7994 }
252b5132
RH
7995 if (j + 1 < iverdef->vd_cnt)
7996 iverdaux->vda_nextptr = iverdaux + 1;
252b5132 7997
d0fb9a8d
JJ
7998 if (iverdaux->vda_next
7999 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
601a03ba 8000 goto error_return_bad_verdef;
d0fb9a8d 8001
252b5132
RH
8002 everdaux = ((Elf_External_Verdaux *)
8003 ((bfd_byte *) everdaux + iverdaux->vda_next));
8004 }
8005
595bce75 8006 iverdef->vd_nodename = NULL;
d0fb9a8d
JJ
8007 if (iverdef->vd_cnt)
8008 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 8009
25ff461f
AM
8010 iverdef->vd_nextdef = NULL;
8011 if (iverdef->vd_next == 0)
8012 break;
d0fb9a8d 8013 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132 8014 iverdef->vd_nextdef = iverdef + 1;
252b5132
RH
8015
8016 everdef = ((Elf_External_Verdef *)
8017 ((bfd_byte *) everdef + iverdef->vd_next));
8018 }
8019
8020 free (contents);
8021 contents = NULL;
8022 }
fc0e6df6 8023 else if (default_imported_symver)
252b5132 8024 {
fc0e6df6
PB
8025 if (freeidx < 3)
8026 freeidx = 3;
8027 else
8028 freeidx++;
252b5132 8029
a50b1753
NC
8030 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
8031 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 8032 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
8033 goto error_return;
8034
fc0e6df6
PB
8035 elf_tdata (abfd)->cverdefs = freeidx;
8036 }
252b5132 8037
fc0e6df6
PB
8038 /* Create a default version based on the soname. */
8039 if (default_imported_symver)
8040 {
8041 Elf_Internal_Verdef *iverdef;
8042 Elf_Internal_Verdaux *iverdaux;
252b5132 8043
5bb3703f 8044 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
252b5132 8045
fc0e6df6
PB
8046 iverdef->vd_version = VER_DEF_CURRENT;
8047 iverdef->vd_flags = 0;
8048 iverdef->vd_ndx = freeidx;
8049 iverdef->vd_cnt = 1;
252b5132 8050
fc0e6df6 8051 iverdef->vd_bfd = abfd;
252b5132 8052
fc0e6df6
PB
8053 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
8054 if (iverdef->vd_nodename == NULL)
d0fb9a8d 8055 goto error_return_verdef;
fc0e6df6 8056 iverdef->vd_nextdef = NULL;
601a03ba
AM
8057 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
8058 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
d0fb9a8d
JJ
8059 if (iverdef->vd_auxptr == NULL)
8060 goto error_return_verdef;
252b5132 8061
fc0e6df6
PB
8062 iverdaux = iverdef->vd_auxptr;
8063 iverdaux->vda_nodename = iverdef->vd_nodename;
252b5132
RH
8064 }
8065
b34976b6 8066 return TRUE;
252b5132
RH
8067
8068 error_return:
5ed6aba4 8069 if (contents != NULL)
252b5132 8070 free (contents);
b34976b6 8071 return FALSE;
252b5132
RH
8072}
8073\f
8074asymbol *
217aa764 8075_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
8076{
8077 elf_symbol_type *newsym;
8078
201159ec 8079 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof * newsym);
252b5132
RH
8080 if (!newsym)
8081 return NULL;
201159ec
NC
8082 newsym->symbol.the_bfd = abfd;
8083 return &newsym->symbol;
252b5132
RH
8084}
8085
8086void
217aa764
AM
8087_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
8088 asymbol *symbol,
8089 symbol_info *ret)
252b5132
RH
8090{
8091 bfd_symbol_info (symbol, ret);
8092}
8093
8094/* Return whether a symbol name implies a local symbol. Most targets
8095 use this function for the is_local_label_name entry point, but some
8096 override it. */
8097
b34976b6 8098bfd_boolean
217aa764
AM
8099_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
8100 const char *name)
252b5132
RH
8101{
8102 /* Normal local symbols start with ``.L''. */
8103 if (name[0] == '.' && name[1] == 'L')
b34976b6 8104 return TRUE;
252b5132
RH
8105
8106 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
8107 DWARF debugging symbols starting with ``..''. */
8108 if (name[0] == '.' && name[1] == '.')
b34976b6 8109 return TRUE;
252b5132
RH
8110
8111 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
8112 emitting DWARF debugging output. I suspect this is actually a
8113 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
8114 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
8115 underscore to be emitted on some ELF targets). For ease of use,
8116 we treat such symbols as local. */
8117 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 8118 return TRUE;
252b5132 8119
b1fa9dd6
NC
8120 /* Treat assembler generated fake symbols, dollar local labels and
8121 forward-backward labels (aka local labels) as locals.
8122 These labels have the form:
8123
8124 L0^A.* (fake symbols)
8125
8126 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
8127
8128 Versions which start with .L will have already been matched above,
8129 so we only need to match the rest. */
8130 if (name[0] == 'L' && ISDIGIT (name[1]))
8131 {
8132 bfd_boolean ret = FALSE;
8133 const char * p;
8134 char c;
8135
8136 for (p = name + 2; (c = *p); p++)
8137 {
8138 if (c == 1 || c == 2)
8139 {
8140 if (c == 1 && p == name + 2)
8141 /* A fake symbol. */
8142 return TRUE;
8143
8144 /* FIXME: We are being paranoid here and treating symbols like
8145 L0^Bfoo as if there were non-local, on the grounds that the
8146 assembler will never generate them. But can any symbol
8147 containing an ASCII value in the range 1-31 ever be anything
8148 other than some kind of local ? */
8149 ret = TRUE;
8150 }
8151
8152 if (! ISDIGIT (c))
8153 {
8154 ret = FALSE;
8155 break;
8156 }
8157 }
8158 return ret;
8159 }
ffa54770 8160
b34976b6 8161 return FALSE;
252b5132
RH
8162}
8163
8164alent *
217aa764
AM
8165_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
8166 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
8167{
8168 abort ();
8169 return NULL;
8170}
8171
b34976b6 8172bfd_boolean
217aa764
AM
8173_bfd_elf_set_arch_mach (bfd *abfd,
8174 enum bfd_architecture arch,
8175 unsigned long machine)
252b5132
RH
8176{
8177 /* If this isn't the right architecture for this backend, and this
8178 isn't the generic backend, fail. */
8179 if (arch != get_elf_backend_data (abfd)->arch
8180 && arch != bfd_arch_unknown
8181 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 8182 return FALSE;
252b5132
RH
8183
8184 return bfd_default_set_arch_mach (abfd, arch, machine);
8185}
8186
d1fad7c6
NC
8187/* Find the nearest line to a particular section and offset,
8188 for error reporting. */
8189
b34976b6 8190bfd_boolean
217aa764 8191_bfd_elf_find_nearest_line (bfd *abfd,
217aa764 8192 asymbol **symbols,
fb167eb2 8193 asection *section,
217aa764
AM
8194 bfd_vma offset,
8195 const char **filename_ptr,
8196 const char **functionname_ptr,
fb167eb2
AM
8197 unsigned int *line_ptr,
8198 unsigned int *discriminator_ptr)
d1fad7c6 8199{
b34976b6 8200 bfd_boolean found;
d1fad7c6 8201
fb167eb2 8202 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
4e8a9624 8203 filename_ptr, functionname_ptr,
fb167eb2
AM
8204 line_ptr, discriminator_ptr,
8205 dwarf_debug_sections, 0,
e00e8198
AM
8206 &elf_tdata (abfd)->dwarf2_find_line_info)
8207 || _bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
8208 filename_ptr, functionname_ptr,
8209 line_ptr))
d1fad7c6
NC
8210 {
8211 if (!*functionname_ptr)
e00e8198
AM
8212 _bfd_elf_find_function (abfd, symbols, section, offset,
8213 *filename_ptr ? NULL : filename_ptr,
8214 functionname_ptr);
b34976b6 8215 return TRUE;
d1fad7c6
NC
8216 }
8217
8218 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
8219 &found, filename_ptr,
8220 functionname_ptr, line_ptr,
8221 &elf_tdata (abfd)->line_info))
b34976b6 8222 return FALSE;
dc43ada5 8223 if (found && (*functionname_ptr || *line_ptr))
b34976b6 8224 return TRUE;
d1fad7c6
NC
8225
8226 if (symbols == NULL)
b34976b6 8227 return FALSE;
d1fad7c6 8228
e00e8198
AM
8229 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
8230 filename_ptr, functionname_ptr))
b34976b6 8231 return FALSE;
d1fad7c6 8232
252b5132 8233 *line_ptr = 0;
b34976b6 8234 return TRUE;
252b5132
RH
8235}
8236
5420f73d
L
8237/* Find the line for a symbol. */
8238
8239bfd_boolean
8240_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
8241 const char **filename_ptr, unsigned int *line_ptr)
9b8d1a36 8242{
fb167eb2
AM
8243 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
8244 filename_ptr, NULL, line_ptr, NULL,
8245 dwarf_debug_sections, 0,
8246 &elf_tdata (abfd)->dwarf2_find_line_info);
5420f73d
L
8247}
8248
4ab527b0
FF
8249/* After a call to bfd_find_nearest_line, successive calls to
8250 bfd_find_inliner_info can be used to get source information about
8251 each level of function inlining that terminated at the address
8252 passed to bfd_find_nearest_line. Currently this is only supported
8253 for DWARF2 with appropriate DWARF3 extensions. */
8254
8255bfd_boolean
8256_bfd_elf_find_inliner_info (bfd *abfd,
8257 const char **filename_ptr,
8258 const char **functionname_ptr,
8259 unsigned int *line_ptr)
8260{
8261 bfd_boolean found;
8262 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
8263 functionname_ptr, line_ptr,
8264 & elf_tdata (abfd)->dwarf2_find_line_info);
8265 return found;
8266}
8267
252b5132 8268int
a6b96beb 8269_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 8270{
8ded5a0f
AM
8271 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8272 int ret = bed->s->sizeof_ehdr;
252b5132 8273
0e1862bb 8274 if (!bfd_link_relocatable (info))
8ded5a0f 8275 {
12bd6957 8276 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 8277
62d7a5f6
AM
8278 if (phdr_size == (bfd_size_type) -1)
8279 {
8280 struct elf_segment_map *m;
8281
8282 phdr_size = 0;
12bd6957 8283 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62d7a5f6 8284 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 8285
62d7a5f6
AM
8286 if (phdr_size == 0)
8287 phdr_size = get_program_header_size (abfd, info);
8288 }
8ded5a0f 8289
12bd6957 8290 elf_program_header_size (abfd) = phdr_size;
8ded5a0f
AM
8291 ret += phdr_size;
8292 }
8293
252b5132
RH
8294 return ret;
8295}
8296
b34976b6 8297bfd_boolean
217aa764
AM
8298_bfd_elf_set_section_contents (bfd *abfd,
8299 sec_ptr section,
0f867abe 8300 const void *location,
217aa764
AM
8301 file_ptr offset,
8302 bfd_size_type count)
252b5132
RH
8303{
8304 Elf_Internal_Shdr *hdr;
1b6aeedb 8305 file_ptr pos;
252b5132
RH
8306
8307 if (! abfd->output_has_begun
217aa764 8308 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 8309 return FALSE;
252b5132 8310
0ce398f1
L
8311 if (!count)
8312 return TRUE;
8313
252b5132 8314 hdr = &elf_section_data (section)->this_hdr;
0ce398f1
L
8315 if (hdr->sh_offset == (file_ptr) -1)
8316 {
8317 /* We must compress this section. Write output to the buffer. */
