PR 21409, segfault in _bfd_dwarf2_find_nearest_line
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91 2
2571583a 3 Copyright (C) 1993-2017 Free Software Foundation, Inc.
252b5132 4
5e8d7549 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
5e8d7549
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
5e8d7549 10 (at your option) any later version.
252b5132 11
5e8d7549
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
5e8d7549 17 You should have received a copy of the GNU General Public License
b34976b6 18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132 22
1b74d094
BW
23/*
24SECTION
252b5132
RH
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
661a3fd4 33 haven't bothered yet. */
252b5132 34
7ee38065
MS
35/* For sparc64-cross-sparc32. */
36#define _SYSCALL32
252b5132 37#include "sysdep.h"
3db64b00 38#include "bfd.h"
252b5132
RH
39#include "bfdlink.h"
40#include "libbfd.h"
41#define ARCH_SIZE 0
42#include "elf-bfd.h"
e0e8c97f 43#include "libiberty.h"
ff59fc36 44#include "safe-ctype.h"
de64ce13 45#include "elf-linux-core.h"
252b5132 46
8bc7f138
L
47#ifdef CORE_HEADER
48#include CORE_HEADER
49#endif
50
217aa764 51static int elf_sort_sections (const void *, const void *);
c84fca4d 52static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764 53static bfd_boolean prep_headers (bfd *);
ef10c3ac 54static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int) ;
718175fa
JK
55static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
56static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
57 file_ptr offset);
50b2bdb7 58
252b5132
RH
59/* Swap version information in and out. The version information is
60 currently size independent. If that ever changes, this code will
61 need to move into elfcode.h. */
62
63/* Swap in a Verdef structure. */
64
65void
217aa764
AM
66_bfd_elf_swap_verdef_in (bfd *abfd,
67 const Elf_External_Verdef *src,
68 Elf_Internal_Verdef *dst)
252b5132 69{
dc810e39
AM
70 dst->vd_version = H_GET_16 (abfd, src->vd_version);
71 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
72 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
73 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
74 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
75 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
76 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
77}
78
79/* Swap out a Verdef structure. */
80
81void
217aa764
AM
82_bfd_elf_swap_verdef_out (bfd *abfd,
83 const Elf_Internal_Verdef *src,
84 Elf_External_Verdef *dst)
252b5132 85{
dc810e39
AM
86 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
87 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
88 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
89 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
90 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
91 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
92 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
93}
94
95/* Swap in a Verdaux structure. */
96
97void
217aa764
AM
98_bfd_elf_swap_verdaux_in (bfd *abfd,
99 const Elf_External_Verdaux *src,
100 Elf_Internal_Verdaux *dst)
252b5132 101{
dc810e39
AM
102 dst->vda_name = H_GET_32 (abfd, src->vda_name);
103 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
104}
105
106/* Swap out a Verdaux structure. */
107
108void
217aa764
AM
109_bfd_elf_swap_verdaux_out (bfd *abfd,
110 const Elf_Internal_Verdaux *src,
111 Elf_External_Verdaux *dst)
252b5132 112{
dc810e39
AM
113 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
114 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
115}
116
117/* Swap in a Verneed structure. */
118
119void
217aa764
AM
120_bfd_elf_swap_verneed_in (bfd *abfd,
121 const Elf_External_Verneed *src,
122 Elf_Internal_Verneed *dst)
252b5132 123{
dc810e39
AM
124 dst->vn_version = H_GET_16 (abfd, src->vn_version);
125 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
126 dst->vn_file = H_GET_32 (abfd, src->vn_file);
127 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
128 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
129}
130
131/* Swap out a Verneed structure. */
132
133void
217aa764
AM
134_bfd_elf_swap_verneed_out (bfd *abfd,
135 const Elf_Internal_Verneed *src,
136 Elf_External_Verneed *dst)
252b5132 137{
dc810e39
AM
138 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
139 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
140 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
141 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
142 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
143}
144
145/* Swap in a Vernaux structure. */
146
147void
217aa764
AM
148_bfd_elf_swap_vernaux_in (bfd *abfd,
149 const Elf_External_Vernaux *src,
150 Elf_Internal_Vernaux *dst)
252b5132 151{
dc810e39
AM
152 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
153 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
154 dst->vna_other = H_GET_16 (abfd, src->vna_other);
155 dst->vna_name = H_GET_32 (abfd, src->vna_name);
156 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
157}
158
159/* Swap out a Vernaux structure. */
160
161void
217aa764
AM
162_bfd_elf_swap_vernaux_out (bfd *abfd,
163 const Elf_Internal_Vernaux *src,
164 Elf_External_Vernaux *dst)
252b5132 165{
dc810e39
AM
166 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
167 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
168 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
169 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
170 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
171}
172
173/* Swap in a Versym structure. */
174
175void
217aa764
AM
176_bfd_elf_swap_versym_in (bfd *abfd,
177 const Elf_External_Versym *src,
178 Elf_Internal_Versym *dst)
252b5132 179{
dc810e39 180 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
181}
182
183/* Swap out a Versym structure. */
184
185void
217aa764
AM
186_bfd_elf_swap_versym_out (bfd *abfd,
187 const Elf_Internal_Versym *src,
188 Elf_External_Versym *dst)
252b5132 189{
dc810e39 190 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
191}
192
193/* Standard ELF hash function. Do not change this function; you will
194 cause invalid hash tables to be generated. */
3a99b017 195
252b5132 196unsigned long
217aa764 197bfd_elf_hash (const char *namearg)
252b5132 198{
3a99b017 199 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
200 unsigned long h = 0;
201 unsigned long g;
202 int ch;
203
204 while ((ch = *name++) != '\0')
205 {
206 h = (h << 4) + ch;
207 if ((g = (h & 0xf0000000)) != 0)
208 {
209 h ^= g >> 24;
210 /* The ELF ABI says `h &= ~g', but this is equivalent in
211 this case and on some machines one insn instead of two. */
212 h ^= g;
213 }
214 }
32dfa85d 215 return h & 0xffffffff;
252b5132
RH
216}
217
fdc90cb4
JJ
218/* DT_GNU_HASH hash function. Do not change this function; you will
219 cause invalid hash tables to be generated. */
220
221unsigned long
222bfd_elf_gnu_hash (const char *namearg)
223{
224 const unsigned char *name = (const unsigned char *) namearg;
225 unsigned long h = 5381;
226 unsigned char ch;
227
228 while ((ch = *name++) != '\0')
229 h = (h << 5) + h + ch;
230 return h & 0xffffffff;
231}
232
0c8d6e5c
AM
233/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
234 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 235bfd_boolean
0c8d6e5c 236bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 237 size_t object_size,
4dfe6ac6 238 enum elf_target_id object_id)
252b5132 239{
0ffa91dd
NC
240 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
241 abfd->tdata.any = bfd_zalloc (abfd, object_size);
242 if (abfd->tdata.any == NULL)
243 return FALSE;
252b5132 244
0ffa91dd 245 elf_object_id (abfd) = object_id;
c0355132
AM
246 if (abfd->direction != read_direction)
247 {
248 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
249 if (o == NULL)
250 return FALSE;
251 elf_tdata (abfd)->o = o;
252 elf_program_header_size (abfd) = (bfd_size_type) -1;
253 }
b34976b6 254 return TRUE;
252b5132
RH
255}
256
0ffa91dd
NC
257
258bfd_boolean
ae95ffa6 259bfd_elf_make_object (bfd *abfd)
0ffa91dd 260{
ae95ffa6 261 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 262 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 263 bed->target_id);
0ffa91dd
NC
264}
265
b34976b6 266bfd_boolean
217aa764 267bfd_elf_mkcorefile (bfd *abfd)
252b5132 268{
c044fabd 269 /* I think this can be done just like an object file. */
228e534f
AM
270 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
271 return FALSE;
272 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
273 return elf_tdata (abfd)->core != NULL;
252b5132
RH
274}
275
72a80a16 276static char *
217aa764 277bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
278{
279 Elf_Internal_Shdr **i_shdrp;
f075ee0c 280 bfd_byte *shstrtab = NULL;
dc810e39
AM
281 file_ptr offset;
282 bfd_size_type shstrtabsize;
252b5132
RH
283
284 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
285 if (i_shdrp == 0
286 || shindex >= elf_numsections (abfd)
287 || i_shdrp[shindex] == 0)
f075ee0c 288 return NULL;
252b5132 289
f075ee0c 290 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
291 if (shstrtab == NULL)
292 {
c044fabd 293 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
294 offset = i_shdrp[shindex]->sh_offset;
295 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
296
297 /* Allocate and clear an extra byte at the end, to prevent crashes
298 in case the string table is not terminated. */
3471d59d 299 if (shstrtabsize + 1 <= 1
06614111
NC
300 || bfd_seek (abfd, offset, SEEK_SET) != 0
301 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL)
c6c60d09
JJ
302 shstrtab = NULL;
303 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
304 {
305 if (bfd_get_error () != bfd_error_system_call)
306 bfd_set_error (bfd_error_file_truncated);
06614111 307 bfd_release (abfd, shstrtab);
c6c60d09 308 shstrtab = NULL;
3471d59d
CC
309 /* Once we've failed to read it, make sure we don't keep
310 trying. Otherwise, we'll keep allocating space for
311 the string table over and over. */
312 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
313 }
314 else
315 shstrtab[shstrtabsize] = '\0';
217aa764 316 i_shdrp[shindex]->contents = shstrtab;
252b5132 317 }
f075ee0c 318 return (char *) shstrtab;
252b5132
RH
319}
320
321char *
217aa764
AM
322bfd_elf_string_from_elf_section (bfd *abfd,
323 unsigned int shindex,
324 unsigned int strindex)
252b5132
RH
325{
326 Elf_Internal_Shdr *hdr;
327
328 if (strindex == 0)
329 return "";
330
74f2e02b
AM
331 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
332 return NULL;
333
252b5132
RH
334 hdr = elf_elfsections (abfd)[shindex];
335
06614111
NC
336 if (hdr->contents == NULL)
337 {
338 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
339 {
340 /* PR 17512: file: f057ec89. */
695344c0 341 /* xgettext:c-format */
63a5468a
AM
342 _bfd_error_handler (_("%B: attempt to load strings from"
343 " a non-string section (number %d)"),
06614111
NC
344 abfd, shindex);
345 return NULL;
346 }
b1fa9dd6 347
06614111
NC
348 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
349 return NULL;
350 }
252b5132
RH
351
352 if (strindex >= hdr->sh_size)
353 {
1b3a8575 354 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
4eca0228 355 _bfd_error_handler
695344c0 356 /* xgettext:c-format */
d003868e
AM
357 (_("%B: invalid string offset %u >= %lu for section `%s'"),
358 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 359 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 360 ? ".shstrtab"
1b3a8575 361 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 362 return NULL;
252b5132
RH
363 }
364
365 return ((char *) hdr->contents) + strindex;
366}
367
6cdc0ccc
AM
368/* Read and convert symbols to internal format.
369 SYMCOUNT specifies the number of symbols to read, starting from
370 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
371 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
372 symbols, and symbol section index extensions, respectively.
373 Returns a pointer to the internal symbol buffer (malloced if necessary)
374 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
375
376Elf_Internal_Sym *
217aa764
AM
377bfd_elf_get_elf_syms (bfd *ibfd,
378 Elf_Internal_Shdr *symtab_hdr,
379 size_t symcount,
380 size_t symoffset,
381 Elf_Internal_Sym *intsym_buf,
382 void *extsym_buf,
383 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
384{
385 Elf_Internal_Shdr *shndx_hdr;
217aa764 386 void *alloc_ext;
df622259 387 const bfd_byte *esym;
6cdc0ccc
AM
388 Elf_External_Sym_Shndx *alloc_extshndx;
389 Elf_External_Sym_Shndx *shndx;
4dd07732 390 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
391 Elf_Internal_Sym *isym;
392 Elf_Internal_Sym *isymend;
9c5bfbb7 393 const struct elf_backend_data *bed;
6cdc0ccc
AM
394 size_t extsym_size;
395 bfd_size_type amt;
396 file_ptr pos;
397
e44a2c9c
AM
398 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
399 abort ();
400
6cdc0ccc
AM
401 if (symcount == 0)
402 return intsym_buf;
403
404 /* Normal syms might have section extension entries. */
405 shndx_hdr = NULL;
6a40cf0c
NC
406 if (elf_symtab_shndx_list (ibfd) != NULL)
407 {
408 elf_section_list * entry;
409 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
410
411 /* Find an index section that is linked to this symtab section. */
412 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
315350be
NC
413 {
414 /* PR 20063. */
415 if (entry->hdr.sh_link >= elf_numsections (ibfd))
416 continue;
417
418 if (sections[entry->hdr.sh_link] == symtab_hdr)
419 {
420 shndx_hdr = & entry->hdr;
421 break;
422 };
423 }
6a40cf0c
NC
424
425 if (shndx_hdr == NULL)
426 {
427 if (symtab_hdr == & elf_symtab_hdr (ibfd))
428 /* Not really accurate, but this was how the old code used to work. */
429 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
430 /* Otherwise we do nothing. The assumption is that
431 the index table will not be needed. */
432 }
433 }
6cdc0ccc
AM
434
435 /* Read the symbols. */
436 alloc_ext = NULL;
437 alloc_extshndx = NULL;
4dd07732 438 alloc_intsym = NULL;
6cdc0ccc
AM
439 bed = get_elf_backend_data (ibfd);
440 extsym_size = bed->s->sizeof_sym;
ef53be89 441 amt = (bfd_size_type) symcount * extsym_size;
6cdc0ccc
AM
442 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
443 if (extsym_buf == NULL)
444 {
d0fb9a8d 445 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
446 extsym_buf = alloc_ext;
447 }
448 if (extsym_buf == NULL
449 || bfd_seek (ibfd, pos, SEEK_SET) != 0
450 || bfd_bread (extsym_buf, amt, ibfd) != amt)
451 {
452 intsym_buf = NULL;
453 goto out;
454 }
455
456 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
457 extshndx_buf = NULL;
458 else
459 {
ef53be89 460 amt = (bfd_size_type) symcount * sizeof (Elf_External_Sym_Shndx);
6cdc0ccc
AM
461 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
462 if (extshndx_buf == NULL)
463 {
a50b1753
NC
464 alloc_extshndx = (Elf_External_Sym_Shndx *)
465 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
466 extshndx_buf = alloc_extshndx;
467 }
468 if (extshndx_buf == NULL
469 || bfd_seek (ibfd, pos, SEEK_SET) != 0
470 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
471 {
472 intsym_buf = NULL;
473 goto out;
474 }
475 }
476
477 if (intsym_buf == NULL)
478 {
a50b1753
NC
479 alloc_intsym = (Elf_Internal_Sym *)
480 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 481 intsym_buf = alloc_intsym;
6cdc0ccc
AM
482 if (intsym_buf == NULL)
483 goto out;
484 }
485
486 /* Convert the symbols to internal form. */
487 isymend = intsym_buf + symcount;
a50b1753
NC
488 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
489 shndx = extshndx_buf;
6cdc0ccc
AM
490 isym < isymend;
491 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
492 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
493 {
494 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
695344c0 495 /* xgettext:c-format */
63a5468a
AM
496 _bfd_error_handler (_("%B symbol number %lu references"
497 " nonexistent SHT_SYMTAB_SHNDX section"),
4eca0228 498 ibfd, (unsigned long) symoffset);
4dd07732
AM
499 if (alloc_intsym != NULL)
500 free (alloc_intsym);
8384fb8f
AM
501 intsym_buf = NULL;
502 goto out;
503 }
6cdc0ccc
AM
504
505 out:
506 if (alloc_ext != NULL)
507 free (alloc_ext);
508 if (alloc_extshndx != NULL)
509 free (alloc_extshndx);
510
511 return intsym_buf;
512}
513
5cab59f6
AM
514/* Look up a symbol name. */
515const char *
be8dd2ca
AM
516bfd_elf_sym_name (bfd *abfd,
517 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
518 Elf_Internal_Sym *isym,
519 asection *sym_sec)
5cab59f6 520{
26c61ae5 521 const char *name;
5cab59f6 522 unsigned int iname = isym->st_name;
be8dd2ca 523 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 524
138f35cc
JJ
525 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
526 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 527 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
528 {
529 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
530 shindex = elf_elfheader (abfd)->e_shstrndx;
531 }
532
26c61ae5
L
533 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
534 if (name == NULL)
535 name = "(null)";
536 else if (sym_sec && *name == '\0')
537 name = bfd_section_name (abfd, sym_sec);
538
539 return name;
5cab59f6
AM
540}
541
dbb410c3
AM
542/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
543 sections. The first element is the flags, the rest are section
544 pointers. */
545
546typedef union elf_internal_group {
547 Elf_Internal_Shdr *shdr;
548 unsigned int flags;
549} Elf_Internal_Group;
550
b885599b
AM
551/* Return the name of the group signature symbol. Why isn't the
552 signature just a string? */
553
554static const char *
217aa764 555group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 556{
9dce4196 557 Elf_Internal_Shdr *hdr;
9dce4196
AM
558 unsigned char esym[sizeof (Elf64_External_Sym)];
559 Elf_External_Sym_Shndx eshndx;
560 Elf_Internal_Sym isym;
b885599b 561
13792e9d
L
562 /* First we need to ensure the symbol table is available. Make sure
563 that it is a symbol table section. */
4fbb74a6
AM
564 if (ghdr->sh_link >= elf_numsections (abfd))
565 return NULL;
13792e9d
L
566 hdr = elf_elfsections (abfd) [ghdr->sh_link];
567 if (hdr->sh_type != SHT_SYMTAB
568 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
569 return NULL;
570
9dce4196
AM
571 /* Go read the symbol. */
572 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
573 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
574 &isym, esym, &eshndx) == NULL)
b885599b 575 return NULL;
9dce4196 576
26c61ae5 577 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
578}
579
dbb410c3
AM
580/* Set next_in_group list pointer, and group name for NEWSECT. */
581
b34976b6 582static bfd_boolean
217aa764 583setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
584{
585 unsigned int num_group = elf_tdata (abfd)->num_group;
586
587 /* If num_group is zero, read in all SHT_GROUP sections. The count
588 is set to -1 if there are no SHT_GROUP sections. */
589 if (num_group == 0)
590 {
591 unsigned int i, shnum;
592
593 /* First count the number of groups. If we have a SHT_GROUP
594 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 595 shnum = elf_numsections (abfd);
dbb410c3 596 num_group = 0;
08a40648 597
44534af3 598#define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
1783205a 599 ( (shdr)->sh_type == SHT_GROUP \
44534af3 600 && (shdr)->sh_size >= minsize \
1783205a
NC
601 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
602 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 603
dbb410c3
AM
604 for (i = 0; i < shnum; i++)
605 {
606 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 607
44534af3 608 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3
AM
609 num_group += 1;
610 }
611
612 if (num_group == 0)
20dbb49d
L
613 {
614 num_group = (unsigned) -1;
615 elf_tdata (abfd)->num_group = num_group;
616 }
617 else
dbb410c3
AM
618 {
619 /* We keep a list of elf section headers for group sections,
620 so we can find them quickly. */
20dbb49d 621 bfd_size_type amt;
d0fb9a8d 622
20dbb49d 623 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
624 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
625 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 626 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 627 return FALSE;
dbb410c3
AM
628
629 num_group = 0;
630 for (i = 0; i < shnum; i++)
631 {
632 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 633
44534af3 634 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3 635 {
973ffd63 636 unsigned char *src;
dbb410c3
AM
637 Elf_Internal_Group *dest;
638
639 /* Add to list of sections. */
640 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
641 num_group += 1;
642
643 /* Read the raw contents. */
644 BFD_ASSERT (sizeof (*dest) >= 4);
645 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
646 shdr->contents = (unsigned char *)
647 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
648 /* PR binutils/4110: Handle corrupt group headers. */
649 if (shdr->contents == NULL)
650 {
651 _bfd_error_handler
695344c0 652 /* xgettext:c-format */
63a5468a
AM
653 (_("%B: corrupt size field in group section"
654 " header: 0x%lx"), abfd, shdr->sh_size);
1783205a 655 bfd_set_error (bfd_error_bad_value);
493a3386
NC
656 -- num_group;
657 continue;
1783205a
NC
658 }
659
660 memset (shdr->contents, 0, amt);
661
662 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
663 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
664 != shdr->sh_size))
493a3386
NC
665 {
666 _bfd_error_handler
695344c0 667 /* xgettext:c-format */
63a5468a
AM
668 (_("%B: invalid size field in group section"
669 " header: 0x%lx"), abfd, shdr->sh_size);
493a3386
NC
670 bfd_set_error (bfd_error_bad_value);
671 -- num_group;
63a5468a
AM
672 /* PR 17510: If the group contents are even
673 partially corrupt, do not allow any of the
674 contents to be used. */
493a3386
NC
675 memset (shdr->contents, 0, amt);
676 continue;
677 }
708d7d0d 678
dbb410c3
AM
679 /* Translate raw contents, a flag word followed by an
680 array of elf section indices all in target byte order,
681 to the flag word followed by an array of elf section
682 pointers. */
683 src = shdr->contents + shdr->sh_size;
684 dest = (Elf_Internal_Group *) (shdr->contents + amt);
06614111 685
dbb410c3
AM
686 while (1)
687 {
688 unsigned int idx;
689
690 src -= 4;
691 --dest;
692 idx = H_GET_32 (abfd, src);
693 if (src == shdr->contents)
694 {
695 dest->flags = idx;
b885599b
AM
696 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
697 shdr->bfd_section->flags
698 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
699 break;
700 }
701 if (idx >= shnum)
702 {
4eca0228
AM
703 _bfd_error_handler
704 (_("%B: invalid SHT_GROUP entry"), abfd);
dbb410c3
AM
705 idx = 0;
706 }
707 dest->shdr = elf_elfsections (abfd)[idx];
708 }
709 }
710 }
493a3386
NC
711
712 /* PR 17510: Corrupt binaries might contain invalid groups. */
713 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
714 {
715 elf_tdata (abfd)->num_group = num_group;
716
717 /* If all groups are invalid then fail. */
718 if (num_group == 0)
719 {
720 elf_tdata (abfd)->group_sect_ptr = NULL;
721 elf_tdata (abfd)->num_group = num_group = -1;
4eca0228
AM
722 _bfd_error_handler
723 (_("%B: no valid group sections found"), abfd);
493a3386
NC
724 bfd_set_error (bfd_error_bad_value);
725 }
726 }
dbb410c3
AM
727 }
728 }
729
730 if (num_group != (unsigned) -1)
731 {
732 unsigned int i;
733
734 for (i = 0; i < num_group; i++)
735 {
736 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
737 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
738 unsigned int n_elt = shdr->sh_size / 4;
739
740 /* Look through this group's sections to see if current
741 section is a member. */
742 while (--n_elt != 0)
743 if ((++idx)->shdr == hdr)
744 {
e0e8c97f 745 asection *s = NULL;
dbb410c3
AM
746
747 /* We are a member of this group. Go looking through
748 other members to see if any others are linked via
749 next_in_group. */
750 idx = (Elf_Internal_Group *) shdr->contents;
751 n_elt = shdr->sh_size / 4;
752 while (--n_elt != 0)
753 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 754 && elf_next_in_group (s) != NULL)
dbb410c3
AM
755 break;
756 if (n_elt != 0)
757 {
dbb410c3
AM
758 /* Snarf the group name from other member, and
759 insert current section in circular list. */
945906ff
AM
760 elf_group_name (newsect) = elf_group_name (s);
761 elf_next_in_group (newsect) = elf_next_in_group (s);
762 elf_next_in_group (s) = newsect;
dbb410c3
AM
763 }
764 else
765 {
dbb410c3
AM
766 const char *gname;
767
b885599b
AM
768 gname = group_signature (abfd, shdr);
769 if (gname == NULL)
b34976b6 770 return FALSE;
945906ff 771 elf_group_name (newsect) = gname;
dbb410c3
AM
772
773 /* Start a circular list with one element. */
945906ff 774 elf_next_in_group (newsect) = newsect;
dbb410c3 775 }
b885599b 776
9dce4196
AM
777 /* If the group section has been created, point to the
778 new member. */
dbb410c3 779 if (shdr->bfd_section != NULL)
945906ff 780 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 781
dbb410c3
AM
782 i = num_group - 1;
783 break;
784 }
785 }
786 }
787
945906ff 788 if (elf_group_name (newsect) == NULL)
dbb410c3 789 {
695344c0 790 /* xgettext:c-format */
4eca0228
AM
791 _bfd_error_handler (_("%B: no group info for section %A"),
792 abfd, newsect);
493a3386 793 return FALSE;
dbb410c3 794 }
b34976b6 795 return TRUE;
dbb410c3
AM
796}
797
3d7f7666 798bfd_boolean
dd863624 799_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
800{
801 unsigned int i;
802 unsigned int num_group = elf_tdata (abfd)->num_group;
803 bfd_boolean result = TRUE;
dd863624
L
804 asection *s;
805
806 /* Process SHF_LINK_ORDER. */
807 for (s = abfd->sections; s != NULL; s = s->next)
808 {
809 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
810 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
811 {
812 unsigned int elfsec = this_hdr->sh_link;
813 /* FIXME: The old Intel compiler and old strip/objcopy may
814 not set the sh_link or sh_info fields. Hence we could
815 get the situation where elfsec is 0. */
816 if (elfsec == 0)
817 {
4fbb74a6 818 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
819 if (bed->link_order_error_handler)
820 bed->link_order_error_handler
695344c0 821 /* xgettext:c-format */
dd863624
L
822 (_("%B: warning: sh_link not set for section `%A'"),
823 abfd, s);
824 }
825 else
826 {
91d6fa6a 827 asection *linksec = NULL;
25bbc984 828
4fbb74a6
AM
829 if (elfsec < elf_numsections (abfd))
830 {
831 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 832 linksec = this_hdr->bfd_section;
4fbb74a6 833 }
25bbc984
L
834
835 /* PR 1991, 2008:
836 Some strip/objcopy may leave an incorrect value in
837 sh_link. We don't want to proceed. */
91d6fa6a 838 if (linksec == NULL)
25bbc984 839 {
4eca0228 840 _bfd_error_handler
695344c0 841 /* xgettext:c-format */
25bbc984 842 (_("%B: sh_link [%d] in section `%A' is incorrect"),
c08bb8dd 843 s->owner, elfsec, s);
25bbc984
L
844 result = FALSE;
845 }
846
91d6fa6a 847 elf_linked_to_section (s) = linksec;
dd863624
L
848 }
849 }
53720c49
AM
850 else if (this_hdr->sh_type == SHT_GROUP
851 && elf_next_in_group (s) == NULL)
852 {
4eca0228 853 _bfd_error_handler
695344c0 854 /* xgettext:c-format */
53720c49
AM
855 (_("%B: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
856 abfd, elf_section_data (s)->this_idx);
857 result = FALSE;
858 }
dd863624 859 }
3d7f7666 860
dd863624 861 /* Process section groups. */
3d7f7666
L
862 if (num_group == (unsigned) -1)
863 return result;
864
865 for (i = 0; i < num_group; i++)
866 {
867 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
4b0e8a5f
NC
868 Elf_Internal_Group *idx;
869 unsigned int n_elt;
3d7f7666 870
4b0e8a5f
NC
871 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
872 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
873 {
4eca0228 874 _bfd_error_handler
695344c0 875 /* xgettext:c-format */
4b0e8a5f
NC
876 (_("%B: section group entry number %u is corrupt"),
877 abfd, i);
878 result = FALSE;
879 continue;
880 }
881
882 idx = (Elf_Internal_Group *) shdr->contents;
883 n_elt = shdr->sh_size / 4;
1b786873 884
3d7f7666
L
885 while (--n_elt != 0)
886 if ((++idx)->shdr->bfd_section)
887 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
888 else if (idx->shdr->sh_type == SHT_RELA
889 || idx->shdr->sh_type == SHT_REL)
890 /* We won't include relocation sections in section groups in
891 output object files. We adjust the group section size here
892 so that relocatable link will work correctly when
893 relocation sections are in section group in input object
894 files. */
895 shdr->bfd_section->size -= 4;
896 else
897 {
898 /* There are some unknown sections in the group. */
4eca0228 899 _bfd_error_handler
695344c0 900 /* xgettext:c-format */
dae82561 901 (_("%B: unknown [%d] section `%s' in group [%A]"),
d003868e 902 abfd,
3d7f7666 903 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
904 bfd_elf_string_from_elf_section (abfd,
905 (elf_elfheader (abfd)
906 ->e_shstrndx),
907 idx->shdr->sh_name),
dae82561 908 shdr->bfd_section);
3d7f7666
L
909 result = FALSE;
910 }
911 }
912 return result;
913}
914
72adc230
AM
915bfd_boolean
916bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
917{
918 return elf_next_in_group (sec) != NULL;
919}
920
f6fe1ccd
L
921static char *
922convert_debug_to_zdebug (bfd *abfd, const char *name)
923{
924 unsigned int len = strlen (name);
925 char *new_name = bfd_alloc (abfd, len + 2);
926 if (new_name == NULL)
927 return NULL;
928 new_name[0] = '.';
929 new_name[1] = 'z';
930 memcpy (new_name + 2, name + 1, len);
931 return new_name;
932}
933
934static char *
935convert_zdebug_to_debug (bfd *abfd, const char *name)
936{
937 unsigned int len = strlen (name);
938 char *new_name = bfd_alloc (abfd, len);
939 if (new_name == NULL)
940 return NULL;
941 new_name[0] = '.';
942 memcpy (new_name + 1, name + 2, len - 1);
943 return new_name;
944}
945
252b5132
RH
946/* Make a BFD section from an ELF section. We store a pointer to the
947 BFD section in the bfd_section field of the header. */
948
b34976b6 949bfd_boolean
217aa764
AM
950_bfd_elf_make_section_from_shdr (bfd *abfd,
951 Elf_Internal_Shdr *hdr,
6dc132d9
L
952 const char *name,
953 int shindex)
252b5132
RH
954{
955 asection *newsect;
956 flagword flags;
9c5bfbb7 957 const struct elf_backend_data *bed;
252b5132
RH
958
959 if (hdr->bfd_section != NULL)
4e011fb5 960 return TRUE;
252b5132
RH
961
962 newsect = bfd_make_section_anyway (abfd, name);
963 if (newsect == NULL)
b34976b6 964 return FALSE;
252b5132 965
1829f4b2
AM
966 hdr->bfd_section = newsect;
967 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 968 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 969
2f89ff8d
L
970 /* Always use the real type/flags. */
971 elf_section_type (newsect) = hdr->sh_type;
972 elf_section_flags (newsect) = hdr->sh_flags;
973
252b5132
RH
974 newsect->filepos = hdr->sh_offset;
975
976 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
977 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
978 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 979 bfd_log2 (hdr->sh_addralign)))
b34976b6 980 return FALSE;
252b5132
RH
981
982 flags = SEC_NO_FLAGS;
983 if (hdr->sh_type != SHT_NOBITS)
984 flags |= SEC_HAS_CONTENTS;
dbb410c3 985 if (hdr->sh_type == SHT_GROUP)
b3096250 986 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
987 if ((hdr->sh_flags & SHF_ALLOC) != 0)
988 {
989 flags |= SEC_ALLOC;
990 if (hdr->sh_type != SHT_NOBITS)
991 flags |= SEC_LOAD;
992 }
993 if ((hdr->sh_flags & SHF_WRITE) == 0)
994 flags |= SEC_READONLY;
995 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
996 flags |= SEC_CODE;
997 else if ((flags & SEC_LOAD) != 0)
998 flags |= SEC_DATA;
f5fa8ca2
JJ
999 if ((hdr->sh_flags & SHF_MERGE) != 0)
1000 {
1001 flags |= SEC_MERGE;
1002 newsect->entsize = hdr->sh_entsize;
f5fa8ca2 1003 }
84865015
NC
1004 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1005 flags |= SEC_STRINGS;
dbb410c3
AM
1006 if (hdr->sh_flags & SHF_GROUP)
1007 if (!setup_group (abfd, hdr, newsect))
b34976b6 1008 return FALSE;
13ae64f3
JJ
1009 if ((hdr->sh_flags & SHF_TLS) != 0)
1010 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
1011 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1012 flags |= SEC_EXCLUDE;
252b5132 1013
3d2b39cf 1014 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 1015 {
3d2b39cf
L
1016 /* The debugging sections appear to be recognized only by name,
1017 not any sort of flag. Their SEC_ALLOC bits are cleared. */
3d2b39cf
L
1018 if (name [0] == '.')
1019 {
f073ced3
AM
1020 const char *p;
1021 int n;
1022 if (name[1] == 'd')
1023 p = ".debug", n = 6;
1024 else if (name[1] == 'g' && name[2] == 'n')
1025 p = ".gnu.linkonce.wi.", n = 17;
1026 else if (name[1] == 'g' && name[2] == 'd')
1027 p = ".gdb_index", n = 11; /* yes we really do mean 11. */
1028 else if (name[1] == 'l')
1029 p = ".line", n = 5;
1030 else if (name[1] == 's')
1031 p = ".stab", n = 5;
1032 else if (name[1] == 'z')
1033 p = ".zdebug", n = 7;
1034 else
1035 p = NULL, n = 0;
1036 if (p != NULL && strncmp (name, p, n) == 0)
3d2b39cf
L
1037 flags |= SEC_DEBUGGING;
1038 }
1039 }
252b5132
RH
1040
1041 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1042 only link a single copy of the section. This is used to support
1043 g++. g++ will emit each template expansion in its own section.
1044 The symbols will be defined as weak, so that multiple definitions
1045 are permitted. The GNU linker extension is to actually discard
1046 all but one of the sections. */
0112cd26 1047 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 1048 && elf_next_in_group (newsect) == NULL)
252b5132
RH
1049 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1050
fa152c49
JW
1051 bed = get_elf_backend_data (abfd);
1052 if (bed->elf_backend_section_flags)
1053 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 1054 return FALSE;
fa152c49 1055
252b5132 1056 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 1057 return FALSE;
252b5132 1058
718175fa
JK
1059 /* We do not parse the PT_NOTE segments as we are interested even in the
1060 separate debug info files which may have the segments offsets corrupted.
1061 PT_NOTEs from the core files are currently not parsed using BFD. */
1062 if (hdr->sh_type == SHT_NOTE)
1063 {
baea7ef1 1064 bfd_byte *contents;
718175fa 1065
baea7ef1 1066 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
1067 return FALSE;
1068
08698b7b 1069 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, hdr->sh_offset);
718175fa
JK
1070 free (contents);
1071 }
1072
252b5132
RH
1073 if ((flags & SEC_ALLOC) != 0)
1074 {
1075 Elf_Internal_Phdr *phdr;
6ffd7900
AM
1076 unsigned int i, nload;
1077
1078 /* Some ELF linkers produce binaries with all the program header
1079 p_paddr fields zero. If we have such a binary with more than
1080 one PT_LOAD header, then leave the section lma equal to vma
1081 so that we don't create sections with overlapping lma. */
1082 phdr = elf_tdata (abfd)->phdr;
1083 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1084 if (phdr->p_paddr != 0)
1085 break;
1086 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1087 ++nload;
1088 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1089 return TRUE;
252b5132 1090
252b5132
RH
1091 phdr = elf_tdata (abfd)->phdr;
1092 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1093 {
86b2281f
AM
1094 if (((phdr->p_type == PT_LOAD
1095 && (hdr->sh_flags & SHF_TLS) == 0)
1096 || phdr->p_type == PT_TLS)
9a83a553 1097 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 1098 {
88967714
AM
1099 if ((flags & SEC_LOAD) == 0)
1100 newsect->lma = (phdr->p_paddr
1101 + hdr->sh_addr - phdr->p_vaddr);
1102 else
1103 /* We used to use the same adjustment for SEC_LOAD
1104 sections, but that doesn't work if the segment
1105 is packed with code from multiple VMAs.
1106 Instead we calculate the section LMA based on
1107 the segment LMA. It is assumed that the
1108 segment will contain sections with contiguous
1109 LMAs, even if the VMAs are not. */
1110 newsect->lma = (phdr->p_paddr
1111 + hdr->sh_offset - phdr->p_offset);
1112
1113 /* With contiguous segments, we can't tell from file
1114 offsets whether a section with zero size should
1115 be placed at the end of one segment or the
1116 beginning of the next. Decide based on vaddr. */
1117 if (hdr->sh_addr >= phdr->p_vaddr
1118 && (hdr->sh_addr + hdr->sh_size
1119 <= phdr->p_vaddr + phdr->p_memsz))
1120 break;
252b5132
RH
1121 }
1122 }
1123 }
1124
4a114e3e
L
1125 /* Compress/decompress DWARF debug sections with names: .debug_* and
1126 .zdebug_*, after the section flags is set. */
1127 if ((flags & SEC_DEBUGGING)
1128 && ((name[1] == 'd' && name[6] == '_')
1129 || (name[1] == 'z' && name[7] == '_')))
1130 {
1131 enum { nothing, compress, decompress } action = nothing;
151411f8 1132 int compression_header_size;
dab394de 1133 bfd_size_type uncompressed_size;
151411f8
L
1134 bfd_boolean compressed
1135 = bfd_is_section_compressed_with_header (abfd, newsect,
dab394de
L
1136 &compression_header_size,
1137 &uncompressed_size);
4a114e3e 1138
151411f8 1139 if (compressed)
4a114e3e
L
1140 {
1141 /* Compressed section. Check if we should decompress. */
1142 if ((abfd->flags & BFD_DECOMPRESS))
1143 action = decompress;
1144 }
151411f8
L
1145
1146 /* Compress the uncompressed section or convert from/to .zdebug*
1147 section. Check if we should compress. */
1148 if (action == nothing)
4a114e3e 1149 {
151411f8
L
1150 if (newsect->size != 0
1151 && (abfd->flags & BFD_COMPRESS)
1152 && compression_header_size >= 0
dab394de 1153 && uncompressed_size > 0
151411f8
L
1154 && (!compressed
1155 || ((compression_header_size > 0)
1156 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
4a114e3e 1157 action = compress;
151411f8
L
1158 else
1159 return TRUE;
4a114e3e
L
1160 }
1161
151411f8 1162 if (action == compress)
4a114e3e 1163 {
4a114e3e
L
1164 if (!bfd_init_section_compress_status (abfd, newsect))
1165 {
4eca0228 1166 _bfd_error_handler
695344c0 1167 /* xgettext:c-format */
bc823199 1168 (_("%B: unable to initialize compress status for section %s"),
4a114e3e
L
1169 abfd, name);
1170 return FALSE;
1171 }
151411f8
L
1172 }
1173 else
1174 {
4a114e3e
L
1175 if (!bfd_init_section_decompress_status (abfd, newsect))
1176 {
4eca0228 1177 _bfd_error_handler
695344c0 1178 /* xgettext:c-format */
bc823199 1179 (_("%B: unable to initialize decompress status for section %s"),
4a114e3e
L
1180 abfd, name);
1181 return FALSE;
1182 }
151411f8
L
1183 }
1184
f6fe1ccd 1185 if (abfd->is_linker_input)
151411f8 1186 {
f6fe1ccd
L
1187 if (name[1] == 'z'
1188 && (action == decompress
1189 || (action == compress
1190 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
4e011fb5 1191 {
f6fe1ccd
L
1192 /* Convert section name from .zdebug_* to .debug_* so
1193 that linker will consider this section as a debug
1194 section. */
1195 char *new_name = convert_zdebug_to_debug (abfd, name);
151411f8
L
1196 if (new_name == NULL)
1197 return FALSE;
f6fe1ccd 1198 bfd_rename_section (abfd, newsect, new_name);
151411f8 1199 }
4a114e3e 1200 }
f6fe1ccd
L
1201 else
1202 /* For objdump, don't rename the section. For objcopy, delay
1203 section rename to elf_fake_sections. */
1204 newsect->flags |= SEC_ELF_RENAME;
4a114e3e
L
1205 }
1206
b34976b6 1207 return TRUE;
252b5132
RH
1208}
1209
84865015
NC
1210const char *const bfd_elf_section_type_names[] =
1211{
252b5132
RH
1212 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1213 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1214 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1215};
1216
1049f94e 1217/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1218 output, and the reloc is against an external symbol, and nothing
1219 has given us any additional addend, the resulting reloc will also
1220 be against the same symbol. In such a case, we don't want to
1221 change anything about the way the reloc is handled, since it will
1222 all be done at final link time. Rather than put special case code
1223 into bfd_perform_relocation, all the reloc types use this howto
1224 function. It just short circuits the reloc if producing
1049f94e 1225 relocatable output against an external symbol. */
252b5132 1226
252b5132 1227bfd_reloc_status_type
217aa764
AM
1228bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1229 arelent *reloc_entry,
1230 asymbol *symbol,
1231 void *data ATTRIBUTE_UNUSED,
1232 asection *input_section,
1233 bfd *output_bfd,
1234 char **error_message ATTRIBUTE_UNUSED)
1235{
1236 if (output_bfd != NULL
252b5132
RH
1237 && (symbol->flags & BSF_SECTION_SYM) == 0
1238 && (! reloc_entry->howto->partial_inplace
1239 || reloc_entry->addend == 0))
1240 {
1241 reloc_entry->address += input_section->output_offset;
1242 return bfd_reloc_ok;
1243 }
1244
1245 return bfd_reloc_continue;
1246}
1247\f
84865015
NC
1248/* Returns TRUE if section A matches section B.
1249 Names, addresses and links may be different, but everything else
1250 should be the same. */
1251
1252static bfd_boolean
5522f910
NC
1253section_match (const Elf_Internal_Shdr * a,
1254 const Elf_Internal_Shdr * b)
84865015
NC
1255{
1256 return
1257 a->sh_type == b->sh_type
5522f910
NC
1258 && (a->sh_flags & ~ SHF_INFO_LINK)
1259 == (b->sh_flags & ~ SHF_INFO_LINK)
84865015
NC
1260 && a->sh_addralign == b->sh_addralign
1261 && a->sh_size == b->sh_size
1262 && a->sh_entsize == b->sh_entsize
1263 /* FIXME: Check sh_addr ? */
1264 ;
1265}
1266
1267/* Find a section in OBFD that has the same characteristics
1268 as IHEADER. Return the index of this section or SHN_UNDEF if
1269 none can be found. Check's section HINT first, as this is likely
1270 to be the correct section. */
1271
1272static unsigned int
5522f910 1273find_link (const bfd * obfd, const Elf_Internal_Shdr * iheader, const unsigned int hint)
84865015
NC
1274{
1275 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1276 unsigned int i;
1277
a55c9876
NC
1278 BFD_ASSERT (iheader != NULL);
1279
1280 /* See PR 20922 for a reproducer of the NULL test. */
1281 if (oheaders[hint] != NULL
1282 && section_match (oheaders[hint], iheader))
84865015
NC
1283 return hint;
1284
1285 for (i = 1; i < elf_numsections (obfd); i++)
1286 {
1287 Elf_Internal_Shdr * oheader = oheaders[i];
1288
a55c9876
NC
1289 if (oheader == NULL)
1290 continue;
84865015
NC
1291 if (section_match (oheader, iheader))
1292 /* FIXME: Do we care if there is a potential for
1293 multiple matches ? */
1294 return i;
1295 }
1296
1297 return SHN_UNDEF;
1298}
1299
5522f910
NC
1300/* PR 19938: Attempt to set the ELF section header fields of an OS or
1301 Processor specific section, based upon a matching input section.
1302 Returns TRUE upon success, FALSE otherwise. */
1303
1304static bfd_boolean
1305copy_special_section_fields (const bfd *ibfd,
1306 bfd *obfd,
1307 const Elf_Internal_Shdr *iheader,
1308 Elf_Internal_Shdr *oheader,
1309 const unsigned int secnum)
1310{
1311 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1312 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1313 bfd_boolean changed = FALSE;
1314 unsigned int sh_link;
1315
1316 if (oheader->sh_type == SHT_NOBITS)
1317 {
1318 /* This is a feature for objcopy --only-keep-debug:
1319 When a section's type is changed to NOBITS, we preserve
1320 the sh_link and sh_info fields so that they can be
1321 matched up with the original.
1322
1323 Note: Strictly speaking these assignments are wrong.
1324 The sh_link and sh_info fields should point to the
1325 relevent sections in the output BFD, which may not be in
1326 the same location as they were in the input BFD. But
1327 the whole point of this action is to preserve the
1328 original values of the sh_link and sh_info fields, so
1329 that they can be matched up with the section headers in
1330 the original file. So strictly speaking we may be
1331 creating an invalid ELF file, but it is only for a file
1332 that just contains debug info and only for sections
1333 without any contents. */
1334 if (oheader->sh_link == 0)
1335 oheader->sh_link = iheader->sh_link;
1336 if (oheader->sh_info == 0)
1337 oheader->sh_info = iheader->sh_info;
1338 return TRUE;
1339 }
1340
1341 /* Allow the target a chance to decide how these fields should be set. */
1342 if (bed->elf_backend_copy_special_section_fields != NULL
1343 && bed->elf_backend_copy_special_section_fields
1344 (ibfd, obfd, iheader, oheader))
1345 return TRUE;
1346
1347 /* We have an iheader which might match oheader, and which has non-zero
1348 sh_info and/or sh_link fields. Attempt to follow those links and find
1349 the section in the output bfd which corresponds to the linked section
1350 in the input bfd. */
1351 if (iheader->sh_link != SHN_UNDEF)
1352 {
4f3ca05b
NC
1353 /* See PR 20931 for a reproducer. */
1354 if (iheader->sh_link >= elf_numsections (ibfd))
1355 {
1356 (* _bfd_error_handler)
1357 /* xgettext:c-format */
1358 (_("%B: Invalid sh_link field (%d) in section number %d"),
1359 ibfd, iheader->sh_link, secnum);
1360 return FALSE;
1361 }
1362
5522f910
NC
1363 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1364 if (sh_link != SHN_UNDEF)
1365 {
1366 oheader->sh_link = sh_link;
1367 changed = TRUE;
1368 }
1369 else
1370 /* FIXME: Should we install iheader->sh_link
1371 if we could not find a match ? */
1372 (* _bfd_error_handler)
695344c0 1373 /* xgettext:c-format */
5522f910
NC
1374 (_("%B: Failed to find link section for section %d"), obfd, secnum);
1375 }
1376
1377 if (iheader->sh_info)
1378 {
1379 /* The sh_info field can hold arbitrary information, but if the
1380 SHF_LINK_INFO flag is set then it should be interpreted as a
1381 section index. */
1382 if (iheader->sh_flags & SHF_INFO_LINK)
1383 {
1384 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1385 iheader->sh_info);
1386 if (sh_link != SHN_UNDEF)
1387 oheader->sh_flags |= SHF_INFO_LINK;
1388 }
1389 else
1390 /* No idea what it means - just copy it. */
1391 sh_link = iheader->sh_info;
1392
1393 if (sh_link != SHN_UNDEF)
1394 {
1395 oheader->sh_info = sh_link;
1396 changed = TRUE;
1397 }
1398 else
1399 (* _bfd_error_handler)
695344c0 1400 /* xgettext:c-format */
5522f910
NC
1401 (_("%B: Failed to find info section for section %d"), obfd, secnum);
1402 }
1403
1404 return changed;
1405}
1406
0ac4564e
L
1407/* Copy the program header and other data from one object module to
1408 another. */
252b5132 1409
b34976b6 1410bfd_boolean
217aa764 1411_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050 1412{
5522f910
NC
1413 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1414 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1415 const struct elf_backend_data *bed;
84865015
NC
1416 unsigned int i;
1417
2d502050 1418 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
84865015 1419 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1420 return TRUE;
2d502050 1421
57b828ef
L
1422 if (!elf_flags_init (obfd))
1423 {
1424 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1425 elf_flags_init (obfd) = TRUE;
1426 }
2d502050 1427
0ac4564e 1428 elf_gp (obfd) = elf_gp (ibfd);
57b828ef
L
1429
1430 /* Also copy the EI_OSABI field. */
1431 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1432 elf_elfheader (ibfd)->e_ident[EI_OSABI];
104d59d1 1433
5522f910
NC
1434 /* If set, copy the EI_ABIVERSION field. */
1435 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1436 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1437 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
1438
104d59d1
JM
1439 /* Copy object attributes. */
1440 _bfd_elf_copy_obj_attributes (ibfd, obfd);
63b9bbb7 1441
84865015
NC
1442 if (iheaders == NULL || oheaders == NULL)
1443 return TRUE;
63b9bbb7 1444
5522f910
NC
1445 bed = get_elf_backend_data (obfd);
1446
1447 /* Possibly copy other fields in the section header. */
84865015 1448 for (i = 1; i < elf_numsections (obfd); i++)
63b9bbb7 1449 {
84865015
NC
1450 unsigned int j;
1451 Elf_Internal_Shdr * oheader = oheaders[i];
63b9bbb7 1452
5522f910
NC
1453 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1454 because of a special case need for generating separate debug info
1455 files. See below for more details. */
84865015
NC
1456 if (oheader == NULL
1457 || (oheader->sh_type != SHT_NOBITS
5522f910
NC
1458 && oheader->sh_type < SHT_LOOS))
1459 continue;
1460
1461 /* Ignore empty sections, and sections whose
1462 fields have already been initialised. */
1463 if (oheader->sh_size == 0
84865015
NC
1464 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1465 continue;
63b9bbb7 1466
84865015 1467 /* Scan for the matching section in the input bfd.