8318 unsigned char *contents = hdr->contents;
8319 if ((offset + count) > hdr->sh_size
8320 || (section->flags & SEC_ELF_COMPRESS) == 0
8321 || contents == NULL)
8322 abort ();
8323 memcpy (contents + offset, location, count);
8324 return TRUE;
8325 }
dc810e39
AM
8326 pos = hdr->sh_offset + offset;
8327 if (bfd_seek (abfd, pos, SEEK_SET) != 0
8328 || bfd_bwrite (location, count, abfd) != count)
b34976b6 8329 return FALSE;
252b5132 8330
b34976b6 8331 return TRUE;
252b5132
RH
8332}
8333
8334void
217aa764
AM
8335_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
8336 arelent *cache_ptr ATTRIBUTE_UNUSED,
8337 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
8338{
8339 abort ();
8340}
8341
252b5132
RH
8342/* Try to convert a non-ELF reloc into an ELF one. */
8343
b34976b6 8344bfd_boolean
217aa764 8345_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 8346{
c044fabd 8347 /* Check whether we really have an ELF howto. */
252b5132
RH
8348
8349 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
8350 {
8351 bfd_reloc_code_real_type code;
8352 reloc_howto_type *howto;
8353
8354 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 8355 equivalent ELF reloc. */
252b5132
RH
8356
8357 if (areloc->howto->pc_relative)
8358 {
8359 switch (areloc->howto->bitsize)
8360 {
8361 case 8:
8362 code = BFD_RELOC_8_PCREL;
8363 break;
8364 case 12:
8365 code = BFD_RELOC_12_PCREL;
8366 break;
8367 case 16:
8368 code = BFD_RELOC_16_PCREL;
8369 break;
8370 case 24:
8371 code = BFD_RELOC_24_PCREL;
8372 break;
8373 case 32:
8374 code = BFD_RELOC_32_PCREL;
8375 break;
8376 case 64:
8377 code = BFD_RELOC_64_PCREL;
8378 break;
8379 default:
8380 goto fail;
8381 }
8382
8383 howto = bfd_reloc_type_lookup (abfd, code);
8384
8385 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
8386 {
8387 if (howto->pcrel_offset)
8388 areloc->addend += areloc->address;
8389 else
8390 areloc->addend -= areloc->address; /* addend is unsigned!! */
8391 }
8392 }
8393 else
8394 {
8395 switch (areloc->howto->bitsize)
8396 {
8397 case 8:
8398 code = BFD_RELOC_8;
8399 break;
8400 case 14:
8401 code = BFD_RELOC_14;
8402 break;
8403 case 16:
8404 code = BFD_RELOC_16;
8405 break;
8406 case 26:
8407 code = BFD_RELOC_26;
8408 break;
8409 case 32:
8410 code = BFD_RELOC_32;
8411 break;
8412 case 64:
8413 code = BFD_RELOC_64;
8414 break;
8415 default:
8416 goto fail;
8417 }
8418
8419 howto = bfd_reloc_type_lookup (abfd, code);
8420 }
8421
8422 if (howto)
8423 areloc->howto = howto;
8424 else
8425 goto fail;
8426 }
8427
b34976b6 8428 return TRUE;
252b5132
RH
8429
8430 fail:
8431 (*_bfd_error_handler)
d003868e
AM
8432 (_("%B: unsupported relocation type %s"),
8433 abfd, areloc->howto->name);
252b5132 8434 bfd_set_error (bfd_error_bad_value);
b34976b6 8435 return FALSE;
252b5132
RH
8436}
8437
b34976b6 8438bfd_boolean
217aa764 8439_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132 8440{
d9071b0c
TG
8441 struct elf_obj_tdata *tdata = elf_tdata (abfd);
8442 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
252b5132 8443 {
c0355132 8444 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 8445 _bfd_elf_strtab_free (elf_shstrtab (abfd));
d9071b0c 8446 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
252b5132
RH
8447 }
8448
8449 return _bfd_generic_close_and_cleanup (abfd);
8450}
8451
8452/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
8453 in the relocation's offset. Thus we cannot allow any sort of sanity
8454 range-checking to interfere. There is nothing else to do in processing
8455 this reloc. */
8456
8457bfd_reloc_status_type
217aa764
AM
8458_bfd_elf_rel_vtable_reloc_fn
8459 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 8460 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
8461 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
8462 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
8463{
8464 return bfd_reloc_ok;
8465}
252b5132
RH
8466\f
8467/* Elf core file support. Much of this only works on native
8468 toolchains, since we rely on knowing the
8469 machine-dependent procfs structure in order to pick
c044fabd 8470 out details about the corefile. */
252b5132
RH
8471
8472#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
8473/* Needed for new procfs interface on sparc-solaris. */
8474# define _STRUCTURED_PROC 1
252b5132
RH
8475# include <sys/procfs.h>
8476#endif
8477
261b8d08
PA
8478/* Return a PID that identifies a "thread" for threaded cores, or the
8479 PID of the main process for non-threaded cores. */
252b5132
RH
8480
8481static int
217aa764 8482elfcore_make_pid (bfd *abfd)
252b5132 8483{
261b8d08
PA
8484 int pid;
8485
228e534f 8486 pid = elf_tdata (abfd)->core->lwpid;
261b8d08 8487 if (pid == 0)
228e534f 8488 pid = elf_tdata (abfd)->core->pid;
261b8d08
PA
8489
8490 return pid;
252b5132
RH
8491}
8492
252b5132
RH
8493/* If there isn't a section called NAME, make one, using
8494 data from SECT. Note, this function will generate a
8495 reference to NAME, so you shouldn't deallocate or
c044fabd 8496 overwrite it. */
252b5132 8497
b34976b6 8498static bfd_boolean
217aa764 8499elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 8500{
c044fabd 8501 asection *sect2;
252b5132
RH
8502
8503 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 8504 return TRUE;
252b5132 8505
117ed4f8 8506 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 8507 if (sect2 == NULL)
b34976b6 8508 return FALSE;
252b5132 8509
eea6121a 8510 sect2->size = sect->size;
252b5132 8511 sect2->filepos = sect->filepos;
252b5132 8512 sect2->alignment_power = sect->alignment_power;
b34976b6 8513 return TRUE;
252b5132
RH
8514}
8515
bb0082d6
AM
8516/* Create a pseudosection containing SIZE bytes at FILEPOS. This
8517 actually creates up to two pseudosections:
8518 - For the single-threaded case, a section named NAME, unless
8519 such a section already exists.
8520 - For the multi-threaded case, a section named "NAME/PID", where
8521 PID is elfcore_make_pid (abfd).
8522 Both pseudosections have identical contents. */
b34976b6 8523bfd_boolean
217aa764
AM
8524_bfd_elfcore_make_pseudosection (bfd *abfd,
8525 char *name,
8526 size_t size,
8527 ufile_ptr filepos)
bb0082d6
AM
8528{
8529 char buf[100];
8530 char *threaded_name;
d4c88bbb 8531 size_t len;
bb0082d6
AM
8532 asection *sect;
8533
8534 /* Build the section name. */
8535
8536 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 8537 len = strlen (buf) + 1;
a50b1753 8538 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 8539 if (threaded_name == NULL)
b34976b6 8540 return FALSE;
d4c88bbb 8541 memcpy (threaded_name, buf, len);
bb0082d6 8542
117ed4f8
AM
8543 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
8544 SEC_HAS_CONTENTS);
bb0082d6 8545 if (sect == NULL)
b34976b6 8546 return FALSE;
eea6121a 8547 sect->size = size;
bb0082d6 8548 sect->filepos = filepos;
bb0082d6
AM
8549 sect->alignment_power = 2;
8550
936e320b 8551 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
8552}
8553
252b5132 8554/* prstatus_t exists on:
4a938328 8555 solaris 2.5+
252b5132
RH
8556 linux 2.[01] + glibc
8557 unixware 4.2
8558*/
8559
8560#if defined (HAVE_PRSTATUS_T)
a7b97311 8561
b34976b6 8562static bfd_boolean
217aa764 8563elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 8564{
eea6121a 8565 size_t size;
7ee38065 8566 int offset;
252b5132 8567
4a938328
MS
8568 if (note->descsz == sizeof (prstatus_t))
8569 {
8570 prstatus_t prstat;
252b5132 8571
eea6121a 8572 size = sizeof (prstat.pr_reg);
7ee38065 8573 offset = offsetof (prstatus_t, pr_reg);
4a938328 8574 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 8575
fa49d224
NC
8576 /* Do not overwrite the core signal if it
8577 has already been set by another thread. */
228e534f
AM
8578 if (elf_tdata (abfd)->core->signal == 0)
8579 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
8580 if (elf_tdata (abfd)->core->pid == 0)
8581 elf_tdata (abfd)->core->pid = prstat.pr_pid;
252b5132 8582
4a938328
MS
8583 /* pr_who exists on:
8584 solaris 2.5+
8585 unixware 4.2
8586 pr_who doesn't exist on:
8587 linux 2.[01]
8588 */
252b5132 8589#if defined (HAVE_PRSTATUS_T_PR_WHO)
228e534f 8590 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 8591#else
228e534f 8592 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
252b5132 8593#endif
4a938328 8594 }
7ee38065 8595#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
8596 else if (note->descsz == sizeof (prstatus32_t))
8597 {
8598 /* 64-bit host, 32-bit corefile */
8599 prstatus32_t prstat;
8600
eea6121a 8601 size = sizeof (prstat.pr_reg);
7ee38065 8602 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
8603 memcpy (&prstat, note->descdata, sizeof (prstat));
8604
fa49d224
NC
8605 /* Do not overwrite the core signal if it
8606 has already been set by another thread. */
228e534f
AM
8607 if (elf_tdata (abfd)->core->signal == 0)
8608 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
8609 if (elf_tdata (abfd)->core->pid == 0)
8610 elf_tdata (abfd)->core->pid = prstat.pr_pid;
4a938328
MS
8611
8612 /* pr_who exists on:
8613 solaris 2.5+
8614 unixware 4.2
8615 pr_who doesn't exist on:
8616 linux 2.[01]
8617 */
7ee38065 8618#if defined (HAVE_PRSTATUS32_T_PR_WHO)
228e534f 8619 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 8620#else
228e534f 8621 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
4a938328
MS
8622#endif
8623 }
7ee38065 8624#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
8625 else
8626 {
8627 /* Fail - we don't know how to handle any other
8628 note size (ie. data object type). */
b34976b6 8629 return TRUE;
4a938328 8630 }
252b5132 8631
bb0082d6 8632 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 8633 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 8634 size, note->descpos + offset);
252b5132
RH
8635}
8636#endif /* defined (HAVE_PRSTATUS_T) */
8637
bb0082d6 8638/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 8639static bfd_boolean
217aa764
AM
8640elfcore_make_note_pseudosection (bfd *abfd,
8641 char *name,
8642 Elf_Internal_Note *note)
252b5132 8643{
936e320b
AM
8644 return _bfd_elfcore_make_pseudosection (abfd, name,
8645 note->descsz, note->descpos);
252b5132
RH
8646}
8647
ff08c6bb
JB
8648/* There isn't a consistent prfpregset_t across platforms,
8649 but it doesn't matter, because we don't have to pick this
c044fabd
KH
8650 data structure apart. */
8651
b34976b6 8652static bfd_boolean
217aa764 8653elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8654{