5522f910
NC
1468 First we try for a direct mapping between the input and output sections. */
1469 for (j = 1; j < elf_numsections (ibfd); j++)
1470 {
1471 const Elf_Internal_Shdr * iheader = iheaders[j];
1472
1473 if (iheader == NULL)
1474 continue;
1475
1476 if (oheader->bfd_section != NULL
1477 && iheader->bfd_section != NULL
1478 && iheader->bfd_section->output_section != NULL
1479 && iheader->bfd_section->output_section == oheader->bfd_section)
1480 {
1481 /* We have found a connection from the input section to the
1482 output section. Attempt to copy the header fields. If
1483 this fails then do not try any further sections - there
1484 should only be a one-to-one mapping between input and output. */
1485 if (! copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1486 j = elf_numsections (ibfd);
1487 break;
1488 }
1489 }
1490
1491 if (j < elf_numsections (ibfd))
1492 continue;
1493
1494 /* That failed. So try to deduce the corresponding input section.
84865015
NC
1495 Unfortunately we cannot compare names as the output string table
1496 is empty, so instead we check size, address and type. */
1497 for (j = 1; j < elf_numsections (ibfd); j++)
1498 {
5522f910 1499 const Elf_Internal_Shdr * iheader = iheaders[j];
84865015 1500
5522f910
NC
1501 if (iheader == NULL)
1502 continue;
1503
1504 /* Try matching fields in the input section's header.
1505 Since --only-keep-debug turns all non-debug sections into
84865015
NC
1506 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1507 input type. */
1508 if ((oheader->sh_type == SHT_NOBITS
1509 || iheader->sh_type == oheader->sh_type)
5522f910
NC
1510 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1511 == (oheader->sh_flags & ~ SHF_INFO_LINK)
84865015
NC
1512 && iheader->sh_addralign == oheader->sh_addralign
1513 && iheader->sh_entsize == oheader->sh_entsize
1514 && iheader->sh_size == oheader->sh_size
1515 && iheader->sh_addr == oheader->sh_addr
1516 && (iheader->sh_info != oheader->sh_info
1517 || iheader->sh_link != oheader->sh_link))
63b9bbb7 1518 {
5522f910
NC
1519 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1520 break;
63b9bbb7
NC
1521 }
1522 }
5522f910
NC
1523
1524 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1525 {
1526 /* Final attempt. Call the backend copy function
1527 with a NULL input section. */
1528 if (bed->elf_backend_copy_special_section_fields != NULL)
1529 bed->elf_backend_copy_special_section_fields (ibfd, obfd, NULL, oheader);
1530 }
63b9bbb7
NC
1531 }
1532
b34976b6 1533 return TRUE;
2d502050
L
1534}
1535
cedc298e
L
1536static const char *
1537get_segment_type (unsigned int p_type)
1538{
1539 const char *pt;
1540 switch (p_type)
1541 {
1542 case PT_NULL: pt = "NULL"; break;
1543 case PT_LOAD: pt = "LOAD"; break;
1544 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1545 case PT_INTERP: pt = "INTERP"; break;
1546 case PT_NOTE: pt = "NOTE"; break;
1547 case PT_SHLIB: pt = "SHLIB"; break;
1548 case PT_PHDR: pt = "PHDR"; break;
1549 case PT_TLS: pt = "TLS"; break;
1550 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1551 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1552 case PT_GNU_RELRO: pt = "RELRO"; break;
1553 default: pt = NULL; break;
1554 }
1555 return pt;
1556}
1557
f0b79d91
L
1558/* Print out the program headers. */
1559
b34976b6 1560bfd_boolean
217aa764 1561_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1562{
a50b1753 1563 FILE *f = (FILE *) farg;
252b5132
RH
1564 Elf_Internal_Phdr *p;
1565 asection *s;
1566 bfd_byte *dynbuf = NULL;
1567
1568 p = elf_tdata (abfd)->phdr;
1569 if (p != NULL)
1570 {
1571 unsigned int i, c;
1572
1573 fprintf (f, _("\nProgram Header:\n"));
1574 c = elf_elfheader (abfd)->e_phnum;
1575 for (i = 0; i < c; i++, p++)
1576 {
cedc298e 1577 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1578 char buf[20];
1579
cedc298e 1580 if (pt == NULL)
252b5132 1581 {
cedc298e
L
1582 sprintf (buf, "0x%lx", p->p_type);
1583 pt = buf;
252b5132 1584 }
dc810e39 1585 fprintf (f, "%8s off 0x", pt);
60b89a18 1586 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1587 fprintf (f, " vaddr 0x");
60b89a18 1588 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1589 fprintf (f, " paddr 0x");
60b89a18 1590 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1591 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1592 fprintf (f, " filesz 0x");
60b89a18 1593 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1594 fprintf (f, " memsz 0x");
60b89a18 1595 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1596 fprintf (f, " flags %c%c%c",
1597 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1598 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1599 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1600 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1601 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1602 fprintf (f, "\n");
1603 }
1604 }
1605
1606 s = bfd_get_section_by_name (abfd, ".dynamic");
1607 if (s != NULL)
1608 {
cb33740c 1609 unsigned int elfsec;
dc810e39 1610 unsigned long shlink;
252b5132
RH
1611 bfd_byte *extdyn, *extdynend;
1612 size_t extdynsize;
217aa764 1613 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1614
1615 fprintf (f, _("\nDynamic Section:\n"));
1616
eea6121a 1617 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1618 goto error_return;
1619
1620 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1621 if (elfsec == SHN_BAD)
252b5132 1622 goto error_return;
dc810e39 1623 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1624
1625 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1626 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1627
1628 extdyn = dynbuf;
06614111
NC
1629 /* PR 17512: file: 6f427532. */
1630 if (s->size < extdynsize)
1631 goto error_return;
eea6121a 1632 extdynend = extdyn + s->size;
1036838a
NC
1633 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1634 Fix range check. */
1635 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
252b5132
RH
1636 {
1637 Elf_Internal_Dyn dyn;
ad9563d6 1638 const char *name = "";
252b5132 1639 char ab[20];
b34976b6 1640 bfd_boolean stringp;
ad9563d6 1641 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1642
217aa764 1643 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1644
1645 if (dyn.d_tag == DT_NULL)
1646 break;
1647
b34976b6 1648 stringp = FALSE;
252b5132
RH
1649 switch (dyn.d_tag)
1650 {
1651 default:
ad9563d6
CM
1652 if (bed->elf_backend_get_target_dtag)
1653 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1654
1655 if (!strcmp (name, ""))
1656 {
1657 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1658 name = ab;
1659 }
252b5132
RH
1660 break;
1661
b34976b6 1662 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1663 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1664 case DT_PLTGOT: name = "PLTGOT"; break;
1665 case DT_HASH: name = "HASH"; break;
1666 case DT_STRTAB: name = "STRTAB"; break;
1667 case DT_SYMTAB: name = "SYMTAB"; break;
1668 case DT_RELA: name = "RELA"; break;
1669 case DT_RELASZ: name = "RELASZ"; break;
1670 case DT_RELAENT: name = "RELAENT"; break;
1671 case DT_STRSZ: name = "STRSZ"; break;
1672 case DT_SYMENT: name = "SYMENT"; break;
1673 case DT_INIT: name = "INIT"; break;
1674 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1675 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1676 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1677 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1678 case DT_REL: name = "REL"; break;
1679 case DT_RELSZ: name = "RELSZ"; break;
1680 case DT_RELENT: name = "RELENT"; break;
1681 case DT_PLTREL: name = "PLTREL"; break;
1682 case DT_DEBUG: name = "DEBUG"; break;
1683 case DT_TEXTREL: name = "TEXTREL"; break;
1684 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1685 case DT_BIND_NOW: name = "BIND_NOW"; break;
1686 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1687 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1688 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1689 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1690 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1691 case DT_FLAGS: name = "FLAGS"; break;
1692 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1693 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1694 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1695 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1696 case DT_MOVEENT: name = "MOVEENT"; break;
1697 case DT_MOVESZ: name = "MOVESZ"; break;
1698 case DT_FEATURE: name = "FEATURE"; break;
1699 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1700 case DT_SYMINSZ: name = "SYMINSZ"; break;
1701 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1702 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1703 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1704 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1705 case DT_PLTPAD: name = "PLTPAD"; break;
1706 case DT_MOVETAB: name = "MOVETAB"; break;
1707 case DT_SYMINFO: name = "SYMINFO"; break;
1708 case DT_RELACOUNT: name = "RELACOUNT"; break;
1709 case DT_RELCOUNT: name = "RELCOUNT"; break;
1710 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1711 case DT_VERSYM: name = "VERSYM"; break;
1712 case DT_VERDEF: name = "VERDEF"; break;
1713 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1714 case DT_VERNEED: name = "VERNEED"; break;
1715 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1716 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1717 case DT_USED: name = "USED"; break;
b34976b6 1718 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1719 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1720 }
1721
ad9563d6 1722 fprintf (f, " %-20s ", name);
252b5132 1723 if (! stringp)
a1f3c56e
AN
1724 {
1725 fprintf (f, "0x");
1726 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1727 }
252b5132
RH
1728 else
1729 {
1730 const char *string;
dc810e39 1731 unsigned int tagv = dyn.d_un.d_val;
252b5132 1732
dc810e39 1733 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1734 if (string == NULL)
1735 goto error_return;
1736 fprintf (f, "%s", string);
1737 }
1738 fprintf (f, "\n");
1739 }
1740
1741 free (dynbuf);
1742 dynbuf = NULL;
1743 }
1744
1745 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1746 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1747 {
fc0e6df6 1748 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1749 return FALSE;
252b5132
RH
1750 }
1751
1752 if (elf_dynverdef (abfd) != 0)
1753 {
1754 Elf_Internal_Verdef *t;
1755
1756 fprintf (f, _("\nVersion definitions:\n"));
1757 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1758 {
1759 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1760 t->vd_flags, t->vd_hash,
1761 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1762 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1763 {
1764 Elf_Internal_Verdaux *a;
1765
1766 fprintf (f, "\t");
1767 for (a = t->vd_auxptr->vda_nextptr;
1768 a != NULL;
1769 a = a->vda_nextptr)
d0fb9a8d
JJ
1770 fprintf (f, "%s ",
1771 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1772 fprintf (f, "\n");
1773 }
1774 }
1775 }
1776
1777 if (elf_dynverref (abfd) != 0)
1778 {
1779 Elf_Internal_Verneed *t;
1780
1781 fprintf (f, _("\nVersion References:\n"));
1782 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1783 {
1784 Elf_Internal_Vernaux *a;
1785
d0fb9a8d
JJ
1786 fprintf (f, _(" required from %s:\n"),
1787 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1788 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1789 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1790 a->vna_flags, a->vna_other,
1791 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1792 }
1793 }
1794
b34976b6 1795 return TRUE;
252b5132
RH
1796
1797 error_return:
1798 if (dynbuf != NULL)
1799 free (dynbuf);
b34976b6 1800 return FALSE;
252b5132
RH
1801}
1802
bb4d2ac2
L
1803/* Get version string. */
1804
1805const char *
60bb06bc
L
1806_bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1807 bfd_boolean *hidden)
bb4d2ac2
L
1808{
1809 const char *version_string = NULL;
1810 if (elf_dynversym (abfd) != 0
1811 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1812 {
1813 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1814
1815 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1816 vernum &= VERSYM_VERSION;
1817
1818 if (vernum == 0)
1819 version_string = "";
1820 else if (vernum == 1)
1821 version_string = "Base";
1822 else if (vernum <= elf_tdata (abfd)->cverdefs)
1823 version_string =
1824 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1825 else
1826 {
1827 Elf_Internal_Verneed *t;
1828
1829 version_string = "";
1830 for (t = elf_tdata (abfd)->verref;
1831 t != NULL;
1832 t = t->vn_nextref)
1833 {
1834 Elf_Internal_Vernaux *a;
1835
1836 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1837 {
1838 if (a->vna_other == vernum)
1839 {
1840 version_string = a->vna_nodename;
1841 break;
1842 }
1843 }
1844 }
1845 }
1846 }
1847 return version_string;
1848}
1849
252b5132
RH
1850/* Display ELF-specific fields of a symbol. */
1851
1852void
217aa764
AM
1853bfd_elf_print_symbol (bfd *abfd,
1854 void *filep,
1855 asymbol *symbol,
1856 bfd_print_symbol_type how)
252b5132 1857{
a50b1753 1858 FILE *file = (FILE *) filep;
252b5132
RH
1859 switch (how)
1860 {
1861 case bfd_print_symbol_name:
1862 fprintf (file, "%s", symbol->name);
1863 break;
1864 case bfd_print_symbol_more:
1865 fprintf (file, "elf ");
60b89a18 1866 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1867 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1868 break;
1869 case bfd_print_symbol_all:
1870 {
4e8a9624
AM
1871 const char *section_name;
1872 const char *name = NULL;
9c5bfbb7 1873 const struct elf_backend_data *bed;
7a13edea 1874 unsigned char st_other;
dbb410c3 1875 bfd_vma val;
bb4d2ac2
L
1876 const char *version_string;
1877 bfd_boolean hidden;
c044fabd 1878
252b5132 1879 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1880
1881 bed = get_elf_backend_data (abfd);
1882 if (bed->elf_backend_print_symbol_all)
c044fabd 1883 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1884
1885 if (name == NULL)
1886 {
7ee38065 1887 name = symbol->name;
217aa764 1888 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1889 }
1890
252b5132
RH
1891 fprintf (file, " %s\t", section_name);
1892 /* Print the "other" value for a symbol. For common symbols,
1893 we've already printed the size; now print the alignment.
1894 For other symbols, we have no specified alignment, and
1895 we've printed the address; now print the size. */
dcf6c779 1896 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1897 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1898 else
1899 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1900 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1901
1902 /* If we have version information, print it. */
60bb06bc
L
1903 version_string = _bfd_elf_get_symbol_version_string (abfd,
1904 symbol,
1905 &hidden);
bb4d2ac2 1906 if (version_string)
252b5132 1907 {
bb4d2ac2 1908 if (!hidden)
252b5132
RH
1909 fprintf (file, " %-11s", version_string);
1910 else
1911 {
1912 int i;
1913
1914 fprintf (file, " (%s)", version_string);
1915 for (i = 10 - strlen (version_string); i > 0; --i)
1916 putc (' ', file);
1917 }
1918 }
1919
1920 /* If the st_other field is not zero, print it. */
7a13edea 1921 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1922
7a13edea
NC
1923 switch (st_other)
1924 {
1925 case 0: break;
1926 case STV_INTERNAL: fprintf (file, " .internal"); break;
1927 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1928 case STV_PROTECTED: fprintf (file, " .protected"); break;
1929 default:
1930 /* Some other non-defined flags are also present, so print
1931 everything hex. */
1932 fprintf (file, " 0x%02x", (unsigned int) st_other);
1933 }
252b5132 1934
587ff49e 1935 fprintf (file, " %s", name);
252b5132
RH
1936 }
1937 break;
1938 }
1939}
252b5132
RH
1940\f
1941/* ELF .o/exec file reading */
1942
c044fabd 1943/* Create a new bfd section from an ELF section header. */
252b5132 1944
b34976b6 1945bfd_boolean
217aa764 1946bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1947{
4fbb74a6
AM
1948 Elf_Internal_Shdr *hdr;
1949 Elf_Internal_Ehdr *ehdr;
1950 const struct elf_backend_data *bed;
90937f86 1951 const char *name;
bf67003b
NC
1952 bfd_boolean ret = TRUE;
1953 static bfd_boolean * sections_being_created = NULL;
5a4b0ccc 1954 static bfd * sections_being_created_abfd = NULL;
bf67003b 1955 static unsigned int nesting = 0;
252b5132 1956
4fbb74a6
AM
1957 if (shindex >= elf_numsections (abfd))
1958 return FALSE;
1959
bf67003b
NC
1960 if (++ nesting > 3)
1961 {
1962 /* PR17512: A corrupt ELF binary might contain a recursive group of
06614111 1963 sections, with each the string indicies pointing to the next in the
bf67003b
NC
1964 loop. Detect this here, by refusing to load a section that we are
1965 already in the process of loading. We only trigger this test if
1966 we have nested at least three sections deep as normal ELF binaries
5a4b0ccc
NC
1967 can expect to recurse at least once.
1968
1969 FIXME: It would be better if this array was attached to the bfd,
1970 rather than being held in a static pointer. */
1971
1972 if (sections_being_created_abfd != abfd)
1973 sections_being_created = NULL;
bf67003b
NC
1974 if (sections_being_created == NULL)
1975 {
1976 /* FIXME: It would be more efficient to attach this array to the bfd somehow. */
1977 sections_being_created = (bfd_boolean *)
1978 bfd_zalloc (abfd, elf_numsections (abfd) * sizeof (bfd_boolean));
5a4b0ccc 1979 sections_being_created_abfd = abfd;
bf67003b
NC
1980 }
1981 if (sections_being_created [shindex])
1982 {
4eca0228 1983 _bfd_error_handler
bf67003b
NC
1984 (_("%B: warning: loop in section dependencies detected"), abfd);
1985 return FALSE;
1986 }
1987 sections_being_created [shindex] = TRUE;
1988 }
1989
4fbb74a6
AM
1990 hdr = elf_elfsections (abfd)[shindex];
1991 ehdr = elf_elfheader (abfd);
1992 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1993 hdr->sh_name);
933d961a 1994 if (name == NULL)
bf67003b 1995 goto fail;
252b5132 1996
4fbb74a6 1997 bed = get_elf_backend_data (abfd);
252b5132
RH
1998 switch (hdr->sh_type)
1999 {
2000 case SHT_NULL:
2001 /* Inactive section. Throw it away. */
bf67003b 2002 goto success;
252b5132 2003
bf67003b
NC
2004 case SHT_PROGBITS: /* Normal section with contents. */
2005 case SHT_NOBITS: /* .bss section. */
2006 case SHT_HASH: /* .hash section. */
2007 case SHT_NOTE: /* .note section. */
25e27870
L
2008 case SHT_INIT_ARRAY: /* .init_array section. */
2009 case SHT_FINI_ARRAY: /* .fini_array section. */
2010 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 2011 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 2012 case SHT_GNU_HASH: /* .gnu.hash section. */
bf67003b
NC
2013 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2014 goto success;
252b5132 2015
797fc050 2016 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 2017 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2018 goto fail;
2019
cfcac11d
NC
2020 if (hdr->sh_link > elf_numsections (abfd))
2021 {
caa83f8b 2022 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
2023 field set to SHN_BEFORE or SHN_AFTER. */
2024 switch (bfd_get_arch (abfd))
2025 {
caa83f8b 2026 case bfd_arch_i386:
cfcac11d
NC
2027 case bfd_arch_sparc:
2028 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
2029 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
2030 break;
2031 /* Otherwise fall through. */
2032 default:
bf67003b 2033 goto fail;
cfcac11d
NC
2034 }
2035 }
2036 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
bf67003b 2037 goto fail;
cfcac11d 2038 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
2039 {
2040 Elf_Internal_Shdr *dynsymhdr;
2041
2042 /* The shared libraries distributed with hpux11 have a bogus
2043 sh_link field for the ".dynamic" section. Find the
2044 string table for the ".dynsym" section instead. */
2045 if (elf_dynsymtab (abfd) != 0)
2046 {
2047 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2048 hdr->sh_link = dynsymhdr->sh_link;
2049 }
2050 else
2051 {
2052 unsigned int i, num_sec;
2053
2054 num_sec = elf_numsections (abfd);
2055 for (i = 1; i < num_sec; i++)
2056 {
2057 dynsymhdr = elf_elfsections (abfd)[i];
2058 if (dynsymhdr->sh_type == SHT_DYNSYM)
2059 {
2060 hdr->sh_link = dynsymhdr->sh_link;
2061 break;
2062 }
2063 }
2064 }
2065 }
bf67003b 2066 goto success;
797fc050 2067
bf67003b 2068 case SHT_SYMTAB: /* A symbol table. */
252b5132 2069 if (elf_onesymtab (abfd) == shindex)
bf67003b 2070 goto success;
252b5132 2071
a50b2160 2072 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2073 goto fail;
2074
3337c1e5 2075 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
eee3b786
AM
2076 {
2077 if (hdr->sh_size != 0)
bf67003b 2078 goto fail;
eee3b786
AM
2079 /* Some assemblers erroneously set sh_info to one with a
2080 zero sh_size. ld sees this as a global symbol count
2081 of (unsigned) -1. Fix it here. */
2082 hdr->sh_info = 0;
bf67003b 2083 goto success;
eee3b786 2084 }
bf67003b 2085
16ad13ec
NC
2086 /* PR 18854: A binary might contain more than one symbol table.
2087 Unusual, but possible. Warn, but continue. */
2088 if (elf_onesymtab (abfd) != 0)
2089 {
4eca0228 2090 _bfd_error_handler
695344c0 2091 /* xgettext:c-format */
63a5468a
AM
2092 (_("%B: warning: multiple symbol tables detected"
2093 " - ignoring the table in section %u"),
16ad13ec
NC
2094 abfd, shindex);
2095 goto success;
2096 }
252b5132 2097 elf_onesymtab (abfd) = shindex;
6a40cf0c
NC
2098 elf_symtab_hdr (abfd) = *hdr;
2099 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
252b5132
RH
2100 abfd->flags |= HAS_SYMS;
2101
2102 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
2103 SHF_ALLOC is set, and this is a shared object, then we also
2104 treat this section as a BFD section. We can not base the
2105 decision purely on SHF_ALLOC, because that flag is sometimes
2106 set in a relocatable object file, which would confuse the
2107 linker. */
252b5132
RH
2108 if ((hdr->sh_flags & SHF_ALLOC) != 0
2109 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
2110 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2111 shindex))
bf67003b 2112 goto fail;
252b5132 2113
1b3a8575
AM
2114 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2115 can't read symbols without that section loaded as well. It
2116 is most likely specified by the next section header. */
6a40cf0c
NC
2117 {
2118 elf_section_list * entry;
2119 unsigned int i, num_sec;
1b3a8575 2120
6a40cf0c
NC
2121 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2122 if (entry->hdr.sh_link == shindex)
2123 goto success;
2124
2125 num_sec = elf_numsections (abfd);
2126 for (i = shindex + 1; i < num_sec; i++)
2127 {
2128 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2129
2130 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2131 && hdr2->sh_link == shindex)
2132 break;
2133 }
2134
2135 if (i == num_sec)
2136 for (i = 1; i < shindex; i++)
1b3a8575
AM
2137 {
2138 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
6a40cf0c 2139
1b3a8575
AM
2140 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2141 && hdr2->sh_link == shindex)
2142 break;
2143 }
6a40cf0c
NC
2144
2145 if (i != shindex)
2146 ret = bfd_section_from_shdr (abfd, i);
2147 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2148 goto success;
2149 }
252b5132 2150
bf67003b 2151 case SHT_DYNSYM: /* A dynamic symbol table. */
252b5132 2152 if (elf_dynsymtab (abfd) == shindex)
bf67003b 2153 goto success;
252b5132 2154
a50b2160 2155 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2156 goto fail;
2157
eee3b786
AM
2158 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2159 {
2160 if (hdr->sh_size != 0)
bf67003b
NC
2161 goto fail;
2162
eee3b786
AM
2163 /* Some linkers erroneously set sh_info to one with a
2164 zero sh_size. ld sees this as a global symbol count
2165 of (unsigned) -1. Fix it here. */
2166 hdr->sh_info = 0;
bf67003b 2167 goto success;
eee3b786 2168 }
bf67003b 2169
16ad13ec
NC
2170 /* PR 18854: A binary might contain more than one dynamic symbol table.
2171 Unusual, but possible. Warn, but continue. */
2172 if (elf_dynsymtab (abfd) != 0)
2173 {
4eca0228 2174 _bfd_error_handler
695344c0 2175 /* xgettext:c-format */
63a5468a
AM
2176 (_("%B: warning: multiple dynamic symbol tables detected"
2177 " - ignoring the table in section %u"),
16ad13ec
NC
2178 abfd, shindex);
2179 goto success;
2180 }
252b5132
RH
2181 elf_dynsymtab (abfd) = shindex;
2182 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2183 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2184 abfd->flags |= HAS_SYMS;
2185
2186 /* Besides being a symbol table, we also treat this as a regular
2187 section, so that objcopy can handle it. */
bf67003b
NC
2188 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2189 goto success;
252b5132 2190
bf67003b 2191 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
6a40cf0c
NC
2192 {
2193 elf_section_list * entry;
9ad5cbcf 2194
6a40cf0c
NC
2195 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2196 if (entry->ndx == shindex)
2197 goto success;
2198
2199 entry = bfd_alloc (abfd, sizeof * entry);
2200 if (entry == NULL)
2201 goto fail;
2202 entry->ndx = shindex;
2203 entry->hdr = * hdr;
2204 entry->next = elf_symtab_shndx_list (abfd);
2205 elf_symtab_shndx_list (abfd) = entry;
2206 elf_elfsections (abfd)[shindex] = & entry->hdr;
2207 goto success;
2208 }
9ad5cbcf 2209
bf67003b 2210 case SHT_STRTAB: /* A string table. */
252b5132 2211 if (hdr->bfd_section != NULL)
bf67003b
NC
2212 goto success;
2213
252b5132
RH
2214 if (ehdr->e_shstrndx == shindex)
2215 {
2216 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2217 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
bf67003b 2218 goto success;
252b5132 2219 }
bf67003b 2220
1b3a8575
AM
2221 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2222 {
2223 symtab_strtab:
2224 elf_tdata (abfd)->strtab_hdr = *hdr;
2225 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
bf67003b 2226 goto success;
1b3a8575 2227 }
bf67003b 2228
1b3a8575
AM
2229 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2230 {
2231 dynsymtab_strtab:
2232 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2233 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2234 elf_elfsections (abfd)[shindex] = hdr;
2235 /* We also treat this as a regular section, so that objcopy
2236 can handle it. */
bf67003b
NC
2237 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2238 shindex);
2239 goto success;
1b3a8575 2240 }
252b5132 2241
1b3a8575
AM
2242 /* If the string table isn't one of the above, then treat it as a
2243 regular section. We need to scan all the headers to be sure,
2244 just in case this strtab section appeared before the above. */
2245 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2246 {
2247 unsigned int i, num_sec;
252b5132 2248
1b3a8575
AM
2249 num_sec = elf_numsections (abfd);
2250 for (i = 1; i < num_sec; i++)
2251 {
2252 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2253 if (hdr2->sh_link == shindex)
2254 {
933d961a
JJ
2255 /* Prevent endless recursion on broken objects. */
2256 if (i == shindex)
bf67003b 2257 goto fail;
1b3a8575 2258 if (! bfd_section_from_shdr (abfd, i))
bf67003b 2259 goto fail;
1b3a8575
AM
2260 if (elf_onesymtab (abfd) == i)
2261 goto symtab_strtab;
2262 if (elf_dynsymtab (abfd) == i)
2263 goto dynsymtab_strtab;
2264 }
2265 }
2266 }
bf67003b
NC
2267 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2268 goto success;
252b5132
RH
2269
2270 case SHT_REL:
2271 case SHT_RELA:
2272 /* *These* do a lot of work -- but build no sections! */
2273 {
2274 asection *target_sect;
d4730f92 2275 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 2276 unsigned int num_sec = elf_numsections (abfd);
d4730f92 2277 struct bfd_elf_section_data *esdt;
252b5132 2278
aa2ca951
JJ
2279 if (hdr->sh_entsize
2280 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160 2281 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
bf67003b 2282 goto fail;
a50b2160 2283
03ae5f59 2284 /* Check for a bogus link to avoid crashing. */
4fbb74a6 2285 if (hdr->sh_link >= num_sec)
03ae5f59 2286 {
4eca0228 2287 _bfd_error_handler
695344c0 2288 /* xgettext:c-format */
4eca0228
AM
2289 (_("%B: invalid link %lu for reloc section %s (index %u)"),
2290 abfd, hdr->sh_link, name, shindex);
bf67003b
NC
2291 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2292 shindex);
2293 goto success;
03ae5f59
ILT
2294 }
2295
252b5132
RH
2296 /* For some incomprehensible reason Oracle distributes
2297 libraries for Solaris in which some of the objects have
2298 bogus sh_link fields. It would be nice if we could just
2299 reject them, but, unfortunately, some people need to use
2300 them. We scan through the section headers; if we find only
2301 one suitable symbol table, we clobber the sh_link to point
83b89087
L
2302 to it. I hope this doesn't break anything.
2303
2304 Don't do it on executable nor shared library. */
2305 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2306 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
2307 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2308 {
9ad5cbcf 2309 unsigned int scan;
252b5132
RH
2310 int found;
2311
2312 found = 0;
9ad5cbcf 2313 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2314 {
2315 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2316 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2317 {
2318 if (found != 0)
2319 {
2320 found = 0;
2321 break;
2322 }
2323 found = scan;
2324 }
2325 }
2326 if (found != 0)
2327 hdr->sh_link = found;
2328 }
2329
2330 /* Get the symbol table. */
1b3a8575
AM
2331 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2332 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2333 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
bf67003b 2334 goto fail;
252b5132
RH
2335
2336 /* If this reloc section does not use the main symbol table we
2337 don't treat it as a reloc section. BFD can't adequately
2338 represent such a section, so at least for now, we don't
c044fabd 2339 try. We just present it as a normal section. We also
60bcf0fa 2340 can't use it as a reloc section if it points to the null
83b89087
L
2341 section, an invalid section, another reloc section, or its
2342 sh_link points to the null section. */
185ef66d 2343 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 2344 || hdr->sh_link == SHN_UNDEF
185ef66d 2345 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
2346 || hdr->sh_info >= num_sec
2347 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2348 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
bf67003b
NC
2349 {
2350 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2351 shindex);
2352 goto success;
2353 }
252b5132
RH
2354
2355 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
bf67003b
NC
2356 goto fail;
2357
252b5132
RH
2358 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2359 if (target_sect == NULL)
bf67003b 2360 goto fail;
252b5132 2361
d4730f92
BS
2362 esdt = elf_section_data (target_sect);
2363 if (hdr->sh_type == SHT_RELA)
2364 p_hdr = &esdt->rela.hdr;
252b5132 2365 else
d4730f92
BS
2366 p_hdr = &esdt->rel.hdr;
2367
06614111
NC
2368 /* PR 17512: file: 0b4f81b7. */
2369 if (*p_hdr != NULL)
2370 goto fail;
ef53be89 2371 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
d4730f92 2372 if (hdr2 == NULL)
bf67003b 2373 goto fail;
252b5132 2374 *hdr2 = *hdr;
d4730f92 2375 *p_hdr = hdr2;
252b5132 2376 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2377 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2378 target_sect->flags |= SEC_RELOC;
2379 target_sect->relocation = NULL;
2380 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2381 /* In the section to which the relocations apply, mark whether
2382 its relocations are of the REL or RELA variety. */
72730e0c 2383 if (hdr->sh_size != 0)
d4730f92
BS
2384 {
2385 if (hdr->sh_type == SHT_RELA)
2386 target_sect->use_rela_p = 1;
2387 }
252b5132 2388 abfd->flags |= HAS_RELOC;
bf67003b 2389 goto success;
252b5132 2390 }
252b5132
RH
2391
2392 case SHT_GNU_verdef:
2393 elf_dynverdef (abfd) = shindex;
2394 elf_tdata (abfd)->dynverdef_hdr = *hdr;
bf67003b
NC
2395 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2396 goto success;
252b5132
RH
2397
2398 case SHT_GNU_versym:
a50b2160 2399 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
bf67003b
NC
2400 goto fail;
2401
252b5132
RH
2402 elf_dynversym (abfd) = shindex;
2403 elf_tdata (abfd)->dynversym_hdr = *hdr;
bf67003b
NC
2404 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2405 goto success;
252b5132
RH
2406
2407 case SHT_GNU_verneed:
2408 elf_dynverref (abfd) = shindex;
2409 elf_tdata (abfd)->dynverref_hdr = *hdr;
bf67003b
NC
2410 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2411 goto success;
252b5132
RH
2412
2413 case SHT_SHLIB:
bf67003b 2414 goto success;
252b5132 2415
dbb410c3 2416 case SHT_GROUP:
44534af3 2417 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
bf67003b
NC
2418 goto fail;
2419
6dc132d9 2420 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2421 goto fail;
2422
dbb410c3
AM
2423 if (hdr->contents != NULL)
2424 {
2425 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
06614111 2426 unsigned int n_elt = hdr->sh_size / sizeof (* idx);
dbb410c3
AM
2427 asection *s;
2428
06614111
NC
2429 if (n_elt == 0)
2430 goto fail;
b885599b
AM
2431 if (idx->flags & GRP_COMDAT)
2432 hdr->bfd_section->flags
2433 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2434
45c5e9ed
L
2435 /* We try to keep the same section order as it comes in. */
2436 idx += n_elt;
06614111 2437
dbb410c3 2438 while (--n_elt != 0)
1783205a
NC
2439 {
2440 --idx;
2441
2442 if (idx->shdr != NULL
2443 && (s = idx->shdr->bfd_section) != NULL
2444 && elf_next_in_group (s) != NULL)
2445 {
2446 elf_next_in_group (hdr->bfd_section) = s;
2447 break;
2448 }
2449 }
dbb410c3 2450 }
bf67003b 2451 goto success;
dbb410c3 2452
252b5132 2453 default:
104d59d1
JM
2454 /* Possibly an attributes section. */
2455 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2456 || hdr->sh_type == bed->obj_attrs_section_type)
2457 {
2458 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2459 goto fail;
104d59d1 2460 _bfd_elf_parse_attributes (abfd, hdr);
bf67003b 2461 goto success;
104d59d1
JM
2462 }
2463
252b5132 2464 /* Check for any processor-specific section types. */
3eb70a79 2465 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2466 goto success;
3eb70a79
L
2467
2468 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2469 {
2470 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2471 /* FIXME: How to properly handle allocated section reserved
2472 for applications? */
4eca0228 2473 _bfd_error_handler
695344c0 2474 /* xgettext:c-format */
3eb70a79
L
2475 (_("%B: don't know how to handle allocated, application "
2476 "specific section `%s' [0x%8x]"),
2477 abfd, name, hdr->sh_type);
2478 else
bf67003b
NC
2479 {
2480 /* Allow sections reserved for applications. */
2481 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2482 shindex);
2483 goto success;
2484 }
3eb70a79
L
2485 }
2486 else if (hdr->sh_type >= SHT_LOPROC
2487 && hdr->sh_type <= SHT_HIPROC)
2488 /* FIXME: We should handle this section. */
4eca0228 2489 _bfd_error_handler
695344c0 2490 /* xgettext:c-format */
3eb70a79
L
2491 (_("%B: don't know how to handle processor specific section "
2492 "`%s' [0x%8x]"),
2493 abfd, name, hdr->sh_type);
2494 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
2495 {
2496 /* Unrecognised OS-specific sections. */
2497 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2498 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 2499 required to correctly process the section and the file should
ff15b240 2500 be rejected with an error message. */
4eca0228 2501 _bfd_error_handler
695344c0 2502 /* xgettext:c-format */
ff15b240
NC
2503 (_("%B: don't know how to handle OS specific section "
2504 "`%s' [0x%8x]"),
2505 abfd, name, hdr->sh_type);
2506 else
bf67003b
NC
2507 {
2508 /* Otherwise it should be processed. */
2509 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2510 goto success;
2511 }
ff15b240 2512 }
3eb70a79
L
2513 else
2514 /* FIXME: We should handle this section. */
4eca0228 2515 _bfd_error_handler
695344c0 2516 /* xgettext:c-format */
3eb70a79
L
2517 (_("%B: don't know how to handle section `%s' [0x%8x]"),
2518 abfd, name, hdr->sh_type);
2519
bf67003b 2520 goto fail;
252b5132
RH
2521 }
2522
bf67003b
NC
2523 fail:
2524 ret = FALSE;
2525 success:
e5b470e2 2526 if (sections_being_created && sections_being_created_abfd == abfd)
bf67003b
NC
2527 sections_being_created [shindex] = FALSE;
2528 if (-- nesting == 0)
5a4b0ccc
NC
2529 {
2530 sections_being_created = NULL;
2531 sections_being_created_abfd = abfd;
2532 }
bf67003b 2533 return ret;
252b5132
RH
2534}
2535
87d72d41 2536/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2537
87d72d41
AM
2538Elf_Internal_Sym *
2539bfd_sym_from_r_symndx (struct sym_cache *cache,
2540 bfd *abfd,
2541 unsigned long r_symndx)
ec338859 2542{
ec338859
AM
2543 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2544
a5d1b3b5
AM
2545 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2546 {
2547 Elf_Internal_Shdr *symtab_hdr;
2548 unsigned char esym[sizeof (Elf64_External_Sym)];
2549 Elf_External_Sym_Shndx eshndx;
ec338859 2550
a5d1b3b5
AM
2551 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2552 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2553 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2554 return NULL;
9ad5cbcf 2555
a5d1b3b5
AM
2556 if (cache->abfd != abfd)
2557 {
2558 memset (cache->indx, -1, sizeof (cache->indx));
2559 cache->abfd = abfd;
2560 }
2561 cache->indx[ent] = r_symndx;
ec338859 2562 }
a5d1b3b5 2563
87d72d41 2564 return &cache->sym[ent];
ec338859
AM
2565}
2566
252b5132
RH
2567/* Given an ELF section number, retrieve the corresponding BFD
2568 section. */
2569
2570asection *
91d6fa6a 2571bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2572{
91d6fa6a 2573 if (sec_index >= elf_numsections (abfd))
252b5132 2574 return NULL;
91d6fa6a 2575 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2576}
2577
b35d266b 2578static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2579{
0112cd26
NC
2580 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2581 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2582};
2583
b35d266b 2584static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2585{
0112cd26
NC
2586 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2587 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2588};
2589
b35d266b 2590static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2591{
0112cd26
NC
2592 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2593 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
a9a72a65
DE
2594 /* There are more DWARF sections than these, but they needn't be added here
2595 unless you have to cope with broken compilers that don't emit section
2596 attributes or you want to help the user writing assembler. */
0112cd26
NC
2597 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2598 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2599 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2600 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2601 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2602 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2603 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2604 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2605 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2606};
2607
b35d266b 2608static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2609{
6f9dbcd4
AM
2610 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2611 { STRING_COMMA_LEN (".fini_array"), -2, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2612 { NULL, 0 , 0, 0, 0 }
7f4d3958
L
2613};
2614
b35d266b 2615static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2616{
0112cd26 2617 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
68efed41 2618 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
0112cd26
NC
2619 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2620 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2621 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2622 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2623 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2624 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2625 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2626 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2627};
2628
b35d266b 2629static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2630{
0112cd26
NC
2631 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2632 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2633};
2634
b35d266b 2635static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2636{
6f9dbcd4
AM
2637 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2638 { STRING_COMMA_LEN (".init_array"), -2, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2639 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2640 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2641};
2642
b35d266b 2643static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2644{
0112cd26
NC
2645 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2646 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2647};
2648
b35d266b 2649static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2650{
0112cd26
NC
2651 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2652 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2653 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2654};
2655
b35d266b 2656static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2657{
6f9dbcd4
AM
2658 { STRING_COMMA_LEN (".preinit_array"), -2, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2659 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2660 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2661};
2662
b35d266b 2663static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2664{
0112cd26
NC
2665 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2666 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2667 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2668 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2669 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2670};
2671
b35d266b 2672static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2673{
0112cd26
NC
2674 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2675 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2676 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2677 /* See struct bfd_elf_special_section declaration for the semantics of
2678 this special case where .prefix_length != strlen (.prefix). */
2679 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2680 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2681};
2682
b35d266b 2683static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2684{
0112cd26
NC
2685 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2686 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2687 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2688 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2689};
2690
1b315056
CS
2691static const struct bfd_elf_special_section special_sections_z[] =
2692{
2693 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2694 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2695 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2696 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2697 { NULL, 0, 0, 0, 0 }
2698};
2699
e4c93b56 2700static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2701{
7f4d3958 2702 special_sections_b, /* 'b' */
98ece1b3 2703 special_sections_c, /* 'c' */
7f4d3958
L
2704 special_sections_d, /* 'd' */
2705 NULL, /* 'e' */
2706 special_sections_f, /* 'f' */
2707 special_sections_g, /* 'g' */
2708 special_sections_h, /* 'h' */
2709 special_sections_i, /* 'i' */
2710 NULL, /* 'j' */
2711 NULL, /* 'k' */
2712 special_sections_l, /* 'l' */
2713 NULL, /* 'm' */
2714 special_sections_n, /* 'n' */
2715 NULL, /* 'o' */
2716 special_sections_p, /* 'p' */
2717 NULL, /* 'q' */
2718 special_sections_r, /* 'r' */
2719 special_sections_s, /* 's' */
2720 special_sections_t, /* 't' */
1b315056
CS
2721 NULL, /* 'u' */
2722 NULL, /* 'v' */
2723 NULL, /* 'w' */
2724 NULL, /* 'x' */
2725 NULL, /* 'y' */
2726 special_sections_z /* 'z' */
7f4d3958
L
2727};
2728
551b43fd
AM
2729const struct bfd_elf_special_section *
2730_bfd_elf_get_special_section (const char *name,
2731 const struct bfd_elf_special_section *spec,
2732 unsigned int rela)
2f89ff8d
L
2733{
2734 int i;
7f4d3958 2735 int len;
7f4d3958 2736
551b43fd 2737 len = strlen (name);
7f4d3958 2738
551b43fd 2739 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2740 {
2741 int suffix_len;
551b43fd 2742 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2743
2744 if (len < prefix_len)
2745 continue;
551b43fd 2746 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2747 continue;
2748
551b43fd 2749 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2750 if (suffix_len <= 0)
2751 {
2752 if (name[prefix_len] != 0)
2753 {
2754 if (suffix_len == 0)
2755 continue;
2756 if (name[prefix_len] != '.'
2757 && (suffix_len == -2
551b43fd 2758 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2759 continue;
2760 }
2761 }
2762 else
2763 {
2764 if (len < prefix_len + suffix_len)
2765 continue;
2766 if (memcmp (name + len - suffix_len,
551b43fd 2767 spec[i].prefix + prefix_len,
7dcb9820
AM
2768 suffix_len) != 0)
2769 continue;
2770 }
551b43fd 2771 return &spec[i];
7dcb9820 2772 }
2f89ff8d
L
2773
2774 return NULL;
2775}
2776
7dcb9820 2777const struct bfd_elf_special_section *
29ef7005 2778_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2779{
551b43fd
AM
2780 int i;
2781 const struct bfd_elf_special_section *spec;
29ef7005 2782 const struct elf_backend_data *bed;
2f89ff8d
L
2783
2784 /* See if this is one of the special sections. */
551b43fd
AM
2785 if (sec->name == NULL)
2786 return NULL;
2f89ff8d 2787
29ef7005
L
2788 bed = get_elf_backend_data (abfd);
2789 spec = bed->special_sections;
2790 if (spec)
2791 {
2792 spec = _bfd_elf_get_special_section (sec->name,
2793 bed->special_sections,
2794 sec->use_rela_p);
2795 if (spec != NULL)
2796 return spec;
2797 }
2798
551b43fd
AM
2799 if (sec->name[0] != '.')
2800 return NULL;
2f89ff8d 2801
551b43fd 2802 i = sec->name[1] - 'b';
1b315056 2803 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2804 return NULL;
2805
2806 spec = special_sections[i];
2f89ff8d 2807
551b43fd
AM
2808 if (spec == NULL)
2809 return NULL;
2810
2811 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2812}
2813
b34976b6 2814bfd_boolean
217aa764 2815_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2816{
2817 struct bfd_elf_section_data *sdata;
551b43fd 2818 const struct elf_backend_data *bed;
7dcb9820 2819 const struct bfd_elf_special_section *ssect;
252b5132 2820
f0abc2a1
AM
2821 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2822 if (sdata == NULL)
2823 {
a50b1753
NC
2824 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2825 sizeof (*sdata));
f0abc2a1
AM
2826 if (sdata == NULL)
2827 return FALSE;
217aa764 2828 sec->used_by_bfd = sdata;
f0abc2a1 2829 }
bf572ba0 2830
551b43fd
AM
2831 /* Indicate whether or not this section should use RELA relocations. */
2832 bed = get_elf_backend_data (abfd);
2833 sec->use_rela_p = bed->default_use_rela_p;
2834
e843e0f8
L
2835 /* When we read a file, we don't need to set ELF section type and
2836 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2837 anyway. We will set ELF section type and flags for all linker
2838 created sections. If user specifies BFD section flags, we will
2839 set ELF section type and flags based on BFD section flags in
02ecc8e9
L
2840 elf_fake_sections. Special handling for .init_array/.fini_array
2841 output sections since they may contain .ctors/.dtors input
2842 sections. We don't want _bfd_elf_init_private_section_data to
2843 copy ELF section type from .ctors/.dtors input sections. */
2844 if (abfd->direction != read_direction
3496cb2a 2845 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2846 {
551b43fd 2847 ssect = (*bed->get_sec_type_attr) (abfd, sec);
02ecc8e9
L
2848 if (ssect != NULL
2849 && (!sec->flags
2850 || (sec->flags & SEC_LINKER_CREATED) != 0
2851 || ssect->type == SHT_INIT_ARRAY
2852 || ssect->type == SHT_FINI_ARRAY))
a31501e9
L
2853 {
2854 elf_section_type (sec) = ssect->type;
2855 elf_section_flags (sec) = ssect->attr;
2856 }
2f89ff8d
L
2857 }
2858
f592407e 2859 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2860}
2861
2862/* Create a new bfd section from an ELF program header.
2863
2864 Since program segments have no names, we generate a synthetic name
2865 of the form segment<NUM>, where NUM is generally the index in the
2866 program header table. For segments that are split (see below) we
2867 generate the names segment<NUM>a and segment<NUM>b.
2868
2869 Note that some program segments may have a file size that is different than
2870 (less than) the memory size. All this means is that at execution the
2871 system must allocate the amount of memory specified by the memory size,
2872 but only initialize it with the first "file size" bytes read from the
2873 file. This would occur for example, with program segments consisting
2874 of combined data+bss.
2875
2876 To handle the above situation, this routine generates TWO bfd sections
2877 for the single program segment. The first has the length specified by
2878 the file size of the segment, and the second has the length specified
2879 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2880 into its initialized and uninitialized parts.
252b5132
RH
2881
2882 */
2883
b34976b6 2884bfd_boolean
217aa764
AM
2885_bfd_elf_make_section_from_phdr (bfd *abfd,
2886 Elf_Internal_Phdr *hdr,
91d6fa6a 2887 int hdr_index,
a50b1753 2888 const char *type_name)
252b5132
RH
2889{
2890 asection *newsect;
2891 char *name;
2892 char namebuf[64];
d4c88bbb 2893 size_t len;
252b5132
RH
2894 int split;
2895
2896 split = ((hdr->p_memsz > 0)
2897 && (hdr->p_filesz > 0)
2898 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2899
2900 if (hdr->p_filesz > 0)
252b5132 2901 {
91d6fa6a 2902 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2903 len = strlen (namebuf) + 1;
a50b1753 2904 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2905 if (!name)
2906 return FALSE;
2907 memcpy (name, namebuf, len);
2908 newsect = bfd_make_section (abfd, name);
2909 if (newsect == NULL)
2910 return FALSE;
2911 newsect->vma = hdr->p_vaddr;
2912 newsect->lma = hdr->p_paddr;
2913 newsect->size = hdr->p_filesz;
2914 newsect->filepos = hdr->p_offset;
2915 newsect->flags |= SEC_HAS_CONTENTS;
2916 newsect->alignment_power = bfd_log2 (hdr->p_align);
2917 if (hdr->p_type == PT_LOAD)
252b5132 2918 {
d5191d0c
AM
2919 newsect->flags |= SEC_ALLOC;
2920 newsect->flags |= SEC_LOAD;
2921 if (hdr->p_flags & PF_X)
2922 {
2923 /* FIXME: all we known is that it has execute PERMISSION,
2924 may be data. */
2925 newsect->flags |= SEC_CODE;
2926 }
2927 }
2928 if (!(hdr->p_flags & PF_W))
2929 {
2930 newsect->flags |= SEC_READONLY;
252b5132 2931 }
252b5132
RH
2932 }
2933
d5191d0c 2934 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2935 {
d5191d0c
AM
2936 bfd_vma align;
2937
91d6fa6a 2938 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2939 len = strlen (namebuf) + 1;
a50b1753 2940 name = (char *) bfd_alloc (abfd, len);
252b5132 2941 if (!name)
b34976b6 2942 return FALSE;
d4c88bbb 2943 memcpy (name, namebuf, len);
252b5132
RH
2944 newsect = bfd_make_section (abfd, name);
2945 if (newsect == NULL)
b34976b6 2946 return FALSE;
252b5132
RH
2947 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2948 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2949 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2950 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2951 align = newsect->vma & -newsect->vma;
2952 if (align == 0 || align > hdr->p_align)
2953 align = hdr->p_align;
2954 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2955 if (hdr->p_type == PT_LOAD)
2956 {
d5191d0c
AM
2957 /* Hack for gdb. Segments that have not been modified do
2958 not have their contents written to a core file, on the
2959 assumption that a debugger can find the contents in the
2960 executable. We flag this case by setting the fake
2961 section size to zero. Note that "real" bss sections will
2962 always have their contents dumped to the core file. */
2963 if (bfd_get_format (abfd) == bfd_core)
2964 newsect->size = 0;
252b5132
RH
2965 newsect->flags |= SEC_ALLOC;
2966 if (hdr->p_flags & PF_X)
2967 newsect->flags |= SEC_CODE;
2968 }
2969 if (!(hdr->p_flags & PF_W))
2970 newsect->flags |= SEC_READONLY;
2971 }
2972
b34976b6 2973 return TRUE;
252b5132
RH
2974}
2975
b34976b6 2976bfd_boolean
91d6fa6a 2977bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2978{
9c5bfbb7 2979 const struct elf_backend_data *bed;
20cfcaae
NC
2980
2981 switch (hdr->p_type)
2982 {
2983 case PT_NULL:
91d6fa6a 2984 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2985
2986 case PT_LOAD:
91d6fa6a 2987 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2988
2989 case PT_DYNAMIC:
91d6fa6a 2990 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2991
2992 case PT_INTERP:
91d6fa6a 2993 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2994
2995 case PT_NOTE:
91d6fa6a 2996 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2997 return FALSE;
718175fa 2998 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2999 return FALSE;
3000 return TRUE;
20cfcaae
NC
3001
3002 case PT_SHLIB:
91d6fa6a 3003 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
3004
3005 case PT_PHDR:
91d6fa6a 3006 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 3007
811072d8 3008 case PT_GNU_EH_FRAME:
91d6fa6a 3009 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
3010 "eh_frame_hdr");
3011
2b05f1b7 3012 case PT_GNU_STACK:
91d6fa6a 3013 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 3014
8c37241b 3015 case PT_GNU_RELRO:
91d6fa6a 3016 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 3017
20cfcaae 3018 default:
8c1acd09 3019 /* Check for any processor-specific program segment types. */
20cfcaae 3020 bed = get_elf_backend_data (abfd);
91d6fa6a 3021 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
3022 }
3023}
3024
d4730f92
BS
3025/* Return the REL_HDR for SEC, assuming there is only a single one, either
3026 REL or RELA. */
3027
3028Elf_Internal_Shdr *
3029_bfd_elf_single_rel_hdr (asection *sec)
3030{
3031 if (elf_section_data (sec)->rel.hdr)
3032 {
3033 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3034 return elf_section_data (sec)->rel.hdr;
3035 }
3036 else
3037 return elf_section_data (sec)->rela.hdr;
3038}
3039
3e19fb8f
L
3040static bfd_boolean
3041_bfd_elf_set_reloc_sh_name (bfd *abfd,
3042 Elf_Internal_Shdr *rel_hdr,
3043 const char *sec_name,
3044 bfd_boolean use_rela_p)
3045{
3046 char *name = (char *) bfd_alloc (abfd,
3047 sizeof ".rela" + strlen (sec_name));
3048 if (name == NULL)
3049 return FALSE;
3050
3051 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3052 rel_hdr->sh_name =
3053 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3054 FALSE);
3055 if (rel_hdr->sh_name == (unsigned int) -1)
3056 return FALSE;
3057
3058 return TRUE;
3059}
3060
d4730f92
BS
3061/* Allocate and initialize a section-header for a new reloc section,
3062 containing relocations against ASECT. It is stored in RELDATA. If
3063 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3064 relocations. */
23bc299b 3065
5d13b3b3 3066static bfd_boolean
217aa764 3067_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 3068 struct bfd_elf_section_reloc_data *reldata,
f6fe1ccd 3069 const char *sec_name,
3e19fb8f
L
3070 bfd_boolean use_rela_p,
3071 bfd_boolean delay_st_name_p)
23bc299b 3072{
d4730f92 3073 Elf_Internal_Shdr *rel_hdr;
9c5bfbb7 3074 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3075
d4730f92 3076 BFD_ASSERT (reldata->hdr == NULL);
ef53be89 3077 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
d4730f92 3078 reldata->hdr = rel_hdr;
23bc299b 3079
3e19fb8f
L
3080 if (delay_st_name_p)
3081 rel_hdr->sh_name = (unsigned int) -1;
3082 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3083 use_rela_p))
b34976b6 3084 return FALSE;
23bc299b
MM
3085 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3086 rel_hdr->sh_entsize = (use_rela_p
3087 ? bed->s->sizeof_rela
3088 : bed->s->sizeof_rel);
72de5009 3089 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
3090 rel_hdr->sh_flags = 0;
3091 rel_hdr->sh_addr = 0;
3092 rel_hdr->sh_size = 0;
3093 rel_hdr->sh_offset = 0;
3094
b34976b6 3095 return TRUE;
23bc299b
MM
3096}
3097
94be91de
JB
3098/* Return the default section type based on the passed in section flags. */
3099
3100int
3101bfd_elf_get_default_section_type (flagword flags)
3102{
3103 if ((flags & SEC_ALLOC) != 0
2e76e85a 3104 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
3105 return SHT_NOBITS;
3106 return SHT_PROGBITS;
3107}
3108
d4730f92
BS
3109struct fake_section_arg
3110{
3111 struct bfd_link_info *link_info;
3112 bfd_boolean failed;
3113};
3114
252b5132
RH
3115/* Set up an ELF internal section header for a section. */
3116
252b5132 3117static void
d4730f92 3118elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 3119{
d4730f92 3120 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 3121 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3122 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 3123 Elf_Internal_Shdr *this_hdr;
0414f35b 3124 unsigned int sh_type;
0ce398f1 3125 const char *name = asect->name;
3e19fb8f 3126 bfd_boolean delay_st_name_p = FALSE;
252b5132 3127
d4730f92 3128 if (arg->failed)
252b5132
RH
3129 {
3130 /* We already failed; just get out of the bfd_map_over_sections
08a40648 3131 loop. */
252b5132
RH
3132 return;
3133 }
3134
d4730f92 3135 this_hdr = &esd->this_hdr;
252b5132 3136
f6fe1ccd 3137 if (arg->link_info)
0ce398f1 3138 {
f6fe1ccd
L
3139 /* ld: compress DWARF debug sections with names: .debug_*. */
3140 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
3141 && (asect->flags & SEC_DEBUGGING)
3142 && name[1] == 'd'
3143 && name[6] == '_')
3144 {
3145 /* Set SEC_ELF_COMPRESS to indicate this section should be
3146 compressed. */
3147 asect->flags |= SEC_ELF_COMPRESS;
0ce398f1 3148
dd905818 3149 /* If this section will be compressed, delay adding section
3e19fb8f
L
3150 name to section name section after it is compressed in
3151 _bfd_elf_assign_file_positions_for_non_load. */
3152 delay_st_name_p = TRUE;
f6fe1ccd
L
3153 }
3154 }
3155 else if ((asect->flags & SEC_ELF_RENAME))
3156 {
3157 /* objcopy: rename output DWARF debug section. */
3158 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
3159 {
3160 /* When we decompress or compress with SHF_COMPRESSED,
3161 convert section name from .zdebug_* to .debug_* if
3162 needed. */
3163 if (name[1] == 'z')
3164 {
3165 char *new_name = convert_zdebug_to_debug (abfd, name);
3166 if (new_name == NULL)
3167 {
3168 arg->failed = TRUE;
3169 return;
3170 }
3171 name = new_name;
3172 }
3173 }
3174 else if (asect->compress_status == COMPRESS_SECTION_DONE)
0ce398f1 3175 {
f6fe1ccd
L
3176 /* PR binutils/18087: Compression does not always make a
3177 section smaller. So only rename the section when
3178 compression has actually taken place. If input section
3179 name is .zdebug_*, we should never compress it again. */
3180 char *new_name = convert_debug_to_zdebug (abfd, name);
0ce398f1
L
3181 if (new_name == NULL)
3182 {
3183 arg->failed = TRUE;
3184 return;
3185 }
f6fe1ccd
L
3186 BFD_ASSERT (name[1] != 'z');
3187 name = new_name;
0ce398f1
L
3188 }
3189 }
3190
3e19fb8f
L
3191 if (delay_st_name_p)
3192 this_hdr->sh_name = (unsigned int) -1;
3193 else
252b5132 3194 {
3e19fb8f
L
3195 this_hdr->sh_name
3196 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3197 name, FALSE);
3198 if (this_hdr->sh_name == (unsigned int) -1)
3199 {
3200 arg->failed = TRUE;
3201 return;
3202 }
252b5132
RH
3203 }
3204
a4d8e49b 3205 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
3206
3207 if ((asect->flags & SEC_ALLOC) != 0
3208 || asect->user_set_vma)
3209 this_hdr->sh_addr = asect->vma;
3210 else
3211 this_hdr->sh_addr = 0;
3212
3213 this_hdr->sh_offset = 0;
eea6121a 3214 this_hdr->sh_size = asect->size;
252b5132 3215 this_hdr->sh_link = 0;
c86934ce
NC
3216 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3217 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3218 {
4eca0228 3219 _bfd_error_handler
695344c0 3220 /* xgettext:c-format */
c86934ce 3221 (_("%B: error: Alignment power %d of section `%A' is too big"),
c08bb8dd 3222 abfd, asect->alignment_power, asect);
c86934ce
NC
3223 arg->failed = TRUE;
3224 return;
3225 }
72de5009 3226 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
3227 /* The sh_entsize and sh_info fields may have been set already by
3228 copy_private_section_data. */
3229
3230 this_hdr->bfd_section = asect;
3231 this_hdr->contents = NULL;
3232
3cddba1e
L
3233 /* If the section type is unspecified, we set it based on
3234 asect->flags. */
98ece1b3
AM
3235 if ((asect->flags & SEC_GROUP) != 0)
3236 sh_type = SHT_GROUP;
98ece1b3 3237 else
94be91de 3238 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 3239
3cddba1e 3240 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
3241 this_hdr->sh_type = sh_type;
3242 else if (this_hdr->sh_type == SHT_NOBITS
3243 && sh_type == SHT_PROGBITS
3244 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 3245 {
98ece1b3
AM
3246 /* Warn if we are changing a NOBITS section to PROGBITS, but
3247 allow the link to proceed. This can happen when users link
3248 non-bss input sections to bss output sections, or emit data
3249 to a bss output section via a linker script. */
4eca0228 3250 _bfd_error_handler
58f0869b 3251 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 3252 this_hdr->sh_type = sh_type;
3cddba1e
L
3253 }
3254
2f89ff8d 3255 switch (this_hdr->sh_type)
252b5132 3256 {
2f89ff8d 3257 default:
2f89ff8d
L
3258 break;
3259
3260 case SHT_STRTAB:
2f89ff8d
L
3261 case SHT_NOTE:
3262 case SHT_NOBITS:
3263 case SHT_PROGBITS:
3264 break;
606851fb
AM
3265
3266 case SHT_INIT_ARRAY:
3267 case SHT_FINI_ARRAY:
3268 case SHT_PREINIT_ARRAY:
3269 this_hdr->sh_entsize = bed->s->arch_size / 8;
3270 break;
2f89ff8d
L
3271
3272 case SHT_HASH:
c7ac6ff8 3273 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 3274 break;
5de3bf90 3275
2f89ff8d 3276 case SHT_DYNSYM:
252b5132 3277 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
3278 break;
3279
3280 case SHT_DYNAMIC:
252b5132 3281 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
3282 break;
3283
3284 case SHT_RELA:
3285 if (get_elf_backend_data (abfd)->may_use_rela_p)
3286 this_hdr->sh_entsize = bed->s->sizeof_rela;
3287 break;
3288
3289 case SHT_REL:
3290 if (get_elf_backend_data (abfd)->may_use_rel_p)
3291 this_hdr->sh_entsize = bed->s->sizeof_rel;
3292 break;
3293
3294 case SHT_GNU_versym:
252b5132 3295 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
3296 break;
3297
3298 case SHT_GNU_verdef:
252b5132
RH
3299 this_hdr->sh_entsize = 0;
3300 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3301 cverdefs. The linker will set cverdefs, but sh_info will be
3302 zero. */
252b5132
RH
3303 if (this_hdr->sh_info == 0)
3304 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3305 else
3306 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3307 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
3308 break;
3309
3310 case SHT_GNU_verneed:
252b5132
RH
3311 this_hdr->sh_entsize = 0;
3312 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3313 cverrefs. The linker will set cverrefs, but sh_info will be
3314 zero. */
252b5132
RH
3315 if (this_hdr->sh_info == 0)
3316 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3317 else
3318 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3319 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
3320 break;
3321
3322 case SHT_GROUP:
1783205a 3323 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 3324 break;
fdc90cb4
JJ
3325
3326 case SHT_GNU_HASH:
3327 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3328 break;
dbb410c3 3329 }
252b5132
RH
3330
3331 if ((asect->flags & SEC_ALLOC) != 0)
3332 this_hdr->sh_flags |= SHF_ALLOC;
3333 if ((asect->flags & SEC_READONLY) == 0)
3334 this_hdr->sh_flags |= SHF_WRITE;
3335 if ((asect->flags & SEC_CODE) != 0)
3336 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
3337 if ((asect->flags & SEC_MERGE) != 0)
3338 {
3339 this_hdr->sh_flags |= SHF_MERGE;
3340 this_hdr->sh_entsize = asect->entsize;
f5fa8ca2 3341 }
84865015
NC
3342 if ((asect->flags & SEC_STRINGS) != 0)
3343 this_hdr->sh_flags |= SHF_STRINGS;
1126897b 3344 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 3345 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 3346 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
3347 {
3348 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
3349 if (asect->size == 0
3350 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 3351 {
3a800eb9 3352 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 3353
704afa60 3354 this_hdr->sh_size = 0;
3a800eb9
AM
3355 if (o != NULL)
3356 {
704afa60 3357 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
3358 if (this_hdr->sh_size != 0)
3359 this_hdr->sh_type = SHT_NOBITS;
3360 }
704afa60
JJ
3361 }
3362 }
18ae9cc1
L
3363 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3364 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 3365
d4730f92
BS
3366 /* If the section has relocs, set up a section header for the
3367 SHT_REL[A] section. If two relocation sections are required for
3368 this section, it is up to the processor-specific back-end to
3369 create the other. */
3370 if ((asect->flags & SEC_RELOC) != 0)
3371 {
3372 /* When doing a relocatable link, create both REL and RELA sections if
3373 needed. */
3374 if (arg->link_info
3375 /* Do the normal setup if we wouldn't create any sections here. */
3376 && esd->rel.count + esd->rela.count > 0
0e1862bb
L
3377 && (bfd_link_relocatable (arg->link_info)
3378 || arg->link_info->emitrelocations))
d4730f92
BS
3379 {
3380 if (esd->rel.count && esd->rel.hdr == NULL
3e19fb8f
L
3381 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name, FALSE,
3382 delay_st_name_p))
d4730f92
BS
3383 {
3384 arg->failed = TRUE;
3385 return;
3386 }
3387 if (esd->rela.count && esd->rela.hdr == NULL
3e19fb8f
L
3388 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name, TRUE,
3389 delay_st_name_p))
d4730f92
BS
3390 {
3391 arg->failed = TRUE;
3392 return;
3393 }
3394 }
3395 else if (!_bfd_elf_init_reloc_shdr (abfd,
3396 (asect->use_rela_p
3397 ? &esd->rela : &esd->rel),
f6fe1ccd 3398 name,
3e19fb8f
L
3399 asect->use_rela_p,
3400 delay_st_name_p))
d4730f92
BS
3401 arg->failed = TRUE;
3402 }
3403
252b5132 3404 /* Check for processor-specific section types. */
0414f35b 3405 sh_type = this_hdr->sh_type;
e1fddb6b
AO
3406 if (bed->elf_backend_fake_sections
3407 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
d4730f92 3408 arg->failed = TRUE;
252b5132 3409
42bb2e33 3410 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
3411 {
3412 /* Don't change the header type from NOBITS if we are being
42bb2e33 3413 called for objcopy --only-keep-debug. */
0414f35b
AM
3414 this_hdr->sh_type = sh_type;
3415 }
252b5132
RH
3416}
3417
bcacc0f5
AM
3418/* Fill in the contents of a SHT_GROUP section. Called from
3419 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3420 when ELF targets use the generic linker, ld. Called for ld -r
3421 from bfd_elf_final_link. */
dbb410c3 3422
1126897b 3423void
217aa764 3424bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 3425{
a50b1753 3426 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 3427 asection *elt, *first;
dbb410c3 3428 unsigned char *loc;
b34976b6 3429 bfd_boolean gas;
dbb410c3 3430
7e4111ad
L
3431 /* Ignore linker created group section. See elfNN_ia64_object_p in
3432 elfxx-ia64.c. */
3433 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
3434 || *failedptr)
3435 return;
3436
bcacc0f5
AM
3437 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3438 {
3439 unsigned long symindx = 0;
3440
3441 /* elf_group_id will have been set up by objcopy and the
3442 generic linker. */
3443 if (elf_group_id (sec) != NULL)
3444 symindx = elf_group_id (sec)->udata.i;
1126897b 3445
bcacc0f5
AM
3446 if (symindx == 0)
3447 {
3448 /* If called from the assembler, swap_out_syms will have set up
3449 elf_section_syms. */
3450 BFD_ASSERT (elf_section_syms (abfd) != NULL);
3451 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3452 }
3453 elf_section_data (sec)->this_hdr.sh_info = symindx;
3454 }
3455 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 3456 {
bcacc0f5
AM
3457 /* The ELF backend linker sets sh_info to -2 when the group
3458 signature symbol is global, and thus the index can't be
3459 set until all local symbols are output. */
53720c49
AM
3460 asection *igroup;
3461 struct bfd_elf_section_data *sec_data;
3462 unsigned long symndx;
3463 unsigned long extsymoff;
bcacc0f5
AM
3464 struct elf_link_hash_entry *h;
3465
53720c49
AM
3466 /* The point of this little dance to the first SHF_GROUP section
3467 then back to the SHT_GROUP section is that this gets us to
3468 the SHT_GROUP in the input object. */
3469 igroup = elf_sec_group (elf_next_in_group (sec));
3470 sec_data = elf_section_data (igroup);
3471 symndx = sec_data->this_hdr.sh_info;
3472 extsymoff = 0;
bcacc0f5
AM
3473 if (!elf_bad_symtab (igroup->owner))
3474 {
3475 Elf_Internal_Shdr *symtab_hdr;
3476
3477 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3478 extsymoff = symtab_hdr->sh_info;
3479 }
3480 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3481 while (h->root.type == bfd_link_hash_indirect
3482 || h->root.type == bfd_link_hash_warning)
3483 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3484
3485 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 3486 }
dbb410c3 3487
1126897b 3488 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 3489 gas = TRUE;
dbb410c3
AM
3490 if (sec->contents == NULL)
3491 {
b34976b6 3492 gas = FALSE;
a50b1753 3493 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
3494
3495 /* Arrange for the section to be written out. */
3496 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
3497 if (sec->contents == NULL)
3498 {
b34976b6 3499 *failedptr = TRUE;
dbb410c3
AM
3500 return;
3501 }
3502 }
3503
eea6121a 3504 loc = sec->contents + sec->size;
dbb410c3 3505
9dce4196
AM
3506 /* Get the pointer to the first section in the group that gas
3507 squirreled away here. objcopy arranges for this to be set to the
3508 start of the input section group. */
3509 first = elt = elf_next_in_group (sec);
dbb410c3
AM
3510
3511 /* First element is a flag word. Rest of section is elf section
3512 indices for all the sections of the group. Write them backwards
3513 just to keep the group in the same order as given in .section
3514 directives, not that it matters. */
3515 while (elt != NULL)
3516 {
9dce4196 3517 asection *s;
9dce4196 3518
9dce4196 3519 s = elt;
415f38a6
AM
3520 if (!gas)
3521 s = s->output_section;
3522 if (s != NULL
3523 && !bfd_is_abs_section (s))
01e1a5bc 3524 {
415f38a6
AM
3525 unsigned int idx = elf_section_data (s)->this_idx;
3526
01e1a5bc 3527 loc -= 4;
01e1a5bc
NC
3528 H_PUT_32 (abfd, idx, loc);
3529 }
945906ff 3530 elt = elf_next_in_group (elt);
9dce4196
AM
3531 if (elt == first)
3532 break;
dbb410c3
AM
3533 }
3534
3d7f7666 3535 if ((loc -= 4) != sec->contents)
9dce4196 3536 abort ();
dbb410c3 3537
9dce4196 3538 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
3539}
3540
bd53a53a
L
3541/* Return the section which RELOC_SEC applies to. */
3542
3543asection *
3544_bfd_elf_get_reloc_section (asection *reloc_sec)
3545{
3546 const char *name;
3547 unsigned int type;
3548 bfd *abfd;
3549
3550 if (reloc_sec == NULL)
3551 return NULL;
3552
3553 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3554 if (type != SHT_REL && type != SHT_RELA)
3555 return NULL;
3556
3557 /* We look up the section the relocs apply to by name. */
3558 name = reloc_sec->name;
3559 if (type == SHT_REL)
3560 name += 4;
3561 else
3562 name += 5;
3563
3564 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3565 section apply to .got.plt section. */
3566 abfd = reloc_sec->owner;
3567 if (get_elf_backend_data (abfd)->want_got_plt
3568 && strcmp (name, ".plt") == 0)
87070c08
AM
3569 {
3570 /* .got.plt is a linker created input section. It may be mapped
3571 to some other output section. Try two likely sections. */
3572 name = ".got.plt";
3573 reloc_sec = bfd_get_section_by_name (abfd, name);
3574 if (reloc_sec != NULL)
3575 return reloc_sec;
3576 name = ".got";
3577 }
bd53a53a
L
3578
3579 reloc_sec = bfd_get_section_by_name (abfd, name);
3580 return reloc_sec;
3581}
3582
252b5132
RH
3583/* Assign all ELF section numbers. The dummy first section is handled here
3584 too. The link/info pointers for the standard section types are filled
3585 in here too, while we're at it. */
3586
b34976b6 3587static bfd_boolean
da9f89d4 3588assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
3589{
3590 struct elf_obj_tdata *t = elf_tdata (abfd);
3591 asection *sec;
3e19fb8f 3592 unsigned int section_number;
252b5132 3593 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 3594 struct bfd_elf_section_data *d;
3516e984 3595 bfd_boolean need_symtab;
252b5132
RH
3596
3597 section_number = 1;
3598
2b0f7ef9
JJ
3599 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3600
da9f89d4 3601 /* SHT_GROUP sections are in relocatable files only. */
0e1862bb 3602 if (link_info == NULL || bfd_link_relocatable (link_info))
252b5132 3603 {
ef53be89 3604 size_t reloc_count = 0;
14f2c699 3605
da9f89d4 3606 /* Put SHT_GROUP sections first. */
04dd1667 3607 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 3608 {
5daa8fe7 3609 d = elf_section_data (sec);
da9f89d4
L
3610
3611 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 3612 {
5daa8fe7 3613 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
3614 {
3615 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 3616 bfd_section_list_remove (abfd, sec);
da9f89d4 3617 abfd->section_count--;
da9f89d4 3618 }
08a40648 3619 else
4fbb74a6 3620 d->this_idx = section_number++;
da9f89d4 3621 }
14f2c699
L
3622
3623 /* Count relocations. */
3624 reloc_count += sec->reloc_count;
47cc2cf5 3625 }
14f2c699
L
3626
3627 /* Clear HAS_RELOC if there are no relocations. */
3628 if (reloc_count == 0)
3629 abfd->flags &= ~HAS_RELOC;
47cc2cf5
PB
3630 }
3631
3632 for (sec = abfd->sections; sec; sec = sec->next)
3633 {
3634 d = elf_section_data (sec);
3635
3636 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 3637 d->this_idx = section_number++;
3e19fb8f
L
3638 if (d->this_hdr.sh_name != (unsigned int) -1)
3639 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 3640 if (d->rel.hdr)
2b0f7ef9 3641 {
d4730f92 3642 d->rel.idx = section_number++;
3e19fb8f
L
3643 if (d->rel.hdr->sh_name != (unsigned int) -1)
3644 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 3645 }
d4730f92
BS
3646 else
3647 d->rel.idx = 0;
23bc299b 3648
d4730f92 3649 if (d->rela.hdr)
2b0f7ef9 3650 {
d4730f92 3651 d->rela.idx = section_number++;
3e19fb8f
L
3652 if (d->rela.hdr->sh_name != (unsigned int) -1)
3653 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 3654 }
23bc299b 3655 else
d4730f92 3656 d->rela.idx = 0;
252b5132
RH
3657 }
3658
3516e984
L
3659 need_symtab = (bfd_get_symcount (abfd) > 0
3660 || (link_info == NULL
3661 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3662 == HAS_RELOC)));
3663 if (need_symtab)
252b5132 3664 {
12bd6957 3665 elf_onesymtab (abfd) = section_number++;
2b0f7ef9 3666 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 3667 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 3668 {
6a40cf0c
NC
3669 elf_section_list * entry;
3670
3671 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3672
3673 entry = bfd_zalloc (abfd, sizeof * entry);
3674 entry->ndx = section_number++;
3675 elf_symtab_shndx_list (abfd) = entry;
3676 entry->hdr.sh_name
9ad5cbcf 3677 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3678 ".symtab_shndx", FALSE);
6a40cf0c 3679 if (entry->hdr.sh_name == (unsigned int) -1)
b34976b6 3680 return FALSE;
9ad5cbcf 3681 }
12bd6957 3682 elf_strtab_sec (abfd) = section_number++;
2b0f7ef9 3683 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3684 }
3685
dd905818
NC
3686 elf_shstrtab_sec (abfd) = section_number++;
3687 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3688 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3689
1c52a645
L
3690 if (section_number >= SHN_LORESERVE)
3691 {
695344c0 3692 /* xgettext:c-format */
1c52a645
L
3693 _bfd_error_handler (_("%B: too many sections: %u"),
3694 abfd, section_number);
3695 return FALSE;
3696 }
3697
9ad5cbcf 3698 elf_numsections (abfd) = section_number;
252b5132
RH
3699 elf_elfheader (abfd)->e_shnum = section_number;
3700
3701 /* Set up the list of section header pointers, in agreement with the
3702 indices. */
a50b1753
NC
3703 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
3704 sizeof (Elf_Internal_Shdr *));
252b5132 3705 if (i_shdrp == NULL)
b34976b6 3706 return FALSE;
252b5132 3707
a50b1753
NC
3708 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3709 sizeof (Elf_Internal_Shdr));
252b5132
RH
3710 if (i_shdrp[0] == NULL)
3711 {
3712 bfd_release (abfd, i_shdrp);
b34976b6 3713 return FALSE;
252b5132 3714 }
252b5132
RH
3715
3716 elf_elfsections (abfd) = i_shdrp;
3717
12bd6957 3718 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3516e984 3719 if (need_symtab)
252b5132 3720 {
12bd6957 3721 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
4fbb74a6 3722 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf 3723 {
6a40cf0c
NC
3724 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3725 BFD_ASSERT (entry != NULL);
3726 i_shdrp[entry->ndx] = & entry->hdr;
3727 entry->hdr.sh_link = elf_onesymtab (abfd);
9ad5cbcf 3728 }
12bd6957
AM
3729 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3730 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
252b5132 3731 }
38ce5b11 3732
252b5132
RH
3733 for (sec = abfd->sections; sec; sec = sec->next)
3734 {
252b5132 3735 asection *s;
252b5132 3736
91d6fa6a
NC
3737 d = elf_section_data (sec);
3738
252b5132 3739 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3740 if (d->rel.idx != 0)
3741 i_shdrp[d->rel.idx] = d->rel.hdr;
3742 if (d->rela.idx != 0)
3743 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3744
3745 /* Fill in the sh_link and sh_info fields while we're at it. */
3746
3747 /* sh_link of a reloc section is the section index of the symbol
3748 table. sh_info is the section index of the section to which
3749 the relocation entries apply. */
d4730f92 3750 if (d->rel.idx != 0)
252b5132 3751 {
12bd6957 3752 d->rel.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3753 d->rel.hdr->sh_info = d->this_idx;
9ef5d938 3754 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
252b5132 3755 }
d4730f92 3756 if (d->rela.idx != 0)
23bc299b 3757 {
12bd6957 3758 d->rela.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3759 d->rela.hdr->sh_info = d->this_idx;
9ef5d938 3760 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
23bc299b 3761 }
252b5132 3762
38ce5b11
L
3763 /* We need to set up sh_link for SHF_LINK_ORDER. */
3764 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3765 {
3766 s = elf_linked_to_section (sec);
3767 if (s)
38ce5b11 3768 {
f2876037 3769 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3770 if (link_info != NULL)
38ce5b11 3771 {
f2876037 3772 /* Check discarded linkonce section. */
dbaa2011 3773 if (discarded_section (s))
38ce5b11 3774 {
ccd2ec6a 3775 asection *kept;
4eca0228 3776 _bfd_error_handler
695344c0 3777 /* xgettext:c-format */
63a5468a
AM
3778 (_("%B: sh_link of section `%A' points to"
3779 " discarded section `%A' of `%B'"),
ccd2ec6a
L
3780 abfd, d->this_hdr.bfd_section,
3781 s, s->owner);
3782 /* Point to the kept section if it has the same
3783 size as the discarded one. */
c0f00686 3784 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3785 if (kept == NULL)
185d09ad 3786 {
ccd2ec6a
L
3787 bfd_set_error (bfd_error_bad_value);
3788 return FALSE;
185d09ad 3789 }
ccd2ec6a 3790 s = kept;
38ce5b11 3791 }
e424ecc8 3792
ccd2ec6a
L
3793 s = s->output_section;
3794 BFD_ASSERT (s != NULL);
38ce5b11 3795 }
f2876037
L
3796 else
3797 {
3798 /* Handle objcopy. */
3799 if (s->output_section == NULL)
3800 {
4eca0228 3801 _bfd_error_handler
695344c0 3802 /* xgettext:c-format */
63a5468a
AM
3803 (_("%B: sh_link of section `%A' points to"
3804 " removed section `%A' of `%B'"),
f2876037
L
3805 abfd, d->this_hdr.bfd_section, s, s->owner);
3806 bfd_set_error (bfd_error_bad_value);
3807 return FALSE;
3808 }
3809 s = s->output_section;
3810 }
ccd2ec6a
L
3811 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3812 }
3813 else
3814 {
3815 /* PR 290:
3816 The Intel C compiler generates SHT_IA_64_UNWIND with
3817 SHF_LINK_ORDER. But it doesn't set the sh_link or
3818 sh_info fields. Hence we could get the situation
08a40648 3819 where s is NULL. */
ccd2ec6a
L
3820 const struct elf_backend_data *bed
3821 = get_elf_backend_data (abfd);
3822 if (bed->link_order_error_handler)
3823 bed->link_order_error_handler
695344c0 3824 /* xgettext:c-format */
ccd2ec6a
L
3825 (_("%B: warning: sh_link not set for section `%A'"),
3826 abfd, sec);
38ce5b11
L
3827 }
3828 }
3829
252b5132
RH
3830 switch (d->this_hdr.sh_type)
3831 {
3832 case SHT_REL:
3833 case SHT_RELA:
3834 /* A reloc section which we are treating as a normal BFD
3835 section. sh_link is the section index of the symbol
3836 table. sh_info is the section index of the section to
3837 which the relocation entries apply. We assume that an
3838 allocated reloc section uses the dynamic symbol table.
3839 FIXME: How can we be sure? */
3840 s = bfd_get_section_by_name (abfd, ".dynsym");
3841 if (s != NULL)
3842 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3843
bd53a53a 3844 s = get_elf_backend_data (abfd)->get_reloc_section (sec);
252b5132 3845 if (s != NULL)
9ef5d938
L
3846 {
3847 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3848 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3849 }
252b5132
RH
3850 break;
3851
3852 case SHT_STRTAB:
3853 /* We assume that a section named .stab*str is a stabs
3854 string section. We look for a section with the same name
3855 but without the trailing ``str'', and set its sh_link
3856 field to point to this section. */
0112cd26 3857 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3858 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3859 {
3860 size_t len;
3861 char *alc;
3862
3863 len = strlen (sec->name);
a50b1753 3864 alc = (char *) bfd_malloc (len - 2);
252b5132 3865 if (alc == NULL)
b34976b6 3866 return FALSE;
d4c88bbb 3867 memcpy (alc, sec->name, len - 3);
252b5132
RH
3868 alc[len - 3] = '\0';
3869 s = bfd_get_section_by_name (abfd, alc);
3870 free (alc);
3871 if (s != NULL)
3872 {
3873 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3874
3875 /* This is a .stab section. */
0594c12d
AM
3876 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3877 elf_section_data (s)->this_hdr.sh_entsize
3878 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3879 }
3880 }
3881 break;
3882
3883 case SHT_DYNAMIC:
3884 case SHT_DYNSYM:
3885 case SHT_GNU_verneed:
3886 case SHT_GNU_verdef:
3887 /* sh_link is the section header index of the string table
3888 used for the dynamic entries, or the symbol table, or the
3889 version strings. */
3890 s = bfd_get_section_by_name (abfd, ".dynstr");
3891 if (s != NULL)
3892 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3893 break;
3894
7f1204bb
JJ
3895 case SHT_GNU_LIBLIST:
3896 /* sh_link is the section header index of the prelink library
08a40648
AM
3897 list used for the dynamic entries, or the symbol table, or
3898 the version strings. */
7f1204bb
JJ
3899 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3900 ? ".dynstr" : ".gnu.libstr");
3901 if (s != NULL)
3902 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3903 break;
3904
252b5132 3905 case SHT_HASH:
fdc90cb4 3906 case SHT_GNU_HASH:
252b5132
RH
3907 case SHT_GNU_versym:
3908 /* sh_link is the section header index of the symbol table
3909 this hash table or version table is for. */
3910 s = bfd_get_section_by_name (abfd, ".dynsym");
3911 if (s != NULL)
3912 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3913 break;
dbb410c3
AM
3914
3915 case SHT_GROUP:
12bd6957 3916 d->this_hdr.sh_link = elf_onesymtab (abfd);
252b5132
RH
3917 }
3918 }
3919
3e19fb8f
L
3920 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
3921 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
3922 debug section name from .debug_* to .zdebug_* if needed. */
3923
b34976b6 3924 return TRUE;
252b5132
RH
3925}
3926
5372391b 3927static bfd_boolean
217aa764 3928sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3929{
3930 /* If the backend has a special mapping, use it. */
9c5bfbb7 3931 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3932 if (bed->elf_backend_sym_is_global)
3933 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3934
e47bf690 3935 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3936 || bfd_is_und_section (bfd_get_section (sym))
3937 || bfd_is_com_section (bfd_get_section (sym)));
3938}
3939
76359541
TP
3940/* Filter global symbols of ABFD to include in the import library. All
3941 SYMCOUNT symbols of ABFD can be examined from their pointers in
3942 SYMS. Pointers of symbols to keep should be stored contiguously at
3943 the beginning of that array.
3944
3945 Returns the number of symbols to keep. */
3946
3947unsigned int
3948_bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
3949 asymbol **syms, long symcount)
3950{
3951 long src_count, dst_count = 0;
3952
3953 for (src_count = 0; src_count < symcount; src_count++)
3954 {
3955 asymbol *sym = syms[src_count];
3956 char *name = (char *) bfd_asymbol_name (sym);
3957 struct bfd_link_hash_entry *h;
3958
3959 if (!sym_is_global (abfd, sym))
3960 continue;
3961
3962 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, FALSE);
5df1bc57
AM
3963 if (h == NULL)
3964 continue;
76359541
TP
3965 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
3966 continue;
76359541
TP
3967 if (h->linker_def || h->ldscript_def)
3968 continue;
3969
3970 syms[dst_count++] = sym;
3971 }
3972
3973 syms[dst_count] = NULL;
3974
3975 return dst_count;
3976}
3977
5372391b 3978/* Don't output section symbols for sections that are not going to be
c6d8cab4 3979 output, that are duplicates or there is no BFD section. */
5372391b
AM
3980
3981static bfd_boolean
3982ignore_section_sym (bfd *abfd, asymbol *sym)
3983{
c6d8cab4
L
3984 elf_symbol_type *type_ptr;
3985
3986 if ((sym->flags & BSF_SECTION_SYM) == 0)
3987 return FALSE;
3988
3989 type_ptr = elf_symbol_from (abfd, sym);
3990 return ((type_ptr != NULL
3991 && type_ptr->internal_elf_sym.st_shndx != 0
3992 && bfd_is_abs_section (sym->section))
3993 || !(sym->section->owner == abfd
0f0a5e58 3994 || (sym->section->output_section->owner == abfd
2633a79c
AM
3995 && sym->section->output_offset == 0)
3996 || bfd_is_abs_section (sym->section)));
5372391b
AM
3997}
3998
2633a79c
AM
3999/* Map symbol from it's internal number to the external number, moving
4000 all local symbols to be at the head of the list. */
4001
b34976b6 4002static bfd_boolean
12bd6957 4003elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
252b5132 4004{
dc810e39 4005 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
4006 asymbol **syms = bfd_get_outsymbols (abfd);
4007 asymbol **sect_syms;
dc810e39
AM
4008 unsigned int num_locals = 0;
4009 unsigned int num_globals = 0;
4010 unsigned int num_locals2 = 0;
4011 unsigned int num_globals2 = 0;
7292b3ac 4012 unsigned int max_index = 0;
dc810e39 4013 unsigned int idx;
252b5132
RH
4014 asection *asect;
4015 asymbol **new_syms;
252b5132
RH
4016
4017#ifdef DEBUG
4018 fprintf (stderr, "elf_map_symbols\n");
4019 fflush (stderr);
4020#endif
4021
252b5132
RH
4022 for (asect = abfd->sections; asect; asect = asect->next)
4023 {
4024 if (max_index < asect->index)
4025 max_index = asect->index;
4026 }
4027
4028 max_index++;
a50b1753 4029 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 4030 if (sect_syms == NULL)
b34976b6 4031 return FALSE;
252b5132 4032 elf_section_syms (abfd) = sect_syms;
4e89ac30 4033 elf_num_section_syms (abfd) = max_index;
252b5132 4034
079e9a2f
AM
4035 /* Init sect_syms entries for any section symbols we have already
4036 decided to output. */
252b5132
RH
4037 for (idx = 0; idx < symcount; idx++)
4038 {
dc810e39 4039 asymbol *sym = syms[idx];
c044fabd 4040
252b5132 4041 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 4042 && sym->value == 0
2633a79c
AM
4043 && !ignore_section_sym (abfd, sym)
4044 && !bfd_is_abs_section (sym->section))
252b5132 4045 {
5372391b 4046 asection *sec = sym->section;
252b5132 4047
5372391b
AM
4048 if (sec->owner != abfd)
4049 sec = sec->output_section;
252b5132 4050
5372391b 4051 sect_syms[sec->index] = syms[idx];
252b5132
RH
4052 }
4053 }
4054
252b5132
RH
4055 /* Classify all of the symbols. */
4056 for (idx = 0; idx < symcount; idx++)
4057 {
2633a79c 4058 if (sym_is_global (abfd, syms[idx]))
252b5132 4059 num_globals++;
2633a79c
AM
4060 else if (!ignore_section_sym (abfd, syms[idx]))
4061 num_locals++;
252b5132 4062 }
079e9a2f 4063
5372391b 4064 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
4065 sections will already have a section symbol in outsymbols, but
4066 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4067 at least in that case. */
252b5132
RH
4068 for (asect = abfd->sections; asect; asect = asect->next)
4069 {
079e9a2f 4070 if (sect_syms[asect->index] == NULL)
252b5132 4071 {
079e9a2f 4072 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
4073 num_locals++;
4074 else
4075 num_globals++;
252b5132
RH
4076 }
4077 }
4078
4079 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
4080 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
4081 sizeof (asymbol *));
dc810e39 4082
252b5132 4083 if (new_syms == NULL)
b34976b6 4084 return FALSE;
252b5132
RH
4085
4086 for (idx = 0; idx < symcount; idx++)
4087 {
4088 asymbol *sym = syms[idx];
dc810e39 4089 unsigned int i;
252b5132 4090
2633a79c
AM
4091 if (sym_is_global (abfd, sym))
4092 i = num_locals + num_globals2++;
4093 else if (!ignore_section_sym (abfd, sym))
252b5132
RH
4094 i = num_locals2++;
4095 else
2633a79c 4096 continue;
252b5132
RH
4097 new_syms[i] = sym;
4098 sym->udata.i = i + 1;
4099 }
4100 for (asect = abfd->sections; asect; asect = asect->next)
4101 {
079e9a2f 4102 if (sect_syms[asect->index] == NULL)
252b5132 4103 {
079e9a2f 4104 asymbol *sym = asect->symbol;
dc810e39 4105 unsigned int i;
252b5132 4106
079e9a2f 4107 sect_syms[asect->index] = sym;
252b5132
RH
4108 if (!sym_is_global (abfd, sym))
4109 i = num_locals2++;
4110 else
4111 i = num_locals + num_globals2++;
4112 new_syms[i] = sym;
4113 sym->udata.i = i + 1;
4114 }
4115 }
4116
4117 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4118
12bd6957 4119 *pnum_locals = num_locals;
b34976b6 4120 return TRUE;
252b5132
RH
4121}
4122
4123/* Align to the maximum file alignment that could be required for any
4124 ELF data structure. */
4125
268b6b39 4126static inline file_ptr
217aa764 4127align_file_position (file_ptr off, int align)
252b5132
RH
4128{
4129 return (off + align - 1) & ~(align - 1);
4130}
4131
4132/* Assign a file position to a section, optionally aligning to the
4133 required section alignment. */
4134
217aa764
AM
4135file_ptr
4136_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4137 file_ptr offset,
4138 bfd_boolean align)
252b5132 4139{
72de5009
AM
4140 if (align && i_shdrp->sh_addralign > 1)
4141 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
4142 i_shdrp->sh_offset = offset;
4143 if (i_shdrp->bfd_section != NULL)
4144 i_shdrp->bfd_section->filepos = offset;
4145 if (i_shdrp->sh_type != SHT_NOBITS)
4146 offset += i_shdrp->sh_size;
4147 return offset;
4148}
4149
4150/* Compute the file positions we are going to put the sections at, and
4151 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4152 is not NULL, this is being called by the ELF backend linker. */
4153
b34976b6 4154bfd_boolean
217aa764
AM
4155_bfd_elf_compute_section_file_positions (bfd *abfd,
4156 struct bfd_link_info *link_info)
252b5132 4157{
9c5bfbb7 4158 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 4159 struct fake_section_arg fsargs;
b34976b6 4160 bfd_boolean failed;
ef10c3ac 4161 struct elf_strtab_hash *strtab = NULL;
252b5132 4162 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 4163 bfd_boolean need_symtab;
252b5132
RH
4164
4165 if (abfd->output_has_begun)
b34976b6 4166 return TRUE;
252b5132
RH
4167
4168 /* Do any elf backend specific processing first. */
4169 if (bed->elf_backend_begin_write_processing)
4170 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4171
4172 if (! prep_headers (abfd))
b34976b6 4173 return FALSE;
252b5132 4174
e6c51ed4 4175 /* Post process the headers if necessary. */
78245035 4176 (*bed->elf_backend_post_process_headers) (abfd, link_info);
e6c51ed4 4177
d4730f92
BS
4178 fsargs.failed = FALSE;
4179 fsargs.link_info = link_info;
4180 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4181 if (fsargs.failed)
b34976b6 4182 return FALSE;
252b5132 4183
da9f89d4 4184 if (!assign_section_numbers (abfd, link_info))
b34976b6 4185 return FALSE;
252b5132
RH
4186
4187 /* The backend linker builds symbol table information itself. */
3516e984
L
4188 need_symtab = (link_info == NULL
4189 && (bfd_get_symcount (abfd) > 0
4190 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4191 == HAS_RELOC)));
4192 if (need_symtab)
252b5132
RH
4193 {
4194 /* Non-zero if doing a relocatable link. */
4195 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4196
4197 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 4198 return FALSE;
252b5132
RH
4199 }
4200
d4730f92 4201 failed = FALSE;
1126897b 4202 if (link_info == NULL)
dbb410c3 4203 {
1126897b 4204 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 4205 if (failed)
b34976b6 4206 return FALSE;
dbb410c3
AM
4207 }
4208
252b5132
RH
4209 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
4210 /* sh_name was set in prep_headers. */
4211 shstrtab_hdr->sh_type = SHT_STRTAB;
84865015 4212 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
252b5132 4213 shstrtab_hdr->sh_addr = 0;
946748d5 4214 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4215 shstrtab_hdr->sh_entsize = 0;
4216 shstrtab_hdr->sh_link = 0;
4217 shstrtab_hdr->sh_info = 0;
3e19fb8f 4218 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4219 shstrtab_hdr->sh_addralign = 1;
4220
c84fca4d 4221 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 4222 return FALSE;
252b5132 4223
3516e984 4224 if (need_symtab)
252b5132
RH
4225 {
4226 file_ptr off;
4227 Elf_Internal_Shdr *hdr;
4228
12bd6957 4229 off = elf_next_file_pos (abfd);
252b5132 4230
6a40cf0c 4231 hdr = & elf_symtab_hdr (abfd);
b34976b6 4232 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4233
6a40cf0c
NC
4234 if (elf_symtab_shndx_list (abfd) != NULL)
4235 {
4236 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4237 if (hdr->sh_size != 0)
4238 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4239 /* FIXME: What about other symtab_shndx sections in the list ? */
4240 }
9ad5cbcf 4241
252b5132 4242 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 4243 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4244
12bd6957 4245 elf_next_file_pos (abfd) = off;
252b5132
RH
4246
4247 /* Now that we know where the .strtab section goes, write it
08a40648 4248 out. */
252b5132 4249 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
ef10c3ac 4250 || ! _bfd_elf_strtab_emit (abfd, strtab))
b34976b6 4251 return FALSE;
ef10c3ac 4252 _bfd_elf_strtab_free (strtab);
252b5132
RH
4253 }
4254
b34976b6 4255 abfd->output_has_begun = TRUE;
252b5132 4256
b34976b6 4257 return TRUE;
252b5132
RH
4258}
4259
8ded5a0f
AM
4260/* Make an initial estimate of the size of the program header. If we
4261 get the number wrong here, we'll redo section placement. */
4262
4263static bfd_size_type
4264get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4265{
4266 size_t segs;
4267 asection *s;
2b05f1b7 4268 const struct elf_backend_data *bed;
8ded5a0f
AM
4269
4270 /* Assume we will need exactly two PT_LOAD segments: one for text
4271 and one for data. */
4272 segs = 2;
4273
4274 s = bfd_get_section_by_name (abfd, ".interp");
4275 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4276 {
4277 /* If we have a loadable interpreter section, we need a
4278 PT_INTERP segment. In this case, assume we also need a
4279 PT_PHDR segment, although that may not be true for all
4280 targets. */
e9a38e0f 4281 segs += 2;
8ded5a0f
AM
4282 }
4283
4284 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4285 {
4286 /* We need a PT_DYNAMIC segment. */
4287 ++segs;
f210dcff 4288 }
08a40648 4289
ceae84aa 4290 if (info != NULL && info->relro)
f210dcff
L
4291 {
4292 /* We need a PT_GNU_RELRO segment. */
4293 ++segs;
8ded5a0f
AM
4294 }
4295
12bd6957 4296 if (elf_eh_frame_hdr (abfd))
8ded5a0f
AM
4297 {
4298 /* We need a PT_GNU_EH_FRAME segment. */
4299 ++segs;
4300 }
4301
12bd6957 4302 if (elf_stack_flags (abfd))
8ded5a0f 4303 {
2b05f1b7
L
4304 /* We need a PT_GNU_STACK segment. */
4305 ++segs;
4306 }
94b11780 4307
2b05f1b7
L
4308 for (s = abfd->sections; s != NULL; s = s->next)
4309 {
8ded5a0f 4310 if ((s->flags & SEC_LOAD) != 0
0112cd26 4311 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
4312 {
4313 /* We need a PT_NOTE segment. */
4314 ++segs;
1c5265b5
JJ
4315 /* Try to create just one PT_NOTE segment
4316 for all adjacent loadable .note* sections.