8655 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8656}
8657
ff08c6bb 8658/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 8659 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 8660 literally. */
c044fabd 8661
b34976b6 8662static bfd_boolean
217aa764 8663elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8664{
8665 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8666}
8667
4339cae0
L
8668/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
8669 with a note type of NT_X86_XSTATE. Just include the whole note's
8670 contents literally. */
8671
8672static bfd_boolean
8673elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
8674{
8675 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
8676}
8677
97753bd5
AM
8678static bfd_boolean
8679elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
8680{
8681 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
8682}
8683
89eeb0bc
LM
8684static bfd_boolean
8685elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
8686{
8687 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
8688}
97753bd5 8689
0675e188
UW
8690static bfd_boolean
8691elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
8692{
8693 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
8694}
8695
d7eeb400
MS
8696static bfd_boolean
8697elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
8698{
8699 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
8700}
8701
8702static bfd_boolean
8703elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
8704{
8705 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
8706}
8707
8708static bfd_boolean
8709elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
8710{
8711 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
8712}
8713
8714static bfd_boolean
8715elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
8716{
8717 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
8718}
8719
8720static bfd_boolean
8721elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
8722{
8723 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
8724}
8725
355b81d9
UW
8726static bfd_boolean
8727elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
8728{
8729 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
8730}
8731
8732static bfd_boolean
8733elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
8734{
8735 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
8736}
8737
abb3f6cc
NC
8738static bfd_boolean
8739elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
8740{
8741 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
8742}
8743
4ef9f41a
AA
8744static bfd_boolean
8745elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
8746{
8747 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
8748}
8749
8750static bfd_boolean
8751elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
8752{
8753 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
8754}
8755
faa9a424
UW
8756static bfd_boolean
8757elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
8758{
8759 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
8760}
8761
652451f8
YZ
8762static bfd_boolean
8763elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
8764{
8765 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
8766}
8767
8768static bfd_boolean
8769elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
8770{
8771 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
8772}
8773
8774static bfd_boolean
8775elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
8776{
8777 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
8778}
8779
252b5132 8780#if defined (HAVE_PRPSINFO_T)
4a938328 8781typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 8782#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
8783typedef prpsinfo32_t elfcore_psinfo32_t;
8784#endif
252b5132
RH
8785#endif
8786
8787#if defined (HAVE_PSINFO_T)
4a938328 8788typedef psinfo_t elfcore_psinfo_t;
7ee38065 8789#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
8790typedef psinfo32_t elfcore_psinfo32_t;
8791#endif
252b5132
RH
8792#endif
8793
252b5132
RH
8794/* return a malloc'ed copy of a string at START which is at
8795 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 8796 the copy will always have a terminating '\0'. */
252b5132 8797
936e320b 8798char *
217aa764 8799_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 8800{
dc810e39 8801 char *dups;
a50b1753 8802 char *end = (char *) memchr (start, '\0', max);
dc810e39 8803 size_t len;
252b5132
RH
8804
8805 if (end == NULL)
8806 len = max;
8807 else
8808 len = end - start;
8809
a50b1753 8810 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 8811 if (dups == NULL)
252b5132
RH
8812 return NULL;
8813
dc810e39
AM
8814 memcpy (dups, start, len);
8815 dups[len] = '\0';
252b5132 8816
dc810e39 8817 return dups;
252b5132
RH
8818}
8819
bb0082d6 8820#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 8821static bfd_boolean
217aa764 8822elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 8823{
4a938328
MS
8824 if (note->descsz == sizeof (elfcore_psinfo_t))
8825 {
8826 elfcore_psinfo_t psinfo;
252b5132 8827
7ee38065 8828 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 8829
335e41d4 8830#if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
228e534f 8831 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 8832#endif
228e534f 8833 elf_tdata (abfd)->core->program
936e320b
AM
8834 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
8835 sizeof (psinfo.pr_fname));
252b5132 8836
228e534f 8837 elf_tdata (abfd)->core->command
936e320b
AM
8838 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
8839 sizeof (psinfo.pr_psargs));
4a938328 8840 }
7ee38065 8841#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
8842 else if (note->descsz == sizeof (elfcore_psinfo32_t))
8843 {
8844 /* 64-bit host, 32-bit corefile */
8845 elfcore_psinfo32_t psinfo;
8846
7ee38065 8847 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 8848
335e41d4 8849#if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
228e534f 8850 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 8851#endif
228e534f 8852 elf_tdata (abfd)->core->program
936e320b
AM
8853 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
8854 sizeof (psinfo.pr_fname));
4a938328 8855
228e534f 8856 elf_tdata (abfd)->core->command
936e320b
AM
8857 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
8858 sizeof (psinfo.pr_psargs));
4a938328
MS
8859 }
8860#endif
8861
8862 else
8863 {
8864 /* Fail - we don't know how to handle any other
8865 note size (ie. data object type). */
b34976b6 8866 return TRUE;
4a938328 8867 }
252b5132
RH
8868
8869 /* Note that for some reason, a spurious space is tacked
8870 onto the end of the args in some (at least one anyway)
c044fabd 8871 implementations, so strip it off if it exists. */
252b5132
RH
8872
8873 {
228e534f 8874 char *command = elf_tdata (abfd)->core->command;
252b5132
RH
8875 int n = strlen (command);
8876
8877 if (0 < n && command[n - 1] == ' ')
8878 command[n - 1] = '\0';
8879 }
8880
b34976b6 8881 return TRUE;
252b5132
RH
8882}
8883#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
8884
252b5132 8885#if defined (HAVE_PSTATUS_T)
b34976b6 8886static bfd_boolean
217aa764 8887elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 8888{
f572a39d
AM
8889 if (note->descsz == sizeof (pstatus_t)
8890#if defined (HAVE_PXSTATUS_T)
8891 || note->descsz == sizeof (pxstatus_t)
8892#endif
8893 )
4a938328
MS
8894 {
8895 pstatus_t pstat;
252b5132 8896
4a938328 8897 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 8898
228e534f 8899 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328 8900 }
7ee38065 8901#if defined (HAVE_PSTATUS32_T)
4a938328
MS
8902 else if (note->descsz == sizeof (pstatus32_t))
8903 {
8904 /* 64-bit host, 32-bit corefile */
8905 pstatus32_t pstat;
252b5132 8906
4a938328 8907 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 8908
228e534f 8909 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328
MS
8910 }
8911#endif
252b5132
RH
8912 /* Could grab some more details from the "representative"
8913 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 8914 NT_LWPSTATUS note, presumably. */
252b5132 8915
b34976b6 8916 return TRUE;
252b5132
RH
8917}
8918#endif /* defined (HAVE_PSTATUS_T) */
8919
252b5132 8920#if defined (HAVE_LWPSTATUS_T)
b34976b6 8921static bfd_boolean
217aa764 8922elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
8923{
8924 lwpstatus_t lwpstat;
8925 char buf[100];
c044fabd 8926 char *name;
d4c88bbb 8927 size_t len;
c044fabd 8928 asection *sect;
252b5132 8929
f572a39d
AM
8930 if (note->descsz != sizeof (lwpstat)
8931#if defined (HAVE_LWPXSTATUS_T)
8932 && note->descsz != sizeof (lwpxstatus_t)
8933#endif
8934 )
b34976b6 8935 return TRUE;
252b5132
RH
8936
8937 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
8938
228e534f 8939 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
a1504221
JB
8940 /* Do not overwrite the core signal if it has already been set by
8941 another thread. */
228e534f
AM
8942 if (elf_tdata (abfd)->core->signal == 0)
8943 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
252b5132 8944
c044fabd 8945 /* Make a ".reg/999" section. */
252b5132
RH
8946
8947 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 8948 len = strlen (buf) + 1;
217aa764 8949 name = bfd_alloc (abfd, len);
252b5132 8950 if (name == NULL)
b34976b6 8951 return FALSE;
d4c88bbb 8952 memcpy (name, buf, len);
252b5132 8953
117ed4f8 8954 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8955 if (sect == NULL)
b34976b6 8956 return FALSE;
252b5132
RH
8957
8958#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8959 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
8960 sect->filepos = note->descpos
8961 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
8962#endif
8963
8964#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 8965 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
8966 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
8967#endif
8968
252b5132
RH
8969 sect->alignment_power = 2;
8970
8971 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8972 return FALSE;
252b5132
RH
8973
8974 /* Make a ".reg2/999" section */
8975
8976 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 8977 len = strlen (buf) + 1;
217aa764 8978 name = bfd_alloc (abfd, len);
252b5132 8979 if (name == NULL)
b34976b6 8980 return FALSE;
d4c88bbb 8981 memcpy (name, buf, len);