4317 gABI requires that within a PT_NOTE segment
4318 (and also inside of each SHT_NOTE section)
4319 each note is padded to a multiple of 4 size,
4320 so we check whether the sections are correctly
4321 aligned. */
4322 if (s->alignment_power == 2)
4323 while (s->next != NULL
4324 && s->next->alignment_power == 2
4325 && (s->next->flags & SEC_LOAD) != 0
4326 && CONST_STRNEQ (s->next->name, ".note"))
4327 s = s->next;
8ded5a0f
AM
4328 }
4329 }
4330
4331 for (s = abfd->sections; s != NULL; s = s->next)
4332 {
4333 if (s->flags & SEC_THREAD_LOCAL)
4334 {
4335 /* We need a PT_TLS segment. */
4336 ++segs;
4337 break;
4338 }
4339 }
4340
2b05f1b7 4341 bed = get_elf_backend_data (abfd);
a91e1603
L
4342
4343 if ((abfd->flags & D_PAGED) != 0)
4344 {
4345 /* Add a PT_GNU_MBIND segment for each mbind section. */
4346 unsigned int page_align_power = bfd_log2 (bed->commonpagesize);
4347 for (s = abfd->sections; s != NULL; s = s->next)
4348 if (elf_section_flags (s) & SHF_GNU_MBIND)
4349 {
4350 if (elf_section_data (s)->this_hdr.sh_info
4351 > PT_GNU_MBIND_NUM)
4352 {
4353 _bfd_error_handler
4354 /* xgettext:c-format */
4355 (_("%B: GNU_MBIN section `%A' has invalid sh_info field: %d"),
4356 abfd, s, elf_section_data (s)->this_hdr.sh_info);
4357 continue;
4358 }
4359 /* Align mbind section to page size. */
4360 if (s->alignment_power < page_align_power)
4361 s->alignment_power = page_align_power;
4362 segs ++;
4363 }
4364 }
4365
4366 /* Let the backend count up any program headers it might need. */
4367 if (bed->elf_backend_additional_program_headers)
8ded5a0f
AM
4368 {
4369 int a;
4370
4371 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4372 if (a == -1)
4373 abort ();
4374 segs += a;
4375 }
4376
4377 return segs * bed->s->sizeof_phdr;
4378}
4379
2ea37f1c
NC
4380/* Find the segment that contains the output_section of section. */
4381
4382Elf_Internal_Phdr *
4383_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4384{
4385 struct elf_segment_map *m;
4386 Elf_Internal_Phdr *p;
4387
12bd6957 4388 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
2ea37f1c
NC
4389 m != NULL;
4390 m = m->next, p++)
4391 {
4392 int i;
4393
4394 for (i = m->count - 1; i >= 0; i--)
4395 if (m->sections[i] == section)
4396 return p;
4397 }
4398
4399 return NULL;
4400}
4401
252b5132
RH
4402/* Create a mapping from a set of sections to a program segment. */
4403
217aa764
AM
4404static struct elf_segment_map *
4405make_mapping (bfd *abfd,
4406 asection **sections,
4407 unsigned int from,
4408 unsigned int to,
4409 bfd_boolean phdr)
252b5132
RH
4410{
4411 struct elf_segment_map *m;
4412 unsigned int i;
4413 asection **hdrpp;
dc810e39 4414 bfd_size_type amt;
252b5132 4415
dc810e39
AM
4416 amt = sizeof (struct elf_segment_map);
4417 amt += (to - from - 1) * sizeof (asection *);
a50b1753 4418 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4419 if (m == NULL)
4420 return NULL;
4421 m->next = NULL;
4422 m->p_type = PT_LOAD;
4423 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4424 m->sections[i - from] = *hdrpp;
4425 m->count = to - from;
4426
4427 if (from == 0 && phdr)
4428 {
4429 /* Include the headers in the first PT_LOAD segment. */
4430 m->includes_filehdr = 1;
4431 m->includes_phdrs = 1;
4432 }
4433
4434 return m;
4435}
4436
229fcec5
MM
4437/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4438 on failure. */
4439
4440struct elf_segment_map *
4441_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4442{
4443 struct elf_segment_map *m;
4444
a50b1753
NC
4445 m = (struct elf_segment_map *) bfd_zalloc (abfd,
4446 sizeof (struct elf_segment_map));
229fcec5
MM
4447 if (m == NULL)
4448 return NULL;
4449 m->next = NULL;
4450 m->p_type = PT_DYNAMIC;
4451 m->count = 1;
4452 m->sections[0] = dynsec;
08a40648 4453
229fcec5
MM
4454 return m;
4455}
4456
8ded5a0f 4457/* Possibly add or remove segments from the segment map. */
252b5132 4458
b34976b6 4459static bfd_boolean
3dea8fca
AM
4460elf_modify_segment_map (bfd *abfd,
4461 struct bfd_link_info *info,
4462 bfd_boolean remove_empty_load)
252b5132 4463{
252e386e 4464 struct elf_segment_map **m;
8ded5a0f 4465 const struct elf_backend_data *bed;
252b5132 4466
8ded5a0f
AM
4467 /* The placement algorithm assumes that non allocated sections are
4468 not in PT_LOAD segments. We ensure this here by removing such
4469 sections from the segment map. We also remove excluded
252e386e
AM
4470 sections. Finally, any PT_LOAD segment without sections is
4471 removed. */
12bd6957 4472 m = &elf_seg_map (abfd);
252e386e 4473 while (*m)
8ded5a0f
AM
4474 {
4475 unsigned int i, new_count;
252b5132 4476
252e386e 4477 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 4478 {
252e386e
AM
4479 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4480 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4481 || (*m)->p_type != PT_LOAD))
8ded5a0f 4482 {
252e386e
AM
4483 (*m)->sections[new_count] = (*m)->sections[i];
4484 new_count++;
8ded5a0f
AM
4485 }
4486 }
252e386e 4487 (*m)->count = new_count;
252b5132 4488
1a9ccd70
NC
4489 if (remove_empty_load
4490 && (*m)->p_type == PT_LOAD
4491 && (*m)->count == 0
4492 && !(*m)->includes_phdrs)
252e386e
AM
4493 *m = (*m)->next;
4494 else
4495 m = &(*m)->next;
8ded5a0f 4496 }
252b5132 4497
8ded5a0f
AM
4498 bed = get_elf_backend_data (abfd);
4499 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 4500 {
252e386e 4501 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 4502 return FALSE;
252b5132 4503 }
252b5132 4504
8ded5a0f
AM
4505 return TRUE;
4506}
252b5132 4507
8ded5a0f 4508/* Set up a mapping from BFD sections to program segments. */
252b5132 4509
8ded5a0f
AM
4510bfd_boolean
4511_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4512{
4513 unsigned int count;
4514 struct elf_segment_map *m;
4515 asection **sections = NULL;
4516 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 4517 bfd_boolean no_user_phdrs;
252b5132 4518
12bd6957 4519 no_user_phdrs = elf_seg_map (abfd) == NULL;
d324f6d6
RM
4520
4521 if (info != NULL)
4522 info->user_phdrs = !no_user_phdrs;
4523
3dea8fca 4524 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 4525 {
8ded5a0f
AM
4526 asection *s;
4527 unsigned int i;
4528 struct elf_segment_map *mfirst;
4529 struct elf_segment_map **pm;
4530 asection *last_hdr;
4531 bfd_vma last_size;
4532 unsigned int phdr_index;
4533 bfd_vma maxpagesize;
4534 asection **hdrpp;
4535 bfd_boolean phdr_in_segment = TRUE;
4536 bfd_boolean writable;
4537 int tls_count = 0;
4538 asection *first_tls = NULL;
a91e1603 4539 asection *first_mbind = NULL;
8ded5a0f
AM
4540 asection *dynsec, *eh_frame_hdr;
4541 bfd_size_type amt;
8d06853e 4542 bfd_vma addr_mask, wrap_to = 0;
1a9ccd70 4543 bfd_boolean linker_created_pt_phdr_segment = FALSE;
252b5132 4544
8ded5a0f 4545 /* Select the allocated sections, and sort them. */
252b5132 4546
a50b1753
NC
4547 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
4548 sizeof (asection *));
8ded5a0f 4549 if (sections == NULL)
252b5132 4550 goto error_return;
252b5132 4551
8d06853e
AM
4552 /* Calculate top address, avoiding undefined behaviour of shift
4553 left operator when shift count is equal to size of type
4554 being shifted. */
4555 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4556 addr_mask = (addr_mask << 1) + 1;
4557
8ded5a0f
AM
4558 i = 0;
4559 for (s = abfd->sections; s != NULL; s = s->next)
4560 {
4561 if ((s->flags & SEC_ALLOC) != 0)
4562 {
4563 sections[i] = s;
4564 ++i;
8d06853e
AM
4565 /* A wrapping section potentially clashes with header. */
4566 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
4567 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
4568 }
4569 }
4570 BFD_ASSERT (i <= bfd_count_sections (abfd));
4571 count = i;
252b5132 4572
8ded5a0f 4573 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 4574
8ded5a0f 4575 /* Build the mapping. */
252b5132 4576
8ded5a0f
AM
4577 mfirst = NULL;
4578 pm = &mfirst;
252b5132 4579
8ded5a0f
AM
4580 /* If we have a .interp section, then create a PT_PHDR segment for
4581 the program headers and a PT_INTERP segment for the .interp
4582 section. */
4583 s = bfd_get_section_by_name (abfd, ".interp");
4584 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4585 {
4586 amt = sizeof (struct elf_segment_map);
a50b1753 4587 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4588 if (m == NULL)
4589 goto error_return;
4590 m->next = NULL;
4591 m->p_type = PT_PHDR;
4592 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
4593 m->p_flags = PF_R | PF_X;
4594 m->p_flags_valid = 1;
4595 m->includes_phdrs = 1;
1a9ccd70 4596 linker_created_pt_phdr_segment = TRUE;
8ded5a0f
AM
4597 *pm = m;
4598 pm = &m->next;
252b5132 4599
8ded5a0f 4600 amt = sizeof (struct elf_segment_map);
a50b1753 4601 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4602 if (m == NULL)
4603 goto error_return;
4604 m->next = NULL;
4605 m->p_type = PT_INTERP;
4606 m->count = 1;
4607 m->sections[0] = s;
4608
4609 *pm = m;
4610 pm = &m->next;
252b5132 4611 }
8ded5a0f
AM
4612
4613 /* Look through the sections. We put sections in the same program
4614 segment when the start of the second section can be placed within
4615 a few bytes of the end of the first section. */
4616 last_hdr = NULL;
4617 last_size = 0;
4618 phdr_index = 0;
4619 maxpagesize = bed->maxpagesize;
063bb025
NC
4620 /* PR 17512: file: c8455299.
4621 Avoid divide-by-zero errors later on.
4622 FIXME: Should we abort if the maxpagesize is zero ? */
4623 if (maxpagesize == 0)
4624 maxpagesize = 1;
8ded5a0f
AM
4625 writable = FALSE;
4626 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4627 if (dynsec != NULL
4628 && (dynsec->flags & SEC_LOAD) == 0)
4629 dynsec = NULL;
4630
4631 /* Deal with -Ttext or something similar such that the first section
4632 is not adjacent to the program headers. This is an
4633 approximation, since at this point we don't know exactly how many
4634 program headers we will need. */
4635 if (count > 0)
252b5132 4636 {
12bd6957 4637 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 4638
62d7a5f6 4639 if (phdr_size == (bfd_size_type) -1)
8ded5a0f 4640 phdr_size = get_program_header_size (abfd, info);
d2bcb0d1 4641 phdr_size += bed->s->sizeof_ehdr;
8ded5a0f 4642 if ((abfd->flags & D_PAGED) == 0
8d06853e
AM
4643 || (sections[0]->lma & addr_mask) < phdr_size
4644 || ((sections[0]->lma & addr_mask) % maxpagesize
4645 < phdr_size % maxpagesize)
4646 || (sections[0]->lma & addr_mask & -maxpagesize) < wrap_to)
1a9ccd70
NC
4647 {
4648 /* PR 20815: The ELF standard says that a PT_PHDR segment, if
4649 present, must be included as part of the memory image of the
4650 program. Ie it must be part of a PT_LOAD segment as well.
4651 If we have had to create our own PT_PHDR segment, but it is
4652 not going to be covered by the first PT_LOAD segment, then
4653 force the inclusion if we can... */
4654 if ((abfd->flags & D_PAGED) != 0
4655 && linker_created_pt_phdr_segment)
4656 phdr_in_segment = TRUE;
4657 else
4658 phdr_in_segment = FALSE;
4659 }
252b5132
RH
4660 }
4661
8ded5a0f 4662 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 4663 {
8ded5a0f
AM
4664 asection *hdr;
4665 bfd_boolean new_segment;
4666
4667 hdr = *hdrpp;
4668
4669 /* See if this section and the last one will fit in the same
4670 segment. */
4671
4672 if (last_hdr == NULL)
4673 {
4674 /* If we don't have a segment yet, then we don't need a new
4675 one (we build the last one after this loop). */
4676 new_segment = FALSE;
4677 }
4678 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4679 {
4680 /* If this section has a different relation between the
4681 virtual address and the load address, then we need a new
4682 segment. */
4683 new_segment = TRUE;
4684 }
b5599592
AM
4685 else if (hdr->lma < last_hdr->lma + last_size
4686 || last_hdr->lma + last_size < last_hdr->lma)
4687 {
4688 /* If this section has a load address that makes it overlap
4689 the previous section, then we need a new segment. */
4690 new_segment = TRUE;
4691 }
39948a60
NC
4692 /* In the next test we have to be careful when last_hdr->lma is close
4693 to the end of the address space. If the aligned address wraps
4694 around to the start of the address space, then there are no more
4695 pages left in memory and it is OK to assume that the current
4696 section can be included in the current segment. */
4697 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4698 > last_hdr->lma)
4699 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 4700 <= hdr->lma))
8ded5a0f
AM
4701 {
4702 /* If putting this section in this segment would force us to
4703 skip a page in the segment, then we need a new segment. */
4704 new_segment = TRUE;
4705 }
4706 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
e5654c0f
AM
4707 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0
4708 && ((abfd->flags & D_PAGED) == 0
4709 || (((last_hdr->lma + last_size - 1) & -maxpagesize)
4710 != (hdr->lma & -maxpagesize))))
8ded5a0f 4711 {
e5654c0f
AM
4712 /* We don't want to put a loaded section after a
4713 nonloaded (ie. bss style) section in the same segment
4714 as that will force the non-loaded section to be loaded.
4715 Consider .tbss sections as loaded for this purpose.
4716 However, like the writable/non-writable case below,
4717 if they are on the same page then they must be put
4718 in the same segment. */
8ded5a0f
AM
4719 new_segment = TRUE;
4720 }
4721 else if ((abfd->flags & D_PAGED) == 0)
4722 {
4723 /* If the file is not demand paged, which means that we
4724 don't require the sections to be correctly aligned in the
4725 file, then there is no other reason for a new segment. */
4726 new_segment = FALSE;
4727 }
4728 else if (! writable
4729 && (hdr->flags & SEC_READONLY) == 0
8d06853e
AM
4730 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4731 != (hdr->lma & -maxpagesize)))
8ded5a0f
AM
4732 {
4733 /* We don't want to put a writable section in a read only
4734 segment, unless they are on the same page in memory
4735 anyhow. We already know that the last section does not
4736 bring us past the current section on the page, so the
4737 only case in which the new section is not on the same
4738 page as the previous section is when the previous section
4739 ends precisely on a page boundary. */
4740 new_segment = TRUE;
4741 }
4742 else
4743 {
4744 /* Otherwise, we can use the same segment. */
4745 new_segment = FALSE;
4746 }
4747
2889e75b 4748 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
4749 if (last_hdr != NULL
4750 && info != NULL
4751 && info->callbacks->override_segment_assignment != NULL)
4752 new_segment
4753 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4754 last_hdr,
4755 new_segment);
2889e75b 4756
8ded5a0f
AM
4757 if (! new_segment)
4758 {
4759 if ((hdr->flags & SEC_READONLY) == 0)
4760 writable = TRUE;
4761 last_hdr = hdr;
4762 /* .tbss sections effectively have zero size. */
4763 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4764 != SEC_THREAD_LOCAL)
4765 last_size = hdr->size;
4766 else
4767 last_size = 0;
4768 continue;
4769 }
4770
4771 /* We need a new program segment. We must create a new program
4772 header holding all the sections from phdr_index until hdr. */
4773
4774 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4775 if (m == NULL)
4776 goto error_return;
4777
4778 *pm = m;
4779 pm = &m->next;
4780
252b5132 4781 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 4782 writable = TRUE;
8ded5a0f
AM
4783 else
4784 writable = FALSE;
4785
baaff79e
JJ
4786 last_hdr = hdr;
4787 /* .tbss sections effectively have zero size. */
e5caec89 4788 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 4789 last_size = hdr->size;
baaff79e
JJ
4790 else
4791 last_size = 0;
8ded5a0f
AM
4792 phdr_index = i;
4793 phdr_in_segment = FALSE;
252b5132
RH
4794 }
4795
86b2281f
AM
4796 /* Create a final PT_LOAD program segment, but not if it's just
4797 for .tbss. */
4798 if (last_hdr != NULL
4799 && (i - phdr_index != 1
4800 || ((last_hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4801 != SEC_THREAD_LOCAL)))
8ded5a0f
AM
4802 {
4803 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4804 if (m == NULL)
4805 goto error_return;
252b5132 4806
8ded5a0f
AM
4807 *pm = m;
4808 pm = &m->next;
4809 }
252b5132 4810
8ded5a0f
AM
4811 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4812 if (dynsec != NULL)
4813 {
4814 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4815 if (m == NULL)
4816 goto error_return;
4817 *pm = m;
4818 pm = &m->next;
4819 }
252b5132 4820
1c5265b5
JJ
4821 /* For each batch of consecutive loadable .note sections,
4822 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4823 because if we link together nonloadable .note sections and
4824 loadable .note sections, we will generate two .note sections
4825 in the output file. FIXME: Using names for section types is
4826 bogus anyhow. */
8ded5a0f
AM
4827 for (s = abfd->sections; s != NULL; s = s->next)
4828 {
4829 if ((s->flags & SEC_LOAD) != 0
0112cd26 4830 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 4831 {
1c5265b5 4832 asection *s2;
91d6fa6a
NC
4833
4834 count = 1;
8ded5a0f 4835 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
4836 if (s->alignment_power == 2)
4837 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
4838 {
4839 if (s2->next->alignment_power == 2
4840 && (s2->next->flags & SEC_LOAD) != 0
4841 && CONST_STRNEQ (s2->next->name, ".note")
8d06853e
AM
4842 && align_power (s2->lma + s2->size, 2)
4843 == s2->next->lma)
55b581a6
JJ
4844 count++;
4845 else
4846 break;
4847 }
1c5265b5 4848 amt += (count - 1) * sizeof (asection *);
a50b1753 4849 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4850 if (m == NULL)
4851 goto error_return;
4852 m->next = NULL;
4853 m->p_type = PT_NOTE;
1c5265b5
JJ
4854 m->count = count;
4855 while (count > 1)
4856 {
4857 m->sections[m->count - count--] = s;
4858 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
4859 s = s->next;
4860 }
4861 m->sections[m->count - 1] = s;
4862 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
4863 *pm = m;
4864 pm = &m->next;
4865 }
4866 if (s->flags & SEC_THREAD_LOCAL)
4867 {
4868 if (! tls_count)
4869 first_tls = s;
4870 tls_count++;
4871 }
a91e1603
L
4872 if (first_mbind == NULL
4873 && (elf_section_flags (s) & SHF_GNU_MBIND) != 0)
4874 first_mbind = s;
8ded5a0f 4875 }
252b5132 4876
8ded5a0f
AM
4877 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
4878 if (tls_count > 0)
4879 {
8ded5a0f
AM
4880 amt = sizeof (struct elf_segment_map);
4881 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 4882 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4883 if (m == NULL)
4884 goto error_return;
4885 m->next = NULL;
4886 m->p_type = PT_TLS;
4887 m->count = tls_count;
4888 /* Mandated PF_R. */
4889 m->p_flags = PF_R;
4890 m->p_flags_valid = 1;
d923cae0 4891 s = first_tls;
91d6fa6a 4892 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f 4893 {
d923cae0
L
4894 if ((s->flags & SEC_THREAD_LOCAL) == 0)
4895 {
4896 _bfd_error_handler
4897 (_("%B: TLS sections are not adjacent:"), abfd);
4898 s = first_tls;
4899 i = 0;
4900 while (i < (unsigned int) tls_count)
4901 {
4902 if ((s->flags & SEC_THREAD_LOCAL) != 0)
4903 {
4904 _bfd_error_handler (_(" TLS: %A"), s);
4905 i++;
4906 }
4907 else
4908 _bfd_error_handler (_(" non-TLS: %A"), s);
4909 s = s->next;
4910 }
4911 bfd_set_error (bfd_error_bad_value);
4912 goto error_return;
4913 }
4914 m->sections[i] = s;
4915 s = s->next;
8ded5a0f 4916 }
252b5132 4917
8ded5a0f
AM
4918 *pm = m;
4919 pm = &m->next;
4920 }
252b5132 4921
a91e1603
L
4922 if (first_mbind && (abfd->flags & D_PAGED) != 0)
4923 for (s = first_mbind; s != NULL; s = s->next)
4924 if ((elf_section_flags (s) & SHF_GNU_MBIND) != 0
4925 && (elf_section_data (s)->this_hdr.sh_info
4926 <= PT_GNU_MBIND_NUM))
4927 {
4928 /* Mandated PF_R. */
4929 unsigned long p_flags = PF_R;
4930 if ((s->flags & SEC_READONLY) == 0)
4931 p_flags |= PF_W;
4932 if ((s->flags & SEC_CODE) != 0)
4933 p_flags |= PF_X;
4934
4935 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
4936 m = bfd_zalloc (abfd, amt);
4937 if (m == NULL)
4938 goto error_return;
4939 m->next = NULL;
4940 m->p_type = (PT_GNU_MBIND_LO
4941 + elf_section_data (s)->this_hdr.sh_info);
4942 m->count = 1;
4943 m->p_flags_valid = 1;
4944 m->sections[0] = s;
4945 m->p_flags = p_flags;
4946
4947 *pm = m;
4948 pm = &m->next;
4949 }
4950
8ded5a0f
AM
4951 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4952 segment. */
12bd6957 4953 eh_frame_hdr = elf_eh_frame_hdr (abfd);
8ded5a0f
AM
4954 if (eh_frame_hdr != NULL
4955 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 4956 {
dc810e39 4957 amt = sizeof (struct elf_segment_map);
a50b1753 4958 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4959 if (m == NULL)
4960 goto error_return;
4961 m->next = NULL;
8ded5a0f 4962 m->p_type = PT_GNU_EH_FRAME;
252b5132 4963 m->count = 1;
8ded5a0f 4964 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
4965
4966 *pm = m;
4967 pm = &m->next;
4968 }
13ae64f3 4969
12bd6957 4970 if (elf_stack_flags (abfd))
13ae64f3 4971 {
8ded5a0f 4972 amt = sizeof (struct elf_segment_map);
a50b1753 4973 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4974 if (m == NULL)
4975 goto error_return;
4976 m->next = NULL;
2b05f1b7 4977 m->p_type = PT_GNU_STACK;
12bd6957 4978 m->p_flags = elf_stack_flags (abfd);
04c3a755 4979 m->p_align = bed->stack_align;
8ded5a0f 4980 m->p_flags_valid = 1;
04c3a755
NS
4981 m->p_align_valid = m->p_align != 0;
4982 if (info->stacksize > 0)
4983 {
4984 m->p_size = info->stacksize;
4985 m->p_size_valid = 1;
4986 }
252b5132 4987
8ded5a0f
AM
4988 *pm = m;
4989 pm = &m->next;
4990 }
65765700 4991
ceae84aa 4992 if (info != NULL && info->relro)
8ded5a0f 4993 {
f210dcff
L
4994 for (m = mfirst; m != NULL; m = m->next)
4995 {
3832a4d8
AM
4996 if (m->p_type == PT_LOAD
4997 && m->count != 0
4998 && m->sections[0]->vma >= info->relro_start
4999 && m->sections[0]->vma < info->relro_end)
f210dcff 5000 {
3832a4d8
AM
5001 i = m->count;
5002 while (--i != (unsigned) -1)
5003 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
5004 == (SEC_LOAD | SEC_HAS_CONTENTS))
5005 break;
5006
43a8475c 5007 if (i != (unsigned) -1)
f210dcff
L
5008 break;
5009 }
be01b344 5010 }
f210dcff
L
5011
5012 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
5013 if (m != NULL)
5014 {
5015 amt = sizeof (struct elf_segment_map);
a50b1753 5016 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
5017 if (m == NULL)
5018 goto error_return;
5019 m->next = NULL;
5020 m->p_type = PT_GNU_RELRO;
f210dcff
L
5021 *pm = m;
5022 pm = &m->next;
5023 }
8ded5a0f 5024 }
9ee5e499 5025
8ded5a0f 5026 free (sections);
12bd6957 5027 elf_seg_map (abfd) = mfirst;
9ee5e499
JJ
5028 }
5029
3dea8fca 5030 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 5031 return FALSE;
8c37241b 5032
12bd6957 5033 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
8ded5a0f 5034 ++count;
12bd6957 5035 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
252b5132 5036
b34976b6 5037 return TRUE;
252b5132
RH
5038
5039 error_return:
5040 if (sections != NULL)
5041 free (sections);
b34976b6 5042 return FALSE;
252b5132
RH
5043}
5044
5045/* Sort sections by address. */
5046
5047static int
217aa764 5048elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
5049{
5050 const asection *sec1 = *(const asection **) arg1;
5051 const asection *sec2 = *(const asection **) arg2;
eecdbe52 5052 bfd_size_type size1, size2;
252b5132
RH
5053
5054 /* Sort by LMA first, since this is the address used to
5055 place the section into a segment. */
5056 if (sec1->lma < sec2->lma)
5057 return -1;
5058 else if (sec1->lma > sec2->lma)
5059 return 1;
5060
5061 /* Then sort by VMA. Normally the LMA and the VMA will be
5062 the same, and this will do nothing. */
5063 if (sec1->vma < sec2->vma)
5064 return -1;
5065 else if (sec1->vma > sec2->vma)
5066 return 1;
5067
5068 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
5069
07c6e936 5070#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
5071
5072 if (TOEND (sec1))
5073 {
5074 if (TOEND (sec2))
00a7cdc5
NC
5075 {
5076 /* If the indicies are the same, do not return 0
5077 here, but continue to try the next comparison. */
5078 if (sec1->target_index - sec2->target_index != 0)
5079 return sec1->target_index - sec2->target_index;
5080 }
252b5132
RH
5081 else
5082 return 1;
5083 }
00a7cdc5 5084 else if (TOEND (sec2))
252b5132
RH
5085 return -1;
5086
5087#undef TOEND
5088
00a7cdc5
NC
5089 /* Sort by size, to put zero sized sections
5090 before others at the same address. */
252b5132 5091
eea6121a
AM
5092 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
5093 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
5094
5095 if (size1 < size2)
252b5132 5096 return -1;
eecdbe52 5097 if (size1 > size2)
252b5132
RH
5098 return 1;
5099
5100 return sec1->target_index - sec2->target_index;
5101}
5102
340b6d91
AC
5103/* Ian Lance Taylor writes:
5104
5105 We shouldn't be using % with a negative signed number. That's just
5106 not good. We have to make sure either that the number is not
5107 negative, or that the number has an unsigned type. When the types
5108 are all the same size they wind up as unsigned. When file_ptr is a
5109 larger signed type, the arithmetic winds up as signed long long,
5110 which is wrong.
5111
5112 What we're trying to say here is something like ``increase OFF by
5113 the least amount that will cause it to be equal to the VMA modulo
5114 the page size.'' */
5115/* In other words, something like:
5116
5117 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5118 off_offset = off % bed->maxpagesize;
5119 if (vma_offset < off_offset)
5120 adjustment = vma_offset + bed->maxpagesize - off_offset;
5121 else
5122 adjustment = vma_offset - off_offset;
08a40648 5123
340b6d91
AC
5124 which can can be collapsed into the expression below. */
5125
5126static file_ptr
5127vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5128{
dc9155b2
NC
5129 /* PR binutils/16199: Handle an alignment of zero. */
5130 if (maxpagesize == 0)
5131 maxpagesize = 1;
340b6d91
AC
5132 return ((vma - off) % maxpagesize);
5133}
5134
6d33f217
L
5135static void
5136print_segment_map (const struct elf_segment_map *m)
5137{
5138 unsigned int j;
5139 const char *pt = get_segment_type (m->p_type);
5140 char buf[32];
5141
5142 if (pt == NULL)
5143 {
5144 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5145 sprintf (buf, "LOPROC+%7.7x",
5146 (unsigned int) (m->p_type - PT_LOPROC));
5147 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5148 sprintf (buf, "LOOS+%7.7x",
5149 (unsigned int) (m->p_type - PT_LOOS));
5150 else
5151 snprintf (buf, sizeof (buf), "%8.8x",
5152 (unsigned int) m->p_type);
5153 pt = buf;
5154 }
4a97a0e5 5155 fflush (stdout);
6d33f217
L
5156 fprintf (stderr, "%s:", pt);
5157 for (j = 0; j < m->count; j++)
5158 fprintf (stderr, " %s", m->sections [j]->name);
5159 putc ('\n',stderr);
4a97a0e5 5160 fflush (stderr);
6d33f217
L
5161}
5162
32812159
AM
5163static bfd_boolean
5164write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5165{
5166 void *buf;
5167 bfd_boolean ret;
5168
5169 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5170 return FALSE;
5171 buf = bfd_zmalloc (len);
5172 if (buf == NULL)
5173 return FALSE;
5174 ret = bfd_bwrite (buf, len, abfd) == len;
5175 free (buf);
5176 return ret;
5177}
5178
252b5132
RH
5179/* Assign file positions to the sections based on the mapping from
5180 sections to segments. This function also sets up some fields in
f3520d2f 5181 the file header. */
252b5132 5182
b34976b6 5183static bfd_boolean
f3520d2f
AM
5184assign_file_positions_for_load_sections (bfd *abfd,
5185 struct bfd_link_info *link_info)
252b5132
RH
5186{
5187 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5188 struct elf_segment_map *m;
252b5132 5189 Elf_Internal_Phdr *phdrs;
252b5132 5190 Elf_Internal_Phdr *p;
02bf8d82 5191 file_ptr off;
3f570048 5192 bfd_size_type maxpagesize;
a8c75b76 5193 unsigned int pt_load_count = 0;
f3520d2f 5194 unsigned int alloc;
0920dee7 5195 unsigned int i, j;
2b0bc088 5196 bfd_vma header_pad = 0;
252b5132 5197
e36284ab 5198 if (link_info == NULL
ceae84aa 5199 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 5200 return FALSE;
252b5132 5201
8ded5a0f 5202 alloc = 0;
12bd6957 5203 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
2b0bc088
NC
5204 {
5205 ++alloc;
5206 if (m->header_size)
5207 header_pad = m->header_size;
5208 }
252b5132 5209
82f2dbf7
NC
5210 if (alloc)
5211 {
5212 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5213 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5214 }
5215 else
5216 {
5217 /* PR binutils/12467. */
5218 elf_elfheader (abfd)->e_phoff = 0;
5219 elf_elfheader (abfd)->e_phentsize = 0;
5220 }
d324f6d6 5221
8ded5a0f 5222 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 5223
12bd6957
AM
5224 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
5225 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
8ded5a0f 5226 else
12bd6957 5227 BFD_ASSERT (elf_program_header_size (abfd)
59e0647f 5228 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
5229
5230 if (alloc == 0)
f3520d2f 5231 {
12bd6957 5232 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
8ded5a0f 5233 return TRUE;
f3520d2f 5234 }
252b5132 5235
12bd6957 5236 /* We're writing the size in elf_program_header_size (abfd),
57268894
HPN
5237 see assign_file_positions_except_relocs, so make sure we have
5238 that amount allocated, with trailing space cleared.
12bd6957
AM
5239 The variable alloc contains the computed need, while
5240 elf_program_header_size (abfd) contains the size used for the
57268894
HPN
5241 layout.
5242 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5243 where the layout is forced to according to a larger size in the
5244 last iterations for the testcase ld-elf/header. */
12bd6957 5245 BFD_ASSERT (elf_program_header_size (abfd) % bed->s->sizeof_phdr
57268894 5246 == 0);
a50b1753
NC
5247 phdrs = (Elf_Internal_Phdr *)
5248 bfd_zalloc2 (abfd,
12bd6957 5249 (elf_program_header_size (abfd) / bed->s->sizeof_phdr),
a50b1753 5250 sizeof (Elf_Internal_Phdr));
f3520d2f 5251 elf_tdata (abfd)->phdr = phdrs;
252b5132 5252 if (phdrs == NULL)
b34976b6 5253 return FALSE;
252b5132 5254
3f570048
AM
5255 maxpagesize = 1;
5256 if ((abfd->flags & D_PAGED) != 0)
5257 maxpagesize = bed->maxpagesize;
5258
252b5132
RH
5259 off = bed->s->sizeof_ehdr;
5260 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
5261 if (header_pad < (bfd_vma) off)
5262 header_pad = 0;
5263 else
5264 header_pad -= off;
5265 off += header_pad;
252b5132 5266
12bd6957 5267 for (m = elf_seg_map (abfd), p = phdrs, j = 0;
252b5132 5268 m != NULL;
0920dee7 5269 m = m->next, p++, j++)
252b5132 5270 {
252b5132 5271 asection **secpp;
bf988460
AM
5272 bfd_vma off_adjust;
5273 bfd_boolean no_contents;
252b5132
RH
5274
5275 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 5276 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
5277 not be done to the PT_NOTE section of a corefile, which may
5278 contain several pseudo-sections artificially created by bfd.
5279 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
5280 if (m->count > 1
5281 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 5282 && m->p_type == PT_NOTE))
252b5132
RH
5283 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5284 elf_sort_sections);
5285
b301b248
AM
5286 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5287 number of sections with contents contributing to both p_filesz
5288 and p_memsz, followed by a number of sections with no contents
5289 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 5290 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 5291 p->p_type = m->p_type;
28a7f3e7 5292 p->p_flags = m->p_flags;
252b5132 5293
3f570048
AM
5294 if (m->count == 0)
5295 p->p_vaddr = 0;
5296 else
3271a814 5297 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
5298
5299 if (m->p_paddr_valid)
5300 p->p_paddr = m->p_paddr;
5301 else if (m->count == 0)
5302 p->p_paddr = 0;
5303 else
08a40648 5304 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
5305
5306 if (p->p_type == PT_LOAD
5307 && (abfd->flags & D_PAGED) != 0)
5308 {
5309 /* p_align in demand paged PT_LOAD segments effectively stores
5310 the maximum page size. When copying an executable with
5311 objcopy, we set m->p_align from the input file. Use this
5312 value for maxpagesize rather than bed->maxpagesize, which
5313 may be different. Note that we use maxpagesize for PT_TLS
5314 segment alignment later in this function, so we are relying
5315 on at least one PT_LOAD segment appearing before a PT_TLS
5316 segment. */
5317 if (m->p_align_valid)
5318 maxpagesize = m->p_align;
5319
5320 p->p_align = maxpagesize;
a8c75b76 5321 pt_load_count += 1;
3f570048 5322 }
3271a814
NS
5323 else if (m->p_align_valid)
5324 p->p_align = m->p_align;
e970b90a
DJ
5325 else if (m->count == 0)
5326 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
5327 else
5328 p->p_align = 0;
5329
bf988460
AM
5330 no_contents = FALSE;
5331 off_adjust = 0;
252b5132 5332 if (p->p_type == PT_LOAD
b301b248 5333 && m->count > 0)
252b5132 5334 {
b301b248 5335 bfd_size_type align;
a49e53ed 5336 unsigned int align_power = 0;
b301b248 5337
3271a814
NS
5338 if (m->p_align_valid)
5339 align = p->p_align;
5340 else
252b5132 5341 {
3271a814
NS
5342 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5343 {
5344 unsigned int secalign;
08a40648 5345
3271a814
NS
5346 secalign = bfd_get_section_alignment (abfd, *secpp);
5347 if (secalign > align_power)
5348 align_power = secalign;
5349 }
5350 align = (bfd_size_type) 1 << align_power;
5351 if (align < maxpagesize)
5352 align = maxpagesize;
b301b248 5353 }
252b5132 5354
02bf8d82
AM
5355 for (i = 0; i < m->count; i++)
5356 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5357 /* If we aren't making room for this section, then
5358 it must be SHT_NOBITS regardless of what we've
5359 set via struct bfd_elf_special_section. */
5360 elf_section_type (m->sections[i]) = SHT_NOBITS;
5361
bf988460 5362 /* Find out whether this segment contains any loadable
aea274d3
AM
5363 sections. */
5364 no_contents = TRUE;
5365 for (i = 0; i < m->count; i++)
5366 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5367 {
5368 no_contents = FALSE;
5369 break;
5370 }
bf988460 5371
85cfcbfb 5372 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
a8c75b76
AM
5373
5374 /* Broken hardware and/or kernel require that files do not
5375 map the same page with different permissions on some hppa
5376 processors. */
5377 if (pt_load_count > 1
5378 && bed->no_page_alias
5379 && (off & (maxpagesize - 1)) != 0
5380 && (off & -maxpagesize) == ((off + off_adjust) & -maxpagesize))
5381 off_adjust += maxpagesize;
bf988460
AM
5382 off += off_adjust;
5383 if (no_contents)
5384 {
5385 /* We shouldn't need to align the segment on disk since
5386 the segment doesn't need file space, but the gABI
5387 arguably requires the alignment and glibc ld.so
5388 checks it. So to comply with the alignment
5389 requirement but not waste file space, we adjust
5390 p_offset for just this segment. (OFF_ADJUST is
5391 subtracted from OFF later.) This may put p_offset
5392 past the end of file, but that shouldn't matter. */
5393 }
5394 else
5395 off_adjust = 0;
252b5132 5396 }
b1a6d0b1
NC
5397 /* Make sure the .dynamic section is the first section in the
5398 PT_DYNAMIC segment. */
5399 else if (p->p_type == PT_DYNAMIC
5400 && m->count > 1
5401 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5402 {
5403 _bfd_error_handler
63a5468a
AM
5404 (_("%B: The first section in the PT_DYNAMIC segment"
5405 " is not the .dynamic section"),
b301b248 5406 abfd);
b1a6d0b1
NC
5407 bfd_set_error (bfd_error_bad_value);
5408 return FALSE;
5409 }
3f001e84
JK
5410 /* Set the note section type to SHT_NOTE. */
5411 else if (p->p_type == PT_NOTE)
5412 for (i = 0; i < m->count; i++)
5413 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 5414
252b5132
RH
5415 p->p_offset = 0;
5416 p->p_filesz = 0;
5417 p->p_memsz = 0;
5418
5419 if (m->includes_filehdr)
5420 {
bf988460 5421 if (!m->p_flags_valid)
252b5132 5422 p->p_flags |= PF_R;
252b5132
RH
5423 p->p_filesz = bed->s->sizeof_ehdr;
5424 p->p_memsz = bed->s->sizeof_ehdr;
5425 if (m->count > 0)
5426 {
9ab82472
L
5427 if (p->p_vaddr < (bfd_vma) off
5428 || (!m->p_paddr_valid
5429 && p->p_paddr < (bfd_vma) off))
252b5132 5430 {
4eca0228 5431 _bfd_error_handler
63a5468a
AM
5432 (_("%B: Not enough room for program headers,"
5433 " try linking with -N"),
b301b248 5434 abfd);
252b5132 5435 bfd_set_error (bfd_error_bad_value);
b34976b6 5436 return FALSE;
252b5132
RH
5437 }
5438
5439 p->p_vaddr -= off;
bf988460 5440 if (!m->p_paddr_valid)
252b5132
RH
5441 p->p_paddr -= off;
5442 }
252b5132
RH
5443 }
5444
5445 if (m->includes_phdrs)
5446 {
bf988460 5447 if (!m->p_flags_valid)
252b5132
RH
5448 p->p_flags |= PF_R;
5449
f3520d2f 5450 if (!m->includes_filehdr)
252b5132
RH
5451 {
5452 p->p_offset = bed->s->sizeof_ehdr;
5453
5454 if (m->count > 0)
5455 {
252b5132 5456 p->p_vaddr -= off - p->p_offset;
bf988460 5457 if (!m->p_paddr_valid)
252b5132
RH
5458 p->p_paddr -= off - p->p_offset;
5459 }
252b5132
RH
5460 }
5461
5462 p->p_filesz += alloc * bed->s->sizeof_phdr;
5463 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
5464 if (m->count)
5465 {
5466 p->p_filesz += header_pad;
5467 p->p_memsz += header_pad;
5468 }
252b5132
RH
5469 }
5470
5471 if (p->p_type == PT_LOAD
5472 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5473 {
bf988460 5474 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 5475 p->p_offset = off;
252b5132
RH
5476 else
5477 {
5478 file_ptr adjust;
5479
5480 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
5481 if (!no_contents)
5482 p->p_filesz += adjust;
252b5132
RH
5483 p->p_memsz += adjust;
5484 }
5485 }
5486
1ea63fd2
AM
5487 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5488 maps. Set filepos for sections in PT_LOAD segments, and in
5489 core files, for sections in PT_NOTE segments.
5490 assign_file_positions_for_non_load_sections will set filepos
5491 for other sections and update p_filesz for other segments. */
252b5132
RH
5492 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5493 {
5494 asection *sec;
252b5132 5495 bfd_size_type align;
627b32bc 5496 Elf_Internal_Shdr *this_hdr;
252b5132
RH
5497
5498 sec = *secpp;
02bf8d82 5499 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 5500 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 5501
88967714
AM
5502 if ((p->p_type == PT_LOAD
5503 || p->p_type == PT_TLS)
5504 && (this_hdr->sh_type != SHT_NOBITS
5505 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5506 && ((this_hdr->sh_flags & SHF_TLS) == 0
5507 || p->p_type == PT_TLS))))
252b5132 5508 {
b5599592
AM
5509 bfd_vma p_start = p->p_paddr;
5510 bfd_vma p_end = p_start + p->p_memsz;
5511 bfd_vma s_start = sec->lma;
5512 bfd_vma adjust = s_start - p_end;
252b5132 5513
a2d1e028
L
5514 if (adjust != 0
5515 && (s_start < p_end
5516 || p_end < p_start))
252b5132 5517 {
4eca0228 5518 _bfd_error_handler
695344c0 5519 /* xgettext:c-format */
b5599592
AM
5520 (_("%B: section %A lma %#lx adjusted to %#lx"), abfd, sec,
5521 (unsigned long) s_start, (unsigned long) p_end);
88967714 5522 adjust = 0;
b5599592 5523 sec->lma = p_end;
1cfb7d1e 5524 }
3ac9b6c9 5525 p->p_memsz += adjust;
1cfb7d1e 5526
88967714
AM
5527 if (this_hdr->sh_type != SHT_NOBITS)
5528 {
32812159
AM
5529 if (p->p_filesz + adjust < p->p_memsz)
5530 {
5531 /* We have a PROGBITS section following NOBITS ones.
5532 Allocate file space for the NOBITS section(s) and
5533 zero it. */
5534 adjust = p->p_memsz - p->p_filesz;
5535 if (!write_zeros (abfd, off, adjust))
5536 return FALSE;
5537 }
88967714
AM
5538 off += adjust;
5539 p->p_filesz += adjust;
252b5132 5540 }
252b5132
RH
5541 }
5542
5543 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5544 {
b301b248
AM
5545 /* The section at i == 0 is the one that actually contains
5546 everything. */
4a938328
MS
5547 if (i == 0)
5548 {
627b32bc 5549 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
5550 off += this_hdr->sh_size;
5551 p->p_filesz = this_hdr->sh_size;
b301b248
AM
5552 p->p_memsz = 0;
5553 p->p_align = 1;
252b5132 5554 }
4a938328 5555 else
252b5132 5556 {
b301b248 5557 /* The rest are fake sections that shouldn't be written. */
252b5132 5558 sec->filepos = 0;
eea6121a 5559 sec->size = 0;
b301b248
AM
5560 sec->flags = 0;
5561 continue;
252b5132 5562 }
252b5132
RH
5563 }
5564 else
5565 {
1e951488 5566 if (p->p_type == PT_LOAD)
b301b248 5567 {
1e951488
AM
5568 this_hdr->sh_offset = sec->filepos = off;
5569 if (this_hdr->sh_type != SHT_NOBITS)
5570 off += this_hdr->sh_size;
5571 }
5572 else if (this_hdr->sh_type == SHT_NOBITS
5573 && (this_hdr->sh_flags & SHF_TLS) != 0
5574 && this_hdr->sh_offset == 0)
5575 {
5576 /* This is a .tbss section that didn't get a PT_LOAD.
5577 (See _bfd_elf_map_sections_to_segments "Create a
5578 final PT_LOAD".) Set sh_offset to the value it
5579 would have if we had created a zero p_filesz and
5580 p_memsz PT_LOAD header for the section. This
5581 also makes the PT_TLS header have the same
5582 p_offset value. */
5583 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5584 off, align);
5585 this_hdr->sh_offset = sec->filepos = off + adjust;
b301b248 5586 }
252b5132 5587
02bf8d82 5588 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 5589 {
6a3cd2b4 5590 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
5591 /* A load section without SHF_ALLOC is something like
5592 a note section in a PT_NOTE segment. These take
5593 file space but are not loaded into memory. */
5594 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 5595 p->p_memsz += this_hdr->sh_size;
b301b248 5596 }
6a3cd2b4 5597 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 5598 {
6a3cd2b4
AM
5599 if (p->p_type == PT_TLS)
5600 p->p_memsz += this_hdr->sh_size;
5601
5602 /* .tbss is special. It doesn't contribute to p_memsz of
5603 normal segments. */
5604 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5605 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
5606 }
5607
b10a8ae0
L
5608 if (align > p->p_align
5609 && !m->p_align_valid
5610 && (p->p_type != PT_LOAD
5611 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
5612 p->p_align = align;
5613 }
5614
bf988460 5615 if (!m->p_flags_valid)
252b5132
RH
5616 {
5617 p->p_flags |= PF_R;
02bf8d82 5618 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 5619 p->p_flags |= PF_X;
02bf8d82 5620 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
5621 p->p_flags |= PF_W;
5622 }
5623 }
43a8475c 5624
bf988460 5625 off -= off_adjust;
0920dee7 5626
7c928300
AM
5627 /* Check that all sections are in a PT_LOAD segment.
5628 Don't check funky gdb generated core files. */
5629 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
5630 {
5631 bfd_boolean check_vma = TRUE;
5632
5633 for (i = 1; i < m->count; i++)
5634 if (m->sections[i]->vma == m->sections[i - 1]->vma
5635 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5636 ->this_hdr), p) != 0
5637 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5638 ->this_hdr), p) != 0)
0920dee7 5639 {
9a83a553
AM
5640 /* Looks like we have overlays packed into the segment. */
5641 check_vma = FALSE;
5642 break;
0920dee7 5643 }
9a83a553
AM
5644
5645 for (i = 0; i < m->count; i++)
5646 {
5647 Elf_Internal_Shdr *this_hdr;
5648 asection *sec;
5649
5650 sec = m->sections[i];
5651 this_hdr = &(elf_section_data(sec)->this_hdr);
86b2281f
AM
5652 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5653 && !ELF_TBSS_SPECIAL (this_hdr, p))
9a83a553 5654 {
4eca0228 5655 _bfd_error_handler
695344c0 5656 /* xgettext:c-format */
9a83a553
AM
5657 (_("%B: section `%A' can't be allocated in segment %d"),
5658 abfd, sec, j);
5659 print_segment_map (m);
5660 }
5661 }
5662 }
252b5132
RH
5663 }
5664
12bd6957 5665 elf_next_file_pos (abfd) = off;
f3520d2f
AM
5666 return TRUE;
5667}
5668
5669/* Assign file positions for the other sections. */
5670
5671static bfd_boolean
5672assign_file_positions_for_non_load_sections (bfd *abfd,
5673 struct bfd_link_info *link_info)
5674{
5675 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5676 Elf_Internal_Shdr **i_shdrpp;
e06efbf1 5677 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
f3520d2f
AM
5678 Elf_Internal_Phdr *phdrs;
5679 Elf_Internal_Phdr *p;
5680 struct elf_segment_map *m;
62655c7b 5681 struct elf_segment_map *hdrs_segment;
f3520d2f
AM
5682 bfd_vma filehdr_vaddr, filehdr_paddr;
5683 bfd_vma phdrs_vaddr, phdrs_paddr;
5684 file_ptr off;
f3520d2f
AM
5685 unsigned int count;
5686
5c182d5f 5687 i_shdrpp = elf_elfsections (abfd);
e06efbf1 5688 end_hdrpp = i_shdrpp + elf_numsections (abfd);
12bd6957 5689 off = elf_next_file_pos (abfd);
e06efbf1 5690 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
5c182d5f 5691 {
5c182d5f
AM
5692 Elf_Internal_Shdr *hdr;
5693
5694 hdr = *hdrpp;
5695 if (hdr->bfd_section != NULL
252e386e
AM
5696 && (hdr->bfd_section->filepos != 0
5697 || (hdr->sh_type == SHT_NOBITS
5698 && hdr->contents == NULL)))
627b32bc 5699 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
5700 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
5701 {
e8d2ba53 5702 if (hdr->sh_size != 0)
4eca0228 5703 _bfd_error_handler
695344c0 5704 /* xgettext:c-format */
e8d2ba53
AM
5705 (_("%B: warning: allocated section `%s' not in segment"),
5706 abfd,
5707 (hdr->bfd_section == NULL
5708 ? "*unknown*"
5709 : hdr->bfd_section->name));
3ba71138
L
5710 /* We don't need to page align empty sections. */
5711 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
5712 off += vma_page_aligned_bias (hdr->sh_addr, off,
5713 bed->maxpagesize);
5714 else
5715 off += vma_page_aligned_bias (hdr->sh_addr, off,
5716 hdr->sh_addralign);
5717 off = _bfd_elf_assign_file_position_for_section (hdr, off,
5718 FALSE);
5719 }
5720 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5721 && hdr->bfd_section == NULL)
0ce398f1
L
5722 || (hdr->bfd_section != NULL
5723 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS))
5724 /* Compress DWARF debug sections. */
12bd6957 5725 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6a40cf0c
NC
5726 || (elf_symtab_shndx_list (abfd) != NULL
5727 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
5728 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
5729 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
5c182d5f
AM
5730 hdr->sh_offset = -1;
5731 else
5732 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
5733 }
5734
252b5132
RH
5735 /* Now that we have set the section file positions, we can set up
5736 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
5737 count = 0;
5738 filehdr_vaddr = 0;
5739 filehdr_paddr = 0;
5740 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
5741 phdrs_paddr = 0;
62655c7b 5742 hdrs_segment = NULL;
f3520d2f 5743 phdrs = elf_tdata (abfd)->phdr;
12bd6957 5744 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
f3520d2f
AM
5745 {
5746 ++count;
5747 if (p->p_type != PT_LOAD)
5748 continue;
5749
5750 if (m->includes_filehdr)
5751 {
5752 filehdr_vaddr = p->p_vaddr;
5753 filehdr_paddr = p->p_paddr;
5754 }
5755 if (m->includes_phdrs)
5756 {
5757 phdrs_vaddr = p->p_vaddr;
5758 phdrs_paddr = p->p_paddr;
5759 if (m->includes_filehdr)
5760 {
62655c7b 5761 hdrs_segment = m;
f3520d2f
AM
5762 phdrs_vaddr += bed->s->sizeof_ehdr;
5763 phdrs_paddr += bed->s->sizeof_ehdr;
5764 }
5765 }
5766 }
5767
62655c7b
RM
5768 if (hdrs_segment != NULL && link_info != NULL)
5769 {
5770 /* There is a segment that contains both the file headers and the
5771 program headers, so provide a symbol __ehdr_start pointing there.
5772 A program can use this to examine itself robustly. */
5773
5774 struct elf_link_hash_entry *hash
5775 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5776 FALSE, FALSE, TRUE);
5777 /* If the symbol was referenced and not defined, define it. */
5778 if (hash != NULL
5779 && (hash->root.type == bfd_link_hash_new
5780 || hash->root.type == bfd_link_hash_undefined
5781 || hash->root.type == bfd_link_hash_undefweak
5782 || hash->root.type == bfd_link_hash_common))
5783 {
5784 asection *s = NULL;
5785 if (hdrs_segment->count != 0)
5786 /* The segment contains sections, so use the first one. */
5787 s = hdrs_segment->sections[0];
5788 else
5789 /* Use the first (i.e. lowest-addressed) section in any segment. */
12bd6957 5790 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62655c7b
RM
5791 if (m->count != 0)
5792 {
5793 s = m->sections[0];
5794 break;
5795 }
5796
5797 if (s != NULL)
5798 {
5799 hash->root.u.def.value = filehdr_vaddr - s->vma;
5800 hash->root.u.def.section = s;
5801 }
5802 else
5803 {
5804 hash->root.u.def.value = filehdr_vaddr;
5805 hash->root.u.def.section = bfd_abs_section_ptr;
5806 }
5807
5808 hash->root.type = bfd_link_hash_defined;
5809 hash->def_regular = 1;
5810 hash->non_elf = 0;
5811 }
5812 }
5813
12bd6957 5814 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
252b5132 5815 {
129af99f 5816 if (p->p_type == PT_GNU_RELRO)
252b5132 5817 {
b84a33b5 5818 const Elf_Internal_Phdr *lp;
3146fac4 5819 struct elf_segment_map *lm;
1ea63fd2 5820
129af99f 5821 if (link_info != NULL)
8c37241b 5822 {
129af99f
AS
5823 /* During linking the range of the RELRO segment is passed
5824 in link_info. */
12bd6957 5825 for (lm = elf_seg_map (abfd), lp = phdrs;
3146fac4
AM
5826 lm != NULL;
5827 lm = lm->next, lp++)
8c37241b
JJ
5828 {
5829 if (lp->p_type == PT_LOAD
b84a33b5 5830 && lp->p_vaddr < link_info->relro_end
3146fac4
AM
5831 && lm->count != 0
5832 && lm->sections[0]->vma >= link_info->relro_start)
8c37241b
JJ
5833 break;
5834 }
8981c88a 5835
3146fac4 5836 BFD_ASSERT (lm != NULL);
8c37241b 5837 }
129af99f
AS
5838 else
5839 {
5840 /* Otherwise we are copying an executable or shared
b84a33b5 5841 library, but we need to use the same linker logic. */
129af99f
AS
5842 for (lp = phdrs; lp < phdrs + count; ++lp)
5843 {
5844 if (lp->p_type == PT_LOAD
5845 && lp->p_paddr == p->p_paddr)
5846 break;
5847 }
b84a33b5
AM
5848 }
5849
5850 if (lp < phdrs + count)
5851 {
5852 p->p_vaddr = lp->p_vaddr;
5853 p->p_paddr = lp->p_paddr;
5854 p->p_offset = lp->p_offset;
5855 if (link_info != NULL)
5856 p->p_filesz = link_info->relro_end - lp->p_vaddr;
5857 else if (m->p_size_valid)
5858 p->p_filesz = m->p_size;
129af99f
AS
5859 else
5860 abort ();
b84a33b5 5861 p->p_memsz = p->p_filesz;
f3944f72
L
5862 /* Preserve the alignment and flags if they are valid. The
5863 gold linker generates RW/4 for the PT_GNU_RELRO section.
5864 It is better for objcopy/strip to honor these attributes
5865 otherwise gdb will choke when using separate debug files.
5866 */
5867 if (!m->p_align_valid)
5868 p->p_align = 1;
5869 if (!m->p_flags_valid)
341b8ee7 5870 p->p_flags = PF_R;
129af99f 5871 }
9433b9b1 5872 else
b84a33b5
AM
5873 {
5874 memset (p, 0, sizeof *p);
5875 p->p_type = PT_NULL;
5876 }
129af99f 5877 }
04c3a755
NS
5878 else if (p->p_type == PT_GNU_STACK)
5879 {
5880 if (m->p_size_valid)
5881 p->p_memsz = m->p_size;
5882 }
129af99f
AS
5883 else if (m->count != 0)
5884 {
e06efbf1 5885 unsigned int i;
1a9ccd70 5886
129af99f
AS
5887 if (p->p_type != PT_LOAD
5888 && (p->p_type != PT_NOTE
5889 || bfd_get_format (abfd) != bfd_core))
5890 {
1a9ccd70
NC
5891 /* A user specified segment layout may include a PHDR
5892 segment that overlaps with a LOAD segment... */
5893 if (p->p_type == PT_PHDR)
5894 {
5895 m->count = 0;
5896 continue;
5897 }
5898
c86934ce
NC
5899 if (m->includes_filehdr || m->includes_phdrs)
5900 {
b1fa9dd6 5901 /* PR 17512: file: 2195325e. */
4eca0228 5902 _bfd_error_handler
1a9ccd70
NC
5903 (_("%B: error: non-load segment %d includes file header and/or program header"),
5904 abfd, (int)(p - phdrs));
c86934ce
NC
5905 return FALSE;
5906 }
129af99f 5907
86b2281f 5908 p->p_filesz = 0;
129af99f 5909 p->p_offset = m->sections[0]->filepos;
86b2281f
AM
5910 for (i = m->count; i-- != 0;)
5911 {
5912 asection *sect = m->sections[i];
5913 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
5914 if (hdr->sh_type != SHT_NOBITS)
5915 {
5916 p->p_filesz = (sect->filepos - m->sections[0]->filepos
5917 + hdr->sh_size);
5918 break;
5919 }
5920 }
129af99f
AS
5921 }
5922 }
5923 else if (m->includes_filehdr)
5924 {
5925 p->p_vaddr = filehdr_vaddr;
5926 if (! m->p_paddr_valid)
5927 p->p_paddr = filehdr_paddr;
5928 }
5929 else if (m->includes_phdrs)
5930 {
5931 p->p_vaddr = phdrs_vaddr;
5932 if (! m->p_paddr_valid)
5933 p->p_paddr = phdrs_paddr;
252b5132
RH
5934 }
5935 }
5936
12bd6957 5937 elf_next_file_pos (abfd) = off;
252b5132 5938
b34976b6 5939 return TRUE;
252b5132
RH
5940}
5941
6a40cf0c
NC
5942static elf_section_list *
5943find_section_in_list (unsigned int i, elf_section_list * list)
5944{
5945 for (;list != NULL; list = list->next)
5946 if (list->ndx == i)
5947 break;
5948 return list;
5949}
5950
252b5132
RH
5951/* Work out the file positions of all the sections. This is called by
5952 _bfd_elf_compute_section_file_positions. All the section sizes and
5953 VMAs must be known before this is called.
5954
e0638f70
AM
5955 Reloc sections come in two flavours: Those processed specially as
5956 "side-channel" data attached to a section to which they apply, and
5957 those that bfd doesn't process as relocations. The latter sort are
5958 stored in a normal bfd section by bfd_section_from_shdr. We don't
5959 consider the former sort here, unless they form part of the loadable
5960 image. Reloc sections not assigned here will be handled later by
5961 assign_file_positions_for_relocs.
252b5132
RH
5962
5963 We also don't set the positions of the .symtab and .strtab here. */
5964
b34976b6 5965static bfd_boolean
c84fca4d
AO
5966assign_file_positions_except_relocs (bfd *abfd,
5967 struct bfd_link_info *link_info)
252b5132 5968{
5c182d5f
AM
5969 struct elf_obj_tdata *tdata = elf_tdata (abfd);
5970 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
9c5bfbb7 5971 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5972
5973 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
5974 && bfd_get_format (abfd) != bfd_core)
5975 {
5c182d5f
AM
5976 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
5977 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
5978 Elf_Internal_Shdr **hdrpp;
5979 unsigned int i;
a485e98e 5980 file_ptr off;
252b5132
RH
5981
5982 /* Start after the ELF header. */
5983 off = i_ehdrp->e_ehsize;
5984
5985 /* We are not creating an executable, which means that we are
5986 not creating a program header, and that the actual order of
5987 the sections in the file is unimportant. */
9ad5cbcf 5988 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
5989 {
5990 Elf_Internal_Shdr *hdr;
5991
5992 hdr = *hdrpp;
e0638f70
AM
5993 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5994 && hdr->bfd_section == NULL)
0ce398f1
L
5995 || (hdr->bfd_section != NULL
5996 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS))
5997 /* Compress DWARF debug sections. */
12bd6957 5998 || i == elf_onesymtab (abfd)
6a40cf0c
NC
5999 || (elf_symtab_shndx_list (abfd) != NULL
6000 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
6001 || i == elf_strtab_sec (abfd)
6002 || i == elf_shstrtab_sec (abfd))
252b5132
RH
6003 {
6004 hdr->sh_offset = -1;
252b5132 6005 }
9ad5cbcf 6006 else
b34976b6 6007 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 6008 }
a485e98e
AM
6009
6010 elf_next_file_pos (abfd) = off;
252b5132
RH
6011 }
6012 else
6013 {
f3520d2f
AM
6014 unsigned int alloc;
6015
252b5132 6016 /* Assign file positions for the loaded sections based on the
08a40648 6017 assignment of sections to segments. */
f3520d2f
AM
6018 if (!assign_file_positions_for_load_sections (abfd, link_info))
6019 return FALSE;
6020
6021 /* And for non-load sections. */
6022 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
6023 return FALSE;
6024
e36284ab
AM
6025 if (bed->elf_backend_modify_program_headers != NULL)
6026 {
6027 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
6028 return FALSE;
6029 }
6030
58e7ebac 6031 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=. */
0e1862bb 6032 if (link_info != NULL && bfd_link_pie (link_info))
58e7ebac
L
6033 {
6034 unsigned int num_segments = elf_elfheader (abfd)->e_phnum;
6035 Elf_Internal_Phdr *segment = elf_tdata (abfd)->phdr;
6036 Elf_Internal_Phdr *end_segment = &segment[num_segments];
6037
6038 /* Find the lowest p_vaddr in PT_LOAD segments. */
6039 bfd_vma p_vaddr = (bfd_vma) -1;
6040 for (; segment < end_segment; segment++)
6041 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
6042 p_vaddr = segment->p_vaddr;
6043
6044 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
6045 segments is non-zero. */
6046 if (p_vaddr)
6047 i_ehdrp->e_type = ET_EXEC;
6048 }
6049
f3520d2f 6050 /* Write out the program headers. */
12bd6957 6051 alloc = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
1a9ccd70
NC
6052
6053 /* Sort the program headers into the ordering required by the ELF standard. */
6054 if (alloc == 0)
6055 return TRUE;
6056
1a9ccd70
NC
6057 /* PR ld/20815 - Check that the program header segment, if present, will
6058 be loaded into memory. FIXME: The check below is not sufficient as
6059 really all PT_LOAD segments should be checked before issuing an error
6060 message. Plus the PHDR segment does not have to be the first segment
6061 in the program header table. But this version of the check should
cd584857
NC
6062 catch all real world use cases.
6063
6064 FIXME: We used to have code here to sort the PT_LOAD segments into
6065 ascending order, as per the ELF spec. But this breaks some programs,
6066 including the Linux kernel. But really either the spec should be
6067 changed or the programs updated. */
1a9ccd70 6068 if (alloc > 1
cd584857
NC
6069 && tdata->phdr[0].p_type == PT_PHDR
6070 && ! bed->elf_backend_allow_non_load_phdr (abfd, tdata->phdr, alloc)
6071 && tdata->phdr[1].p_type == PT_LOAD
6072 && (tdata->phdr[1].p_vaddr > tdata->phdr[0].p_vaddr
6073 || (tdata->phdr[1].p_vaddr + tdata->phdr[1].p_memsz)
6074 < (tdata->phdr[0].p_vaddr + tdata->phdr[0].p_memsz)))
1a9ccd70
NC
6075 {
6076 /* The fix for this error is usually to edit the linker script being
6077 used and set up the program headers manually. Either that or
6078 leave room for the headers at the start of the SECTIONS. */
6079 _bfd_error_handler (_("\
6080%B: error: PHDR segment not covered by LOAD segment"),
6081 abfd);
1a9ccd70
NC
6082 return FALSE;
6083 }
6084
f3520d2f 6085 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
cd584857
NC
6086 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
6087 return FALSE;
252b5132
RH
6088 }
6089
b34976b6 6090 return TRUE;
252b5132
RH
6091}
6092
b34976b6 6093static bfd_boolean
217aa764 6094prep_headers (bfd *abfd)
252b5132 6095{
3d540e93 6096 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 6097 struct elf_strtab_hash *shstrtab;
9c5bfbb7 6098 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
6099
6100 i_ehdrp = elf_elfheader (abfd);
252b5132 6101
2b0f7ef9 6102 shstrtab = _bfd_elf_strtab_init ();
252b5132 6103 if (shstrtab == NULL)
b34976b6 6104 return FALSE;
252b5132
RH
6105
6106 elf_shstrtab (abfd) = shstrtab;
6107
6108 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
6109 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
6110 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
6111 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
6112
6113 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
6114 i_ehdrp->e_ident[EI_DATA] =
6115 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
6116 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
6117
252b5132
RH
6118 if ((abfd->flags & DYNAMIC) != 0)
6119 i_ehdrp->e_type = ET_DYN;
6120 else if ((abfd->flags & EXEC_P) != 0)
6121 i_ehdrp->e_type = ET_EXEC;
6122 else if (bfd_get_format (abfd) == bfd_core)
6123 i_ehdrp->e_type = ET_CORE;
6124 else
6125 i_ehdrp->e_type = ET_REL;
6126
6127 switch (bfd_get_arch (abfd))
6128 {
6129 case bfd_arch_unknown:
6130 i_ehdrp->e_machine = EM_NONE;
6131 break;
aa4f99bb
AO
6132
6133 /* There used to be a long list of cases here, each one setting
6134 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6135 in the corresponding bfd definition. To avoid duplication,
6136 the switch was removed. Machines that need special handling
6137 can generally do it in elf_backend_final_write_processing(),
6138 unless they need the information earlier than the final write.
6139 Such need can generally be supplied by replacing the tests for
6140 e_machine with the conditions used to determine it. */
252b5132 6141 default:
9c5bfbb7
AM
6142 i_ehdrp->e_machine = bed->elf_machine_code;
6143 }
aa4f99bb 6144
252b5132
RH
6145 i_ehdrp->e_version = bed->s->ev_current;
6146 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
6147
c044fabd 6148 /* No program header, for now. */
252b5132
RH
6149 i_ehdrp->e_phoff = 0;
6150 i_ehdrp->e_phentsize = 0;
6151 i_ehdrp->e_phnum = 0;
6152
c044fabd 6153 /* Each bfd section is section header entry. */
252b5132
RH
6154 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6155 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6156
c044fabd 6157 /* If we're building an executable, we'll need a program header table. */
252b5132 6158 if (abfd->flags & EXEC_P)
0e71e495
BE
6159 /* It all happens later. */
6160 ;
252b5132
RH
6161 else
6162 {
6163 i_ehdrp->e_phentsize = 0;
252b5132
RH
6164 i_ehdrp->e_phoff = 0;
6165 }
6166
6167 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 6168 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 6169 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 6170 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 6171 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 6172 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132 6173 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
17ca87fc 6174 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
252b5132 6175 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 6176 return FALSE;
252b5132 6177
b34976b6 6178 return TRUE;
252b5132
RH
6179}
6180
6181/* Assign file positions for all the reloc sections which are not part
a485e98e 6182 of the loadable file image, and the file position of section headers. */
252b5132 6183
0ce398f1
L
6184static bfd_boolean
6185_bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
252b5132
RH
6186{
6187 file_ptr off;
e06efbf1 6188 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
3e19fb8f 6189 Elf_Internal_Shdr *shdrp;
a485e98e
AM
6190 Elf_Internal_Ehdr *i_ehdrp;
6191 const struct elf_backend_data *bed;
252b5132 6192
12bd6957 6193 off = elf_next_file_pos (abfd);
252b5132 6194
e06efbf1
L
6195 shdrpp = elf_elfsections (abfd);
6196 end_shdrpp = shdrpp + elf_numsections (abfd);
6197 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
252b5132 6198 {
252b5132 6199 shdrp = *shdrpp;
0ce398f1
L
6200 if (shdrp->sh_offset == -1)
6201 {
3e19fb8f 6202 asection *sec = shdrp->bfd_section;
0ce398f1
L
6203 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
6204 || shdrp->sh_type == SHT_RELA);
6205 if (is_rel
3e19fb8f 6206 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
0ce398f1
L
6207 {
6208 if (!is_rel)
6209 {
3e19fb8f
L
6210 const char *name = sec->name;
6211 struct bfd_elf_section_data *d;
6212
0ce398f1 6213 /* Compress DWARF debug sections. */
3e19fb8f 6214 if (!bfd_compress_section (abfd, sec,
0ce398f1
L
6215 shdrp->contents))
6216 return FALSE;
3e19fb8f
L
6217
6218 if (sec->compress_status == COMPRESS_SECTION_DONE
6219 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
6220 {
6221 /* If section is compressed with zlib-gnu, convert
6222 section name from .debug_* to .zdebug_*. */
6223 char *new_name
6224 = convert_debug_to_zdebug (abfd, name);
6225 if (new_name == NULL)
6226 return FALSE;
6227 name = new_name;
6228 }
dd905818 6229 /* Add section name to section name section. */
3e19fb8f
L
6230 if (shdrp->sh_name != (unsigned int) -1)
6231 abort ();
6232 shdrp->sh_name
6233 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6234 name, FALSE);
6235 d = elf_section_data (sec);
6236
dd905818 6237 /* Add reloc section name to section name section. */
3e19fb8f
L
6238 if (d->rel.hdr
6239 && !_bfd_elf_set_reloc_sh_name (abfd,
6240 d->rel.hdr,
6241 name, FALSE))
6242 return FALSE;
6243 if (d->rela.hdr
6244 && !_bfd_elf_set_reloc_sh_name (abfd,
6245 d->rela.hdr,
91cb26da 6246 name, TRUE))
3e19fb8f
L
6247 return FALSE;
6248
0ce398f1 6249 /* Update section size and contents. */
3e19fb8f
L
6250 shdrp->sh_size = sec->size;
6251 shdrp->contents = sec->contents;
0ce398f1
L
6252 shdrp->bfd_section->contents = NULL;
6253 }
6254 off = _bfd_elf_assign_file_position_for_section (shdrp,
6255 off,
6256 TRUE);
6257 }
6258 }
252b5132
RH
6259 }
6260
3e19fb8f
L
6261 /* Place section name section after DWARF debug sections have been
6262 compressed. */
6263 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6264 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6265 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6266 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
6267
6268 /* Place the section headers. */
a485e98e
AM
6269 i_ehdrp = elf_elfheader (abfd);
6270 bed = get_elf_backend_data (abfd);
6271 off = align_file_position (off, 1 << bed->s->log_file_align);
6272 i_ehdrp->e_shoff = off;
6273 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
12bd6957 6274 elf_next_file_pos (abfd) = off;
0ce398f1
L
6275
6276 return TRUE;
252b5132
RH
6277}
6278
b34976b6 6279bfd_boolean
217aa764 6280_bfd_elf_write_object_contents (bfd *abfd)
252b5132 6281{
9c5bfbb7 6282 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6283 Elf_Internal_Shdr **i_shdrp;
b34976b6 6284 bfd_boolean failed;
9ad5cbcf 6285 unsigned int count, num_sec;
30e8ee25 6286 struct elf_obj_tdata *t;
252b5132
RH
6287
6288 if (! abfd->output_has_begun
217aa764 6289 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6290 return FALSE;
252b5132
RH
6291
6292 i_shdrp = elf_elfsections (abfd);
252b5132 6293
b34976b6 6294 failed = FALSE;
252b5132
RH
6295 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6296 if (failed)
b34976b6 6297 return FALSE;
252b5132 6298
0ce398f1
L
6299 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6300 return FALSE;
252b5132 6301
c044fabd 6302 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
6303 num_sec = elf_numsections (abfd);
6304 for (count = 1; count < num_sec; count++)
252b5132 6305 {
3e19fb8f
L
6306 i_shdrp[count]->sh_name
6307 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6308 i_shdrp[count]->sh_name);
252b5132
RH
6309 if (bed->elf_backend_section_processing)
6310 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
6311 if (i_shdrp[count]->contents)
6312 {
dc810e39
AM
6313 bfd_size_type amt = i_shdrp[count]->sh_size;
6314
252b5132 6315 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 6316 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 6317 return FALSE;
252b5132
RH
6318 }
6319 }
6320
6321 /* Write out the section header names. */
30e8ee25 6322 t = elf_tdata (abfd);
26ae6d5e 6323 if (elf_shstrtab (abfd) != NULL
30e8ee25 6324 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 6325 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 6326 return FALSE;
252b5132
RH
6327
6328 if (bed->elf_backend_final_write_processing)
12bd6957 6329 (*bed->elf_backend_final_write_processing) (abfd, elf_linker (abfd));
252b5132 6330
ff59fc36
RM
6331 if (!bed->s->write_shdrs_and_ehdr (abfd))
6332 return FALSE;
6333
6334 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
c0355132
AM
6335 if (t->o->build_id.after_write_object_contents != NULL)
6336 return (*t->o->build_id.after_write_object_contents) (abfd);
ff59fc36
RM
6337
6338 return TRUE;
252b5132
RH
6339}
6340
b34976b6 6341bfd_boolean
217aa764 6342_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 6343{
c044fabd 6344 /* Hopefully this can be done just like an object file. */
252b5132
RH
6345 return _bfd_elf_write_object_contents (abfd);
6346}
c044fabd
KH
6347
6348/* Given a section, search the header to find them. */
6349
cb33740c 6350unsigned int
198beae2 6351_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 6352{
9c5bfbb7 6353 const struct elf_backend_data *bed;
91d6fa6a 6354 unsigned int sec_index;
252b5132 6355
9ad5cbcf
AM
6356 if (elf_section_data (asect) != NULL
6357 && elf_section_data (asect)->this_idx != 0)
6358 return elf_section_data (asect)->this_idx;
6359
6360 if (bfd_is_abs_section (asect))
91d6fa6a 6361 sec_index = SHN_ABS;
af746e92 6362 else if (bfd_is_com_section (asect))
91d6fa6a 6363 sec_index = SHN_COMMON;
af746e92 6364 else if (bfd_is_und_section (asect))
91d6fa6a 6365 sec_index = SHN_UNDEF;
af746e92 6366 else
91d6fa6a 6367 sec_index = SHN_BAD;
252b5132 6368
af746e92 6369 bed = get_elf_backend_data (abfd);
252b5132
RH
6370 if (bed->elf_backend_section_from_bfd_section)
6371 {
91d6fa6a 6372 int retval = sec_index;
9ad5cbcf 6373
af746e92
AM
6374 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6375 return retval;
252b5132
RH
6376 }
6377
91d6fa6a 6378 if (sec_index == SHN_BAD)
af746e92 6379 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 6380
91d6fa6a 6381 return sec_index;
252b5132
RH
6382}
6383
6384/* Given a BFD symbol, return the index in the ELF symbol table, or -1
6385 on error. */
6386
6387int
217aa764 6388_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
6389{
6390 asymbol *asym_ptr = *asym_ptr_ptr;
6391 int idx;
6392 flagword flags = asym_ptr->flags;
6393
6394 /* When gas creates relocations against local labels, it creates its
6395 own symbol for the section, but does put the symbol into the
6396 symbol chain, so udata is 0. When the linker is generating
6397 relocatable output, this section symbol may be for one of the
6398 input sections rather than the output section. */
6399 if (asym_ptr->udata.i == 0
6400 && (flags & BSF_SECTION_SYM)
6401 && asym_ptr->section)
6402 {
5372391b 6403 asection *sec;
252b5132
RH
6404 int indx;
6405
5372391b
AM
6406 sec = asym_ptr->section;
6407 if (sec->owner != abfd && sec->output_section != NULL)
6408 sec = sec->output_section;
6409 if (sec->owner == abfd
6410 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 6411 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
6412 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
6413 }
6414
6415 idx = asym_ptr->udata.i;
6416
6417 if (idx == 0)
6418 {
6419 /* This case can occur when using --strip-symbol on a symbol
08a40648 6420 which is used in a relocation entry. */
4eca0228 6421 _bfd_error_handler
695344c0 6422 /* xgettext:c-format */
d003868e
AM
6423 (_("%B: symbol `%s' required but not present"),
6424 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
6425 bfd_set_error (bfd_error_no_symbols);
6426 return -1;
6427 }
6428
6429#if DEBUG & 4
6430 {
6431 fprintf (stderr,
9ccb8af9
AM
6432 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx\n",
6433 (long) asym_ptr, asym_ptr->name, idx, (long) flags);
252b5132
RH
6434 fflush (stderr);
6435 }
6436#endif
6437
6438 return idx;
6439}
6440
84d1d650 6441/* Rewrite program header information. */
252b5132 6442
b34976b6 6443static bfd_boolean
84d1d650 6444rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 6445{
b34976b6
AM
6446 Elf_Internal_Ehdr *iehdr;
6447 struct elf_segment_map *map;
6448 struct elf_segment_map *map_first;
6449 struct elf_segment_map **pointer_to_map;
6450 Elf_Internal_Phdr *segment;
6451 asection *section;
6452 unsigned int i;
6453 unsigned int num_segments;
6454 bfd_boolean phdr_included = FALSE;
5c44b38e 6455 bfd_boolean p_paddr_valid;
b34976b6
AM
6456 bfd_vma maxpagesize;
6457 struct elf_segment_map *phdr_adjust_seg = NULL;
6458 unsigned int phdr_adjust_num = 0;
9c5bfbb7 6459 const struct elf_backend_data *bed;
bc67d8a6 6460
caf47ea6 6461 bed = get_elf_backend_data (ibfd);
252b5132
RH
6462 iehdr = elf_elfheader (ibfd);
6463
bc67d8a6 6464 map_first = NULL;
c044fabd 6465 pointer_to_map = &map_first;
252b5132
RH
6466
6467 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
6468 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6469
6470 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
6471#define SEGMENT_END(segment, start) \
6472 (start + (segment->p_memsz > segment->p_filesz \
6473 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 6474
eecdbe52
JJ
6475#define SECTION_SIZE(section, segment) \
6476 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6477 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 6478 ? section->size : 0)
eecdbe52 6479
b34976b6 6480 /* Returns TRUE if the given section is contained within
bc67d8a6 6481 the given segment. VMA addresses are compared. */
aecc8f8a
AM
6482#define IS_CONTAINED_BY_VMA(section, segment) \
6483 (section->vma >= segment->p_vaddr \
eecdbe52 6484 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 6485 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 6486
b34976b6 6487 /* Returns TRUE if the given section is contained within
bc67d8a6 6488 the given segment. LMA addresses are compared. */
aecc8f8a
AM
6489#define IS_CONTAINED_BY_LMA(section, segment, base) \
6490 (section->lma >= base \
eecdbe52 6491 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 6492 <= SEGMENT_END (segment, base)))
252b5132 6493
0efc80c8
L
6494 /* Handle PT_NOTE segment. */
6495#define IS_NOTE(p, s) \
aecc8f8a 6496 (p->p_type == PT_NOTE \
0efc80c8 6497 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 6498 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6499 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6500 <= p->p_offset + p->p_filesz))
252b5132 6501
0efc80c8
L
6502 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6503 etc. */
6504#define IS_COREFILE_NOTE(p, s) \
6505 (IS_NOTE (p, s) \
6506 && bfd_get_format (ibfd) == bfd_core \
6507 && s->vma == 0 \
6508 && s->lma == 0)
6509
252b5132
RH
6510 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6511 linker, which generates a PT_INTERP section with p_vaddr and
6512 p_memsz set to 0. */
aecc8f8a
AM
6513#define IS_SOLARIS_PT_INTERP(p, s) \
6514 (p->p_vaddr == 0 \
6515 && p->p_paddr == 0 \
6516 && p->p_memsz == 0 \
6517 && p->p_filesz > 0 \
6518 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 6519 && s->size > 0 \
aecc8f8a 6520 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6521 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6522 <= p->p_offset + p->p_filesz))
5c440b1e 6523
bc67d8a6
NC
6524 /* Decide if the given section should be included in the given segment.
6525 A section will be included if:
f5ffc919 6526 1. It is within the address space of the segment -- we use the LMA
08a40648 6527 if that is set for the segment and the VMA otherwise,
0efc80c8 6528 2. It is an allocated section or a NOTE section in a PT_NOTE
d324f6d6 6529 segment.
bc67d8a6 6530 3. There is an output section associated with it,
eecdbe52 6531 4. The section has not already been allocated to a previous segment.
2b05f1b7 6532 5. PT_GNU_STACK segments do not include any sections.
03394ac9 6533 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
6534 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6535 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 6536 (with the possible exception of .dynamic). */
9f17e2a6 6537#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
6538 ((((segment->p_paddr \
6539 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
6540 : IS_CONTAINED_BY_VMA (section, segment)) \
6541 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 6542 || IS_NOTE (segment, section)) \
2b05f1b7
L
6543 && segment->p_type != PT_GNU_STACK \
6544 && (segment->p_type != PT_TLS \
6545 || (section->flags & SEC_THREAD_LOCAL)) \
6546 && (segment->p_type == PT_LOAD \
6547 || segment->p_type == PT_TLS \
6548 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6549 && (segment->p_type != PT_DYNAMIC \
6550 || SECTION_SIZE (section, segment) > 0 \
6551 || (segment->p_paddr \
6552 ? segment->p_paddr != section->lma \
6553 : segment->p_vaddr != section->vma) \
6554 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
6555 == 0)) \
0067a569 6556 && !section->segment_mark)
bc67d8a6 6557
9f17e2a6
L
6558/* If the output section of a section in the input segment is NULL,
6559 it is removed from the corresponding output segment. */
6560#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
6561 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
6562 && section->output_section != NULL)
6563
b34976b6 6564 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
6565#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6566 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6567
6568 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6569 their VMA address ranges and their LMA address ranges overlap.
6570 It is possible to have overlapping VMA ranges without overlapping LMA
6571 ranges. RedBoot images for example can have both .data and .bss mapped
6572 to the same VMA range, but with the .data section mapped to a different
6573 LMA. */
aecc8f8a 6574#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 6575 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 6576 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 6577 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 6578 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
6579
6580 /* Initialise the segment mark field. */
6581 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 6582 section->segment_mark = FALSE;
bc67d8a6 6583
5c44b38e
AM
6584 /* The Solaris linker creates program headers in which all the
6585 p_paddr fields are zero. When we try to objcopy or strip such a
6586 file, we get confused. Check for this case, and if we find it
6587 don't set the p_paddr_valid fields. */
6588 p_paddr_valid = FALSE;
6589 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6590 i < num_segments;
6591 i++, segment++)
6592 if (segment->p_paddr != 0)
6593 {
6594 p_paddr_valid = TRUE;
6595 break;
6596 }
6597
252b5132 6598 /* Scan through the segments specified in the program header
bc67d8a6 6599 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 6600 in the loadable segments. These can be created by weird
aecc8f8a 6601 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
6602 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6603 i < num_segments;
c044fabd 6604 i++, segment++)
252b5132 6605 {
252b5132 6606 unsigned int j;
c044fabd 6607 Elf_Internal_Phdr *segment2;
252b5132 6608
aecc8f8a
AM
6609 if (segment->p_type == PT_INTERP)
6610 for (section = ibfd->sections; section; section = section->next)
6611 if (IS_SOLARIS_PT_INTERP (segment, section))
6612 {
6613 /* Mininal change so that the normal section to segment
4cc11e76 6614 assignment code will work. */
aecc8f8a
AM
6615 segment->p_vaddr = section->vma;
6616 break;
6617 }
6618
bc67d8a6 6619 if (segment->p_type != PT_LOAD)
b10a8ae0
L
6620 {
6621 /* Remove PT_GNU_RELRO segment. */
6622 if (segment->p_type == PT_GNU_RELRO)
6623 segment->p_type = PT_NULL;
6624 continue;
6625 }
c044fabd 6626
bc67d8a6 6627 /* Determine if this segment overlaps any previous segments. */
0067a569 6628 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
6629 {
6630 bfd_signed_vma extra_length;
c044fabd 6631
bc67d8a6 6632 if (segment2->p_type != PT_LOAD
0067a569 6633 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 6634 continue;
c044fabd 6635
bc67d8a6
NC
6636 /* Merge the two segments together. */
6637 if (segment2->p_vaddr < segment->p_vaddr)
6638 {
c044fabd 6639 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 6640 SEGMENT. */
0067a569
AM
6641 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
6642 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 6643
bc67d8a6
NC
6644 if (extra_length > 0)
6645 {
0067a569 6646 segment2->p_memsz += extra_length;
bc67d8a6
NC
6647 segment2->p_filesz += extra_length;
6648 }
c044fabd 6649
bc67d8a6 6650 segment->p_type = PT_NULL;
c044fabd 6651
bc67d8a6
NC
6652 /* Since we have deleted P we must restart the outer loop. */
6653 i = 0;
6654 segment = elf_tdata (ibfd)->phdr;
6655 break;
6656 }
6657 else
6658 {
c044fabd 6659 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 6660 SEGMENT2. */
0067a569
AM
6661 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
6662 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 6663
bc67d8a6
NC
6664 if (extra_length > 0)
6665 {
0067a569 6666 segment->p_memsz += extra_length;
bc67d8a6
NC
6667 segment->p_filesz += extra_length;
6668 }
c044fabd 6669
bc67d8a6
NC
6670 segment2->p_type = PT_NULL;
6671 }
6672 }
6673 }
c044fabd 6674
bc67d8a6
NC
6675 /* The second scan attempts to assign sections to segments. */
6676 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6677 i < num_segments;
0067a569 6678 i++, segment++)
bc67d8a6 6679 {
0067a569
AM
6680 unsigned int section_count;
6681 asection **sections;
6682 asection *output_section;
6683 unsigned int isec;
6684 bfd_vma matching_lma;
6685 bfd_vma suggested_lma;
6686 unsigned int j;
dc810e39 6687 bfd_size_type amt;
0067a569
AM
6688 asection *first_section;
6689 bfd_boolean first_matching_lma;
6690 bfd_boolean first_suggested_lma;
bc67d8a6
NC
6691
6692 if (segment->p_type == PT_NULL)
6693 continue;
c044fabd 6694
9f17e2a6 6695 first_section = NULL;
bc67d8a6 6696 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
6697 for (section = ibfd->sections, section_count = 0;
6698 section != NULL;
6699 section = section->next)
9f17e2a6
L
6700 {
6701 /* Find the first section in the input segment, which may be
6702 removed from the corresponding output segment. */
6703 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
6704 {
6705 if (first_section == NULL)
6706 first_section = section;
6707 if (section->output_section != NULL)
6708 ++section_count;
6709 }
6710 }
811072d8 6711
b5f852ea
NC
6712 /* Allocate a segment map big enough to contain
6713 all of the sections we have selected. */
dc810e39
AM
6714 amt = sizeof (struct elf_segment_map);
6715 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6716 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 6717 if (map == NULL)
b34976b6 6718 return FALSE;
252b5132
RH
6719
6720 /* Initialise the fields of the segment map. Default to
6721 using the physical address of the segment in the input BFD. */
0067a569
AM
6722 map->next = NULL;
6723 map->p_type = segment->p_type;
6724 map->p_flags = segment->p_flags;
bc67d8a6 6725 map->p_flags_valid = 1;
55d55ac7 6726
9f17e2a6
L
6727 /* If the first section in the input segment is removed, there is
6728 no need to preserve segment physical address in the corresponding
6729 output segment. */
945c025a 6730 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
6731 {
6732 map->p_paddr = segment->p_paddr;
5c44b38e 6733 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 6734 }
252b5132
RH
6735
6736 /* Determine if this segment contains the ELF file header
6737 and if it contains the program headers themselves. */
bc67d8a6
NC
6738 map->includes_filehdr = (segment->p_offset == 0
6739 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 6740 map->includes_phdrs = 0;
252b5132 6741
0067a569 6742 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 6743 {
bc67d8a6
NC
6744 map->includes_phdrs =
6745 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6746 && (segment->p_offset + segment->p_filesz
252b5132
RH
6747 >= ((bfd_vma) iehdr->e_phoff
6748 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 6749
bc67d8a6 6750 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 6751 phdr_included = TRUE;
252b5132
RH
6752 }
6753
bc67d8a6 6754 if (section_count == 0)
252b5132
RH
6755 {
6756 /* Special segments, such as the PT_PHDR segment, may contain
6757 no sections, but ordinary, loadable segments should contain
1ed89aa9 6758 something. They are allowed by the ELF spec however, so only
f98450c6
NC
6759 a warning is produced.
6760 There is however the valid use case of embedded systems which
6761 have segments with p_filesz of 0 and a p_memsz > 0 to initialize
6762 flash memory with zeros. No warning is shown for that case. */
6763 if (segment->p_type == PT_LOAD
6764 && (segment->p_filesz > 0 || segment->p_memsz == 0))
6765 /* xgettext:c-format */
4eca0228 6766 _bfd_error_handler (_("\
f98450c6
NC
6767%B: warning: Empty loadable segment detected at vaddr=0x%.8x, is this intentional ?"),
6768 ibfd, segment->p_vaddr);
252b5132 6769
bc67d8a6 6770 map->count = 0;
c044fabd
KH
6771 *pointer_to_map = map;
6772 pointer_to_map = &map->next;
252b5132
RH
6773
6774 continue;
6775 }
6776
6777 /* Now scan the sections in the input BFD again and attempt
6778 to add their corresponding output sections to the segment map.
6779 The problem here is how to handle an output section which has
6780 been moved (ie had its LMA changed). There are four possibilities:
6781
6782 1. None of the sections have been moved.
6783 In this case we can continue to use the segment LMA from the
6784 input BFD.
6785
6786 2. All of the sections have been moved by the same amount.
6787 In this case we can change the segment's LMA to match the LMA
6788 of the first section.
6789
6790 3. Some of the sections have been moved, others have not.
6791 In this case those sections which have not been moved can be
6792 placed in the current segment which will have to have its size,
6793 and possibly its LMA changed, and a new segment or segments will
6794 have to be created to contain the other sections.
6795
b5f852ea 6796 4. The sections have been moved, but not by the same amount.
252b5132
RH
6797 In this case we can change the segment's LMA to match the LMA
6798 of the first section and we will have to create a new segment
6799 or segments to contain the other sections.
6800
6801 In order to save time, we allocate an array to hold the section
6802 pointers that we are interested in. As these sections get assigned
6803 to a segment, they are removed from this array. */
6804
a50b1753 6805 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 6806 if (sections == NULL)
b34976b6 6807 return FALSE;
252b5132
RH
6808
6809 /* Step One: Scan for segment vs section LMA conflicts.
6810 Also add the sections to the section array allocated above.
6811 Also add the sections to the current segment. In the common
6812 case, where the sections have not been moved, this means that
6813 we have completely filled the segment, and there is nothing
6814 more to do. */
252b5132 6815 isec = 0;
72730e0c 6816 matching_lma = 0;
252b5132 6817 suggested_lma = 0;
0067a569
AM
6818 first_matching_lma = TRUE;
6819 first_suggested_lma = TRUE;
252b5132 6820
461c4b2e 6821 for (section = first_section, j = 0;
bc67d8a6
NC
6822 section != NULL;
6823 section = section->next)
252b5132 6824 {
caf47ea6 6825 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 6826 {
bc67d8a6
NC
6827 output_section = section->output_section;
6828
0067a569 6829 sections[j++] = section;
252b5132
RH
6830
6831 /* The Solaris native linker always sets p_paddr to 0.
6832 We try to catch that case here, and set it to the
5e8d7549
NC
6833 correct value. Note - some backends require that
6834 p_paddr be left as zero. */
5c44b38e 6835 if (!p_paddr_valid
4455705d 6836 && segment->p_vaddr != 0
0067a569 6837 && !bed->want_p_paddr_set_to_zero
252b5132 6838 && isec == 0
bc67d8a6 6839 && output_section->lma != 0
0067a569
AM
6840 && output_section->vma == (segment->p_vaddr
6841 + (map->includes_filehdr
6842 ? iehdr->e_ehsize
6843 : 0)
6844 + (map->includes_phdrs
6845 ? (iehdr->e_phnum
6846 * iehdr->e_phentsize)
6847 : 0)))
bc67d8a6 6848 map->p_paddr = segment->p_vaddr;
252b5132
RH
6849
6850 /* Match up the physical address of the segment with the
6851 LMA address of the output section. */
bc67d8a6 6852 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 6853 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
6854 || (bed->want_p_paddr_set_to_zero
6855 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 6856 {
0067a569
AM
6857 if (first_matching_lma || output_section->lma < matching_lma)
6858 {
6859 matching_lma = output_section->lma;
6860 first_matching_lma = FALSE;
6861 }
252b5132
RH
6862
6863 /* We assume that if the section fits within the segment
bc67d8a6 6864 then it does not overlap any other section within that
252b5132 6865 segment. */
0067a569
AM
6866 map->sections[isec++] = output_section;
6867 }
6868 else if (first_suggested_lma)
6869 {
6870 suggested_lma = output_section->lma;
6871 first_suggested_lma = FALSE;
252b5132 6872 }
147d51c2
L
6873
6874 if (j == section_count)
6875 break;
252b5132
RH
6876 }
6877 }
6878
bc67d8a6 6879 BFD_ASSERT (j == section_count);
252b5132
RH
6880
6881 /* Step Two: Adjust the physical address of the current segment,
6882 if necessary. */
bc67d8a6 6883 if (isec == section_count)
252b5132
RH
6884 {
6885 /* All of the sections fitted within the segment as currently
6886 specified. This is the default case. Add the segment to
6887 the list of built segments and carry on to process the next
6888 program header in the input BFD. */
bc67d8a6 6889 map->count = section_count;
c044fabd
KH
6890 *pointer_to_map = map;
6891 pointer_to_map = &map->next;
08a40648 6892
5c44b38e
AM
6893 if (p_paddr_valid
6894 && !bed->want_p_paddr_set_to_zero
147d51c2 6895 && matching_lma != map->p_paddr
5c44b38e
AM
6896 && !map->includes_filehdr
6897 && !map->includes_phdrs)
3271a814
NS
6898 /* There is some padding before the first section in the
6899 segment. So, we must account for that in the output
6900 segment's vma. */
6901 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 6902
252b5132
RH
6903 free (sections);
6904 continue;
6905 }
252b5132
RH
6906 else
6907 {
0067a569 6908 if (!first_matching_lma)
72730e0c
AM
6909 {
6910 /* At least one section fits inside the current segment.
6911 Keep it, but modify its physical address to match the
6912 LMA of the first section that fitted. */
bc67d8a6 6913 map->p_paddr = matching_lma;
72730e0c
AM
6914 }
6915 else
6916 {
6917 /* None of the sections fitted inside the current segment.