252b5132 8982
117ed4f8 8983 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8984 if (sect == NULL)
b34976b6 8985 return FALSE;
252b5132
RH
8986
8987#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8988 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
8989 sect->filepos = note->descpos
8990 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
8991#endif
8992
8993#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 8994 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
8995 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
8996#endif
8997
252b5132
RH
8998 sect->alignment_power = 2;
8999
936e320b 9000 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
9001}
9002#endif /* defined (HAVE_LWPSTATUS_T) */
9003
b34976b6 9004static bfd_boolean
217aa764 9005elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
9006{
9007 char buf[30];
c044fabd 9008 char *name;
d4c88bbb 9009 size_t len;
c044fabd 9010 asection *sect;
4a6636fb
PA
9011 int type;
9012 int is_active_thread;
9013 bfd_vma base_addr;
16e9c715 9014
4a6636fb 9015 if (note->descsz < 728)
b34976b6 9016 return TRUE;
16e9c715 9017
4a6636fb
PA
9018 if (! CONST_STRNEQ (note->namedata, "win32"))
9019 return TRUE;
9020
9021 type = bfd_get_32 (abfd, note->descdata);
c044fabd 9022
4a6636fb 9023 switch (type)
16e9c715 9024 {
4a6636fb 9025 case 1 /* NOTE_INFO_PROCESS */:
228e534f 9026 /* FIXME: need to add ->core->command. */
4a6636fb 9027 /* process_info.pid */
228e534f 9028 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
4a6636fb 9029 /* process_info.signal */
228e534f 9030 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 9031 break;
16e9c715 9032
4a6636fb 9033 case 2 /* NOTE_INFO_THREAD */:
16e9c715 9034 /* Make a ".reg/999" section. */
4a6636fb
PA
9035 /* thread_info.tid */
9036 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 9037
d4c88bbb 9038 len = strlen (buf) + 1;
a50b1753 9039 name = (char *) bfd_alloc (abfd, len);
16e9c715 9040 if (name == NULL)
b34976b6 9041 return FALSE;
c044fabd 9042
d4c88bbb 9043 memcpy (name, buf, len);
16e9c715 9044
117ed4f8 9045 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 9046 if (sect == NULL)
b34976b6 9047 return FALSE;
c044fabd 9048
4a6636fb
PA
9049 /* sizeof (thread_info.thread_context) */
9050 sect->size = 716;
9051 /* offsetof (thread_info.thread_context) */
9052 sect->filepos = note->descpos + 12;
16e9c715
NC
9053 sect->alignment_power = 2;
9054
4a6636fb
PA
9055 /* thread_info.is_active_thread */
9056 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
9057
9058 if (is_active_thread)
16e9c715 9059 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9060 return FALSE;
16e9c715
NC
9061 break;
9062
4a6636fb 9063 case 3 /* NOTE_INFO_MODULE */:
16e9c715 9064 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
9065 /* module_info.base_address */
9066 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 9067 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 9068
d4c88bbb 9069 len = strlen (buf) + 1;
a50b1753 9070 name = (char *) bfd_alloc (abfd, len);
16e9c715 9071 if (name == NULL)
b34976b6 9072 return FALSE;
c044fabd 9073
d4c88bbb 9074 memcpy (name, buf, len);
252b5132 9075
117ed4f8 9076 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 9077
16e9c715 9078 if (sect == NULL)
b34976b6 9079 return FALSE;
c044fabd 9080
eea6121a 9081 sect->size = note->descsz;
16e9c715 9082 sect->filepos = note->descpos;
16e9c715
NC
9083 sect->alignment_power = 2;
9084 break;
9085
9086 default:
b34976b6 9087 return TRUE;
16e9c715
NC
9088 }
9089
b34976b6 9090 return TRUE;
16e9c715 9091}
252b5132 9092
b34976b6 9093static bfd_boolean
217aa764 9094elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 9095{
9c5bfbb7 9096 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 9097
252b5132
RH
9098 switch (note->type)
9099 {
9100 default:
b34976b6 9101 return TRUE;
252b5132 9102
252b5132 9103 case NT_PRSTATUS:
bb0082d6
AM
9104 if (bed->elf_backend_grok_prstatus)
9105 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 9106 return TRUE;
bb0082d6 9107#if defined (HAVE_PRSTATUS_T)
252b5132 9108 return elfcore_grok_prstatus (abfd, note);
bb0082d6 9109#else
b34976b6 9110 return TRUE;
252b5132
RH
9111#endif
9112
9113#if defined (HAVE_PSTATUS_T)
9114 case NT_PSTATUS:
9115 return elfcore_grok_pstatus (abfd, note);
9116#endif
9117
9118#if defined (HAVE_LWPSTATUS_T)
9119 case NT_LWPSTATUS:
9120 return elfcore_grok_lwpstatus (abfd, note);
9121#endif
9122
9123 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
9124 return elfcore_grok_prfpreg (abfd, note);
9125
c044fabd 9126 case NT_WIN32PSTATUS:
16e9c715 9127 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 9128
c044fabd 9129 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
9130 if (note->namesz == 6
9131 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
9132 return elfcore_grok_prxfpreg (abfd, note);
9133 else
b34976b6 9134 return TRUE;
ff08c6bb 9135
4339cae0
L
9136 case NT_X86_XSTATE: /* Linux XSAVE extension */
9137 if (note->namesz == 6
9138 && strcmp (note->namedata, "LINUX") == 0)
9139 return elfcore_grok_xstatereg (abfd, note);
97de3545
JB
9140 else if (note->namesz == 8
9141 && strcmp (note->namedata, "FreeBSD") == 0)
9142 return elfcore_grok_xstatereg (abfd, note);
4339cae0
L
9143 else
9144 return TRUE;
9145
97753bd5
AM
9146 case NT_PPC_VMX:
9147 if (note->namesz == 6
9148 && strcmp (note->namedata, "LINUX") == 0)
9149 return elfcore_grok_ppc_vmx (abfd, note);
9150 else
9151 return TRUE;
9152
89eeb0bc
LM
9153 case NT_PPC_VSX:
9154 if (note->namesz == 6
9155 && strcmp (note->namedata, "LINUX") == 0)
9156 return elfcore_grok_ppc_vsx (abfd, note);
9157 else
9158 return TRUE;
9159
0675e188
UW
9160 case NT_S390_HIGH_GPRS:
9161 if (note->namesz == 6
9162 && strcmp (note->namedata, "LINUX") == 0)
9163 return elfcore_grok_s390_high_gprs (abfd, note);
9164 else
9165 return TRUE;
9166
d7eeb400
MS
9167 case NT_S390_TIMER:
9168 if (note->namesz == 6
9169 && strcmp (note->namedata, "LINUX") == 0)
9170 return elfcore_grok_s390_timer (abfd, note);
9171 else
9172 return TRUE;
9173
9174 case NT_S390_TODCMP:
9175 if (note->namesz == 6
9176 && strcmp (note->namedata, "LINUX") == 0)
9177 return elfcore_grok_s390_todcmp (abfd, note);
9178 else
9179 return TRUE;
9180
9181 case NT_S390_TODPREG:
9182 if (note->namesz == 6
9183 && strcmp (note->namedata, "LINUX") == 0)
9184 return elfcore_grok_s390_todpreg (abfd, note);
9185 else
9186 return TRUE;
9187
9188 case NT_S390_CTRS:
9189 if (note->namesz == 6
9190 && strcmp (note->namedata, "LINUX") == 0)
9191 return elfcore_grok_s390_ctrs (abfd, note);
9192 else
9193 return TRUE;
9194
9195 case NT_S390_PREFIX:
9196 if (note->namesz == 6
9197 && strcmp (note->namedata, "LINUX") == 0)
9198 return elfcore_grok_s390_prefix (abfd, note);
9199 else
9200 return TRUE;
9201
355b81d9
UW
9202 case NT_S390_LAST_BREAK:
9203 if (note->namesz == 6
9204 && strcmp (note->namedata, "LINUX") == 0)
9205 return elfcore_grok_s390_last_break (abfd, note);
9206 else
9207 return TRUE;
9208
9209 case NT_S390_SYSTEM_CALL:
9210 if (note->namesz == 6
9211 && strcmp (note->namedata, "LINUX") == 0)
9212 return elfcore_grok_s390_system_call (abfd, note);
9213 else
9214 return TRUE;
9215
abb3f6cc
NC
9216 case NT_S390_TDB:
9217 if (note->namesz == 6
9218 && strcmp (note->namedata, "LINUX") == 0)
9219 return elfcore_grok_s390_tdb (abfd, note);
9220 else
9221 return TRUE;
9222
4ef9f41a
AA
9223 case NT_S390_VXRS_LOW:
9224 if (note->namesz == 6
9225 && strcmp (note->namedata, "LINUX") == 0)
9226 return elfcore_grok_s390_vxrs_low (abfd, note);
9227 else
9228 return TRUE;
9229
9230 case NT_S390_VXRS_HIGH:
9231 if (note->namesz == 6
9232 && strcmp (note->namedata, "LINUX") == 0)
9233 return elfcore_grok_s390_vxrs_high (abfd, note);
9234 else
9235 return TRUE;
9236
faa9a424
UW
9237 case NT_ARM_VFP:
9238 if (note->namesz == 6
9239 && strcmp (note->namedata, "LINUX") == 0)
9240 return elfcore_grok_arm_vfp (abfd, note);
9241 else
9242 return TRUE;
9243
652451f8
YZ
9244 case NT_ARM_TLS:
9245 if (note->namesz == 6
9246 && strcmp (note->namedata, "LINUX") == 0)
9247 return elfcore_grok_aarch_tls (abfd, note);
9248 else
9249 return TRUE;
9250
9251 case NT_ARM_HW_BREAK:
9252 if (note->namesz == 6
9253 && strcmp (note->namedata, "LINUX") == 0)
9254 return elfcore_grok_aarch_hw_break (abfd, note);
9255 else
9256 return TRUE;
9257
9258 case NT_ARM_HW_WATCH:
9259 if (note->namesz == 6
9260 && strcmp (note->namedata, "LINUX") == 0)
9261 return elfcore_grok_aarch_hw_watch (abfd, note);
9262 else
9263 return TRUE;
9264
252b5132
RH
9265 case NT_PRPSINFO:
9266 case NT_PSINFO:
bb0082d6
AM
9267 if (bed->elf_backend_grok_psinfo)
9268 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 9269 return TRUE;
bb0082d6 9270#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 9271 return elfcore_grok_psinfo (abfd, note);
bb0082d6 9272#else
b34976b6 9273 return TRUE;
252b5132 9274#endif
3333a7c3
RM
9275
9276 case NT_AUXV:
9277 {
117ed4f8
AM
9278 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9279 SEC_HAS_CONTENTS);
3333a7c3
RM
9280
9281 if (sect == NULL)
9282 return FALSE;
eea6121a 9283 sect->size = note->descsz;
3333a7c3 9284 sect->filepos = note->descpos;
3333a7c3
RM
9285 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9286
9287 return TRUE;
9288 }
9015683b 9289
451b7c33
TT
9290 case NT_FILE:
9291 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
9292 note);
9293
9015683b
TT
9294 case NT_SIGINFO:
9295 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
9296 note);
252b5132
RH
9297 }
9298}
9299
718175fa
JK
9300static bfd_boolean
9301elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
9302{
c74f7d1c 9303 struct bfd_build_id* build_id;
30e8ee25
AM
9304
9305 if (note->descsz == 0)
9306 return FALSE;
9307
c74f7d1c
JT
9308 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
9309 if (build_id == NULL)
718175fa
JK
9310 return FALSE;
9311
c74f7d1c
JT
9312 build_id->size = note->descsz;
9313 memcpy (build_id->data, note->descdata, note->descsz);
9314 abfd->build_id = build_id;
718175fa
JK
9315
9316 return TRUE;
9317}
9318
9319static bfd_boolean
9320elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
9321{
9322 switch (note->type)
9323 {
9324 default:
9325 return TRUE;
9326
9327 case NT_GNU_BUILD_ID:
9328 return elfobj_grok_gnu_build_id (abfd, note);
9329 }
9330}
9331
e21e5835
NC
9332static bfd_boolean