6918 Change the current segment's physical address to match
6919 the LMA of the first section. */
bc67d8a6 6920 map->p_paddr = suggested_lma;
72730e0c
AM
6921 }
6922
bc67d8a6
NC
6923 /* Offset the segment physical address from the lma
6924 to allow for space taken up by elf headers. */
6925 if (map->includes_filehdr)
010c8431
AM
6926 {
6927 if (map->p_paddr >= iehdr->e_ehsize)
6928 map->p_paddr -= iehdr->e_ehsize;
6929 else
6930 {
6931 map->includes_filehdr = FALSE;
6932 map->includes_phdrs = FALSE;
6933 }
6934 }
252b5132 6935
bc67d8a6
NC
6936 if (map->includes_phdrs)
6937 {
010c8431
AM
6938 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
6939 {
6940 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
6941
6942 /* iehdr->e_phnum is just an estimate of the number
6943 of program headers that we will need. Make a note
6944 here of the number we used and the segment we chose
6945 to hold these headers, so that we can adjust the
6946 offset when we know the correct value. */
6947 phdr_adjust_num = iehdr->e_phnum;
6948 phdr_adjust_seg = map;
6949 }
6950 else
6951 map->includes_phdrs = FALSE;
bc67d8a6 6952 }
252b5132
RH
6953 }
6954
6955 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 6956 those that fit to the current segment and removing them from the
252b5132
RH
6957 sections array; but making sure not to leave large gaps. Once all
6958 possible sections have been assigned to the current segment it is
6959 added to the list of built segments and if sections still remain
6960 to be assigned, a new segment is constructed before repeating
6961 the loop. */
6962 isec = 0;
6963 do
6964 {
bc67d8a6 6965 map->count = 0;
252b5132 6966 suggested_lma = 0;
0067a569 6967 first_suggested_lma = TRUE;
252b5132
RH
6968
6969 /* Fill the current segment with sections that fit. */
bc67d8a6 6970 for (j = 0; j < section_count; j++)
252b5132 6971 {
bc67d8a6 6972 section = sections[j];
252b5132 6973
bc67d8a6 6974 if (section == NULL)
252b5132
RH
6975 continue;
6976
bc67d8a6 6977 output_section = section->output_section;
252b5132 6978
bc67d8a6 6979 BFD_ASSERT (output_section != NULL);
c044fabd 6980
bc67d8a6
NC
6981 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
6982 || IS_COREFILE_NOTE (segment, section))
252b5132 6983 {
bc67d8a6 6984 if (map->count == 0)
252b5132
RH
6985 {
6986 /* If the first section in a segment does not start at
bc67d8a6
NC
6987 the beginning of the segment, then something is
6988 wrong. */
0067a569
AM
6989 if (output_section->lma
6990 != (map->p_paddr
6991 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
6992 + (map->includes_phdrs
6993 ? iehdr->e_phnum * iehdr->e_phentsize
6994 : 0)))
252b5132
RH
6995 abort ();
6996 }
6997 else
6998 {
0067a569 6999 asection *prev_sec;
252b5132 7000
bc67d8a6 7001 prev_sec = map->sections[map->count - 1];
252b5132
RH
7002
7003 /* If the gap between the end of the previous section
bc67d8a6
NC
7004 and the start of this section is more than
7005 maxpagesize then we need to start a new segment. */
eea6121a 7006 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 7007 maxpagesize)
caf47ea6 7008 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 7009 || (prev_sec->lma + prev_sec->size
079e9a2f 7010 > output_section->lma))
252b5132 7011 {
0067a569
AM
7012 if (first_suggested_lma)
7013 {
7014 suggested_lma = output_section->lma;
7015 first_suggested_lma = FALSE;
7016 }
252b5132
RH
7017
7018 continue;
7019 }
7020 }
7021
bc67d8a6 7022 map->sections[map->count++] = output_section;
252b5132
RH
7023 ++isec;
7024 sections[j] = NULL;
b34976b6 7025 section->segment_mark = TRUE;
252b5132 7026 }
0067a569
AM
7027 else if (first_suggested_lma)
7028 {
7029 suggested_lma = output_section->lma;
7030 first_suggested_lma = FALSE;
7031 }
252b5132
RH
7032 }
7033
bc67d8a6 7034 BFD_ASSERT (map->count > 0);
252b5132
RH
7035
7036 /* Add the current segment to the list of built segments. */
c044fabd
KH
7037 *pointer_to_map = map;
7038 pointer_to_map = &map->next;
252b5132 7039
bc67d8a6 7040 if (isec < section_count)
252b5132
RH
7041 {
7042 /* We still have not allocated all of the sections to
7043 segments. Create a new segment here, initialise it
7044 and carry on looping. */
dc810e39
AM
7045 amt = sizeof (struct elf_segment_map);
7046 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
5964fc3a 7047 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 7048 if (map == NULL)
5ed6aba4
NC
7049 {
7050 free (sections);
7051 return FALSE;
7052 }
252b5132
RH
7053
7054 /* Initialise the fields of the segment map. Set the physical
7055 physical address to the LMA of the first section that has
7056 not yet been assigned. */
0067a569
AM
7057 map->next = NULL;
7058 map->p_type = segment->p_type;
7059 map->p_flags = segment->p_flags;
7060 map->p_flags_valid = 1;
7061 map->p_paddr = suggested_lma;
5c44b38e 7062 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 7063 map->includes_filehdr = 0;
0067a569 7064 map->includes_phdrs = 0;
252b5132
RH
7065 }
7066 }
bc67d8a6 7067 while (isec < section_count);
252b5132
RH
7068
7069 free (sections);
7070 }
7071
12bd6957 7072 elf_seg_map (obfd) = map_first;
bc67d8a6
NC
7073
7074 /* If we had to estimate the number of program headers that were
9ad5cbcf 7075 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
7076 the offset if necessary. */
7077 if (phdr_adjust_seg != NULL)
7078 {
7079 unsigned int count;
c044fabd 7080
bc67d8a6 7081 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 7082 count++;
252b5132 7083
bc67d8a6
NC
7084 if (count > phdr_adjust_num)
7085 phdr_adjust_seg->p_paddr
7086 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
7087 }
c044fabd 7088
bc67d8a6 7089#undef SEGMENT_END
eecdbe52 7090#undef SECTION_SIZE
bc67d8a6
NC
7091#undef IS_CONTAINED_BY_VMA
7092#undef IS_CONTAINED_BY_LMA
0efc80c8 7093#undef IS_NOTE
252b5132 7094#undef IS_COREFILE_NOTE
bc67d8a6 7095#undef IS_SOLARIS_PT_INTERP
9f17e2a6 7096#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
7097#undef INCLUDE_SECTION_IN_SEGMENT
7098#undef SEGMENT_AFTER_SEGMENT
7099#undef SEGMENT_OVERLAPS
b34976b6 7100 return TRUE;
252b5132
RH
7101}
7102
84d1d650
L
7103/* Copy ELF program header information. */
7104
7105static bfd_boolean
7106copy_elf_program_header (bfd *ibfd, bfd *obfd)
7107{
7108 Elf_Internal_Ehdr *iehdr;
7109 struct elf_segment_map *map;
7110 struct elf_segment_map *map_first;
7111 struct elf_segment_map **pointer_to_map;
7112 Elf_Internal_Phdr *segment;
7113 unsigned int i;
7114 unsigned int num_segments;
7115 bfd_boolean phdr_included = FALSE;
88967714 7116 bfd_boolean p_paddr_valid;
84d1d650
L
7117
7118 iehdr = elf_elfheader (ibfd);
7119
7120 map_first = NULL;
7121 pointer_to_map = &map_first;
7122
88967714
AM
7123 /* If all the segment p_paddr fields are zero, don't set
7124 map->p_paddr_valid. */
7125 p_paddr_valid = FALSE;
84d1d650 7126 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
7127 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7128 i < num_segments;
7129 i++, segment++)
7130 if (segment->p_paddr != 0)
7131 {
7132 p_paddr_valid = TRUE;
7133 break;
7134 }
7135
84d1d650
L
7136 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7137 i < num_segments;
7138 i++, segment++)
7139 {
7140 asection *section;
7141 unsigned int section_count;
7142 bfd_size_type amt;
7143 Elf_Internal_Shdr *this_hdr;
53020534 7144 asection *first_section = NULL;
a76e6f2f 7145 asection *lowest_section;
84d1d650 7146
84d1d650
L
7147 /* Compute how many sections are in this segment. */
7148 for (section = ibfd->sections, section_count = 0;
7149 section != NULL;
7150 section = section->next)
7151 {
7152 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7153 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 7154 {
a76e6f2f
AM
7155 if (first_section == NULL)
7156 first_section = section;
3271a814
NS
7157 section_count++;
7158 }
84d1d650
L
7159 }
7160
7161 /* Allocate a segment map big enough to contain
7162 all of the sections we have selected. */
7163 amt = sizeof (struct elf_segment_map);
7164 if (section_count != 0)
7165 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 7166 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
7167 if (map == NULL)
7168 return FALSE;
7169
7170 /* Initialize the fields of the output segment map with the
7171 input segment. */
7172 map->next = NULL;
7173 map->p_type = segment->p_type;
7174 map->p_flags = segment->p_flags;
7175 map->p_flags_valid = 1;
7176 map->p_paddr = segment->p_paddr;
88967714 7177 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
7178 map->p_align = segment->p_align;
7179 map->p_align_valid = 1;
3271a814 7180 map->p_vaddr_offset = 0;
84d1d650 7181
04c3a755
NS
7182 if (map->p_type == PT_GNU_RELRO
7183 || map->p_type == PT_GNU_STACK)
b10a8ae0
L
7184 {
7185 /* The PT_GNU_RELRO segment may contain the first a few
7186 bytes in the .got.plt section even if the whole .got.plt
7187 section isn't in the PT_GNU_RELRO segment. We won't
04c3a755
NS
7188 change the size of the PT_GNU_RELRO segment.
7189 Similarly, PT_GNU_STACK size is significant on uclinux
7190 systems. */
9433b9b1 7191 map->p_size = segment->p_memsz;
b10a8ae0
L
7192 map->p_size_valid = 1;
7193 }
7194
84d1d650
L
7195 /* Determine if this segment contains the ELF file header
7196 and if it contains the program headers themselves. */
7197 map->includes_filehdr = (segment->p_offset == 0
7198 && segment->p_filesz >= iehdr->e_ehsize);
7199
7200 map->includes_phdrs = 0;
7201 if (! phdr_included || segment->p_type != PT_LOAD)
7202 {
7203 map->includes_phdrs =
7204 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7205 && (segment->p_offset + segment->p_filesz
7206 >= ((bfd_vma) iehdr->e_phoff
7207 + iehdr->e_phnum * iehdr->e_phentsize)));
7208
7209 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7210 phdr_included = TRUE;
7211 }
7212
bbefd0a9 7213 lowest_section = NULL;
84d1d650
L
7214 if (section_count != 0)
7215 {
7216 unsigned int isec = 0;
7217
53020534 7218 for (section = first_section;
84d1d650
L
7219 section != NULL;
7220 section = section->next)
7221 {
7222 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7223 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
7224 {
7225 map->sections[isec++] = section->output_section;
a76e6f2f
AM
7226 if ((section->flags & SEC_ALLOC) != 0)
7227 {
7228 bfd_vma seg_off;
7229
bbefd0a9
AM
7230 if (lowest_section == NULL
7231 || section->lma < lowest_section->lma)
fb8a5684
AM
7232 lowest_section = section;
7233
a76e6f2f
AM
7234 /* Section lmas are set up from PT_LOAD header
7235 p_paddr in _bfd_elf_make_section_from_shdr.
7236 If this header has a p_paddr that disagrees
7237 with the section lma, flag the p_paddr as
7238 invalid. */
7239 if ((section->flags & SEC_LOAD) != 0)
7240 seg_off = this_hdr->sh_offset - segment->p_offset;
7241 else
7242 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7243 if (section->lma - segment->p_paddr != seg_off)
7244 map->p_paddr_valid = FALSE;
7245 }
53020534
L
7246 if (isec == section_count)
7247 break;
7248 }
84d1d650
L
7249 }
7250 }
7251
a76e6f2f
AM
7252 if (map->includes_filehdr && lowest_section != NULL)
7253 /* We need to keep the space used by the headers fixed. */
7254 map->header_size = lowest_section->vma - segment->p_vaddr;
d324f6d6 7255
a76e6f2f
AM
7256 if (!map->includes_phdrs
7257 && !map->includes_filehdr
7258 && map->p_paddr_valid)
7259 /* There is some other padding before the first section. */
7260 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
7261 - segment->p_paddr);
7262
84d1d650
L
7263 map->count = section_count;
7264 *pointer_to_map = map;
7265 pointer_to_map = &map->next;
7266 }
7267
12bd6957 7268 elf_seg_map (obfd) = map_first;
84d1d650
L
7269 return TRUE;
7270}
7271
7272/* Copy private BFD data. This copies or rewrites ELF program header
7273 information. */
7274
7275static bfd_boolean
7276copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7277{
84d1d650
L
7278 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7279 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7280 return TRUE;
7281
7282 if (elf_tdata (ibfd)->phdr == NULL)
7283 return TRUE;
7284
7285 if (ibfd->xvec == obfd->xvec)
7286 {
cb3ff1e5
NC
7287 /* Check to see if any sections in the input BFD
7288 covered by ELF program header have changed. */
d55ce4e2 7289 Elf_Internal_Phdr *segment;
84d1d650
L
7290 asection *section, *osec;
7291 unsigned int i, num_segments;
7292 Elf_Internal_Shdr *this_hdr;
147d51c2
L
7293 const struct elf_backend_data *bed;
7294
7295 bed = get_elf_backend_data (ibfd);
7296
7297 /* Regenerate the segment map if p_paddr is set to 0. */
7298 if (bed->want_p_paddr_set_to_zero)
7299 goto rewrite;
84d1d650
L
7300
7301 /* Initialize the segment mark field. */
7302 for (section = obfd->sections; section != NULL;
7303 section = section->next)
7304 section->segment_mark = FALSE;
7305
7306 num_segments = elf_elfheader (ibfd)->e_phnum;
7307 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7308 i < num_segments;
7309 i++, segment++)
7310 {
5f6999aa
NC
7311 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7312 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7313 which severly confuses things, so always regenerate the segment
7314 map in this case. */
7315 if (segment->p_paddr == 0
7316 && segment->p_memsz == 0
7317 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 7318 goto rewrite;
5f6999aa 7319
84d1d650
L
7320 for (section = ibfd->sections;
7321 section != NULL; section = section->next)
7322 {
7323 /* We mark the output section so that we know it comes
7324 from the input BFD. */
7325 osec = section->output_section;
7326 if (osec)
7327 osec->segment_mark = TRUE;
7328
7329 /* Check if this section is covered by the segment. */
7330 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7331 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
7332 {
7333 /* FIXME: Check if its output section is changed or
7334 removed. What else do we need to check? */
7335 if (osec == NULL
7336 || section->flags != osec->flags
7337 || section->lma != osec->lma
7338 || section->vma != osec->vma
7339 || section->size != osec->size
7340 || section->rawsize != osec->rawsize
7341 || section->alignment_power != osec->alignment_power)
7342 goto rewrite;
7343 }
7344 }
7345 }
7346
cb3ff1e5 7347 /* Check to see if any output section do not come from the
84d1d650
L
7348 input BFD. */
7349 for (section = obfd->sections; section != NULL;
7350 section = section->next)
7351 {
7352 if (section->segment_mark == FALSE)
7353 goto rewrite;
7354 else
7355 section->segment_mark = FALSE;
7356 }
7357
7358 return copy_elf_program_header (ibfd, obfd);
7359 }
7360
7361rewrite:
f1d85785
L
7362 if (ibfd->xvec == obfd->xvec)
7363 {
7364 /* When rewriting program header, set the output maxpagesize to
7365 the maximum alignment of input PT_LOAD segments. */
7366 Elf_Internal_Phdr *segment;
7367 unsigned int i;
7368 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7369 bfd_vma maxpagesize = 0;
7370
7371 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7372 i < num_segments;
7373 i++, segment++)
7374 if (segment->p_type == PT_LOAD
7375 && maxpagesize < segment->p_align)
c86934ce
NC
7376 {
7377 /* PR 17512: file: f17299af. */
7378 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
695344c0 7379 /* xgettext:c-format */
4eca0228 7380 _bfd_error_handler (_("\
c86934ce 7381%B: warning: segment alignment of 0x%llx is too large"),
4eca0228 7382 ibfd, (long long) segment->p_align);
c86934ce
NC
7383 else
7384 maxpagesize = segment->p_align;
7385 }
f1d85785
L
7386
7387 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
7388 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
7389 }
7390
84d1d650
L
7391 return rewrite_elf_program_header (ibfd, obfd);
7392}
7393
ccd2ec6a
L
7394/* Initialize private output section information from input section. */
7395
7396bfd_boolean
7397_bfd_elf_init_private_section_data (bfd *ibfd,
7398 asection *isec,
7399 bfd *obfd,
7400 asection *osec,
7401 struct bfd_link_info *link_info)
7402
7403{
7404 Elf_Internal_Shdr *ihdr, *ohdr;
0e1862bb
L
7405 bfd_boolean final_link = (link_info != NULL
7406 && !bfd_link_relocatable (link_info));
ccd2ec6a
L
7407
7408 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7409 || obfd->xvec->flavour != bfd_target_elf_flavour)
7410 return TRUE;
7411
ba85c43e
NC
7412 BFD_ASSERT (elf_section_data (osec) != NULL);
7413
dfa7b0b8
AM
7414 /* For objcopy and relocatable link, don't copy the output ELF
7415 section type from input if the output BFD section flags have been
7416 set to something different. For a final link allow some flags
7417 that the linker clears to differ. */
42bb2e33 7418 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
7419 && (osec->flags == isec->flags
7420 || (final_link
7421 && ((osec->flags ^ isec->flags)
0814be7d 7422 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 7423 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
7424
7425 /* FIXME: Is this correct for all OS/PROC specific flags? */
7426 elf_section_flags (osec) |= (elf_section_flags (isec)
7427 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a 7428
a91e1603
L
7429 /* Copy sh_info from input for mbind section. */
7430 if (elf_section_flags (isec) & SHF_GNU_MBIND)
7431 elf_section_data (osec)->this_hdr.sh_info
7432 = elf_section_data (isec)->this_hdr.sh_info;
7433
ccd2ec6a
L
7434 /* Set things up for objcopy and relocatable link. The output
7435 SHT_GROUP section will have its elf_next_in_group pointing back
7436 to the input group members. Ignore linker created group section.
7437 See elfNN_ia64_object_p in elfxx-ia64.c. */
dfa7b0b8 7438 if (!final_link)
ccd2ec6a
L
7439 {
7440 if (elf_sec_group (isec) == NULL
7441 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
7442 {
7443 if (elf_section_flags (isec) & SHF_GROUP)
7444 elf_section_flags (osec) |= SHF_GROUP;
7445 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 7446 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a 7447 }
68f5ff89
L
7448
7449 /* If not decompress, preserve SHF_COMPRESSED. */
7450 if ((ibfd->flags & BFD_DECOMPRESS) == 0)
7451 elf_section_flags (osec) |= (elf_section_flags (isec)
7452 & SHF_COMPRESSED);
ccd2ec6a
L
7453 }
7454
7455 ihdr = &elf_section_data (isec)->this_hdr;
7456
7457 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7458 don't use the output section of the linked-to section since it
7459 may be NULL at this point. */
7460 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7461 {
7462 ohdr = &elf_section_data (osec)->this_hdr;
7463 ohdr->sh_flags |= SHF_LINK_ORDER;
7464 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7465 }
7466
7467 osec->use_rela_p = isec->use_rela_p;
7468
7469 return TRUE;
7470}
7471
252b5132
RH
7472/* Copy private section information. This copies over the entsize
7473 field, and sometimes the info field. */
7474
b34976b6 7475bfd_boolean
217aa764
AM
7476_bfd_elf_copy_private_section_data (bfd *ibfd,
7477 asection *isec,
7478 bfd *obfd,
7479 asection *osec)
252b5132
RH
7480{
7481 Elf_Internal_Shdr *ihdr, *ohdr;
7482
7483 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7484 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 7485 return TRUE;
252b5132 7486
252b5132
RH
7487 ihdr = &elf_section_data (isec)->this_hdr;
7488 ohdr = &elf_section_data (osec)->this_hdr;
7489
7490 ohdr->sh_entsize = ihdr->sh_entsize;
7491
7492 if (ihdr->sh_type == SHT_SYMTAB
7493 || ihdr->sh_type == SHT_DYNSYM
7494 || ihdr->sh_type == SHT_GNU_verneed
7495 || ihdr->sh_type == SHT_GNU_verdef)
7496 ohdr->sh_info = ihdr->sh_info;
7497
ccd2ec6a
L
7498 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7499 NULL);
252b5132
RH
7500}
7501
d0bf826b
AM
7502/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7503 necessary if we are removing either the SHT_GROUP section or any of
7504 the group member sections. DISCARDED is the value that a section's
7505 output_section has if the section will be discarded, NULL when this
7506 function is called from objcopy, bfd_abs_section_ptr when called
7507 from the linker. */
80fccad2
BW
7508
7509bfd_boolean
d0bf826b 7510_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 7511{
30288845
AM
7512 asection *isec;
7513
30288845 7514 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 7515 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
7516 {
7517 asection *first = elf_next_in_group (isec);
7518 asection *s = first;
d0bf826b
AM
7519 bfd_size_type removed = 0;
7520
30288845
AM
7521 while (s != NULL)
7522 {
415f38a6
AM
7523 /* If this member section is being output but the
7524 SHT_GROUP section is not, then clear the group info
7525 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
7526 if (s->output_section != discarded
7527 && isec->output_section == discarded)
30288845
AM
7528 {
7529 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7530 elf_group_name (s->output_section) = NULL;
7531 }
415f38a6
AM
7532 /* Conversely, if the member section is not being output
7533 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
7534 else if (s->output_section == discarded
7535 && isec->output_section != discarded)
7536 removed += 4;
30288845
AM
7537 s = elf_next_in_group (s);
7538 if (s == first)
7539 break;
7540 }
d0bf826b
AM
7541 if (removed != 0)
7542 {
7543 if (discarded != NULL)
7544 {
7545 /* If we've been called for ld -r, then we need to
7546 adjust the input section size. This function may
7547 be called multiple times, so save the original
7548 size. */
7549 if (isec->rawsize == 0)
7550 isec->rawsize = isec->size;
7551 isec->size = isec->rawsize - removed;
7552 }
7553 else
7554 {
7555 /* Adjust the output section size when called from
7556 objcopy. */
7557 isec->output_section->size -= removed;
7558 }
7559 }
30288845
AM
7560 }
7561
80fccad2
BW
7562 return TRUE;
7563}
7564
d0bf826b
AM
7565/* Copy private header information. */
7566
7567bfd_boolean
7568_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
7569{
7570 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7571 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7572 return TRUE;
7573
7574 /* Copy over private BFD data if it has not already been copied.
7575 This must be done here, rather than in the copy_private_bfd_data
7576 entry point, because the latter is called after the section
7577 contents have been set, which means that the program headers have
7578 already been worked out. */
12bd6957 7579 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
d0bf826b
AM
7580 {
7581 if (! copy_private_bfd_data (ibfd, obfd))
7582 return FALSE;
7583 }
7584
7585 return _bfd_elf_fixup_group_sections (ibfd, NULL);
7586}
7587
252b5132
RH
7588/* Copy private symbol information. If this symbol is in a section
7589 which we did not map into a BFD section, try to map the section
7590 index correctly. We use special macro definitions for the mapped
7591 section indices; these definitions are interpreted by the
7592 swap_out_syms function. */
7593
9ad5cbcf
AM
7594#define MAP_ONESYMTAB (SHN_HIOS + 1)
7595#define MAP_DYNSYMTAB (SHN_HIOS + 2)
7596#define MAP_STRTAB (SHN_HIOS + 3)
7597#define MAP_SHSTRTAB (SHN_HIOS + 4)
7598#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 7599
b34976b6 7600bfd_boolean
217aa764
AM
7601_bfd_elf_copy_private_symbol_data (bfd *ibfd,
7602 asymbol *isymarg,
7603 bfd *obfd,
7604 asymbol *osymarg)
252b5132
RH
7605{
7606 elf_symbol_type *isym, *osym;
7607
7608 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7609 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 7610 return TRUE;
252b5132
RH
7611
7612 isym = elf_symbol_from (ibfd, isymarg);
7613 osym = elf_symbol_from (obfd, osymarg);
7614
7615 if (isym != NULL
8424d8f5 7616 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
7617 && osym != NULL
7618 && bfd_is_abs_section (isym->symbol.section))
7619 {
7620 unsigned int shndx;
7621
7622 shndx = isym->internal_elf_sym.st_shndx;
7623 if (shndx == elf_onesymtab (ibfd))
7624 shndx = MAP_ONESYMTAB;
7625 else if (shndx == elf_dynsymtab (ibfd))
7626 shndx = MAP_DYNSYMTAB;
12bd6957 7627 else if (shndx == elf_strtab_sec (ibfd))
252b5132 7628 shndx = MAP_STRTAB;
12bd6957 7629 else if (shndx == elf_shstrtab_sec (ibfd))
252b5132 7630 shndx = MAP_SHSTRTAB;
6a40cf0c 7631 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
9ad5cbcf 7632 shndx = MAP_SYM_SHNDX;
252b5132
RH
7633 osym->internal_elf_sym.st_shndx = shndx;
7634 }
7635
b34976b6 7636 return TRUE;
252b5132
RH
7637}
7638
7639/* Swap out the symbols. */
7640
b34976b6 7641static bfd_boolean
217aa764 7642swap_out_syms (bfd *abfd,
ef10c3ac 7643 struct elf_strtab_hash **sttp,
217aa764 7644 int relocatable_p)
252b5132 7645{
9c5bfbb7 7646 const struct elf_backend_data *bed;
079e9a2f
AM
7647 int symcount;
7648 asymbol **syms;
ef10c3ac 7649 struct elf_strtab_hash *stt;
079e9a2f 7650 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 7651 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 7652 Elf_Internal_Shdr *symstrtab_hdr;
ef10c3ac 7653 struct elf_sym_strtab *symstrtab;
f075ee0c
AM
7654 bfd_byte *outbound_syms;
7655 bfd_byte *outbound_shndx;
ef10c3ac
L
7656 unsigned long outbound_syms_index;
7657 unsigned long outbound_shndx_index;
079e9a2f 7658 int idx;
12bd6957 7659 unsigned int num_locals;
079e9a2f 7660 bfd_size_type amt;
174fd7f9 7661 bfd_boolean name_local_sections;
252b5132 7662
12bd6957 7663 if (!elf_map_symbols (abfd, &num_locals))
b34976b6 7664 return FALSE;
252b5132 7665
c044fabd 7666 /* Dump out the symtabs. */
ef10c3ac 7667 stt = _bfd_elf_strtab_init ();
079e9a2f 7668 if (stt == NULL)
b34976b6 7669 return FALSE;
252b5132 7670
079e9a2f
AM
7671 bed = get_elf_backend_data (abfd);
7672 symcount = bfd_get_symcount (abfd);
7673 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
7674 symtab_hdr->sh_type = SHT_SYMTAB;
7675 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
7676 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
12bd6957 7677 symtab_hdr->sh_info = num_locals + 1;
72de5009 7678 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
7679
7680 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
7681 symstrtab_hdr->sh_type = SHT_STRTAB;
7682
ef10c3ac
L
7683 /* Allocate buffer to swap out the .strtab section. */
7684 symstrtab = (struct elf_sym_strtab *) bfd_malloc ((symcount + 1)
7685 * sizeof (*symstrtab));
7686 if (symstrtab == NULL)
7687 {
7688 _bfd_elf_strtab_free (stt);
7689 return FALSE;
7690 }
7691
a50b1753
NC
7692 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
7693 bed->s->sizeof_sym);
079e9a2f 7694 if (outbound_syms == NULL)
5ed6aba4 7695 {
ef10c3ac
L
7696error_return:
7697 _bfd_elf_strtab_free (stt);
7698 free (symstrtab);
5ed6aba4
NC
7699 return FALSE;
7700 }
217aa764 7701 symtab_hdr->contents = outbound_syms;
ef10c3ac 7702 outbound_syms_index = 0;
252b5132 7703
9ad5cbcf 7704 outbound_shndx = NULL;
ef10c3ac 7705 outbound_shndx_index = 0;
6a40cf0c
NC
7706
7707 if (elf_symtab_shndx_list (abfd))
9ad5cbcf 7708 {
6a40cf0c
NC
7709 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
7710 if (symtab_shndx_hdr->sh_name != 0)
7711 {
7712 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
7713 outbound_shndx = (bfd_byte *)
7714 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
7715 if (outbound_shndx == NULL)
7716 goto error_return;
5ed6aba4 7717
6a40cf0c
NC
7718 symtab_shndx_hdr->contents = outbound_shndx;
7719 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
7720 symtab_shndx_hdr->sh_size = amt;
7721 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
7722 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
7723 }
7724 /* FIXME: What about any other headers in the list ? */
9ad5cbcf
AM
7725 }
7726
589e6347 7727 /* Now generate the data (for "contents"). */
079e9a2f
AM
7728 {
7729 /* Fill in zeroth symbol and swap it out. */
7730 Elf_Internal_Sym sym;
7731 sym.st_name = 0;
7732 sym.st_value = 0;
7733 sym.st_size = 0;
7734 sym.st_info = 0;
7735 sym.st_other = 0;
7736 sym.st_shndx = SHN_UNDEF;
35fc36a8 7737 sym.st_target_internal = 0;
ef10c3ac
L
7738 symstrtab[0].sym = sym;
7739 symstrtab[0].dest_index = outbound_syms_index;
7740 symstrtab[0].destshndx_index = outbound_shndx_index;
7741 outbound_syms_index++;
9ad5cbcf 7742 if (outbound_shndx != NULL)
ef10c3ac 7743 outbound_shndx_index++;
079e9a2f 7744 }
252b5132 7745
174fd7f9
RS
7746 name_local_sections
7747 = (bed->elf_backend_name_local_section_symbols
7748 && bed->elf_backend_name_local_section_symbols (abfd));
7749
079e9a2f 7750 syms = bfd_get_outsymbols (abfd);
ef10c3ac 7751 for (idx = 0; idx < symcount;)
252b5132 7752 {
252b5132 7753 Elf_Internal_Sym sym;
079e9a2f
AM
7754 bfd_vma value = syms[idx]->value;
7755 elf_symbol_type *type_ptr;
7756 flagword flags = syms[idx]->flags;
7757 int type;
252b5132 7758
174fd7f9
RS
7759 if (!name_local_sections
7760 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
7761 {
7762 /* Local section symbols have no name. */
ef10c3ac 7763 sym.st_name = (unsigned long) -1;
079e9a2f
AM
7764 }
7765 else
7766 {
ef10c3ac
L
7767 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
7768 to get the final offset for st_name. */
7769 sym.st_name
7770 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
7771 FALSE);
079e9a2f 7772 if (sym.st_name == (unsigned long) -1)
ef10c3ac 7773 goto error_return;
079e9a2f 7774 }
252b5132 7775
079e9a2f 7776 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 7777
079e9a2f
AM
7778 if ((flags & BSF_SECTION_SYM) == 0
7779 && bfd_is_com_section (syms[idx]->section))
7780 {
7781 /* ELF common symbols put the alignment into the `value' field,
7782 and the size into the `size' field. This is backwards from
7783 how BFD handles it, so reverse it here. */
7784 sym.st_size = value;
7785 if (type_ptr == NULL
7786 || type_ptr->internal_elf_sym.st_value == 0)
7787 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
7788 else
7789 sym.st_value = type_ptr->internal_elf_sym.st_value;
7790 sym.st_shndx = _bfd_elf_section_from_bfd_section
7791 (abfd, syms[idx]->section);
7792 }
7793 else
7794 {
7795 asection *sec = syms[idx]->section;
cb33740c 7796 unsigned int shndx;
252b5132 7797
079e9a2f
AM
7798 if (sec->output_section)
7799 {
7800 value += sec->output_offset;
7801 sec = sec->output_section;
7802 }
589e6347 7803
079e9a2f
AM
7804 /* Don't add in the section vma for relocatable output. */
7805 if (! relocatable_p)
7806 value += sec->vma;
7807 sym.st_value = value;
7808 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
7809
7810 if (bfd_is_abs_section (sec)
7811 && type_ptr != NULL
7812 && type_ptr->internal_elf_sym.st_shndx != 0)
7813 {
7814 /* This symbol is in a real ELF section which we did
7815 not create as a BFD section. Undo the mapping done
7816 by copy_private_symbol_data. */
7817 shndx = type_ptr->internal_elf_sym.st_shndx;
7818 switch (shndx)
7819 {
7820 case MAP_ONESYMTAB:
7821 shndx = elf_onesymtab (abfd);
7822 break;
7823 case MAP_DYNSYMTAB:
7824 shndx = elf_dynsymtab (abfd);
7825 break;
7826 case MAP_STRTAB:
12bd6957 7827 shndx = elf_strtab_sec (abfd);
079e9a2f
AM
7828 break;
7829 case MAP_SHSTRTAB:
12bd6957 7830 shndx = elf_shstrtab_sec (abfd);
079e9a2f 7831 break;
9ad5cbcf 7832 case MAP_SYM_SHNDX:
6a40cf0c
NC
7833 if (elf_symtab_shndx_list (abfd))
7834 shndx = elf_symtab_shndx_list (abfd)->ndx;
9ad5cbcf 7835 break;
079e9a2f 7836 default:
15bc576a 7837 shndx = SHN_ABS;
079e9a2f
AM
7838 break;
7839 }
7840 }
7841 else
7842 {
7843 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 7844
cb33740c 7845 if (shndx == SHN_BAD)
079e9a2f
AM
7846 {
7847 asection *sec2;
7848
7849 /* Writing this would be a hell of a lot easier if
7850 we had some decent documentation on bfd, and
7851 knew what to expect of the library, and what to
7852 demand of applications. For example, it
7853 appears that `objcopy' might not set the
7854 section of a symbol to be a section that is
7855 actually in the output file. */
7856 sec2 = bfd_get_section_by_name (abfd, sec->name);
5df1bc57
AM
7857 if (sec2 != NULL)
7858 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
7859 if (shndx == SHN_BAD)
589e6347 7860 {
695344c0 7861 /* xgettext:c-format */
589e6347
NC
7862 _bfd_error_handler (_("\
7863Unable to find equivalent output section for symbol '%s' from section '%s'"),
7864 syms[idx]->name ? syms[idx]->name : "<Local sym>",
7865 sec->name);
811072d8 7866 bfd_set_error (bfd_error_invalid_operation);
ef10c3ac 7867 goto error_return;
589e6347 7868 }
079e9a2f
AM
7869 }
7870 }
252b5132 7871
079e9a2f
AM
7872 sym.st_shndx = shndx;
7873 }
252b5132 7874
13ae64f3
JJ
7875 if ((flags & BSF_THREAD_LOCAL) != 0)
7876 type = STT_TLS;
d8045f23
NC
7877 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
7878 type = STT_GNU_IFUNC;
13ae64f3 7879 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
7880 type = STT_FUNC;
7881 else if ((flags & BSF_OBJECT) != 0)
7882 type = STT_OBJECT;
d9352518
DB
7883 else if ((flags & BSF_RELC) != 0)
7884 type = STT_RELC;
7885 else if ((flags & BSF_SRELC) != 0)
7886 type = STT_SRELC;
079e9a2f
AM
7887 else
7888 type = STT_NOTYPE;
252b5132 7889
13ae64f3
JJ
7890 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
7891 type = STT_TLS;
7892
589e6347 7893 /* Processor-specific types. */
079e9a2f
AM
7894 if (type_ptr != NULL
7895 && bed->elf_backend_get_symbol_type)
7896 type = ((*bed->elf_backend_get_symbol_type)
7897 (&type_ptr->internal_elf_sym, type));
252b5132 7898
079e9a2f
AM
7899 if (flags & BSF_SECTION_SYM)
7900 {
7901 if (flags & BSF_GLOBAL)
7902 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
7903 else
7904 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
7905 }
7906 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 7907 {
b8871f35
L
7908 if (type != STT_TLS)
7909 {
7910 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
7911 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
7912 ? STT_COMMON : STT_OBJECT);
7913 else
7914 type = ((flags & BSF_ELF_COMMON) != 0
7915 ? STT_COMMON : STT_OBJECT);
7916 }
7917 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 7918 }
079e9a2f
AM
7919 else if (bfd_is_und_section (syms[idx]->section))
7920 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
7921 ? STB_WEAK
7922 : STB_GLOBAL),
7923 type);
7924 else if (flags & BSF_FILE)
7925 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
7926 else
7927 {
7928 int bind = STB_LOCAL;
252b5132 7929
079e9a2f
AM
7930 if (flags & BSF_LOCAL)
7931 bind = STB_LOCAL;
3e7a7d11
NC
7932 else if (flags & BSF_GNU_UNIQUE)
7933 bind = STB_GNU_UNIQUE;
079e9a2f
AM
7934 else if (flags & BSF_WEAK)
7935 bind = STB_WEAK;
7936 else if (flags & BSF_GLOBAL)
7937 bind = STB_GLOBAL;
252b5132 7938
079e9a2f
AM
7939 sym.st_info = ELF_ST_INFO (bind, type);
7940 }
252b5132 7941
079e9a2f 7942 if (type_ptr != NULL)
35fc36a8
RS
7943 {
7944 sym.st_other = type_ptr->internal_elf_sym.st_other;
7945 sym.st_target_internal
7946 = type_ptr->internal_elf_sym.st_target_internal;
7947 }
079e9a2f 7948 else
35fc36a8
RS
7949 {
7950 sym.st_other = 0;
7951 sym.st_target_internal = 0;
7952 }
252b5132 7953
ef10c3ac
L
7954 idx++;
7955 symstrtab[idx].sym = sym;
7956 symstrtab[idx].dest_index = outbound_syms_index;
7957 symstrtab[idx].destshndx_index = outbound_shndx_index;
7958
7959 outbound_syms_index++;
9ad5cbcf 7960 if (outbound_shndx != NULL)
ef10c3ac
L
7961 outbound_shndx_index++;
7962 }
7963
7964 /* Finalize the .strtab section. */
7965 _bfd_elf_strtab_finalize (stt);
7966
7967 /* Swap out the .strtab section. */
7968 for (idx = 0; idx <= symcount; idx++)
7969 {
7970 struct elf_sym_strtab *elfsym = &symstrtab[idx];
7971 if (elfsym->sym.st_name == (unsigned long) -1)
7972 elfsym->sym.st_name = 0;
7973 else
7974 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
7975 elfsym->sym.st_name);
7976 bed->s->swap_symbol_out (abfd, &elfsym->sym,
7977 (outbound_syms
7978 + (elfsym->dest_index
7979 * bed->s->sizeof_sym)),
7980 (outbound_shndx
7981 + (elfsym->destshndx_index
7982 * sizeof (Elf_External_Sym_Shndx))));
079e9a2f 7983 }
ef10c3ac 7984 free (symstrtab);
252b5132 7985
079e9a2f 7986 *sttp = stt;
ef10c3ac 7987 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
079e9a2f 7988 symstrtab_hdr->sh_type = SHT_STRTAB;
84865015 7989 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
079e9a2f
AM
7990 symstrtab_hdr->sh_addr = 0;
7991 symstrtab_hdr->sh_entsize = 0;
7992 symstrtab_hdr->sh_link = 0;
7993 symstrtab_hdr->sh_info = 0;
7994 symstrtab_hdr->sh_addralign = 1;
252b5132 7995
b34976b6 7996 return TRUE;
252b5132
RH
7997}
7998
7999/* Return the number of bytes required to hold the symtab vector.
8000
8001 Note that we base it on the count plus 1, since we will null terminate
8002 the vector allocated based on this size. However, the ELF symbol table
8003 always has a dummy entry as symbol #0, so it ends up even. */
8004
8005long
217aa764 8006_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
8007{
8008 long symcount;
8009 long symtab_size;
8010 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
8011
8012 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
8013 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8014 if (symcount > 0)
8015 symtab_size -= sizeof (asymbol *);
252b5132
RH
8016
8017 return symtab_size;
8018}
8019
8020long
217aa764 8021_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
8022{
8023 long symcount;
8024 long symtab_size;
8025 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
8026
8027 if (elf_dynsymtab (abfd) == 0)
8028 {
8029 bfd_set_error (bfd_error_invalid_operation);
8030 return -1;
8031 }
8032
8033 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
8034 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8035 if (symcount > 0)
8036 symtab_size -= sizeof (asymbol *);
252b5132
RH
8037
8038 return symtab_size;
8039}
8040
8041long
217aa764
AM
8042_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
8043 sec_ptr asect)
252b5132
RH
8044{
8045 return (asect->reloc_count + 1) * sizeof (arelent *);
8046}
8047
8048/* Canonicalize the relocs. */
8049
8050long
217aa764
AM
8051_bfd_elf_canonicalize_reloc (bfd *abfd,
8052 sec_ptr section,
8053 arelent **relptr,
8054 asymbol **symbols)
252b5132
RH
8055{
8056 arelent *tblptr;
8057 unsigned int i;
9c5bfbb7 8058 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 8059
b34976b6 8060 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
8061 return -1;
8062
8063 tblptr = section->relocation;
8064 for (i = 0; i < section->reloc_count; i++)
8065 *relptr++ = tblptr++;
8066
8067 *relptr = NULL;
8068
8069 return section->reloc_count;
8070}
8071
8072long
6cee3f79 8073_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 8074{
9c5bfbb7 8075 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 8076 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
8077
8078 if (symcount >= 0)
8079 bfd_get_symcount (abfd) = symcount;
8080 return symcount;
8081}
8082
8083long
217aa764
AM
8084_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
8085 asymbol **allocation)
252b5132 8086{
9c5bfbb7 8087 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 8088 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
8089
8090 if (symcount >= 0)
8091 bfd_get_dynamic_symcount (abfd) = symcount;
8092 return symcount;
252b5132
RH
8093}
8094
8615f3f2
AM
8095/* Return the size required for the dynamic reloc entries. Any loadable
8096 section that was actually installed in the BFD, and has type SHT_REL
8097 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
8098 dynamic reloc section. */
252b5132
RH
8099
8100long
217aa764 8101_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
8102{
8103 long ret;
8104 asection *s;
8105
8106 if (elf_dynsymtab (abfd) == 0)
8107 {
8108 bfd_set_error (bfd_error_invalid_operation);
8109 return -1;
8110 }
8111
8112 ret = sizeof (arelent *);
8113 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 8114 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
8115 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8116 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 8117 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
8118 * sizeof (arelent *));
8119
8120 return ret;
8121}
8122
8615f3f2
AM
8123/* Canonicalize the dynamic relocation entries. Note that we return the
8124 dynamic relocations as a single block, although they are actually
8125 associated with particular sections; the interface, which was
8126 designed for SunOS style shared libraries, expects that there is only
8127 one set of dynamic relocs. Any loadable section that was actually
8128 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8129 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
8130
8131long
217aa764
AM
8132_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
8133 arelent **storage,
8134 asymbol **syms)
252b5132 8135{
217aa764 8136 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
8137 asection *s;
8138 long ret;
8139
8140 if (elf_dynsymtab (abfd) == 0)
8141 {
8142 bfd_set_error (bfd_error_invalid_operation);
8143 return -1;
8144 }
8145
8146 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
8147 ret = 0;
8148 for (s = abfd->sections; s != NULL; s = s->next)
8149 {
266b05cf 8150 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
8151 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8152 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8153 {
8154 arelent *p;
8155 long count, i;
8156
b34976b6 8157 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 8158 return -1;
eea6121a 8159 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
8160 p = s->relocation;
8161 for (i = 0; i < count; i++)
8162 *storage++ = p++;
8163 ret += count;
8164 }
8165 }
8166
8167 *storage = NULL;
8168
8169 return ret;
8170}
8171\f
8172/* Read in the version information. */
8173
b34976b6 8174bfd_boolean
fc0e6df6 8175_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
8176{
8177 bfd_byte *contents = NULL;
fc0e6df6
PB
8178 unsigned int freeidx = 0;
8179
8180 if (elf_dynverref (abfd) != 0)
8181 {
8182 Elf_Internal_Shdr *hdr;
8183 Elf_External_Verneed *everneed;
8184 Elf_Internal_Verneed *iverneed;
8185 unsigned int i;
d0fb9a8d 8186 bfd_byte *contents_end;
fc0e6df6
PB
8187
8188 hdr = &elf_tdata (abfd)->dynverref_hdr;
8189
601a03ba 8190 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verneed))
d0fb9a8d 8191 {
601a03ba 8192error_return_bad_verref:
4eca0228 8193 _bfd_error_handler
601a03ba
AM
8194 (_("%B: .gnu.version_r invalid entry"), abfd);
8195 bfd_set_error (bfd_error_bad_value);
d0fb9a8d
JJ
8196error_return_verref:
8197 elf_tdata (abfd)->verref = NULL;
8198 elf_tdata (abfd)->cverrefs = 0;
8199 goto error_return;
8200 }
601a03ba
AM
8201
8202 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
8203 if (contents == NULL)
8204 goto error_return_verref;
8205
fc0e6df6
PB
8206 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
8207 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 8208 goto error_return_verref;
fc0e6df6 8209
601a03ba
AM
8210 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
8211 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
8212
8213 if (elf_tdata (abfd)->verref == NULL)
d0fb9a8d
JJ
8214 goto error_return_verref;
8215
8216 BFD_ASSERT (sizeof (Elf_External_Verneed)
8217 == sizeof (Elf_External_Vernaux));
8218 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
8219 everneed = (Elf_External_Verneed *) contents;
8220 iverneed = elf_tdata (abfd)->verref;
8221 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8222 {
8223 Elf_External_Vernaux *evernaux;
8224 Elf_Internal_Vernaux *ivernaux;
8225 unsigned int j;
8226
8227 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8228
8229 iverneed->vn_bfd = abfd;
8230
8231 iverneed->vn_filename =
8232 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8233 iverneed->vn_file);
8234 if (iverneed->vn_filename == NULL)
601a03ba 8235 goto error_return_bad_verref;
fc0e6df6 8236
d0fb9a8d
JJ
8237 if (iverneed->vn_cnt == 0)
8238 iverneed->vn_auxptr = NULL;
8239 else
8240 {
a50b1753
NC
8241 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
8242 bfd_alloc2 (abfd, iverneed->vn_cnt,
8243 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
8244 if (iverneed->vn_auxptr == NULL)
8245 goto error_return_verref;
8246 }
8247
8248 if (iverneed->vn_aux
8249 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8250 goto error_return_bad_verref;
fc0e6df6
PB
8251
8252 evernaux = ((Elf_External_Vernaux *)
8253 ((bfd_byte *) everneed + iverneed->vn_aux));
8254 ivernaux = iverneed->vn_auxptr;
8255 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8256 {
8257 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8258
8259 ivernaux->vna_nodename =
8260 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8261 ivernaux->vna_name);
8262 if (ivernaux->vna_nodename == NULL)
601a03ba 8263 goto error_return_bad_verref;
fc0e6df6 8264
25ff461f
AM
8265 if (ivernaux->vna_other > freeidx)
8266 freeidx = ivernaux->vna_other;
8267
8268 ivernaux->vna_nextptr = NULL;
8269 if (ivernaux->vna_next == 0)
8270 {
8271 iverneed->vn_cnt = j + 1;
8272 break;
8273 }
fc0e6df6
PB
8274 if (j + 1 < iverneed->vn_cnt)
8275 ivernaux->vna_nextptr = ivernaux + 1;
fc0e6df6 8276
d0fb9a8d
JJ
8277 if (ivernaux->vna_next
8278 > (size_t) (contents_end - (bfd_byte *) evernaux))
601a03ba 8279 goto error_return_bad_verref;
d0fb9a8d 8280
fc0e6df6
PB
8281 evernaux = ((Elf_External_Vernaux *)
8282 ((bfd_byte *) evernaux + ivernaux->vna_next));
fc0e6df6
PB
8283 }
8284
25ff461f
AM
8285 iverneed->vn_nextref = NULL;
8286 if (iverneed->vn_next == 0)
8287 break;
fc0e6df6
PB
8288 if (i + 1 < hdr->sh_info)
8289 iverneed->vn_nextref = iverneed + 1;
fc0e6df6 8290
d0fb9a8d
JJ
8291 if (iverneed->vn_next
8292 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8293 goto error_return_bad_verref;
d0fb9a8d 8294
fc0e6df6
PB
8295 everneed = ((Elf_External_Verneed *)
8296 ((bfd_byte *) everneed + iverneed->vn_next));
8297 }
25ff461f 8298 elf_tdata (abfd)->cverrefs = i;
fc0e6df6
PB
8299
8300 free (contents);
8301 contents = NULL;
8302 }
252b5132
RH
8303
8304 if (elf_dynverdef (abfd) != 0)
8305 {
8306 Elf_Internal_Shdr *hdr;
8307 Elf_External_Verdef *everdef;
8308 Elf_Internal_Verdef *iverdef;
f631889e
UD
8309 Elf_Internal_Verdef *iverdefarr;
8310 Elf_Internal_Verdef iverdefmem;
252b5132 8311 unsigned int i;
062e2358 8312 unsigned int maxidx;
d0fb9a8d 8313 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
8314
8315 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8316
601a03ba
AM
8317 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
8318 {
8319 error_return_bad_verdef:
4eca0228 8320 _bfd_error_handler
601a03ba
AM
8321 (_("%B: .gnu.version_d invalid entry"), abfd);
8322 bfd_set_error (bfd_error_bad_value);
8323 error_return_verdef:
8324 elf_tdata (abfd)->verdef = NULL;
8325 elf_tdata (abfd)->cverdefs = 0;
8326 goto error_return;
8327 }
8328
a50b1753 8329 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132 8330 if (contents == NULL)
601a03ba 8331 goto error_return_verdef;
252b5132 8332 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 8333 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
601a03ba 8334 goto error_return_verdef;
d0fb9a8d
JJ
8335
8336 BFD_ASSERT (sizeof (Elf_External_Verdef)
8337 >= sizeof (Elf_External_Verdaux));
8338 contents_end_def = contents + hdr->sh_size
8339 - sizeof (Elf_External_Verdef);
8340 contents_end_aux = contents + hdr->sh_size
8341 - sizeof (Elf_External_Verdaux);
8342
f631889e
UD
8343 /* We know the number of entries in the section but not the maximum
8344 index. Therefore we have to run through all entries and find
8345 the maximum. */
252b5132 8346 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
8347 maxidx = 0;
8348 for (i = 0; i < hdr->sh_info; ++i)
8349 {
8350 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8351
601a03ba
AM
8352 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
8353 goto error_return_bad_verdef;
062e2358
AM
8354 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
8355 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 8356
25ff461f
AM
8357 if (iverdefmem.vd_next == 0)
8358 break;
8359
d0fb9a8d
JJ
8360 if (iverdefmem.vd_next
8361 > (size_t) (contents_end_def - (bfd_byte *) everdef))
601a03ba 8362 goto error_return_bad_verdef;
d0fb9a8d 8363
f631889e
UD
8364 everdef = ((Elf_External_Verdef *)
8365 ((bfd_byte *) everdef + iverdefmem.vd_next));
8366 }
8367
fc0e6df6
PB
8368 if (default_imported_symver)
8369 {
8370 if (freeidx > maxidx)
8371 maxidx = ++freeidx;
8372 else
8373 freeidx = ++maxidx;
8374 }
201159ec 8375
601a03ba
AM
8376 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
8377 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e 8378 if (elf_tdata (abfd)->verdef == NULL)
601a03ba 8379 goto error_return_verdef;
f631889e
UD
8380
8381 elf_tdata (abfd)->cverdefs = maxidx;
8382
8383 everdef = (Elf_External_Verdef *) contents;
8384 iverdefarr = elf_tdata (abfd)->verdef;
8385 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
8386 {
8387 Elf_External_Verdaux *everdaux;
8388 Elf_Internal_Verdaux *iverdaux;
8389 unsigned int j;
8390
f631889e
UD
8391 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8392
d0fb9a8d 8393 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
601a03ba 8394 goto error_return_bad_verdef;
d0fb9a8d 8395
f631889e 8396 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
595bce75 8397 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
252b5132
RH
8398
8399 iverdef->vd_bfd = abfd;
8400
d0fb9a8d
JJ
8401 if (iverdef->vd_cnt == 0)
8402 iverdef->vd_auxptr = NULL;
8403 else
8404 {
a50b1753
NC
8405 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
8406 bfd_alloc2 (abfd, iverdef->vd_cnt,
8407 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
8408 if (iverdef->vd_auxptr == NULL)
8409 goto error_return_verdef;
8410 }
8411
8412 if (iverdef->vd_aux
8413 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
601a03ba 8414 goto error_return_bad_verdef;
252b5132
RH
8415
8416 everdaux = ((Elf_External_Verdaux *)
8417 ((bfd_byte *) everdef + iverdef->vd_aux));
8418 iverdaux = iverdef->vd_auxptr;
8419 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
8420 {
8421 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
8422
8423 iverdaux->vda_nodename =
8424 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8425 iverdaux->vda_name);
8426 if (iverdaux->vda_nodename == NULL)
601a03ba 8427 goto error_return_bad_verdef;
252b5132 8428
25ff461f
AM
8429 iverdaux->vda_nextptr = NULL;
8430 if (iverdaux->vda_next == 0)
8431 {
8432 iverdef->vd_cnt = j + 1;
8433 break;
8434 }
252b5132
RH
8435 if (j + 1 < iverdef->vd_cnt)
8436 iverdaux->vda_nextptr = iverdaux + 1;
252b5132 8437
d0fb9a8d
JJ
8438 if (iverdaux->vda_next
8439 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
601a03ba 8440 goto error_return_bad_verdef;
d0fb9a8d 8441
252b5132
RH
8442 everdaux = ((Elf_External_Verdaux *)
8443 ((bfd_byte *) everdaux + iverdaux->vda_next));
8444 }
8445
595bce75 8446 iverdef->vd_nodename = NULL;
d0fb9a8d
JJ
8447 if (iverdef->vd_cnt)
8448 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 8449
25ff461f
AM
8450 iverdef->vd_nextdef = NULL;
8451 if (iverdef->vd_next == 0)
8452 break;
d0fb9a8d 8453 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132 8454 iverdef->vd_nextdef = iverdef + 1;
252b5132
RH
8455
8456 everdef = ((Elf_External_Verdef *)
8457 ((bfd_byte *) everdef + iverdef->vd_next));
8458 }
8459
8460 free (contents);
8461 contents = NULL;
8462 }
fc0e6df6 8463 else if (default_imported_symver)
252b5132 8464 {
fc0e6df6
PB
8465 if (freeidx < 3)
8466 freeidx = 3;
8467 else
8468 freeidx++;
252b5132 8469
a50b1753
NC
8470 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
8471 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 8472 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
8473 goto error_return;
8474
fc0e6df6
PB
8475 elf_tdata (abfd)->cverdefs = freeidx;
8476 }
252b5132 8477
fc0e6df6
PB
8478 /* Create a default version based on the soname. */
8479 if (default_imported_symver)
8480 {
8481 Elf_Internal_Verdef *iverdef;
8482 Elf_Internal_Verdaux *iverdaux;
252b5132 8483
5bb3703f 8484 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
252b5132 8485
fc0e6df6
PB
8486 iverdef->vd_version = VER_DEF_CURRENT;
8487 iverdef->vd_flags = 0;
8488 iverdef->vd_ndx = freeidx;
8489 iverdef->vd_cnt = 1;
252b5132 8490
fc0e6df6 8491 iverdef->vd_bfd = abfd;
252b5132 8492
fc0e6df6
PB
8493 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
8494 if (iverdef->vd_nodename == NULL)
d0fb9a8d 8495 goto error_return_verdef;
fc0e6df6 8496 iverdef->vd_nextdef = NULL;
601a03ba
AM
8497 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
8498 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
d0fb9a8d
JJ
8499 if (iverdef->vd_auxptr == NULL)
8500 goto error_return_verdef;
252b5132 8501
fc0e6df6
PB
8502 iverdaux = iverdef->vd_auxptr;
8503 iverdaux->vda_nodename = iverdef->vd_nodename;
252b5132
RH
8504 }
8505
b34976b6 8506 return TRUE;
252b5132
RH
8507
8508 error_return:
5ed6aba4 8509 if (contents != NULL)
252b5132 8510 free (contents);
b34976b6 8511 return FALSE;
252b5132
RH
8512}
8513\f
8514asymbol *
217aa764 8515_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
8516{
8517 elf_symbol_type *newsym;
8518
201159ec 8519 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof * newsym);
252b5132
RH
8520 if (!newsym)
8521 return NULL;
201159ec
NC
8522 newsym->symbol.the_bfd = abfd;
8523 return &newsym->symbol;
252b5132
RH
8524}
8525
8526void
217aa764
AM
8527_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
8528 asymbol *symbol,
8529 symbol_info *ret)
252b5132
RH
8530{
8531 bfd_symbol_info (symbol, ret);
8532}
8533
8534/* Return whether a symbol name implies a local symbol. Most targets
8535 use this function for the is_local_label_name entry point, but some
8536 override it. */
8537
b34976b6 8538bfd_boolean
217aa764
AM
8539_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
8540 const char *name)
252b5132
RH
8541{
8542 /* Normal local symbols start with ``.L''. */
8543 if (name[0] == '.' && name[1] == 'L')
b34976b6 8544 return TRUE;
252b5132
RH
8545
8546 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
8547 DWARF debugging symbols starting with ``..''. */
8548 if (name[0] == '.' && name[1] == '.')
b34976b6 8549 return TRUE;
252b5132
RH
8550
8551 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
8552 emitting DWARF debugging output. I suspect this is actually a
8553 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
8554 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
8555 underscore to be emitted on some ELF targets). For ease of use,
8556 we treat such symbols as local. */
8557 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 8558 return TRUE;
252b5132 8559
b1fa9dd6
NC
8560 /* Treat assembler generated fake symbols, dollar local labels and
8561 forward-backward labels (aka local labels) as locals.
8562 These labels have the form:
8563
8564 L0^A.* (fake symbols)
8565
8566 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
8567
8568 Versions which start with .L will have already been matched above,
8569 so we only need to match the rest. */
8570 if (name[0] == 'L' && ISDIGIT (name[1]))
8571 {
8572 bfd_boolean ret = FALSE;
8573 const char * p;
8574 char c;
8575
8576 for (p = name + 2; (c = *p); p++)
8577 {
8578 if (c == 1 || c == 2)
8579 {
8580 if (c == 1 && p == name + 2)
8581 /* A fake symbol. */
8582 return TRUE;
8583
8584 /* FIXME: We are being paranoid here and treating symbols like
8585 L0^Bfoo as if there were non-local, on the grounds that the
8586 assembler will never generate them. But can any symbol
8587 containing an ASCII value in the range 1-31 ever be anything
8588 other than some kind of local ? */
8589 ret = TRUE;
8590 }
8591
8592 if (! ISDIGIT (c))
8593 {
8594 ret = FALSE;
8595 break;
8596 }
8597 }
8598 return ret;
8599 }
ffa54770 8600
b34976b6 8601 return FALSE;
252b5132
RH
8602}
8603
8604alent *
217aa764
AM
8605_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
8606 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
8607{
8608 abort ();
8609 return NULL;
8610}
8611
b34976b6 8612bfd_boolean
217aa764
AM
8613_bfd_elf_set_arch_mach (bfd *abfd,
8614 enum bfd_architecture arch,
8615 unsigned long machine)
252b5132
RH
8616{
8617 /* If this isn't the right architecture for this backend, and this
8618 isn't the generic backend, fail. */
8619 if (arch != get_elf_backend_data (abfd)->arch
8620 && arch != bfd_arch_unknown
8621 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 8622 return FALSE;
252b5132
RH
8623
8624 return bfd_default_set_arch_mach (abfd, arch, machine);
8625}
8626
d1fad7c6
NC
8627/* Find the nearest line to a particular section and offset,
8628 for error reporting. */
8629
b34976b6 8630bfd_boolean
217aa764 8631_bfd_elf_find_nearest_line (bfd *abfd,
217aa764 8632 asymbol **symbols,
fb167eb2 8633 asection *section,
217aa764
AM
8634 bfd_vma offset,
8635 const char **filename_ptr,
8636 const char **functionname_ptr,
fb167eb2
AM
8637 unsigned int *line_ptr,
8638 unsigned int *discriminator_ptr)
d1fad7c6 8639{
b34976b6 8640 bfd_boolean found;
d1fad7c6 8641
fb167eb2 8642 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
4e8a9624 8643 filename_ptr, functionname_ptr,
fb167eb2
AM
8644 line_ptr, discriminator_ptr,
8645 dwarf_debug_sections, 0,
e00e8198
AM
8646 &elf_tdata (abfd)->dwarf2_find_line_info)
8647 || _bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
8648 filename_ptr, functionname_ptr,
8649 line_ptr))
d1fad7c6
NC
8650 {
8651 if (!*functionname_ptr)
e00e8198
AM
8652 _bfd_elf_find_function (abfd, symbols, section, offset,
8653 *filename_ptr ? NULL : filename_ptr,
8654 functionname_ptr);
b34976b6 8655 return TRUE;
d1fad7c6
NC
8656 }
8657
8658 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
8659 &found, filename_ptr,
8660 functionname_ptr, line_ptr,
8661 &elf_tdata (abfd)->line_info))
b34976b6 8662 return FALSE;
dc43ada5 8663 if (found && (*functionname_ptr || *line_ptr))
b34976b6 8664 return TRUE;
d1fad7c6
NC
8665
8666 if (symbols == NULL)
b34976b6 8667 return FALSE;
d1fad7c6 8668
e00e8198
AM
8669 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
8670 filename_ptr, functionname_ptr))
b34976b6 8671 return FALSE;
d1fad7c6 8672
252b5132 8673 *line_ptr = 0;
b34976b6 8674 return TRUE;
252b5132
RH
8675}
8676
5420f73d
L
8677/* Find the line for a symbol. */
8678
8679bfd_boolean
8680_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
8681 const char **filename_ptr, unsigned int *line_ptr)
9b8d1a36 8682{
fb167eb2
AM
8683 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
8684 filename_ptr, NULL, line_ptr, NULL,
8685 dwarf_debug_sections, 0,
8686 &elf_tdata (abfd)->dwarf2_find_line_info);
5420f73d
L
8687}
8688
4ab527b0
FF
8689/* After a call to bfd_find_nearest_line, successive calls to
8690 bfd_find_inliner_info can be used to get source information about
8691 each level of function inlining that terminated at the address
8692 passed to bfd_find_nearest_line. Currently this is only supported
8693 for DWARF2 with appropriate DWARF3 extensions. */
8694
8695bfd_boolean
8696_bfd_elf_find_inliner_info (bfd *abfd,
8697 const char **filename_ptr,
8698 const char **functionname_ptr,
8699 unsigned int *line_ptr)
8700{
8701 bfd_boolean found;
8702 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
8703 functionname_ptr, line_ptr,
8704 & elf_tdata (abfd)->dwarf2_find_line_info);
8705 return found;
8706}
8707
252b5132 8708int
a6b96beb 8709_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 8710{
8ded5a0f
AM
8711 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8712 int ret = bed->s->sizeof_ehdr;
252b5132 8713
0e1862bb 8714 if (!bfd_link_relocatable (info))
8ded5a0f 8715 {
12bd6957 8716 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 8717
62d7a5f6
AM
8718 if (phdr_size == (bfd_size_type) -1)
8719 {
8720 struct elf_segment_map *m;
8721
8722 phdr_size = 0;
12bd6957 8723 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62d7a5f6 8724 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 8725
62d7a5f6
AM
8726 if (phdr_size == 0)
8727 phdr_size = get_program_header_size (abfd, info);
8728 }
8ded5a0f 8729
12bd6957 8730 elf_program_header_size (abfd) = phdr_size;
8ded5a0f
AM
8731 ret += phdr_size;
8732 }
8733
252b5132
RH
8734 return ret;
8735}
8736
b34976b6 8737bfd_boolean
217aa764
AM
8738_bfd_elf_set_section_contents (bfd *abfd,
8739 sec_ptr section,
0f867abe 8740 const void *location,
217aa764
AM
8741 file_ptr offset,
8742 bfd_size_type count)
252b5132
RH
8743{
8744 Elf_Internal_Shdr *hdr;
1b6aeedb 8745 file_ptr pos;
252b5132
RH
8746
8747 if (! abfd->output_has_begun
217aa764 8748 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 8749 return FALSE;
252b5132 8750
0ce398f1
L
8751 if (!count)
8752 return TRUE;
8753
252b5132 8754 hdr = &elf_section_data (section)->this_hdr;
0ce398f1
L
8755 if (hdr->sh_offset == (file_ptr) -1)
8756 {
8757 /* We must compress this section. Write output to the buffer. */
8758 unsigned char *contents = hdr->contents;
8759 if ((offset + count) > hdr->sh_size
8760 || (section->flags & SEC_ELF_COMPRESS) == 0
8761 || contents == NULL)
8762 abort ();
8763 memcpy (contents + offset, location, count);
8764 return TRUE;
8765 }
dc810e39
AM
8766 pos = hdr->sh_offset + offset;
8767 if (bfd_seek (abfd, pos, SEEK_SET) != 0
8768 || bfd_bwrite (location, count, abfd) != count)
b34976b6 8769 return FALSE;
252b5132 8770
b34976b6 8771 return TRUE;
252b5132
RH
8772}
8773
8774void
217aa764
AM
8775_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
8776 arelent *cache_ptr ATTRIBUTE_UNUSED,
8777 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
8778{
8779 abort ();
8780}
8781
252b5132
RH
8782/* Try to convert a non-ELF reloc into an ELF one. */
8783
b34976b6 8784bfd_boolean
217aa764 8785_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 8786{
c044fabd 8787 /* Check whether we really have an ELF howto. */
252b5132
RH
8788
8789 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
8790 {
8791 bfd_reloc_code_real_type code;
8792 reloc_howto_type *howto;
8793
8794 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 8795 equivalent ELF reloc. */
252b5132
RH
8796
8797 if (areloc->howto->pc_relative)
8798 {
8799 switch (areloc->howto->bitsize)
8800 {
8801 case 8:
8802 code = BFD_RELOC_8_PCREL;
8803 break;
8804 case 12:
8805 code = BFD_RELOC_12_PCREL;
8806 break;
8807 case 16:
8808 code = BFD_RELOC_16_PCREL;
8809 break;
8810 case 24:
8811 code = BFD_RELOC_24_PCREL;
8812 break;
8813 case 32:
8814 code = BFD_RELOC_32_PCREL;
8815 break;
8816 case 64:
8817 code = BFD_RELOC_64_PCREL;
8818 break;
8819 default:
8820 goto fail;
8821 }
8822
8823 howto = bfd_reloc_type_lookup (abfd, code);
8824
8825 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
8826 {
8827 if (howto->pcrel_offset)
8828 areloc->addend += areloc->address;
8829 else
8830 areloc->addend -= areloc->address; /* addend is unsigned!! */
8831 }
8832 }
8833 else
8834 {
8835 switch (areloc->howto->bitsize)
8836 {
8837 case 8:
8838 code = BFD_RELOC_8;
8839 break;
8840 case 14:
8841 code = BFD_RELOC_14;
8842 break;
8843 case 16:
8844 code = BFD_RELOC_16;
8845 break;
8846 case 26:
8847 code = BFD_RELOC_26;
8848 break;
8849 case 32:
8850 code = BFD_RELOC_32;
8851 break;
8852 case 64:
8853 code = BFD_RELOC_64;
8854 break;
8855 default:
8856 goto fail;
8857 }
8858
8859 howto = bfd_reloc_type_lookup (abfd, code);
8860 }
8861
8862 if (howto)
8863 areloc->howto = howto;
8864 else
8865 goto fail;
8866 }
8867
b34976b6 8868 return TRUE;
252b5132
RH
8869
8870 fail:
4eca0228 8871 _bfd_error_handler
695344c0 8872 /* xgettext:c-format */
d003868e
AM
8873 (_("%B: unsupported relocation type %s"),
8874 abfd, areloc->howto->name);
252b5132 8875 bfd_set_error (bfd_error_bad_value);
b34976b6 8876 return FALSE;
252b5132
RH
8877}
8878
b34976b6 8879bfd_boolean
217aa764 8880_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132 8881{
d9071b0c
TG
8882 struct elf_obj_tdata *tdata = elf_tdata (abfd);
8883 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
252b5132 8884 {
c0355132 8885 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 8886 _bfd_elf_strtab_free (elf_shstrtab (abfd));
d9071b0c 8887 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
252b5132
RH
8888 }
8889
8890 return _bfd_generic_close_and_cleanup (abfd);
8891}
8892
8893/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
8894 in the relocation's offset. Thus we cannot allow any sort of sanity
8895 range-checking to interfere. There is nothing else to do in processing
8896 this reloc. */
8897
8898bfd_reloc_status_type
217aa764
AM
8899_bfd_elf_rel_vtable_reloc_fn
8900 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 8901 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
8902 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
8903 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
8904{
8905 return bfd_reloc_ok;
8906}
252b5132
RH
8907\f
8908/* Elf core file support. Much of this only works on native
8909 toolchains, since we rely on knowing the
8910 machine-dependent procfs structure in order to pick
c044fabd 8911 out details about the corefile. */
252b5132
RH
8912
8913#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
8914/* Needed for new procfs interface on sparc-solaris. */
8915# define _STRUCTURED_PROC 1
252b5132
RH
8916# include <sys/procfs.h>
8917#endif
8918
261b8d08
PA
8919/* Return a PID that identifies a "thread" for threaded cores, or the
8920 PID of the main process for non-threaded cores. */
252b5132
RH
8921
8922static int
217aa764 8923elfcore_make_pid (bfd *abfd)
252b5132 8924{
261b8d08
PA
8925 int pid;
8926
228e534f 8927 pid = elf_tdata (abfd)->core->lwpid;
261b8d08 8928 if (pid == 0)
228e534f 8929 pid = elf_tdata (abfd)->core->pid;
261b8d08
PA
8930
8931 return pid;
252b5132
RH
8932}
8933
252b5132
RH
8934/* If there isn't a section called NAME, make one, using
8935 data from SECT. Note, this function will generate a
8936 reference to NAME, so you shouldn't deallocate or
c044fabd 8937 overwrite it. */
252b5132 8938
b34976b6 8939static bfd_boolean
217aa764 8940elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 8941{
c044fabd 8942 asection *sect2;
252b5132
RH
8943
8944 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 8945 return TRUE;
252b5132 8946
117ed4f8 8947 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 8948 if (sect2 == NULL)
b34976b6 8949 return FALSE;
252b5132 8950
eea6121a 8951 sect2->size = sect->size;
252b5132 8952 sect2->filepos = sect->filepos;
252b5132 8953 sect2->alignment_power = sect->alignment_power;
b34976b6 8954 return TRUE;
252b5132
RH
8955}
8956
bb0082d6
AM
8957/* Create a pseudosection containing SIZE bytes at FILEPOS. This
8958 actually creates up to two pseudosections:
8959 - For the single-threaded case, a section named NAME, unless
8960 such a section already exists.
8961 - For the multi-threaded case, a section named "NAME/PID", where
8962 PID is elfcore_make_pid (abfd).
8963 Both pseudosections have identical contents. */
b34976b6 8964bfd_boolean
217aa764
AM
8965_bfd_elfcore_make_pseudosection (bfd *abfd,
8966 char *name,
8967 size_t size,
8968 ufile_ptr filepos)
bb0082d6
AM
8969{
8970 char buf[100];
8971 char *threaded_name;
d4c88bbb 8972 size_t len;
bb0082d6
AM
8973 asection *sect;
8974
8975 /* Build the section name. */
8976
8977 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 8978 len = strlen (buf) + 1;
a50b1753 8979 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 8980 if (threaded_name == NULL)
b34976b6 8981 return FALSE;
d4c88bbb 8982 memcpy (threaded_name, buf, len);
bb0082d6 8983
117ed4f8
AM
8984 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
8985 SEC_HAS_CONTENTS);
bb0082d6 8986 if (sect == NULL)
b34976b6 8987 return FALSE;
eea6121a 8988 sect->size = size;
bb0082d6 8989 sect->filepos = filepos;
bb0082d6
AM
8990 sect->alignment_power = 2;
8991
936e320b 8992 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
8993}
8994
252b5132 8995/* prstatus_t exists on:
4a938328 8996 solaris 2.5+
252b5132
RH
8997 linux 2.[01] + glibc
8998 unixware 4.2
8999*/
9000
9001#if defined (HAVE_PRSTATUS_T)
a7b97311 9002
b34976b6 9003static bfd_boolean
217aa764 9004elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 9005{
eea6121a 9006 size_t size;
7ee38065 9007 int offset;
252b5132 9008
4a938328
MS
9009 if (note->descsz == sizeof (prstatus_t))
9010 {
9011 prstatus_t prstat;
252b5132 9012
eea6121a 9013 size = sizeof (prstat.pr_reg);
7ee38065 9014 offset = offsetof (prstatus_t, pr_reg);
4a938328 9015 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 9016
fa49d224
NC
9017 /* Do not overwrite the core signal if it
9018 has already been set by another thread. */
228e534f
AM
9019 if (elf_tdata (abfd)->core->signal == 0)
9020 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9021 if (elf_tdata (abfd)->core->pid == 0)
9022 elf_tdata (abfd)->core->pid = prstat.pr_pid;
252b5132 9023
4a938328
MS
9024 /* pr_who exists on:
9025 solaris 2.5+
9026 unixware 4.2
9027 pr_who doesn't exist on:
9028 linux 2.[01]
9029 */
252b5132 9030#if defined (HAVE_PRSTATUS_T_PR_WHO)
228e534f 9031 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 9032#else
228e534f 9033 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
252b5132 9034#endif
4a938328 9035 }
7ee38065 9036#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
9037 else if (note->descsz == sizeof (prstatus32_t))
9038 {
9039 /* 64-bit host, 32-bit corefile */
9040 prstatus32_t prstat;
9041
eea6121a 9042 size = sizeof (prstat.pr_reg);
7ee38065 9043 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
9044 memcpy (&prstat, note->descdata, sizeof (prstat));
9045
fa49d224
NC
9046 /* Do not overwrite the core signal if it
9047 has already been set by another thread. */
228e534f
AM
9048 if (elf_tdata (abfd)->core->signal == 0)
9049 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9050 if (elf_tdata (abfd)->core->pid == 0)
9051 elf_tdata (abfd)->core->pid = prstat.pr_pid;
4a938328
MS
9052
9053 /* pr_who exists on:
9054 solaris 2.5+
9055 unixware 4.2
9056 pr_who doesn't exist on:
9057 linux 2.[01]
9058 */
7ee38065 9059#if defined (HAVE_PRSTATUS32_T_PR_WHO)
228e534f 9060 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 9061#else
228e534f 9062 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
4a938328
MS
9063#endif
9064 }
7ee38065 9065#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
9066 else
9067 {
9068 /* Fail - we don't know how to handle any other
9069 note size (ie. data object type). */
b34976b6 9070 return TRUE;
4a938328 9071 }
252b5132 9072
bb0082d6 9073 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 9074 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 9075 size, note->descpos + offset);
252b5132
RH
9076}
9077#endif /* defined (HAVE_PRSTATUS_T) */
9078
bb0082d6 9079/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 9080static bfd_boolean
217aa764
AM
9081elfcore_make_note_pseudosection (bfd *abfd,
9082 char *name,
9083 Elf_Internal_Note *note)
252b5132 9084{
936e320b
AM
9085 return _bfd_elfcore_make_pseudosection (abfd, name,
9086 note->descsz, note->descpos);
252b5132
RH
9087}
9088
ff08c6bb
JB
9089/* There isn't a consistent prfpregset_t across platforms,
9090 but it doesn't matter, because we don't have to pick this
c044fabd
KH
9091 data structure apart. */
9092
b34976b6 9093static bfd_boolean
217aa764 9094elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
9095{
9096 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9097}
9098
ff08c6bb 9099/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 9100 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 9101 literally. */
c044fabd 9102
b34976b6 9103static bfd_boolean
217aa764 9104elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
9105{
9106 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9107}
9108
4339cae0
L
9109/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9110 with a note type of NT_X86_XSTATE. Just include the whole note's
9111 contents literally. */
9112
9113static bfd_boolean
9114elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
9115{
9116 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
9117}
9118
97753bd5
AM
9119static bfd_boolean
9120elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
9121{
9122 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
9123}
9124
89eeb0bc
LM
9125static bfd_boolean
9126elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
9127{
9128 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
9129}
97753bd5 9130
0675e188
UW
9131static bfd_boolean
9132elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
9133{
9134 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
9135}
9136
d7eeb400
MS
9137static bfd_boolean
9138elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
9139{
9140 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
9141}
9142
9143static bfd_boolean
9144elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
9145{
9146 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
9147}
9148
9149static bfd_boolean
9150elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
9151{
9152 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
9153}
9154
9155static bfd_boolean
9156elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
9157{
9158 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
9159}
9160
9161static bfd_boolean
9162elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9163{
9164 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9165}
9166
355b81d9
UW
9167static bfd_boolean
9168elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9169{
9170 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9171}
9172
9173static bfd_boolean
9174elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9175{
9176 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9177}
9178
abb3f6cc
NC
9179static bfd_boolean
9180elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9181{
9182 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9183}
9184
4ef9f41a
AA
9185static bfd_boolean
9186elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
9187{
9188 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
9189}
9190
9191static bfd_boolean
9192elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
9193{
9194 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
9195}
9196
faa9a424
UW
9197static bfd_boolean
9198elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
9199{
9200 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
9201}
9202
652451f8
YZ
9203static bfd_boolean
9204elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
9205{
9206 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
9207}
9208
9209static bfd_boolean
9210elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
9211{
9212 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
9213}
9214
9215static bfd_boolean
9216elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
9217{
9218 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
9219}
9220
252b5132 9221#if defined (HAVE_PRPSINFO_T)
4a938328 9222typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 9223#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9224typedef prpsinfo32_t elfcore_psinfo32_t;
9225#endif
252b5132
RH
9226#endif
9227
9228#if defined (HAVE_PSINFO_T)
4a938328 9229typedef psinfo_t elfcore_psinfo_t;
7ee38065 9230#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9231typedef psinfo32_t elfcore_psinfo32_t;
9232#endif
252b5132
RH
9233#endif
9234
252b5132
RH
9235/* return a malloc'ed copy of a string at START which is at
9236 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 9237 the copy will always have a terminating '\0'. */
252b5132 9238
936e320b 9239char *
217aa764 9240_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 9241{
dc810e39 9242 char *dups;
a50b1753 9243 char *end = (char *) memchr (start, '\0', max);
dc810e39 9244 size_t len;
252b5132
RH
9245
9246 if (end == NULL)
9247 len = max;
9248 else
9249 len = end - start;
9250
a50b1753 9251 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 9252 if (dups == NULL)
252b5132
RH
9253 return NULL;
9254
dc810e39
AM
9255 memcpy (dups, start, len);
9256 dups[len] = '\0';
252b5132 9257
dc810e39 9258 return dups;
252b5132
RH
9259}
9260
bb0082d6 9261#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 9262static bfd_boolean
217aa764 9263elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 9264{
4a938328
MS
9265 if (note->descsz == sizeof (elfcore_psinfo_t))
9266 {
9267 elfcore_psinfo_t psinfo;
252b5132 9268
7ee38065 9269 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9270
335e41d4 9271#if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
228e534f 9272 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9273#endif
228e534f 9274 elf_tdata (abfd)->core->program
936e320b
AM
9275 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9276 sizeof (psinfo.pr_fname));
252b5132 9277
228e534f 9278 elf_tdata (abfd)->core->command
936e320b
AM
9279 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9280 sizeof (psinfo.pr_psargs));
4a938328 9281 }
7ee38065 9282#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
9283 else if (note->descsz == sizeof (elfcore_psinfo32_t))
9284 {
9285 /* 64-bit host, 32-bit corefile */
9286 elfcore_psinfo32_t psinfo;
9287
7ee38065 9288 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9289
335e41d4 9290#if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
228e534f 9291 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9292#endif
228e534f 9293 elf_tdata (abfd)->core->program
936e320b
AM
9294 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9295 sizeof (psinfo.pr_fname));
4a938328 9296
228e534f 9297 elf_tdata (abfd)->core->command
936e320b
AM
9298 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9299 sizeof (psinfo.pr_psargs));
4a938328
MS
9300 }
9301#endif
9302
9303 else
9304 {
9305 /* Fail - we don't know how to handle any other
9306 note size (ie. data object type). */
b34976b6 9307 return TRUE;
4a938328 9308 }
252b5132
RH
9309
9310 /* Note that for some reason, a spurious space is tacked
9311 onto the end of the args in some (at least one anyway)
c044fabd 9312 implementations, so strip it off if it exists. */
252b5132
RH
9313
9314 {
228e534f 9315 char *command = elf_tdata (abfd)->core->command;
252b5132
RH
9316 int n = strlen (command);
9317
9318 if (0 < n && command[n - 1] == ' ')
9319 command[n - 1] = '\0';
9320 }
9321
b34976b6 9322 return TRUE;
252b5132
RH
9323}
9324#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
9325
252b5132 9326#if defined (HAVE_PSTATUS_T)
b34976b6 9327static bfd_boolean
217aa764 9328elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 9329{
f572a39d
AM
9330 if (note->descsz == sizeof (pstatus_t)
9331#if defined (HAVE_PXSTATUS_T)
9332 || note->descsz == sizeof (pxstatus_t)
9333#endif
9334 )
4a938328
MS
9335 {
9336 pstatus_t pstat;
252b5132 9337
4a938328 9338 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9339
228e534f 9340 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328 9341 }
7ee38065 9342#if defined (HAVE_PSTATUS32_T)
4a938328
MS
9343 else if (note->descsz == sizeof (pstatus32_t))
9344 {
9345 /* 64-bit host, 32-bit corefile */
9346 pstatus32_t pstat;
252b5132 9347
4a938328 9348 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9349
228e534f 9350 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328
MS
9351 }
9352#endif
252b5132
RH
9353 /* Could grab some more details from the "representative"
9354 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 9355 NT_LWPSTATUS note, presumably. */
252b5132 9356
b34976b6 9357 return TRUE;
252b5132
RH
9358}
9359#endif /* defined (HAVE_PSTATUS_T) */
9360
252b5132 9361#if defined (HAVE_LWPSTATUS_T)
b34976b6 9362static bfd_boolean
217aa764 9363elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
9364{
9365 lwpstatus_t lwpstat;
9366 char buf[100];
c044fabd 9367 char *name;
d4c88bbb 9368 size_t len;
c044fabd 9369 asection *sect;
252b5132 9370
f572a39d
AM
9371 if (note->descsz != sizeof (lwpstat)
9372#if defined (HAVE_LWPXSTATUS_T)
9373 && note->descsz != sizeof (lwpxstatus_t)
9374#endif
9375 )
b34976b6 9376 return TRUE;
252b5132
RH
9377
9378 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
9379
228e534f 9380 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
a1504221
JB
9381 /* Do not overwrite the core signal if it has already been set by
9382 another thread. */
228e534f
AM
9383 if (elf_tdata (abfd)->core->signal == 0)
9384 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
252b5132 9385
c044fabd 9386 /* Make a ".reg/999" section. */
252b5132
RH
9387
9388 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 9389 len = strlen (buf) + 1;
217aa764 9390 name = bfd_alloc (abfd, len);
252b5132 9391 if (name == NULL)
b34976b6 9392 return FALSE;
d4c88bbb 9393 memcpy (name, buf, len);
252b5132 9394
117ed4f8 9395 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9396 if (sect == NULL)
b34976b6 9397 return FALSE;
252b5132
RH
9398
9399#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9400 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
9401 sect->filepos = note->descpos
9402 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
9403#endif
9404
9405#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 9406 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
9407 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
9408#endif
9409
252b5132
RH
9410 sect->alignment_power = 2;
9411
9412 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9413 return FALSE;
252b5132
RH
9414
9415 /* Make a ".reg2/999" section */
9416
9417 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 9418 len = strlen (buf) + 1;
217aa764 9419 name = bfd_alloc (abfd, len);
252b5132 9420 if (name == NULL)
b34976b6 9421 return FALSE;
d4c88bbb 9422 memcpy (name, buf, len);
252b5132 9423
117ed4f8 9424 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9425 if (sect == NULL)
b34976b6 9426 return FALSE;
252b5132
RH
9427
9428#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9429 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
9430 sect->filepos = note->descpos
9431 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
9432#endif
9433
9434#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 9435 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
9436 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
9437#endif
9438
252b5132
RH
9439 sect->alignment_power = 2;
9440
936e320b 9441 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
9442}
9443#endif /* defined (HAVE_LWPSTATUS_T) */
9444
b34976b6 9445static bfd_boolean
217aa764 9446elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
9447{
9448 char buf[30];
c044fabd 9449 char *name;
d4c88bbb 9450 size_t len;
c044fabd 9451 asection *sect;
4a6636fb
PA
9452 int type;
9453 int is_active_thread;
9454 bfd_vma base_addr;
16e9c715 9455
4a6636fb 9456 if (note->descsz < 728)
b34976b6 9457 return TRUE;
16e9c715 9458
4a6636fb
PA
9459 if (! CONST_STRNEQ (note->namedata, "win32"))
9460 return TRUE;
9461
9462 type = bfd_get_32 (abfd, note->descdata);
c044fabd 9463
4a6636fb 9464 switch (type)
16e9c715 9465 {
4a6636fb 9466 case 1 /* NOTE_INFO_PROCESS */:
228e534f 9467 /* FIXME: need to add ->core->command. */
4a6636fb 9468 /* process_info.pid */
228e534f 9469 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
4a6636fb 9470 /* process_info.signal */
228e534f 9471 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 9472 break;
16e9c715 9473
4a6636fb 9474 case 2 /* NOTE_INFO_THREAD */:
16e9c715 9475 /* Make a ".reg/999" section. */
4a6636fb
PA
9476 /* thread_info.tid */
9477 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 9478
d4c88bbb 9479 len = strlen (buf) + 1;
a50b1753 9480 name = (char *) bfd_alloc (abfd, len);
16e9c715 9481 if (name == NULL)
b34976b6 9482 return FALSE;
c044fabd 9483
d4c88bbb 9484 memcpy (name, buf, len);
16e9c715 9485
117ed4f8 9486 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 9487 if (sect == NULL)
b34976b6 9488 return FALSE;
c044fabd 9489
4a6636fb
PA
9490 /* sizeof (thread_info.thread_context) */
9491 sect->size = 716;
9492 /* offsetof (thread_info.thread_context) */
9493 sect->filepos = note->descpos + 12;
16e9c715
NC
9494 sect->alignment_power = 2;
9495
4a6636fb
PA
9496 /* thread_info.is_active_thread */
9497 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
9498
9499 if (is_active_thread)
16e9c715 9500 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9501 return FALSE;
16e9c715
NC
9502 break;
9503
4a6636fb 9504 case 3 /* NOTE_INFO_MODULE */:
16e9c715 9505 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
9506 /* module_info.base_address */
9507 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 9508 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 9509
d4c88bbb 9510 len = strlen (buf) + 1;
a50b1753 9511 name = (char *) bfd_alloc (abfd, len);
16e9c715 9512 if (name == NULL)
b34976b6 9513 return FALSE;
c044fabd 9514
d4c88bbb 9515 memcpy (name, buf, len);
252b5132 9516
117ed4f8 9517 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 9518
16e9c715 9519 if (sect == NULL)
b34976b6 9520 return FALSE;
c044fabd 9521
eea6121a 9522 sect->size = note->descsz;
16e9c715 9523 sect->filepos = note->descpos;
16e9c715
NC
9524 sect->alignment_power = 2;
9525 break;
9526
9527 default:
b34976b6 9528 return TRUE;
16e9c715
NC
9529 }
9530
b34976b6 9531 return TRUE;
16e9c715 9532}
252b5132 9533
b34976b6 9534static bfd_boolean
217aa764 9535elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 9536{
9c5bfbb7 9537 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 9538
252b5132
RH
9539 switch (note->type)
9540 {
9541 default:
b34976b6 9542 return TRUE;
252b5132 9543
252b5132 9544 case NT_PRSTATUS:
bb0082d6
AM
9545 if (bed->elf_backend_grok_prstatus)
9546 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 9547 return TRUE;
bb0082d6 9548#if defined (HAVE_PRSTATUS_T)
252b5132 9549 return elfcore_grok_prstatus (abfd, note);
bb0082d6 9550#else
b34976b6 9551 return TRUE;
252b5132
RH
9552#endif
9553
9554#if defined (HAVE_PSTATUS_T)
9555 case NT_PSTATUS:
9556 return elfcore_grok_pstatus (abfd, note);
9557#endif
9558
9559#if defined (HAVE_LWPSTATUS_T)
9560 case NT_LWPSTATUS:
9561 return elfcore_grok_lwpstatus (abfd, note);
9562#endif
9563
9564 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
9565 return elfcore_grok_prfpreg (abfd, note);
9566
c044fabd 9567 case NT_WIN32PSTATUS:
16e9c715 9568 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 9569
c044fabd 9570 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
9571 if (note->namesz == 6
9572 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
9573 return elfcore_grok_prxfpreg (abfd, note);
9574 else
b34976b6 9575 return TRUE;
ff08c6bb 9576
4339cae0
L
9577 case NT_X86_XSTATE: /* Linux XSAVE extension */
9578 if (note->namesz == 6
9579 && strcmp (note->namedata, "LINUX") == 0)
9580 return elfcore_grok_xstatereg (abfd, note);
9581 else
9582 return TRUE;
9583
97753bd5
AM
9584 case NT_PPC_VMX:
9585 if (note->namesz == 6
9586 && strcmp (note->namedata, "LINUX") == 0)
9587 return elfcore_grok_ppc_vmx (abfd, note);
9588 else
9589 return TRUE;
9590
89eeb0bc
LM
9591 case NT_PPC_VSX:
9592 if (note->namesz == 6
9593 && strcmp (note->namedata, "LINUX") == 0)
9594 return elfcore_grok_ppc_vsx (abfd, note);
9595 else
9596 return TRUE;
9597
0675e188
UW
9598 case NT_S390_HIGH_GPRS:
9599 if (note->namesz == 6
9600 && strcmp (note->namedata, "LINUX") == 0)
9601 return elfcore_grok_s390_high_gprs (abfd, note);
9602 else
9603 return TRUE;
9604
d7eeb400
MS
9605 case NT_S390_TIMER:
9606 if (note->namesz == 6
9607 && strcmp (note->namedata, "LINUX") == 0)
9608 return elfcore_grok_s390_timer (abfd, note);
9609 else
9610 return TRUE;
9611
9612 case NT_S390_TODCMP:
9613 if (note->namesz == 6
9614 && strcmp (note->namedata, "LINUX") == 0)
9615 return elfcore_grok_s390_todcmp (abfd, note);
9616 else
9617 return TRUE;
9618
9619 case NT_S390_TODPREG:
9620 if (note->namesz == 6
9621 && strcmp (note->namedata, "LINUX") == 0)
9622 return elfcore_grok_s390_todpreg (abfd, note);
9623 else
9624 return TRUE;
9625
9626 case NT_S390_CTRS:
9627 if (note->namesz == 6
9628 && strcmp (note->namedata, "LINUX") == 0)
9629 return elfcore_grok_s390_ctrs (abfd, note);
9630 else
9631 return TRUE;
9632
9633 case NT_S390_PREFIX:
9634 if (note->namesz == 6
9635 && strcmp (note->namedata, "LINUX") == 0)
9636 return elfcore_grok_s390_prefix (abfd, note);
9637 else
9638 return TRUE;
9639
355b81d9
UW
9640 case NT_S390_LAST_BREAK:
9641 if (note->namesz == 6
9642 && strcmp (note->namedata, "LINUX") == 0)
9643 return elfcore_grok_s390_last_break (abfd, note);
9644 else
9645 return TRUE;
9646
9647 case NT_S390_SYSTEM_CALL:
9648 if (note->namesz == 6
9649 && strcmp (note->namedata, "LINUX") == 0)
9650 return elfcore_grok_s390_system_call (abfd, note);
9651 else
9652 return TRUE;
9653
abb3f6cc
NC
9654 case NT_S390_TDB:
9655 if (note->namesz == 6
9656 && strcmp (note->namedata, "LINUX") == 0)
9657 return elfcore_grok_s390_tdb (abfd, note);
9658 else
9659 return TRUE;
9660
4ef9f41a
AA
9661 case NT_S390_VXRS_LOW:
9662 if (note->namesz == 6
9663 && strcmp (note->namedata, "LINUX") == 0)
9664 return elfcore_grok_s390_vxrs_low (abfd, note);
9665 else
9666 return TRUE;
9667
9668 case NT_S390_VXRS_HIGH:
9669 if (note->namesz == 6
9670 && strcmp (note->namedata, "LINUX") == 0)
9671 return elfcore_grok_s390_vxrs_high (abfd, note);
9672 else
9673 return TRUE;
9674
faa9a424
UW
9675 case NT_ARM_VFP:
9676 if (note->namesz == 6
9677 && strcmp (note->namedata, "LINUX") == 0)
9678 return elfcore_grok_arm_vfp (abfd, note);
9679 else
9680 return TRUE;
9681
652451f8
YZ
9682 case NT_ARM_TLS:
9683 if (note->namesz == 6
9684 && strcmp (note->namedata, "LINUX") == 0)
9685 return elfcore_grok_aarch_tls (abfd, note);
9686 else
9687 return TRUE;
9688
9689 case NT_ARM_HW_BREAK:
9690 if (note->namesz == 6
9691 && strcmp (note->namedata, "LINUX") == 0)
9692 return elfcore_grok_aarch_hw_break (abfd, note);
9693 else
9694 return TRUE;
9695
9696 case NT_ARM_HW_WATCH:
9697 if (note->namesz == 6
9698 && strcmp (note->namedata, "LINUX") == 0)
9699 return elfcore_grok_aarch_hw_watch (abfd, note);
9700 else
9701 return TRUE;
9702
252b5132
RH
9703 case NT_PRPSINFO:
9704 case NT_PSINFO:
bb0082d6
AM
9705 if (bed->elf_backend_grok_psinfo)
9706 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 9707 return TRUE;
bb0082d6 9708#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 9709 return elfcore_grok_psinfo (abfd, note);
bb0082d6 9710#else
b34976b6 9711 return TRUE;
252b5132 9712#endif
3333a7c3
RM
9713
9714 case NT_AUXV:
9715 {
117ed4f8
AM
9716 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9717 SEC_HAS_CONTENTS);
3333a7c3
RM
9718
9719 if (sect == NULL)
9720 return FALSE;
eea6121a 9721 sect->size = note->descsz;
3333a7c3 9722 sect->filepos = note->descpos;
3333a7c3
RM
9723 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9724
9725 return TRUE;
9726 }
9015683b 9727
451b7c33
TT
9728 case NT_FILE:
9729 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
9730 note);
9731
9015683b
TT
9732 case NT_SIGINFO:
9733 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
9734 note);
5b2c414d 9735
252b5132
RH
9736 }
9737}
9738
718175fa
JK
9739static bfd_boolean
9740elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
9741{
c74f7d1c 9742 struct bfd_build_id* build_id;
30e8ee25
AM
9743
9744 if (note->descsz == 0)
9745 return FALSE;
9746
c74f7d1c
JT
9747 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
9748 if (build_id == NULL)
718175fa
JK
9749 return FALSE;
9750
c74f7d1c
JT
9751 build_id->size = note->descsz;
9752 memcpy (build_id->data, note->descdata, note->descsz);
9753 abfd->build_id = build_id;
718175fa
JK
9754
9755 return TRUE;
9756}
9757
9758static bfd_boolean
9759elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
9760{
9761 switch (note->type)
9762 {
9763 default:
9764 return TRUE;
9765
46bed679
L
9766 case NT_GNU_PROPERTY_TYPE_0:
9767 return _bfd_elf_parse_gnu_properties (abfd, note);
9768
718175fa
JK
9769 case NT_GNU_BUILD_ID:
9770 return elfobj_grok_gnu_build_id (abfd, note);
9771 }
9772}
9773
e21e5835
NC
9774static bfd_boolean
9775elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
9776{
9777 struct sdt_note *cur =
9778 (struct sdt_note *) bfd_alloc (abfd, sizeof (struct sdt_note)
9779 + note->descsz);
9780
9781 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
9782 cur->size = (bfd_size_type) note->descsz;
9783 memcpy (cur->data, note->descdata, note->descsz);
9784
9785 elf_tdata (abfd)->sdt_note_head = cur;
9786
9787 return TRUE;
9788}
9789
9790static bfd_boolean
9791elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
9792{
9793 switch (note->type)
9794 {
9795 case NT_STAPSDT:
9796 return elfobj_grok_stapsdt_note_1 (abfd, note);
9797
9798 default:
9799 return TRUE;
9800 }
9801}
9802
aa1ed4a9
JB
9803static bfd_boolean
9804elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
9805{
9806 size_t offset;
9807
aa1ed4a9
JB
9808 switch (abfd->arch_info->bits_per_word)
9809 {
9810 case 32:
0064d223
JB
9811 if (note->descsz < 108)
9812 return FALSE;
aa1ed4a9
JB
9813 break;
9814
9815 case 64:
0064d223
JB
9816 if (note->descsz < 120)
9817 return FALSE;
aa1ed4a9
JB
9818 break;
9819
9820 default:
9821 return FALSE;
9822 }
9823
0064d223
JB
9824 /* Check for version 1 in pr_version. */
9825 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
9826 return FALSE;
9827 offset = 4;
9828
9829 /* Skip over pr_psinfosz. */
9830 if (abfd->arch_info->bits_per_word == 32)
9831 offset += 4;
9832 else
9833 {
9834 offset += 4; /* Padding before pr_psinfosz. */
9835 offset += 8;
9836 }
9837
aa1ed4a9
JB
9838 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
9839 elf_tdata (abfd)->core->program
9840 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
9841 offset += 17;
9842
9843 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
9844 elf_tdata (abfd)->core->command
9845 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
0064d223
JB
9846 offset += 81;
9847
9848 /* Padding before pr_pid. */
9849 offset += 2;
9850
9851 /* The pr_pid field was added in version "1a". */
9852 if (note->descsz < offset + 4)
9853 return TRUE;
9854
9855 elf_tdata (abfd)->core->pid
9856 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
aa1ed4a9
JB
9857
9858 return TRUE;
9859}
9860
9861static bfd_boolean
9862elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
9863{
9864 size_t offset;
9865 size_t size;
9866
9867 /* Check for version 1 in pr_version. */
9868 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
9869 return FALSE;
9870 offset = 4;
9871
9872 /* Skip over pr_statussz. */
9873 switch (abfd->arch_info->bits_per_word)
9874 {
9875 case 32:
9876 offset += 4;
9877 break;
9878
9879 case 64:
9880 offset += 4; /* Padding before pr_statussz. */
9881 offset += 8;
9882 break;
9883
9884 default:
9885 return FALSE;
9886 }
9887
9888 /* Extract size of pr_reg from pr_gregsetsz. */
9889 if (abfd->arch_info->bits_per_word == 32)
9890 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
9891 else
9892 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
9893
9894 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
9895 offset += (abfd->arch_info->bits_per_word / 8) * 2;
9896
9897 /* Skip over pr_osreldate. */
9898 offset += 4;
9899
9900 /* Read signal from pr_cursig. */
9901 if (elf_tdata (abfd)->core->signal == 0)
9902 elf_tdata (abfd)->core->signal
9903 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
9904 offset += 4;
9905
9906 /* Read TID from pr_pid. */
9907 elf_tdata (abfd)->core->lwpid
9908 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
9909 offset += 4;
9910
9911 /* Padding before pr_reg. */
9912 if (abfd->arch_info->bits_per_word == 64)
9913 offset += 4;
9914
9915 /* Make a ".reg/999" section and a ".reg" section. */
9916 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
9917 size, note->descpos + offset);
9918}
9919
9920static bfd_boolean
9921elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
9922{
9923 switch (note->type)
9924 {
9925 case NT_PRSTATUS:
9926 return elfcore_grok_freebsd_prstatus (abfd, note);
9927
9928 case NT_FPREGSET:
9929 return elfcore_grok_prfpreg (abfd, note);
9930
9931 case NT_PRPSINFO:
9932 return elfcore_grok_freebsd_psinfo (abfd, note);
9933
9934 case NT_FREEBSD_THRMISC:
9935 if (note->namesz == 8)
9936 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
9937 else
9938 return TRUE;
9939
3350c5f5
JB
9940 case NT_FREEBSD_PROCSTAT_AUXV:
9941 {
9942 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9943 SEC_HAS_CONTENTS);
9944
9945 if (sect == NULL)
9946 return FALSE;
9947 sect->size = note->descsz - 4;
9948 sect->filepos = note->descpos + 4;
9949 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9950
9951 return TRUE;
9952 }
9953
aa1ed4a9
JB
9954 case NT_X86_XSTATE:
9955 if (note->namesz == 8)
9956 return elfcore_grok_xstatereg (abfd, note);
9957 else
9958 return TRUE;
9959
9960 default:
9961 return TRUE;
9962 }
9963}
9964
b34976b6 9965static bfd_boolean
217aa764 9966elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
9967{
9968 char *cp;
9969
9970 cp = strchr (note->namedata, '@');
9971 if (cp != NULL)
9972 {
d2b64500 9973 *lwpidp = atoi(cp + 1);
b34976b6 9974 return TRUE;
50b2bdb7 9975 }
b34976b6 9976 return FALSE;
50b2bdb7
AM
9977}
9978
b34976b6 9979static bfd_boolean
217aa764 9980elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 9981{
50b2bdb7 9982 /* Signal number at offset 0x08. */
228e534f 9983 elf_tdata (abfd)->core->signal
50b2bdb7
AM
9984 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
9985
9986 /* Process ID at offset 0x50. */
228e534f 9987 elf_tdata (abfd)->core->pid
50b2bdb7
AM
9988 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
9989
9990 /* Command name at 0x7c (max 32 bytes, including nul). */
228e534f 9991 elf_tdata (abfd)->core->command
50b2bdb7
AM
9992 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
9993
7720ba9f
MK
9994 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
9995 note);
50b2bdb7
AM
9996}
9997
b34976b6 9998static bfd_boolean
217aa764 9999elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
10000{
10001 int lwp;
10002
10003 if (elfcore_netbsd_get_lwpid (note, &lwp))
228e534f 10004 elf_tdata (abfd)->core->lwpid = lwp;
50b2bdb7 10005
b4db1224 10006 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
10007 {
10008 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
10009 find this note before any of the others, which is fine,
10010 since the kernel writes this note out first when it
10011 creates a core file. */
47d9a591 10012
50b2bdb7
AM
10013 return elfcore_grok_netbsd_procinfo (abfd, note);
10014 }
10015
b4db1224
JT
10016 /* As of Jan 2002 there are no other machine-independent notes
10017 defined for NetBSD core files. If the note type is less
10018 than the start of the machine-dependent note types, we don't
10019 understand it. */
47d9a591 10020
b4db1224 10021 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 10022 return TRUE;
50b2bdb7
AM
10023
10024
10025 switch (bfd_get_arch (abfd))
10026 {
08a40648
AM
10027 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
10028 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
10029
10030 case bfd_arch_alpha:
10031 case bfd_arch_sparc:
10032 switch (note->type)
08a40648
AM
10033 {
10034 case NT_NETBSDCORE_FIRSTMACH+0:
10035 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 10036
08a40648
AM
10037 case NT_NETBSDCORE_FIRSTMACH+2:
10038 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 10039
08a40648
AM
10040 default:
10041 return TRUE;
10042 }
50b2bdb7 10043
08a40648
AM
10044 /* On all other arch's, PT_GETREGS == mach+1 and
10045 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
10046
10047 default:
10048 switch (note->type)
08a40648
AM
10049 {
10050 case NT_NETBSDCORE_FIRSTMACH+1:
10051 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 10052
08a40648
AM
10053 case NT_NETBSDCORE_FIRSTMACH+3:
10054 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 10055
08a40648
AM
10056 default:
10057 return TRUE;
10058 }
50b2bdb7
AM
10059 }
10060 /* NOTREACHED */
10061}
10062
67cc5033
MK
10063static bfd_boolean
10064elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10065{
10066 /* Signal number at offset 0x08. */
228e534f 10067 elf_tdata (abfd)->core->signal
67cc5033
MK
10068 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10069
10070 /* Process ID at offset 0x20. */
228e534f 10071 elf_tdata (abfd)->core->pid
67cc5033
MK
10072 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
10073
10074 /* Command name at 0x48 (max 32 bytes, including nul). */
228e534f 10075 elf_tdata (abfd)->core->command
67cc5033
MK
10076 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
10077
10078 return TRUE;
10079}
10080
10081static bfd_boolean
10082elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
10083{
10084 if (note->type == NT_OPENBSD_PROCINFO)
10085 return elfcore_grok_openbsd_procinfo (abfd, note);
10086
10087 if (note->type == NT_OPENBSD_REGS)
10088 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10089
10090 if (note->type == NT_OPENBSD_FPREGS)
10091 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10092
10093 if (note->type == NT_OPENBSD_XFPREGS)
10094 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
10095
10096 if (note->type == NT_OPENBSD_AUXV)
10097 {
10098 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
10099 SEC_HAS_CONTENTS);
10100
10101 if (sect == NULL)
10102 return FALSE;
10103 sect->size = note->descsz;
10104 sect->filepos = note->descpos;
10105 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10106
10107 return TRUE;
10108 }
10109
10110 if (note->type == NT_OPENBSD_WCOOKIE)
10111 {
10112 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
10113 SEC_HAS_CONTENTS);
10114
10115 if (sect == NULL)
10116 return FALSE;
10117 sect->size = note->descsz;
10118 sect->filepos = note->descpos;
10119 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10120
10121 return TRUE;
10122 }
10123
10124 return TRUE;
10125}
10126
07c6e936 10127static bfd_boolean
d3fd4074 10128elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
10129{
10130 void *ddata = note->descdata;
10131 char buf[100];
10132 char *name;
10133 asection *sect;
f8843e87
AM
10134 short sig;
10135 unsigned flags;
07c6e936
NC
10136
10137 /* nto_procfs_status 'pid' field is at offset 0. */
228e534f 10138 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
07c6e936 10139
f8843e87
AM
10140 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
10141 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
10142
10143 /* nto_procfs_status 'flags' field is at offset 8. */
10144 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
10145
10146 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
10147 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
10148 {
228e534f
AM
10149 elf_tdata (abfd)->core->signal = sig;
10150 elf_tdata (abfd)->core->lwpid = *tid;
f8843e87 10151 }
07c6e936 10152
f8843e87
AM
10153 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
10154 do not come from signals so we make sure we set the current
10155 thread just in case. */
10156 if (flags & 0x00000080)
228e534f 10157 elf_tdata (abfd)->core->lwpid = *tid;
07c6e936
NC
10158
10159 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 10160 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 10161
a50b1753 10162 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10163 if (name == NULL)
10164 return FALSE;
10165 strcpy (name, buf);
10166
117ed4f8 10167 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10168 if (sect == NULL)
10169 return FALSE;
10170
eea6121a 10171 sect->size = note->descsz;
07c6e936 10172 sect->filepos = note->descpos;
07c6e936
NC
10173 sect->alignment_power = 2;
10174
10175 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
10176}
10177
10178static bfd_boolean
d69f560c
KW
10179elfcore_grok_nto_regs (bfd *abfd,
10180 Elf_Internal_Note *note,
d3fd4074 10181 long tid,
d69f560c 10182 char *base)
07c6e936
NC
10183{
10184 char buf[100];
10185 char *name;
10186 asection *sect;
10187
d69f560c 10188 /* Make a "(base)/%d" section. */
d3fd4074 10189 sprintf (buf, "%s/%ld", base, tid);
07c6e936 10190
a50b1753 10191 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10192 if (name == NULL)
10193 return FALSE;
10194 strcpy (name, buf);
10195
117ed4f8 10196 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10197 if (sect == NULL)
10198 return FALSE;
10199
eea6121a 10200 sect->size = note->descsz;
07c6e936 10201 sect->filepos = note->descpos;
07c6e936
NC
10202 sect->alignment_power = 2;
10203
f8843e87 10204 /* This is the current thread. */
228e534f 10205 if (elf_tdata (abfd)->core->lwpid == tid)
d69f560c 10206 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
10207
10208 return TRUE;
07c6e936
NC
10209}
10210
10211#define BFD_QNT_CORE_INFO 7
10212#define BFD_QNT_CORE_STATUS 8
10213#define BFD_QNT_CORE_GREG 9
10214#define BFD_QNT_CORE_FPREG 10
10215
10216static bfd_boolean
217aa764 10217elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
10218{
10219 /* Every GREG section has a STATUS section before it. Store the
811072d8 10220 tid from the previous call to pass down to the next gregs
07c6e936 10221 function. */
d3fd4074 10222 static long tid = 1;
07c6e936
NC
10223
10224 switch (note->type)
10225 {
d69f560c
KW
10226 case BFD_QNT_CORE_INFO:
10227 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
10228 case BFD_QNT_CORE_STATUS:
10229 return elfcore_grok_nto_status (abfd, note, &tid);
10230 case BFD_QNT_CORE_GREG:
10231 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
10232 case BFD_QNT_CORE_FPREG:
10233 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
10234 default:
10235 return TRUE;
07c6e936
NC
10236 }
10237}
10238
b15fa79e
AM
10239static bfd_boolean
10240elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
10241{
10242 char *name;
10243 asection *sect;
10244 size_t len;
10245
10246 /* Use note name as section name. */
10247 len = note->namesz;
a50b1753 10248 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
10249 if (name == NULL)
10250 return FALSE;
10251 memcpy (name, note->namedata, len);
10252 name[len - 1] = '\0';
10253
10254 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10255 if (sect == NULL)
10256 return FALSE;
10257
10258 sect->size = note->descsz;
10259 sect->filepos = note->descpos;
10260 sect->alignment_power = 1;
10261
10262 return TRUE;
10263}
10264
7c76fa91
MS
10265/* Function: elfcore_write_note
10266
47d9a591 10267 Inputs:
a39f3346 10268 buffer to hold note, and current size of buffer
7c76fa91
MS
10269 name of note
10270 type of note
10271 data for note
10272 size of data for note
10273
a39f3346
AM
10274 Writes note to end of buffer. ELF64 notes are written exactly as
10275 for ELF32, despite the current (as of 2006) ELF gabi specifying
10276 that they ought to have 8-byte namesz and descsz field, and have
10277 8-byte alignment. Other writers, eg. Linux kernel, do the same.