9333elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
9334{
9335 struct sdt_note *cur =
9336 (struct sdt_note *) bfd_alloc (abfd, sizeof (struct sdt_note)
9337 + note->descsz);
9338
9339 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
9340 cur->size = (bfd_size_type) note->descsz;
9341 memcpy (cur->data, note->descdata, note->descsz);
9342
9343 elf_tdata (abfd)->sdt_note_head = cur;
9344
9345 return TRUE;
9346}
9347
9348static bfd_boolean
9349elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
9350{
9351 switch (note->type)
9352 {
9353 case NT_STAPSDT:
9354 return elfobj_grok_stapsdt_note_1 (abfd, note);
9355
9356 default:
9357 return TRUE;
9358 }
9359}
9360
b34976b6 9361static bfd_boolean
217aa764 9362elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
9363{
9364 char *cp;
9365
9366 cp = strchr (note->namedata, '@');
9367 if (cp != NULL)
9368 {
d2b64500 9369 *lwpidp = atoi(cp + 1);
b34976b6 9370 return TRUE;
50b2bdb7 9371 }
b34976b6 9372 return FALSE;
50b2bdb7
AM
9373}
9374
b34976b6 9375static bfd_boolean
217aa764 9376elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 9377{
50b2bdb7 9378 /* Signal number at offset 0x08. */
228e534f 9379 elf_tdata (abfd)->core->signal
50b2bdb7
AM
9380 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
9381
9382 /* Process ID at offset 0x50. */
228e534f 9383 elf_tdata (abfd)->core->pid
50b2bdb7
AM
9384 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
9385
9386 /* Command name at 0x7c (max 32 bytes, including nul). */
228e534f 9387 elf_tdata (abfd)->core->command
50b2bdb7
AM
9388 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
9389
7720ba9f
MK
9390 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
9391 note);
50b2bdb7
AM
9392}
9393
b34976b6 9394static bfd_boolean
217aa764 9395elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
9396{
9397 int lwp;
9398
9399 if (elfcore_netbsd_get_lwpid (note, &lwp))
228e534f 9400 elf_tdata (abfd)->core->lwpid = lwp;
50b2bdb7 9401
b4db1224 9402 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
9403 {
9404 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
9405 find this note before any of the others, which is fine,
9406 since the kernel writes this note out first when it
9407 creates a core file. */
47d9a591 9408
50b2bdb7
AM
9409 return elfcore_grok_netbsd_procinfo (abfd, note);
9410 }
9411
b4db1224
JT
9412 /* As of Jan 2002 there are no other machine-independent notes
9413 defined for NetBSD core files. If the note type is less
9414 than the start of the machine-dependent note types, we don't
9415 understand it. */
47d9a591 9416
b4db1224 9417 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 9418 return TRUE;
50b2bdb7
AM
9419
9420
9421 switch (bfd_get_arch (abfd))
9422 {
08a40648
AM
9423 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
9424 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
9425
9426 case bfd_arch_alpha:
9427 case bfd_arch_sparc:
9428 switch (note->type)
08a40648
AM
9429 {
9430 case NT_NETBSDCORE_FIRSTMACH+0:
9431 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 9432
08a40648
AM
9433 case NT_NETBSDCORE_FIRSTMACH+2:
9434 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 9435
08a40648
AM
9436 default:
9437 return TRUE;
9438 }
50b2bdb7 9439
08a40648
AM
9440 /* On all other arch's, PT_GETREGS == mach+1 and
9441 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
9442
9443 default:
9444 switch (note->type)
08a40648
AM
9445 {
9446 case NT_NETBSDCORE_FIRSTMACH+1:
9447 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 9448
08a40648
AM
9449 case NT_NETBSDCORE_FIRSTMACH+3:
9450 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 9451
08a40648
AM
9452 default:
9453 return TRUE;
9454 }
50b2bdb7
AM
9455 }
9456 /* NOTREACHED */
9457}
9458
67cc5033
MK
9459static bfd_boolean
9460elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
9461{
9462 /* Signal number at offset 0x08. */
228e534f 9463 elf_tdata (abfd)->core->signal
67cc5033
MK
9464 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
9465
9466 /* Process ID at offset 0x20. */
228e534f 9467 elf_tdata (abfd)->core->pid
67cc5033
MK
9468 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
9469
9470 /* Command name at 0x48 (max 32 bytes, including nul). */
228e534f 9471 elf_tdata (abfd)->core->command
67cc5033
MK
9472 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
9473
9474 return TRUE;
9475}
9476
9477static bfd_boolean
9478elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
9479{
9480 if (note->type == NT_OPENBSD_PROCINFO)
9481 return elfcore_grok_openbsd_procinfo (abfd, note);
9482
9483 if (note->type == NT_OPENBSD_REGS)
9484 return elfcore_make_note_pseudosection (abfd, ".reg", note);
9485
9486 if (note->type == NT_OPENBSD_FPREGS)
9487 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9488
9489 if (note->type == NT_OPENBSD_XFPREGS)
9490 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9491
9492 if (note->type == NT_OPENBSD_AUXV)
9493 {
9494 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9495 SEC_HAS_CONTENTS);
9496
9497 if (sect == NULL)
9498 return FALSE;
9499 sect->size = note->descsz;
9500 sect->filepos = note->descpos;
9501 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9502
9503 return TRUE;
9504 }
9505
9506 if (note->type == NT_OPENBSD_WCOOKIE)
9507 {
9508 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
9509 SEC_HAS_CONTENTS);
9510
9511 if (sect == NULL)
9512 return FALSE;
9513 sect->size = note->descsz;
9514 sect->filepos = note->descpos;
9515 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9516
9517 return TRUE;
9518 }
9519
9520 return TRUE;
9521}
9522
07c6e936 9523static bfd_boolean
d3fd4074 9524elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
9525{
9526 void *ddata = note->descdata;
9527 char buf[100];
9528 char *name;
9529 asection *sect;
f8843e87
AM
9530 short sig;
9531 unsigned flags;
07c6e936
NC
9532
9533 /* nto_procfs_status 'pid' field is at offset 0. */
228e534f 9534 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
07c6e936 9535
f8843e87
AM
9536 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
9537 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
9538
9539 /* nto_procfs_status 'flags' field is at offset 8. */
9540 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
9541
9542 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
9543 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
9544 {
228e534f
AM
9545 elf_tdata (abfd)->core->signal = sig;
9546 elf_tdata (abfd)->core->lwpid = *tid;
f8843e87 9547 }
07c6e936 9548
f8843e87
AM
9549 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
9550 do not come from signals so we make sure we set the current
9551 thread just in case. */
9552 if (flags & 0x00000080)
228e534f 9553 elf_tdata (abfd)->core->lwpid = *tid;
07c6e936
NC
9554
9555 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 9556 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 9557
a50b1753 9558 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
9559 if (name == NULL)
9560 return FALSE;
9561 strcpy (name, buf);
9562
117ed4f8 9563 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
9564 if (sect == NULL)
9565 return FALSE;
9566
eea6121a 9567 sect->size = note->descsz;
07c6e936 9568 sect->filepos = note->descpos;
07c6e936
NC
9569 sect->alignment_power = 2;
9570
9571 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
9572}
9573
9574static bfd_boolean
d69f560c
KW
9575elfcore_grok_nto_regs (bfd *abfd,
9576 Elf_Internal_Note *note,
d3fd4074 9577 long tid,
d69f560c 9578 char *base)
07c6e936
NC
9579{
9580 char buf[100];
9581 char *name;
9582 asection *sect;
9583
d69f560c 9584 /* Make a "(base)/%d" section. */
d3fd4074 9585 sprintf (buf, "%s/%ld", base, tid);
07c6e936 9586
a50b1753 9587 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
9588 if (name == NULL)
9589 return FALSE;
9590 strcpy (name, buf);
9591
117ed4f8 9592 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
9593 if (sect == NULL)
9594 return FALSE;
9595
eea6121a 9596 sect->size = note->descsz;
07c6e936 9597 sect->filepos = note->descpos;
07c6e936
NC
9598 sect->alignment_power = 2;
9599
f8843e87 9600 /* This is the current thread. */
228e534f 9601 if (elf_tdata (abfd)->core->lwpid == tid)
d69f560c 9602 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
9603
9604 return TRUE;
07c6e936
NC
9605}
9606
9607#define BFD_QNT_CORE_INFO 7
9608#define BFD_QNT_CORE_STATUS 8
9609#define BFD_QNT_CORE_GREG 9
9610#define BFD_QNT_CORE_FPREG 10
9611
9612static bfd_boolean
217aa764 9613elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
9614{
9615 /* Every GREG section has a STATUS section before it. Store the
811072d8 9616 tid from the previous call to pass down to the next gregs
07c6e936 9617 function. */
d3fd4074 9618 static long tid = 1;
07c6e936
NC
9619
9620 switch (note->type)
9621 {
d69f560c
KW
9622 case BFD_QNT_CORE_INFO:
9623 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
9624 case BFD_QNT_CORE_STATUS:
9625 return elfcore_grok_nto_status (abfd, note, &tid);
9626 case BFD_QNT_CORE_GREG:
9627 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
9628 case BFD_QNT_CORE_FPREG:
9629 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
9630 default:
9631 return TRUE;
07c6e936
NC
9632 }
9633}
9634
b15fa79e
AM
9635static bfd_boolean
9636elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
9637{
9638 char *name;
9639 asection *sect;
9640 size_t len;
9641
9642 /* Use note name as section name. */
9643 len = note->namesz;
a50b1753 9644 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
9645 if (name == NULL)
9646 return FALSE;
9647 memcpy (name, note->namedata, len);
9648 name[len - 1] = '\0';
9649
9650 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
9651 if (sect == NULL)
9652 return FALSE;
9653
9654 sect->size = note->descsz;
9655 sect->filepos = note->descpos;
9656 sect->alignment_power = 1;
9657
9658 return TRUE;
9659}
9660
7c76fa91
MS
9661/* Function: elfcore_write_note
9662
47d9a591 9663 Inputs:
a39f3346 9664 buffer to hold note, and current size of buffer
7c76fa91
MS
9665 name of note
9666 type of note
9667 data for note
9668 size of data for note
9669
a39f3346
AM
9670 Writes note to end of buffer. ELF64 notes are written exactly as
9671 for ELF32, despite the current (as of 2006) ELF gabi specifying
9672 that they ought to have 8-byte namesz and descsz field, and have
9673 8-byte alignment. Other writers, eg. Linux kernel, do the same.
9674
7c76fa91 9675 Return:
a39f3346 9676 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
9677
9678char *
a39f3346 9679elfcore_write_note (bfd *abfd,
217aa764 9680 char *buf,
a39f3346 9681 int *bufsiz,
217aa764 9682 const char *name,
a39f3346 9683 int type,
217aa764 9684 const void *input,
a39f3346 9685 int size)
7c76fa91
MS
9686{
9687 Elf_External_Note *xnp;
d4c88bbb 9688 size_t namesz;
d4c88bbb 9689 size_t newspace;
a39f3346 9690 char *dest;
7c76fa91 9691
d4c88bbb 9692 namesz = 0;
d4c88bbb 9693 if (name != NULL)
a39f3346 9694 namesz = strlen (name) + 1;
d4c88bbb 9695
a39f3346 9696 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 9697
a50b1753 9698 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
9699 if (buf == NULL)
9700 return buf;
a39f3346 9701 dest = buf + *bufsiz;
7c76fa91
MS
9702 *bufsiz += newspace;
9703 xnp = (Elf_External_Note *) dest;
9704 H_PUT_32 (abfd, namesz, xnp->namesz);
9705 H_PUT_32 (abfd, size, xnp->descsz);
9706 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
9707 dest = xnp->name;
9708 if (name != NULL)
9709 {
9710 memcpy (dest, name, namesz);
9711 dest += namesz;
a39f3346 9712 while (namesz & 3)
d4c88bbb
AM
9713 {
9714 *dest++ = '\0';
a39f3346 9715 ++namesz;
d4c88bbb
AM
9716 }
9717 }
9718 memcpy (dest, input, size);
a39f3346
AM
9719 dest += size;
9720 while (size & 3)
9721 {
9722 *dest++ = '\0';
9723 ++size;
9724 }
9725 return buf;
7c76fa91
MS
9726}
9727
7c76fa91 9728char *
217aa764
AM
9729elfcore_write_prpsinfo (bfd *abfd,
9730 char *buf,
9731 int *bufsiz,
9732 const char *fname,
9733 const char *psargs)
7c76fa91 9734{
183e98be
AM
9735 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9736
9737 if (bed->elf_backend_write_core_note != NULL)
9738 {
9739 char *ret;
9740 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
9741 NT_PRPSINFO, fname, psargs);
9742 if (ret != NULL)
9743 return ret;
9744 }
7c76fa91 9745
1f20dca5 9746#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
183e98be
AM
9747#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
9748 if (bed->s->elfclass == ELFCLASS32)
9749 {
9750#if defined (HAVE_PSINFO32_T)
9751 psinfo32_t data;
9752 int note_type = NT_PSINFO;
9753#else
9754 prpsinfo32_t data;
9755 int note_type = NT_PRPSINFO;
9756#endif
9757
9758 memset (&data, 0, sizeof (data));
9759 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
9760 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
9761 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 9762 "CORE", note_type, &data, sizeof (data));
183e98be
AM
9763 }
9764 else
9765#endif
9766 {
7c76fa91 9767#if defined (HAVE_PSINFO_T)
183e98be
AM
9768 psinfo_t data;
9769 int note_type = NT_PSINFO;
7c76fa91 9770#else
183e98be
AM
9771 prpsinfo_t data;
9772 int note_type = NT_PRPSINFO;
7c76fa91
MS
9773#endif
9774
183e98be
AM
9775 memset (&data, 0, sizeof (data));
9776 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
9777 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
9778 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 9779 "CORE", note_type, &data, sizeof (data));
183e98be 9780 }
7c76fa91
MS
9781#endif /* PSINFO_T or PRPSINFO_T */
9782
1f20dca5
UW
9783 free (buf);
9784 return NULL;
9785}
9786
70a38d42
SDJ
9787char *
9788elfcore_write_linux_prpsinfo32
9789 (bfd *abfd, char *buf, int *bufsiz,
9790 const struct elf_internal_linux_prpsinfo *prpsinfo)
9791{
9792 struct elf_external_linux_prpsinfo32 data;
9793
9794 memset (&data, 0, sizeof (data));
9795 LINUX_PRPSINFO32_SWAP_FIELDS (abfd, prpsinfo, data);
9796
9797 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
9798 &data, sizeof (data));
9799}
9800
9801char *
9802elfcore_write_linux_prpsinfo64
9803 (bfd *abfd, char *buf, int *bufsiz,
9804 const struct elf_internal_linux_prpsinfo *prpsinfo)
9805{
9806 struct elf_external_linux_prpsinfo64 data;
9807
9808 memset (&data, 0, sizeof (data));
9809 LINUX_PRPSINFO64_SWAP_FIELDS (abfd, prpsinfo, data);
9810
9811 return elfcore_write_note (abfd, buf, bufsiz,
9812 "CORE", NT_PRPSINFO, &data, sizeof (data));
9813}
9814
7c76fa91 9815char *
217aa764
AM
9816elfcore_write_prstatus (bfd *abfd,
9817 char *buf,
9818 int *bufsiz,
9819 long pid,
9820 int cursig,
9821 const void *gregs)
7c76fa91 9822{
183e98be 9823 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 9824
183e98be
AM
9825 if (bed->elf_backend_write_core_note != NULL)
9826 {
9827 char *ret;
9828 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
9829 NT_PRSTATUS,
9830 pid, cursig, gregs);
9831 if (ret != NULL)
9832 return ret;
9833 }
9834
1f20dca5 9835#if defined (HAVE_PRSTATUS_T)
183e98be
AM
9836#if defined (HAVE_PRSTATUS32_T)
9837 if (bed->s->elfclass == ELFCLASS32)
9838 {
9839 prstatus32_t prstat;
9840
9841 memset (&prstat, 0, sizeof (prstat));
9842 prstat.pr_pid = pid;
9843 prstat.pr_cursig = cursig;
9844 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 9845 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
9846 NT_PRSTATUS, &prstat, sizeof (prstat));
9847 }
9848 else
9849#endif
9850 {
9851 prstatus_t prstat;
9852
9853 memset (&prstat, 0, sizeof (prstat));
9854 prstat.pr_pid = pid;
9855 prstat.pr_cursig = cursig;
9856 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 9857 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
9858 NT_PRSTATUS, &prstat, sizeof (prstat));
9859 }
7c76fa91
MS
9860#endif /* HAVE_PRSTATUS_T */
9861
1f20dca5
UW
9862 free (buf);
9863 return NULL;
9864}
9865
51316059
MS
9866#if defined (HAVE_LWPSTATUS_T)
9867char *
217aa764
AM
9868elfcore_write_lwpstatus (bfd *abfd,
9869 char *buf,
9870 int *bufsiz,
9871 long pid,
9872 int cursig,
9873 const void *gregs)
51316059
MS
9874{
9875 lwpstatus_t lwpstat;
183e98be 9876 const char *note_name = "CORE";
51316059
MS
9877
9878 memset (&lwpstat, 0, sizeof (lwpstat));
9879 lwpstat.pr_lwpid = pid >> 16;
9880 lwpstat.pr_cursig = cursig;
9881#if defined (HAVE_LWPSTATUS_T_PR_REG)
d1e8523e 9882 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
51316059
MS
9883#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
9884#if !defined(gregs)
9885 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
9886 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
9887#else
9888 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
9889 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
9890#endif
9891#endif
47d9a591 9892 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
9893 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
9894}
9895#endif /* HAVE_LWPSTATUS_T */
9896
7c76fa91
MS
9897#if defined (HAVE_PSTATUS_T)
9898char *
217aa764
AM
9899elfcore_write_pstatus (bfd *abfd,
9900 char *buf,
9901 int *bufsiz,
9902 long pid,
6c10990d
NC
9903 int cursig ATTRIBUTE_UNUSED,
9904 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 9905{
183e98be
AM
9906 const char *note_name = "CORE";
9907#if defined (HAVE_PSTATUS32_T)
9908 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 9909
183e98be
AM
9910 if (bed->s->elfclass == ELFCLASS32)
9911 {
9912 pstatus32_t pstat;
9913
9914 memset (&pstat, 0, sizeof (pstat));
9915 pstat.pr_pid = pid & 0xffff;
9916 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
9917 NT_PSTATUS, &pstat, sizeof (pstat));
9918 return buf;
9919 }
9920 else
9921#endif
9922 {
9923 pstatus_t pstat;
9924
9925 memset (&pstat, 0, sizeof (pstat));
9926 pstat.pr_pid = pid & 0xffff;
9927 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
9928 NT_PSTATUS, &pstat, sizeof (pstat));
9929 return buf;
9930 }
7c76fa91
MS
9931}
9932#endif /* HAVE_PSTATUS_T */
9933
9934char *
217aa764
AM
9935elfcore_write_prfpreg (bfd *abfd,
9936 char *buf,
9937 int *bufsiz,
9938 const void *fpregs,
9939 int size)
7c76fa91 9940{
183e98be 9941 const char *note_name = "CORE";
47d9a591 9942 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
9943 note_name, NT_FPREGSET, fpregs, size);
9944}
9945
9946char *
217aa764
AM
9947elfcore_write_prxfpreg (bfd *abfd,
9948 char *buf,
9949 int *bufsiz,
9950 const void *xfpregs,
9951 int size)
7c76fa91
MS
9952{
9953 char *note_name = "LINUX";
47d9a591 9954 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
9955 note_name, NT_PRXFPREG, xfpregs, size);
9956}
9957
4339cae0
L
9958char *
9959elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
9960 const void *xfpregs, int size)
9961{
97de3545
JB
9962 char *note_name;
9963 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
9964 note_name = "FreeBSD";
9965 else
9966 note_name = "LINUX";
4339cae0
L
9967 return elfcore_write_note (abfd, buf, bufsiz,
9968 note_name, NT_X86_XSTATE, xfpregs, size);
9969}
9970
97753bd5
AM
9971char *
9972elfcore_write_ppc_vmx (bfd *abfd,
9973 char *buf,
9974 int *bufsiz,
9975 const void *ppc_vmx,
9976 int size)
9977{
9978 char *note_name = "LINUX";
9979 return elfcore_write_note (abfd, buf, bufsiz,
9980 note_name, NT_PPC_VMX, ppc_vmx, size);
9981}
9982
89eeb0bc
LM
9983char *
9984elfcore_write_ppc_vsx (bfd *abfd,
9985 char *buf,
9986 int *bufsiz,
9987 const void *ppc_vsx,
9988 int size)
9989{
9990 char *note_name = "LINUX";
9991 return elfcore_write_note (abfd, buf, bufsiz,
9992 note_name, NT_PPC_VSX, ppc_vsx, size);
9993}
9994
0675e188
UW
9995static char *
9996elfcore_write_s390_high_gprs (bfd *abfd,
9997 char *buf,
9998 int *bufsiz,
9999 const void *s390_high_gprs,
10000 int size)
10001{
10002 char *note_name = "LINUX";
10003 return elfcore_write_note (abfd, buf, bufsiz,
10004 note_name, NT_S390_HIGH_GPRS,
10005 s390_high_gprs, size);
10006}
10007
d7eeb400
MS
10008char *
10009elfcore_write_s390_timer (bfd *abfd,
10010 char *buf,
10011 int *bufsiz,
10012 const void *s390_timer,
10013 int size)
10014{
10015 char *note_name = "LINUX";
10016 return elfcore_write_note (abfd, buf, bufsiz,
10017 note_name, NT_S390_TIMER, s390_timer, size);
10018}
10019
10020char *
10021elfcore_write_s390_todcmp (bfd *abfd,
10022 char *buf,
10023 int *bufsiz,
10024 const void *s390_todcmp,
10025 int size)
10026{
10027 char *note_name = "LINUX";
10028 return elfcore_write_note (abfd, buf, bufsiz,
10029 note_name, NT_S390_TODCMP, s390_todcmp, size);
10030}
10031
10032char *
10033elfcore_write_s390_todpreg (bfd *abfd,
10034 char *buf,
10035 int *bufsiz,
10036 const void *s390_todpreg,
10037 int size)
10038{
10039 char *note_name = "LINUX";
10040 return elfcore_write_note (abfd, buf, bufsiz,
10041 note_name, NT_S390_TODPREG, s390_todpreg, size);
10042}
10043
10044char *
10045elfcore_write_s390_ctrs (bfd *abfd,
10046 char *buf,
10047 int *bufsiz,
10048 const void *s390_ctrs,
10049 int size)
10050{