10278
7c76fa91 10279 Return:
a39f3346 10280 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
10281
10282char *
a39f3346 10283elfcore_write_note (bfd *abfd,
217aa764 10284 char *buf,
a39f3346 10285 int *bufsiz,
217aa764 10286 const char *name,
a39f3346 10287 int type,
217aa764 10288 const void *input,
a39f3346 10289 int size)
7c76fa91
MS
10290{
10291 Elf_External_Note *xnp;
d4c88bbb 10292 size_t namesz;
d4c88bbb 10293 size_t newspace;
a39f3346 10294 char *dest;
7c76fa91 10295
d4c88bbb 10296 namesz = 0;
d4c88bbb 10297 if (name != NULL)
a39f3346 10298 namesz = strlen (name) + 1;
d4c88bbb 10299
a39f3346 10300 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 10301
a50b1753 10302 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
10303 if (buf == NULL)
10304 return buf;
a39f3346 10305 dest = buf + *bufsiz;
7c76fa91
MS
10306 *bufsiz += newspace;
10307 xnp = (Elf_External_Note *) dest;
10308 H_PUT_32 (abfd, namesz, xnp->namesz);
10309 H_PUT_32 (abfd, size, xnp->descsz);
10310 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
10311 dest = xnp->name;
10312 if (name != NULL)
10313 {
10314 memcpy (dest, name, namesz);
10315 dest += namesz;
a39f3346 10316 while (namesz & 3)
d4c88bbb
AM
10317 {
10318 *dest++ = '\0';
a39f3346 10319 ++namesz;
d4c88bbb
AM
10320 }
10321 }
10322 memcpy (dest, input, size);
a39f3346
AM
10323 dest += size;
10324 while (size & 3)
10325 {
10326 *dest++ = '\0';
10327 ++size;
10328 }
10329 return buf;
7c76fa91
MS
10330}
10331
7c76fa91 10332char *
217aa764
AM
10333elfcore_write_prpsinfo (bfd *abfd,
10334 char *buf,
10335 int *bufsiz,
10336 const char *fname,
10337 const char *psargs)
7c76fa91 10338{
183e98be
AM
10339 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10340
10341 if (bed->elf_backend_write_core_note != NULL)
10342 {
10343 char *ret;
10344 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
10345 NT_PRPSINFO, fname, psargs);
10346 if (ret != NULL)
10347 return ret;
10348 }
7c76fa91 10349
1f20dca5 10350#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
183e98be
AM
10351#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
10352 if (bed->s->elfclass == ELFCLASS32)
10353 {
10354#if defined (HAVE_PSINFO32_T)
10355 psinfo32_t data;
10356 int note_type = NT_PSINFO;
10357#else
10358 prpsinfo32_t data;
10359 int note_type = NT_PRPSINFO;
10360#endif
10361
10362 memset (&data, 0, sizeof (data));
10363 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
10364 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
10365 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 10366 "CORE", note_type, &data, sizeof (data));
183e98be
AM
10367 }
10368 else
10369#endif
10370 {
7c76fa91 10371#if defined (HAVE_PSINFO_T)
183e98be
AM
10372 psinfo_t data;
10373 int note_type = NT_PSINFO;
7c76fa91 10374#else
183e98be
AM
10375 prpsinfo_t data;
10376 int note_type = NT_PRPSINFO;
7c76fa91
MS
10377#endif
10378
183e98be
AM
10379 memset (&data, 0, sizeof (data));
10380 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
10381 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
10382 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 10383 "CORE", note_type, &data, sizeof (data));
183e98be 10384 }
7c76fa91
MS
10385#endif /* PSINFO_T or PRPSINFO_T */
10386
1f20dca5
UW
10387 free (buf);
10388 return NULL;
10389}
10390
70a38d42
SDJ
10391char *
10392elfcore_write_linux_prpsinfo32
10393 (bfd *abfd, char *buf, int *bufsiz,
10394 const struct elf_internal_linux_prpsinfo *prpsinfo)
10395{
10396 struct elf_external_linux_prpsinfo32 data;
10397
aeb70569 10398 swap_linux_prpsinfo32_out (abfd, prpsinfo, &data);
70a38d42
SDJ
10399 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
10400 &data, sizeof (data));
10401}
10402
10403char *
10404elfcore_write_linux_prpsinfo64
10405 (bfd *abfd, char *buf, int *bufsiz,
10406 const struct elf_internal_linux_prpsinfo *prpsinfo)
10407{
10408 struct elf_external_linux_prpsinfo64 data;
10409
aeb70569 10410 swap_linux_prpsinfo64_out (abfd, prpsinfo, &data);
70a38d42
SDJ
10411 return elfcore_write_note (abfd, buf, bufsiz,
10412 "CORE", NT_PRPSINFO, &data, sizeof (data));
10413}
10414
7c76fa91 10415char *
217aa764
AM
10416elfcore_write_prstatus (bfd *abfd,
10417 char *buf,
10418 int *bufsiz,
10419 long pid,
10420 int cursig,
10421 const void *gregs)
7c76fa91 10422{
183e98be 10423 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 10424
183e98be
AM
10425 if (bed->elf_backend_write_core_note != NULL)
10426 {
10427 char *ret;
10428 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
10429 NT_PRSTATUS,
10430 pid, cursig, gregs);
10431 if (ret != NULL)
10432 return ret;
10433 }
10434
1f20dca5 10435#if defined (HAVE_PRSTATUS_T)
183e98be
AM
10436#if defined (HAVE_PRSTATUS32_T)
10437 if (bed->s->elfclass == ELFCLASS32)
10438 {
10439 prstatus32_t prstat;
10440
10441 memset (&prstat, 0, sizeof (prstat));
10442 prstat.pr_pid = pid;
10443 prstat.pr_cursig = cursig;
10444 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 10445 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
10446 NT_PRSTATUS, &prstat, sizeof (prstat));
10447 }
10448 else
10449#endif
10450 {
10451 prstatus_t prstat;
10452
10453 memset (&prstat, 0, sizeof (prstat));
10454 prstat.pr_pid = pid;
10455 prstat.pr_cursig = cursig;
10456 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 10457 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
10458 NT_PRSTATUS, &prstat, sizeof (prstat));
10459 }
7c76fa91
MS
10460#endif /* HAVE_PRSTATUS_T */
10461
1f20dca5
UW
10462 free (buf);
10463 return NULL;
10464}
10465
51316059
MS
10466#if defined (HAVE_LWPSTATUS_T)
10467char *
217aa764
AM
10468elfcore_write_lwpstatus (bfd *abfd,
10469 char *buf,
10470 int *bufsiz,
10471 long pid,
10472 int cursig,
10473 const void *gregs)
51316059
MS
10474{
10475 lwpstatus_t lwpstat;
183e98be 10476 const char *note_name = "CORE";
51316059
MS
10477
10478 memset (&lwpstat, 0, sizeof (lwpstat));
10479 lwpstat.pr_lwpid = pid >> 16;
10480 lwpstat.pr_cursig = cursig;
10481#if defined (HAVE_LWPSTATUS_T_PR_REG)
d1e8523e 10482 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
51316059
MS
10483#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10484#if !defined(gregs)
10485 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
10486 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
10487#else
10488 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
10489 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
10490#endif
10491#endif
47d9a591 10492 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
10493 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
10494}
10495#endif /* HAVE_LWPSTATUS_T */
10496
7c76fa91
MS
10497#if defined (HAVE_PSTATUS_T)
10498char *
217aa764
AM
10499elfcore_write_pstatus (bfd *abfd,
10500 char *buf,
10501 int *bufsiz,
10502 long pid,
6c10990d
NC
10503 int cursig ATTRIBUTE_UNUSED,
10504 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 10505{
183e98be
AM
10506 const char *note_name = "CORE";
10507#if defined (HAVE_PSTATUS32_T)
10508 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 10509
183e98be
AM
10510 if (bed->s->elfclass == ELFCLASS32)
10511 {
10512 pstatus32_t pstat;
10513
10514 memset (&pstat, 0, sizeof (pstat));
10515 pstat.pr_pid = pid & 0xffff;
10516 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
10517 NT_PSTATUS, &pstat, sizeof (pstat));
10518 return buf;
10519 }
10520 else
10521#endif
10522 {
10523 pstatus_t pstat;
10524
10525 memset (&pstat, 0, sizeof (pstat));
10526 pstat.pr_pid = pid & 0xffff;
10527 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
10528 NT_PSTATUS, &pstat, sizeof (pstat));
10529 return buf;
10530 }
7c76fa91
MS
10531}
10532#endif /* HAVE_PSTATUS_T */
10533
10534char *
217aa764
AM
10535elfcore_write_prfpreg (bfd *abfd,
10536 char *buf,
10537 int *bufsiz,
10538 const void *fpregs,
10539 int size)
7c76fa91 10540{
183e98be 10541 const char *note_name = "CORE";
47d9a591 10542 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
10543 note_name, NT_FPREGSET, fpregs, size);
10544}
10545
10546char *
217aa764
AM
10547elfcore_write_prxfpreg (bfd *abfd,
10548 char *buf,
10549 int *bufsiz,
10550 const void *xfpregs,
10551 int size)
7c76fa91
MS
10552{
10553 char *note_name = "LINUX";
47d9a591 10554 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
10555 note_name, NT_PRXFPREG, xfpregs, size);
10556}
10557
4339cae0
L
10558char *
10559elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
10560 const void *xfpregs, int size)
10561{
97de3545
JB
10562 char *note_name;
10563 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
10564 note_name = "FreeBSD";
10565 else
10566 note_name = "LINUX";
4339cae0
L
10567 return elfcore_write_note (abfd, buf, bufsiz,
10568 note_name, NT_X86_XSTATE, xfpregs, size);
10569}
10570
97753bd5
AM
10571char *
10572elfcore_write_ppc_vmx (bfd *abfd,
10573 char *buf,
10574 int *bufsiz,
10575 const void *ppc_vmx,
10576 int size)
10577{
10578 char *note_name = "LINUX";
10579 return elfcore_write_note (abfd, buf, bufsiz,
10580 note_name, NT_PPC_VMX, ppc_vmx, size);
10581}
10582
89eeb0bc
LM
10583char *
10584elfcore_write_ppc_vsx (bfd *abfd,
10585 char *buf,
10586 int *bufsiz,
10587 const void *ppc_vsx,
10588 int size)
10589{
10590 char *note_name = "LINUX";
10591 return elfcore_write_note (abfd, buf, bufsiz,
10592 note_name, NT_PPC_VSX, ppc_vsx, size);
10593}
10594
0675e188
UW
10595static char *
10596elfcore_write_s390_high_gprs (bfd *abfd,
10597 char *buf,
10598 int *bufsiz,
10599 const void *s390_high_gprs,
10600 int size)
10601{
10602 char *note_name = "LINUX";
10603 return elfcore_write_note (abfd, buf, bufsiz,
10604 note_name, NT_S390_HIGH_GPRS,
10605 s390_high_gprs, size);
10606}
10607
d7eeb400
MS
10608char *
10609elfcore_write_s390_timer (bfd *abfd,
10610 char *buf,
10611 int *bufsiz,
10612 const void *s390_timer,
10613 int size)
10614{
10615 char *note_name = "LINUX";
10616 return elfcore_write_note (abfd, buf, bufsiz,
10617 note_name, NT_S390_TIMER, s390_timer, size);
10618}
10619
10620char *
10621elfcore_write_s390_todcmp (bfd *abfd,
10622 char *buf,
10623 int *bufsiz,
10624 const void *s390_todcmp,
10625 int size)
10626{
10627 char *note_name = "LINUX";
10628 return elfcore_write_note (abfd, buf, bufsiz,
10629 note_name, NT_S390_TODCMP, s390_todcmp, size);
10630}
10631
10632char *
10633elfcore_write_s390_todpreg (bfd *abfd,
10634 char *buf,
10635 int *bufsiz,
10636 const void *s390_todpreg,
10637 int size)
10638{
10639 char *note_name = "LINUX";
10640 return elfcore_write_note (abfd, buf, bufsiz,
10641 note_name, NT_S390_TODPREG, s390_todpreg, size);
10642}
10643
10644char *
10645elfcore_write_s390_ctrs (bfd *abfd,
10646 char *buf,
10647 int *bufsiz,
10648 const void *s390_ctrs,
10649 int size)
10650{
10651 char *note_name = "LINUX";
10652 return elfcore_write_note (abfd, buf, bufsiz,
10653 note_name, NT_S390_CTRS, s390_ctrs, size);
10654}
10655
10656char *
10657elfcore_write_s390_prefix (bfd *abfd,
10658 char *buf,
10659 int *bufsiz,
10660 const void *s390_prefix,
10661 int size)
10662{
10663 char *note_name = "LINUX";
10664 return elfcore_write_note (abfd, buf, bufsiz,
10665 note_name, NT_S390_PREFIX, s390_prefix, size);
10666}
10667
355b81d9
UW
10668char *
10669elfcore_write_s390_last_break (bfd *abfd,
10670 char *buf,
10671 int *bufsiz,
10672 const void *s390_last_break,
10673 int size)
10674{
10675 char *note_name = "LINUX";
10676 return elfcore_write_note (abfd, buf, bufsiz,
10677 note_name, NT_S390_LAST_BREAK,
10678 s390_last_break, size);
10679}
10680
10681char *
10682elfcore_write_s390_system_call (bfd *abfd,
10683 char *buf,
10684 int *bufsiz,
10685 const void *s390_system_call,
10686 int size)
10687{
10688 char *note_name = "LINUX";
10689 return elfcore_write_note (abfd, buf, bufsiz,
10690 note_name, NT_S390_SYSTEM_CALL,
10691 s390_system_call, size);
10692}
10693
abb3f6cc
NC
10694char *
10695elfcore_write_s390_tdb (bfd *abfd,
10696 char *buf,
10697 int *bufsiz,
10698 const void *s390_tdb,
10699 int size)
10700{
10701 char *note_name = "LINUX";
10702 return elfcore_write_note (abfd, buf, bufsiz,
10703 note_name, NT_S390_TDB, s390_tdb, size);
10704}
10705
4ef9f41a
AA
10706char *
10707elfcore_write_s390_vxrs_low (bfd *abfd,
10708 char *buf,
10709 int *bufsiz,
10710 const void *s390_vxrs_low,
10711 int size)
10712{
10713 char *note_name = "LINUX";
10714 return elfcore_write_note (abfd, buf, bufsiz,
10715 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
10716}
10717
10718char *
10719elfcore_write_s390_vxrs_high (bfd *abfd,
10720 char *buf,
10721 int *bufsiz,
10722 const void *s390_vxrs_high,
10723 int size)
10724{
10725 char *note_name = "LINUX";
10726 return elfcore_write_note (abfd, buf, bufsiz,
10727 note_name, NT_S390_VXRS_HIGH,
10728 s390_vxrs_high, size);
10729}
10730
faa9a424
UW
10731char *
10732elfcore_write_arm_vfp (bfd *abfd,
10733 char *buf,
10734 int *bufsiz,
10735 const void *arm_vfp,
10736 int size)
10737{
10738 char *note_name = "LINUX";
10739 return elfcore_write_note (abfd, buf, bufsiz,
10740 note_name, NT_ARM_VFP, arm_vfp, size);
10741}
10742
652451f8
YZ
10743char *
10744elfcore_write_aarch_tls (bfd *abfd,
10745 char *buf,
10746 int *bufsiz,
10747 const void *aarch_tls,
10748 int size)
10749{
10750 char *note_name = "LINUX";
10751 return elfcore_write_note (abfd, buf, bufsiz,
10752 note_name, NT_ARM_TLS, aarch_tls, size);
10753}
10754
10755char *
10756elfcore_write_aarch_hw_break (bfd *abfd,
10757 char *buf,
10758 int *bufsiz,
10759 const void *aarch_hw_break,
10760 int size)
10761{
10762 char *note_name = "LINUX";
10763 return elfcore_write_note (abfd, buf, bufsiz,
10764 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
10765}
10766
10767char *
10768elfcore_write_aarch_hw_watch (bfd *abfd,
10769 char *buf,
10770 int *bufsiz,
10771 const void *aarch_hw_watch,
10772 int size)
10773{
10774 char *note_name = "LINUX";
10775 return elfcore_write_note (abfd, buf, bufsiz,
10776 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
10777}
10778
bb864ac1
CES
10779char *
10780elfcore_write_register_note (bfd *abfd,
10781 char *buf,
10782 int *bufsiz,
10783 const char *section,
10784 const void *data,
10785 int size)
10786{
10787 if (strcmp (section, ".reg2") == 0)
10788 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
10789 if (strcmp (section, ".reg-xfp") == 0)
10790 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
10791 if (strcmp (section, ".reg-xstate") == 0)
10792 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
10793 if (strcmp (section, ".reg-ppc-vmx") == 0)
10794 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
10795 if (strcmp (section, ".reg-ppc-vsx") == 0)
10796 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
10797 if (strcmp (section, ".reg-s390-high-gprs") == 0)
10798 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
10799 if (strcmp (section, ".reg-s390-timer") == 0)
10800 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
10801 if (strcmp (section, ".reg-s390-todcmp") == 0)
10802 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
10803 if (strcmp (section, ".reg-s390-todpreg") == 0)
10804 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
10805 if (strcmp (section, ".reg-s390-ctrs") == 0)
10806 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
10807 if (strcmp (section, ".reg-s390-prefix") == 0)
10808 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
355b81d9
UW
10809 if (strcmp (section, ".reg-s390-last-break") == 0)
10810 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
10811 if (strcmp (section, ".reg-s390-system-call") == 0)
10812 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
abb3f6cc
NC
10813 if (strcmp (section, ".reg-s390-tdb") == 0)
10814 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
4ef9f41a
AA
10815 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
10816 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
10817 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
10818 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
faa9a424
UW
10819 if (strcmp (section, ".reg-arm-vfp") == 0)
10820 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
652451f8
YZ
10821 if (strcmp (section, ".reg-aarch-tls") == 0)
10822 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
10823 if (strcmp (section, ".reg-aarch-hw-break") == 0)
10824 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
10825 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
10826 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
bb864ac1
CES
10827 return NULL;
10828}
10829
b34976b6 10830static bfd_boolean
718175fa 10831elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 10832{
c044fabd 10833 char *p;
252b5132 10834
252b5132
RH
10835 p = buf;
10836 while (p < buf + size)
10837 {
c044fabd
KH
10838 /* FIXME: bad alignment assumption. */
10839 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
10840 Elf_Internal_Note in;
10841
baea7ef1
AM
10842 if (offsetof (Elf_External_Note, name) > buf - p + size)
10843 return FALSE;
10844
dc810e39 10845 in.type = H_GET_32 (abfd, xnp->type);
252b5132 10846
dc810e39 10847 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 10848 in.namedata = xnp->name;
baea7ef1
AM
10849 if (in.namesz > buf - in.namedata + size)
10850 return FALSE;
252b5132 10851
dc810e39 10852 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
10853 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
10854 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
10855 if (in.descsz != 0
10856 && (in.descdata >= buf + size
10857 || in.descsz > buf - in.descdata + size))
10858 return FALSE;
252b5132 10859
718175fa
JK
10860 switch (bfd_get_format (abfd))
10861 {
10862 default:
10863 return TRUE;
10864
10865 case bfd_core:
f64e188b 10866 {
8acbedd6 10867#define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
f64e188b 10868 struct
718175fa 10869 {
f64e188b 10870 const char * string;
8acbedd6 10871 size_t len;
f64e188b 10872 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
718175fa 10873 }
f64e188b 10874 grokers[] =
b15fa79e 10875 {
8acbedd6 10876 GROKER_ELEMENT ("", elfcore_grok_note),
aa1ed4a9 10877 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
8acbedd6
KS
10878 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
10879 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
10880 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
10881 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note)
f64e188b 10882 };
8acbedd6 10883#undef GROKER_ELEMENT
f64e188b
NC
10884 int i;
10885
10886 for (i = ARRAY_SIZE (grokers); i--;)
8acbedd6
KS
10887 {
10888 if (in.namesz >= grokers[i].len
10889 && strncmp (in.namedata, grokers[i].string,
10890 grokers[i].len) == 0)
10891 {
10892 if (! grokers[i].func (abfd, & in))
10893 return FALSE;
10894 break;
10895 }
10896 }
f64e188b
NC
10897 break;
10898 }
718175fa
JK
10899
10900 case bfd_object:
10901 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
10902 {
10903 if (! elfobj_grok_gnu_note (abfd, &in))
10904 return FALSE;
10905 }
e21e5835
NC
10906 else if (in.namesz == sizeof "stapsdt"
10907 && strcmp (in.namedata, "stapsdt") == 0)
10908 {
10909 if (! elfobj_grok_stapsdt_note (abfd, &in))
10910 return FALSE;
10911 }
718175fa 10912 break;
08a40648 10913 }
252b5132
RH
10914
10915 p = in.descdata + BFD_ALIGN (in.descsz, 4);
10916 }
10917
718175fa
JK
10918 return TRUE;
10919}
10920
10921static bfd_boolean
10922elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
10923{
10924 char *buf;
10925
10926 if (size <= 0)
10927 return TRUE;
10928
10929 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
10930 return FALSE;
10931
f64e188b 10932 buf = (char *) bfd_malloc (size + 1);
718175fa
JK
10933 if (buf == NULL)
10934 return FALSE;
10935
f64e188b
NC
10936 /* PR 17512: file: ec08f814
10937 0-termintate the buffer so that string searches will not overflow. */
10938 buf[size] = 0;
10939
718175fa
JK
10940 if (bfd_bread (buf, size, abfd) != size
10941 || !elf_parse_notes (abfd, buf, size, offset))
10942 {
10943 free (buf);
10944 return FALSE;
10945 }
10946
252b5132 10947 free (buf);
b34976b6 10948 return TRUE;
252b5132 10949}
98d8431c
JB
10950\f
10951/* Providing external access to the ELF program header table. */
10952
10953/* Return an upper bound on the number of bytes required to store a
10954 copy of ABFD's program header table entries. Return -1 if an error
10955 occurs; bfd_get_error will return an appropriate code. */
c044fabd 10956
98d8431c 10957long
217aa764 10958bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
10959{
10960 if (abfd->xvec->flavour != bfd_target_elf_flavour)
10961 {
10962 bfd_set_error (bfd_error_wrong_format);
10963 return -1;
10964 }
10965
936e320b 10966 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
10967}
10968
98d8431c
JB
10969/* Copy ABFD's program header table entries to *PHDRS. The entries
10970 will be stored as an array of Elf_Internal_Phdr structures, as
10971 defined in include/elf/internal.h. To find out how large the
10972 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
10973
10974 Return the number of program header table entries read, or -1 if an
10975 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 10976
98d8431c 10977int
217aa764 10978bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
10979{
10980 int num_phdrs;
10981
10982 if (abfd->xvec->flavour != bfd_target_elf_flavour)
10983 {
10984 bfd_set_error (bfd_error_wrong_format);
10985 return -1;
10986 }
10987
10988 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 10989 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
10990 num_phdrs * sizeof (Elf_Internal_Phdr));
10991
10992 return num_phdrs;
10993}
ae4221d7 10994
db6751f2 10995enum elf_reloc_type_class
7e612e98
AM
10996_bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
10997 const asection *rel_sec ATTRIBUTE_UNUSED,
10998 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
10999{
11000 return reloc_class_normal;
11001}
f8df10f4 11002
47d9a591 11003/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
11004 relocation against a local symbol. */
11005
11006bfd_vma
217aa764
AM
11007_bfd_elf_rela_local_sym (bfd *abfd,
11008 Elf_Internal_Sym *sym,
8517fae7 11009 asection **psec,
217aa764 11010 Elf_Internal_Rela *rel)
f8df10f4 11011{
8517fae7 11012 asection *sec = *psec;
f8df10f4
JJ
11013 bfd_vma relocation;
11014
11015 relocation = (sec->output_section->vma
11016 + sec->output_offset
11017 + sym->st_value);
11018 if ((sec->flags & SEC_MERGE)
c629eae0 11019 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 11020 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
f8df10f4 11021 {
f8df10f4 11022 rel->r_addend =
8517fae7 11023 _bfd_merged_section_offset (abfd, psec,
65765700 11024 elf_section_data (sec)->sec_info,
753731ee
AM
11025 sym->st_value + rel->r_addend);
11026 if (sec != *psec)
11027 {
11028 /* If we have changed the section, and our original section is
11029 marked with SEC_EXCLUDE, it means that the original
11030 SEC_MERGE section has been completely subsumed in some
11031 other SEC_MERGE section. In this case, we need to leave
11032 some info around for --emit-relocs. */
11033 if ((sec->flags & SEC_EXCLUDE) != 0)
11034 sec->kept_section = *psec;
11035 sec = *psec;
11036 }
8517fae7
AM
11037 rel->r_addend -= relocation;
11038 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
11039 }
11040 return relocation;
11041}
c629eae0
JJ
11042
11043bfd_vma
217aa764
AM
11044_bfd_elf_rel_local_sym (bfd *abfd,
11045 Elf_Internal_Sym *sym,
11046 asection **psec,
11047 bfd_vma addend)
47d9a591 11048{
c629eae0
JJ
11049 asection *sec = *psec;
11050
dbaa2011 11051 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
c629eae0
JJ
11052 return sym->st_value + addend;
11053
11054 return _bfd_merged_section_offset (abfd, psec,
65765700 11055 elf_section_data (sec)->sec_info,
753731ee 11056 sym->st_value + addend);
c629eae0
JJ
11057}
11058
37b01f6a
DG
11059/* Adjust an address within a section. Given OFFSET within SEC, return
11060 the new offset within the section, based upon changes made to the
11061 section. Returns -1 if the offset is now invalid.
11062 The offset (in abnd out) is in target sized bytes, however big a
11063 byte may be. */
11064
c629eae0 11065bfd_vma
217aa764 11066_bfd_elf_section_offset (bfd *abfd,
92e4ec35 11067 struct bfd_link_info *info,
217aa764
AM
11068 asection *sec,
11069 bfd_vma offset)
c629eae0 11070{
68bfbfcc 11071 switch (sec->sec_info_type)
65765700 11072 {
dbaa2011 11073 case SEC_INFO_TYPE_STABS:
eea6121a
AM
11074 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
11075 offset);
dbaa2011 11076 case SEC_INFO_TYPE_EH_FRAME:
92e4ec35 11077 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
37b01f6a 11078
65765700 11079 default:
310fd250
L
11080 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
11081 {
37b01f6a 11082 /* Reverse the offset. */
310fd250
L
11083 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11084 bfd_size_type address_size = bed->s->arch_size / 8;
37b01f6a
DG
11085
11086 /* address_size and sec->size are in octets. Convert
11087 to bytes before subtracting the original offset. */
11088 offset = (sec->size - address_size) / bfd_octets_per_byte (abfd) - offset;
310fd250 11089 }
65765700
JJ
11090 return offset;
11091 }
c629eae0 11092}
3333a7c3
RM
11093\f
11094/* Create a new BFD as if by bfd_openr. Rather than opening a file,
11095 reconstruct an ELF file by reading the segments out of remote memory
11096 based on the ELF file header at EHDR_VMA and the ELF program headers it
11097 points to. If not null, *LOADBASEP is filled in with the difference
11098 between the VMAs from which the segments were read, and the VMAs the
11099 file headers (and hence BFD's idea of each section's VMA) put them at.
11100
11101 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
11102 remote memory at target address VMA into the local buffer at MYADDR; it
11103 should return zero on success or an `errno' code on failure. TEMPL must
11104 be a BFD for an ELF target with the word size and byte order found in
11105 the remote memory. */
11106
11107bfd *
217aa764
AM
11108bfd_elf_bfd_from_remote_memory
11109 (bfd *templ,
11110 bfd_vma ehdr_vma,
f0a5d95a 11111 bfd_size_type size,
217aa764 11112 bfd_vma *loadbasep,
fe78531d 11113 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
3333a7c3
RM
11114{
11115 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
5979d6b6 11116 (templ, ehdr_vma, size, loadbasep, target_read_memory);
3333a7c3 11117}
4c45e5c9
JJ
11118\f
11119long
c9727e01
AM
11120_bfd_elf_get_synthetic_symtab (bfd *abfd,
11121 long symcount ATTRIBUTE_UNUSED,
11122 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 11123 long dynsymcount,
c9727e01
AM
11124 asymbol **dynsyms,
11125 asymbol **ret)
4c45e5c9
JJ
11126{
11127 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11128 asection *relplt;
11129 asymbol *s;
11130 const char *relplt_name;
11131 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
11132 arelent *p;
11133 long count, i, n;
11134 size_t size;
11135 Elf_Internal_Shdr *hdr;
11136 char *names;
11137 asection *plt;
11138
8615f3f2
AM
11139 *ret = NULL;
11140
90e3cdf2
JJ
11141 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
11142 return 0;
11143
8615f3f2
AM
11144 if (dynsymcount <= 0)
11145 return 0;
11146
4c45e5c9
JJ
11147 if (!bed->plt_sym_val)
11148 return 0;
11149
11150 relplt_name = bed->relplt_name;
11151 if (relplt_name == NULL)
d35fd659 11152 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
11153 relplt = bfd_get_section_by_name (abfd, relplt_name);
11154 if (relplt == NULL)
11155 return 0;
11156
11157 hdr = &elf_section_data (relplt)->this_hdr;
11158 if (hdr->sh_link != elf_dynsymtab (abfd)
11159 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
11160 return 0;
11161
11162 plt = bfd_get_section_by_name (abfd, ".plt");
11163 if (plt == NULL)
11164 return 0;
11165
11166 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 11167 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
11168 return -1;
11169
eea6121a 11170 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
11171 size = count * sizeof (asymbol);
11172 p = relplt->relocation;
cb53bf42 11173 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
11174 {
11175 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
11176 if (p->addend != 0)
11177 {
11178#ifdef BFD64
11179 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
11180#else
11181 size += sizeof ("+0x") - 1 + 8;
11182#endif
11183 }
11184 }
4c45e5c9 11185
a50b1753 11186 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
11187 if (s == NULL)
11188 return -1;
11189
11190 names = (char *) (s + count);
11191 p = relplt->relocation;
11192 n = 0;
cb53bf42 11193 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
11194 {
11195 size_t len;
11196 bfd_vma addr;
11197
11198 addr = bed->plt_sym_val (i, plt, p);
11199 if (addr == (bfd_vma) -1)
11200 continue;
11201
11202 *s = **p->sym_ptr_ptr;
65a7a66f
AM
11203 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
11204 we are defining a symbol, ensure one of them is set. */
11205 if ((s->flags & BSF_LOCAL) == 0)
11206 s->flags |= BSF_GLOBAL;
6ba2a415 11207 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
11208 s->section = plt;
11209 s->value = addr - plt->vma;
11210 s->name = names;
8f39ba8e 11211 s->udata.p = NULL;
4c45e5c9
JJ
11212 len = strlen ((*p->sym_ptr_ptr)->name);
11213 memcpy (names, (*p->sym_ptr_ptr)->name, len);
11214 names += len;
041de40d
AM
11215 if (p->addend != 0)
11216 {
1d770845 11217 char buf[30], *a;
d324f6d6 11218
041de40d
AM
11219 memcpy (names, "+0x", sizeof ("+0x") - 1);
11220 names += sizeof ("+0x") - 1;
1d770845
L
11221 bfd_sprintf_vma (abfd, buf, p->addend);
11222 for (a = buf; *a == '0'; ++a)
11223 ;
11224 len = strlen (a);
11225 memcpy (names, a, len);
11226 names += len;
041de40d 11227 }
4c45e5c9
JJ
11228 memcpy (names, "@plt", sizeof ("@plt"));
11229 names += sizeof ("@plt");
8f39ba8e 11230 ++s, ++n;
4c45e5c9
JJ
11231 }
11232
11233 return n;
11234}
3d7f7666 11235
821e6ff6
AM
11236/* It is only used by x86-64 so far.
11237 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
11238 but current usage would allow all of _bfd_std_section to be zero. t*/
3b22753a 11239asection _bfd_elf_large_com_section
821e6ff6
AM
11240 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, NULL,
11241 "LARGE_COMMON", 0, SEC_IS_COMMON);
ecca9871 11242
d1036acb 11243void
78245035
L
11244_bfd_elf_post_process_headers (bfd * abfd,
11245 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
d1036acb
L
11246{
11247 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
11248
11249 i_ehdrp = elf_elfheader (abfd);
11250
11251 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
11252
11253 /* To make things simpler for the loader on Linux systems we set the
9c55345c 11254 osabi field to ELFOSABI_GNU if the binary contains symbols of
f64b2e8d 11255 the STT_GNU_IFUNC type or STB_GNU_UNIQUE binding. */
d8045f23 11256 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
f64b2e8d 11257 && elf_tdata (abfd)->has_gnu_symbols)
9c55345c 11258 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
d1036acb 11259}
fcb93ecf
PB
11260
11261
11262/* Return TRUE for ELF symbol types that represent functions.
11263 This is the default version of this function, which is sufficient for
d8045f23 11264 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
11265
11266bfd_boolean
11267_bfd_elf_is_function_type (unsigned int type)
11268{
d8045f23
NC
11269 return (type == STT_FUNC
11270 || type == STT_GNU_IFUNC);
fcb93ecf 11271}
9f296da3 11272
aef36ac1
AM
11273/* If the ELF symbol SYM might be a function in SEC, return the
11274 function size and set *CODE_OFF to the function's entry point,
11275 otherwise return zero. */
9f296da3 11276
aef36ac1
AM
11277bfd_size_type
11278_bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
11279 bfd_vma *code_off)
9f296da3 11280{
aef36ac1
AM
11281 bfd_size_type size;
11282
ff9e0f5b 11283 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
aef36ac1
AM
11284 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
11285 || sym->section != sec)
11286 return 0;
ff9e0f5b 11287
ff9e0f5b 11288 *code_off = sym->value;
aef36ac1
AM
11289 size = 0;
11290 if (!(sym->flags & BSF_SYNTHETIC))
11291 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
11292 if (size == 0)
11293 size = 1;
11294 return size;
9f296da3 11295}
This page took 1.907856 seconds and 4 git commands to generate.