10051 char *note_name = "LINUX";
10052 return elfcore_write_note (abfd, buf, bufsiz,
10053 note_name, NT_S390_CTRS, s390_ctrs, size);
10054}
10055
10056char *
10057elfcore_write_s390_prefix (bfd *abfd,
10058 char *buf,
10059 int *bufsiz,
10060 const void *s390_prefix,
10061 int size)
10062{
10063 char *note_name = "LINUX";
10064 return elfcore_write_note (abfd, buf, bufsiz,
10065 note_name, NT_S390_PREFIX, s390_prefix, size);
10066}
10067
355b81d9
UW
10068char *
10069elfcore_write_s390_last_break (bfd *abfd,
10070 char *buf,
10071 int *bufsiz,
10072 const void *s390_last_break,
10073 int size)
10074{
10075 char *note_name = "LINUX";
10076 return elfcore_write_note (abfd, buf, bufsiz,
10077 note_name, NT_S390_LAST_BREAK,
10078 s390_last_break, size);
10079}
10080
10081char *
10082elfcore_write_s390_system_call (bfd *abfd,
10083 char *buf,
10084 int *bufsiz,
10085 const void *s390_system_call,
10086 int size)
10087{
10088 char *note_name = "LINUX";
10089 return elfcore_write_note (abfd, buf, bufsiz,
10090 note_name, NT_S390_SYSTEM_CALL,
10091 s390_system_call, size);
10092}
10093
abb3f6cc
NC
10094char *
10095elfcore_write_s390_tdb (bfd *abfd,
10096 char *buf,
10097 int *bufsiz,
10098 const void *s390_tdb,
10099 int size)
10100{
10101 char *note_name = "LINUX";
10102 return elfcore_write_note (abfd, buf, bufsiz,
10103 note_name, NT_S390_TDB, s390_tdb, size);
10104}
10105
4ef9f41a
AA
10106char *
10107elfcore_write_s390_vxrs_low (bfd *abfd,
10108 char *buf,
10109 int *bufsiz,
10110 const void *s390_vxrs_low,
10111 int size)
10112{
10113 char *note_name = "LINUX";
10114 return elfcore_write_note (abfd, buf, bufsiz,
10115 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
10116}
10117
10118char *
10119elfcore_write_s390_vxrs_high (bfd *abfd,
10120 char *buf,
10121 int *bufsiz,
10122 const void *s390_vxrs_high,
10123 int size)
10124{
10125 char *note_name = "LINUX";
10126 return elfcore_write_note (abfd, buf, bufsiz,
10127 note_name, NT_S390_VXRS_HIGH,
10128 s390_vxrs_high, size);
10129}
10130
faa9a424
UW
10131char *
10132elfcore_write_arm_vfp (bfd *abfd,
10133 char *buf,
10134 int *bufsiz,
10135 const void *arm_vfp,
10136 int size)
10137{
10138 char *note_name = "LINUX";
10139 return elfcore_write_note (abfd, buf, bufsiz,
10140 note_name, NT_ARM_VFP, arm_vfp, size);
10141}
10142
652451f8
YZ
10143char *
10144elfcore_write_aarch_tls (bfd *abfd,
10145 char *buf,
10146 int *bufsiz,
10147 const void *aarch_tls,
10148 int size)
10149{
10150 char *note_name = "LINUX";
10151 return elfcore_write_note (abfd, buf, bufsiz,
10152 note_name, NT_ARM_TLS, aarch_tls, size);
10153}
10154
10155char *
10156elfcore_write_aarch_hw_break (bfd *abfd,
10157 char *buf,
10158 int *bufsiz,
10159 const void *aarch_hw_break,
10160 int size)
10161{
10162 char *note_name = "LINUX";
10163 return elfcore_write_note (abfd, buf, bufsiz,
10164 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
10165}
10166
10167char *
10168elfcore_write_aarch_hw_watch (bfd *abfd,
10169 char *buf,
10170 int *bufsiz,
10171 const void *aarch_hw_watch,
10172 int size)
10173{
10174 char *note_name = "LINUX";
10175 return elfcore_write_note (abfd, buf, bufsiz,
10176 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
10177}
10178
bb864ac1
CES
10179char *
10180elfcore_write_register_note (bfd *abfd,
10181 char *buf,
10182 int *bufsiz,
10183 const char *section,
10184 const void *data,
10185 int size)
10186{
10187 if (strcmp (section, ".reg2") == 0)
10188 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
10189 if (strcmp (section, ".reg-xfp") == 0)
10190 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
10191 if (strcmp (section, ".reg-xstate") == 0)
10192 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
10193 if (strcmp (section, ".reg-ppc-vmx") == 0)
10194 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
10195 if (strcmp (section, ".reg-ppc-vsx") == 0)
10196 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
10197 if (strcmp (section, ".reg-s390-high-gprs") == 0)
10198 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
10199 if (strcmp (section, ".reg-s390-timer") == 0)
10200 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
10201 if (strcmp (section, ".reg-s390-todcmp") == 0)
10202 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
10203 if (strcmp (section, ".reg-s390-todpreg") == 0)
10204 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
10205 if (strcmp (section, ".reg-s390-ctrs") == 0)
10206 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
10207 if (strcmp (section, ".reg-s390-prefix") == 0)
10208 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
355b81d9
UW
10209 if (strcmp (section, ".reg-s390-last-break") == 0)
10210 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
10211 if (strcmp (section, ".reg-s390-system-call") == 0)
10212 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
abb3f6cc
NC
10213 if (strcmp (section, ".reg-s390-tdb") == 0)
10214 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
4ef9f41a
AA
10215 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
10216 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
10217 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
10218 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
faa9a424
UW
10219 if (strcmp (section, ".reg-arm-vfp") == 0)
10220 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
652451f8
YZ
10221 if (strcmp (section, ".reg-aarch-tls") == 0)
10222 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
10223 if (strcmp (section, ".reg-aarch-hw-break") == 0)
10224 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
10225 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
10226 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
bb864ac1
CES
10227 return NULL;
10228}
10229
b34976b6 10230static bfd_boolean
718175fa 10231elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 10232{
c044fabd 10233 char *p;
252b5132 10234
252b5132
RH
10235 p = buf;
10236 while (p < buf + size)
10237 {
c044fabd
KH
10238 /* FIXME: bad alignment assumption. */
10239 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
10240 Elf_Internal_Note in;
10241
baea7ef1
AM
10242 if (offsetof (Elf_External_Note, name) > buf - p + size)
10243 return FALSE;
10244
dc810e39 10245 in.type = H_GET_32 (abfd, xnp->type);
252b5132 10246
dc810e39 10247 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 10248 in.namedata = xnp->name;
baea7ef1
AM
10249 if (in.namesz > buf - in.namedata + size)
10250 return FALSE;
252b5132 10251
dc810e39 10252 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
10253 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
10254 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
10255 if (in.descsz != 0
10256 && (in.descdata >= buf + size
10257 || in.descsz > buf - in.descdata + size))
10258 return FALSE;
252b5132 10259
718175fa
JK
10260 switch (bfd_get_format (abfd))
10261 {
10262 default:
10263 return TRUE;
10264
10265 case bfd_core:
f64e188b 10266 {
8acbedd6 10267#define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
f64e188b 10268 struct
718175fa 10269 {
f64e188b 10270 const char * string;
8acbedd6 10271 size_t len;
f64e188b 10272 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
718175fa 10273 }
f64e188b 10274 grokers[] =
b15fa79e 10275 {
8acbedd6
KS
10276 GROKER_ELEMENT ("", elfcore_grok_note),
10277 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
10278 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
10279 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
10280 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note)
f64e188b 10281 };
8acbedd6 10282#undef GROKER_ELEMENT
f64e188b
NC
10283 int i;
10284
10285 for (i = ARRAY_SIZE (grokers); i--;)
8acbedd6
KS
10286 {
10287 if (in.namesz >= grokers[i].len
10288 && strncmp (in.namedata, grokers[i].string,
10289 grokers[i].len) == 0)
10290 {
10291 if (! grokers[i].func (abfd, & in))
10292 return FALSE;
10293 break;
10294 }
10295 }
f64e188b
NC
10296 break;
10297 }
718175fa
JK
10298
10299 case bfd_object:
10300 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
10301 {
10302 if (! elfobj_grok_gnu_note (abfd, &in))
10303 return FALSE;
10304 }
e21e5835
NC
10305 else if (in.namesz == sizeof "stapsdt"
10306 && strcmp (in.namedata, "stapsdt") == 0)
10307 {
10308 if (! elfobj_grok_stapsdt_note (abfd, &in))
10309 return FALSE;
10310 }
718175fa 10311 break;
08a40648 10312 }
252b5132
RH
10313
10314 p = in.descdata + BFD_ALIGN (in.descsz, 4);
10315 }
10316
718175fa
JK
10317 return TRUE;
10318}
10319
10320static bfd_boolean
10321elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
10322{
10323 char *buf;
10324
10325 if (size <= 0)
10326 return TRUE;
10327
10328 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
10329 return FALSE;
10330
f64e188b 10331 buf = (char *) bfd_malloc (size + 1);
718175fa
JK
10332 if (buf == NULL)
10333 return FALSE;
10334
f64e188b
NC
10335 /* PR 17512: file: ec08f814
10336 0-termintate the buffer so that string searches will not overflow. */
10337 buf[size] = 0;
10338
718175fa
JK
10339 if (bfd_bread (buf, size, abfd) != size
10340 || !elf_parse_notes (abfd, buf, size, offset))
10341 {
10342 free (buf);
10343 return FALSE;
10344 }
10345
252b5132 10346 free (buf);
b34976b6 10347 return TRUE;
252b5132 10348}
98d8431c
JB
10349\f
10350/* Providing external access to the ELF program header table. */
10351
10352/* Return an upper bound on the number of bytes required to store a
10353 copy of ABFD's program header table entries. Return -1 if an error
10354 occurs; bfd_get_error will return an appropriate code. */
c044fabd 10355
98d8431c 10356long
217aa764 10357bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
10358{
10359 if (abfd->xvec->flavour != bfd_target_elf_flavour)
10360 {
10361 bfd_set_error (bfd_error_wrong_format);
10362 return -1;
10363 }
10364
936e320b 10365 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
10366}
10367
98d8431c
JB
10368/* Copy ABFD's program header table entries to *PHDRS. The entries
10369 will be stored as an array of Elf_Internal_Phdr structures, as
10370 defined in include/elf/internal.h. To find out how large the
10371 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
10372
10373 Return the number of program header table entries read, or -1 if an
10374 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 10375
98d8431c 10376int
217aa764 10377bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
10378{
10379 int num_phdrs;
10380
10381 if (abfd->xvec->flavour != bfd_target_elf_flavour)
10382 {
10383 bfd_set_error (bfd_error_wrong_format);
10384 return -1;
10385 }
10386
10387 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 10388 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
10389 num_phdrs * sizeof (Elf_Internal_Phdr));
10390
10391 return num_phdrs;
10392}
ae4221d7 10393
db6751f2 10394enum elf_reloc_type_class
7e612e98
AM
10395_bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
10396 const asection *rel_sec ATTRIBUTE_UNUSED,
10397 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
10398{
10399 return reloc_class_normal;
10400}
f8df10f4 10401
47d9a591 10402/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
10403 relocation against a local symbol. */
10404
10405bfd_vma
217aa764
AM
10406_bfd_elf_rela_local_sym (bfd *abfd,
10407 Elf_Internal_Sym *sym,
8517fae7 10408 asection **psec,
217aa764 10409 Elf_Internal_Rela *rel)
f8df10f4 10410{
8517fae7 10411 asection *sec = *psec;
f8df10f4
JJ
10412 bfd_vma relocation;
10413
10414 relocation = (sec->output_section->vma
10415 + sec->output_offset
10416 + sym->st_value);
10417 if ((sec->flags & SEC_MERGE)
c629eae0 10418 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 10419 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
f8df10f4 10420 {
f8df10f4 10421 rel->r_addend =
8517fae7 10422 _bfd_merged_section_offset (abfd, psec,
65765700 10423 elf_section_data (sec)->sec_info,
753731ee
AM
10424 sym->st_value + rel->r_addend);
10425 if (sec != *psec)
10426 {
10427 /* If we have changed the section, and our original section is
10428 marked with SEC_EXCLUDE, it means that the original
10429 SEC_MERGE section has been completely subsumed in some
10430 other SEC_MERGE section. In this case, we need to leave
10431 some info around for --emit-relocs. */
10432 if ((sec->flags & SEC_EXCLUDE) != 0)
10433 sec->kept_section = *psec;
10434 sec = *psec;
10435 }
8517fae7
AM
10436 rel->r_addend -= relocation;
10437 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
10438 }
10439 return relocation;
10440}
c629eae0
JJ
10441
10442bfd_vma
217aa764
AM
10443_bfd_elf_rel_local_sym (bfd *abfd,
10444 Elf_Internal_Sym *sym,
10445 asection **psec,
10446 bfd_vma addend)
47d9a591 10447{
c629eae0
JJ
10448 asection *sec = *psec;
10449
dbaa2011 10450 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
c629eae0
JJ
10451 return sym->st_value + addend;
10452
10453 return _bfd_merged_section_offset (abfd, psec,
65765700 10454 elf_section_data (sec)->sec_info,
753731ee 10455 sym->st_value + addend);
c629eae0
JJ
10456}
10457
10458bfd_vma
217aa764 10459_bfd_elf_section_offset (bfd *abfd,
92e4ec35 10460 struct bfd_link_info *info,
217aa764
AM
10461 asection *sec,
10462 bfd_vma offset)
c629eae0 10463{
68bfbfcc 10464 switch (sec->sec_info_type)
65765700 10465 {
dbaa2011 10466 case SEC_INFO_TYPE_STABS:
eea6121a
AM
10467 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
10468 offset);
dbaa2011 10469 case SEC_INFO_TYPE_EH_FRAME:
92e4ec35 10470 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700 10471 default:
310fd250
L
10472 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
10473 {
10474 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10475 bfd_size_type address_size = bed->s->arch_size / 8;
10476 offset = sec->size - offset - address_size;
10477 }
65765700
JJ
10478 return offset;
10479 }
c629eae0 10480}
3333a7c3
RM
10481\f
10482/* Create a new BFD as if by bfd_openr. Rather than opening a file,
10483 reconstruct an ELF file by reading the segments out of remote memory
10484 based on the ELF file header at EHDR_VMA and the ELF program headers it
10485 points to. If not null, *LOADBASEP is filled in with the difference
10486 between the VMAs from which the segments were read, and the VMAs the
10487 file headers (and hence BFD's idea of each section's VMA) put them at.
10488
10489 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
10490 remote memory at target address VMA into the local buffer at MYADDR; it
10491 should return zero on success or an `errno' code on failure. TEMPL must
10492 be a BFD for an ELF target with the word size and byte order found in
10493 the remote memory. */
10494
10495bfd *
217aa764
AM
10496bfd_elf_bfd_from_remote_memory
10497 (bfd *templ,
10498 bfd_vma ehdr_vma,
f0a5d95a 10499 bfd_size_type size,
217aa764 10500 bfd_vma *loadbasep,
fe78531d 10501 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
3333a7c3
RM
10502{
10503 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
5979d6b6 10504 (templ, ehdr_vma, size, loadbasep, target_read_memory);
3333a7c3 10505}
4c45e5c9
JJ
10506\f
10507long
c9727e01
AM
10508_bfd_elf_get_synthetic_symtab (bfd *abfd,
10509 long symcount ATTRIBUTE_UNUSED,
10510 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 10511 long dynsymcount,
c9727e01
AM
10512 asymbol **dynsyms,
10513 asymbol **ret)
4c45e5c9
JJ
10514{
10515 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10516 asection *relplt;
10517 asymbol *s;
10518 const char *relplt_name;
10519 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
10520 arelent *p;
10521 long count, i, n;
10522 size_t size;
10523 Elf_Internal_Shdr *hdr;
10524 char *names;
10525 asection *plt;
10526
8615f3f2
AM
10527 *ret = NULL;
10528
90e3cdf2
JJ
10529 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
10530 return 0;
10531
8615f3f2
AM
10532 if (dynsymcount <= 0)
10533 return 0;
10534
4c45e5c9
JJ
10535 if (!bed->plt_sym_val)
10536 return 0;
10537
10538 relplt_name = bed->relplt_name;
10539 if (relplt_name == NULL)
d35fd659 10540 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
10541 relplt = bfd_get_section_by_name (abfd, relplt_name);
10542 if (relplt == NULL)
10543 return 0;
10544
10545 hdr = &elf_section_data (relplt)->this_hdr;
10546 if (hdr->sh_link != elf_dynsymtab (abfd)
10547 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
10548 return 0;
10549
10550 plt = bfd_get_section_by_name (abfd, ".plt");
10551 if (plt == NULL)
10552 return 0;
10553
10554 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 10555 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
10556 return -1;
10557
eea6121a 10558 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
10559 size = count * sizeof (asymbol);
10560 p = relplt->relocation;
cb53bf42 10561 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
10562 {
10563 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
10564 if (p->addend != 0)
10565 {
10566#ifdef BFD64
10567 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
10568#else
10569 size += sizeof ("+0x") - 1 + 8;
10570#endif
10571 }
10572 }
4c45e5c9 10573
a50b1753 10574 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
10575 if (s == NULL)
10576 return -1;
10577
10578 names = (char *) (s + count);
10579 p = relplt->relocation;
10580 n = 0;
cb53bf42 10581 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
10582 {
10583 size_t len;
10584 bfd_vma addr;
10585
10586 addr = bed->plt_sym_val (i, plt, p);
10587 if (addr == (bfd_vma) -1)
10588 continue;
10589
10590 *s = **p->sym_ptr_ptr;
65a7a66f
AM
10591 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
10592 we are defining a symbol, ensure one of them is set. */
10593 if ((s->flags & BSF_LOCAL) == 0)
10594 s->flags |= BSF_GLOBAL;
6ba2a415 10595 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
10596 s->section = plt;
10597 s->value = addr - plt->vma;
10598 s->name = names;
8f39ba8e 10599 s->udata.p = NULL;
4c45e5c9
JJ
10600 len = strlen ((*p->sym_ptr_ptr)->name);
10601 memcpy (names, (*p->sym_ptr_ptr)->name, len);
10602 names += len;
041de40d
AM
10603 if (p->addend != 0)
10604 {
1d770845 10605 char buf[30], *a;
d324f6d6 10606
041de40d
AM
10607 memcpy (names, "+0x", sizeof ("+0x") - 1);
10608 names += sizeof ("+0x") - 1;
1d770845
L
10609 bfd_sprintf_vma (abfd, buf, p->addend);
10610 for (a = buf; *a == '0'; ++a)
10611 ;
10612 len = strlen (a);
10613 memcpy (names, a, len);
10614 names += len;
041de40d 10615 }
4c45e5c9
JJ
10616 memcpy (names, "@plt", sizeof ("@plt"));
10617 names += sizeof ("@plt");
8f39ba8e 10618 ++s, ++n;
4c45e5c9
JJ
10619 }
10620
10621 return n;
10622}
3d7f7666 10623
3b22753a
L
10624/* It is only used by x86-64 so far. */
10625asection _bfd_elf_large_com_section
10626 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 10627 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 10628
d1036acb 10629void
78245035
L
10630_bfd_elf_post_process_headers (bfd * abfd,
10631 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
d1036acb
L
10632{
10633 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
10634
10635 i_ehdrp = elf_elfheader (abfd);
10636
10637 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
10638
10639 /* To make things simpler for the loader on Linux systems we set the
9c55345c 10640 osabi field to ELFOSABI_GNU if the binary contains symbols of
f64b2e8d 10641 the STT_GNU_IFUNC type or STB_GNU_UNIQUE binding. */
d8045f23 10642 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
f64b2e8d 10643 && elf_tdata (abfd)->has_gnu_symbols)
9c55345c 10644 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
d1036acb 10645}
fcb93ecf
PB
10646
10647
10648/* Return TRUE for ELF symbol types that represent functions.
10649 This is the default version of this function, which is sufficient for
d8045f23 10650 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
10651
10652bfd_boolean
10653_bfd_elf_is_function_type (unsigned int type)
10654{
d8045f23
NC
10655 return (type == STT_FUNC
10656 || type == STT_GNU_IFUNC);
fcb93ecf 10657}
9f296da3 10658
aef36ac1
AM
10659/* If the ELF symbol SYM might be a function in SEC, return the
10660 function size and set *CODE_OFF to the function's entry point,
10661 otherwise return zero. */
9f296da3 10662
aef36ac1
AM
10663bfd_size_type
10664_bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
10665 bfd_vma *code_off)
9f296da3 10666{
aef36ac1
AM
10667 bfd_size_type size;
10668
ff9e0f5b 10669 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
aef36ac1
AM
10670 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
10671 || sym->section != sec)
10672 return 0;
ff9e0f5b 10673
ff9e0f5b 10674 *code_off = sym->value;
aef36ac1
AM
10675 size = 0;
10676 if (!(sym->flags & BSF_SYNTHETIC))
10677 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
10678 if (size == 0)
10679 size = 1;
10680 return size;
9f296da3 10681}
This page took 2.229283 seconds and 4 git commands to generate.