PR22829, objcopy/strip removes PT_GNU_RELRO from lld binaries
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91 2
219d1afa 3 Copyright (C) 1993-2018 Free Software Foundation, Inc.
252b5132 4
5e8d7549 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
5e8d7549
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
5e8d7549 10 (at your option) any later version.
252b5132 11
5e8d7549
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
5e8d7549 17 You should have received a copy of the GNU General Public License
b34976b6 18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132 22
1b74d094
BW
23/*
24SECTION
252b5132
RH
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
661a3fd4 33 haven't bothered yet. */
252b5132 34
7ee38065
MS
35/* For sparc64-cross-sparc32. */
36#define _SYSCALL32
252b5132 37#include "sysdep.h"
3db64b00 38#include "bfd.h"
252b5132
RH
39#include "bfdlink.h"
40#include "libbfd.h"
41#define ARCH_SIZE 0
42#include "elf-bfd.h"
e0e8c97f 43#include "libiberty.h"
ff59fc36 44#include "safe-ctype.h"
de64ce13 45#include "elf-linux-core.h"
252b5132 46
8bc7f138
L
47#ifdef CORE_HEADER
48#include CORE_HEADER
49#endif
50
217aa764 51static int elf_sort_sections (const void *, const void *);
c84fca4d 52static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764 53static bfd_boolean prep_headers (bfd *);
ef10c3ac 54static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int) ;
276da9b3
L
55static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type,
56 size_t align) ;
718175fa 57static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
276da9b3 58 file_ptr offset, size_t align);
50b2bdb7 59
252b5132
RH
60/* Swap version information in and out. The version information is
61 currently size independent. If that ever changes, this code will
62 need to move into elfcode.h. */
63
64/* Swap in a Verdef structure. */
65
66void
217aa764
AM
67_bfd_elf_swap_verdef_in (bfd *abfd,
68 const Elf_External_Verdef *src,
69 Elf_Internal_Verdef *dst)
252b5132 70{
dc810e39
AM
71 dst->vd_version = H_GET_16 (abfd, src->vd_version);
72 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
73 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
74 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
75 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
76 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
77 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
78}
79
80/* Swap out a Verdef structure. */
81
82void
217aa764
AM
83_bfd_elf_swap_verdef_out (bfd *abfd,
84 const Elf_Internal_Verdef *src,
85 Elf_External_Verdef *dst)
252b5132 86{
dc810e39
AM
87 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
88 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
89 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
90 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
91 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
92 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
93 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
94}
95
96/* Swap in a Verdaux structure. */
97
98void
217aa764
AM
99_bfd_elf_swap_verdaux_in (bfd *abfd,
100 const Elf_External_Verdaux *src,
101 Elf_Internal_Verdaux *dst)
252b5132 102{
dc810e39
AM
103 dst->vda_name = H_GET_32 (abfd, src->vda_name);
104 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
105}
106
107/* Swap out a Verdaux structure. */
108
109void
217aa764
AM
110_bfd_elf_swap_verdaux_out (bfd *abfd,
111 const Elf_Internal_Verdaux *src,
112 Elf_External_Verdaux *dst)
252b5132 113{
dc810e39
AM
114 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
115 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
116}
117
118/* Swap in a Verneed structure. */
119
120void
217aa764
AM
121_bfd_elf_swap_verneed_in (bfd *abfd,
122 const Elf_External_Verneed *src,
123 Elf_Internal_Verneed *dst)
252b5132 124{
dc810e39
AM
125 dst->vn_version = H_GET_16 (abfd, src->vn_version);
126 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
127 dst->vn_file = H_GET_32 (abfd, src->vn_file);
128 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
129 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
130}
131
132/* Swap out a Verneed structure. */
133
134void
217aa764
AM
135_bfd_elf_swap_verneed_out (bfd *abfd,
136 const Elf_Internal_Verneed *src,
137 Elf_External_Verneed *dst)
252b5132 138{
dc810e39
AM
139 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
140 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
141 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
142 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
143 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
144}
145
146/* Swap in a Vernaux structure. */
147
148void
217aa764
AM
149_bfd_elf_swap_vernaux_in (bfd *abfd,
150 const Elf_External_Vernaux *src,
151 Elf_Internal_Vernaux *dst)
252b5132 152{
dc810e39
AM
153 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
154 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
155 dst->vna_other = H_GET_16 (abfd, src->vna_other);
156 dst->vna_name = H_GET_32 (abfd, src->vna_name);
157 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
158}
159
160/* Swap out a Vernaux structure. */
161
162void
217aa764
AM
163_bfd_elf_swap_vernaux_out (bfd *abfd,
164 const Elf_Internal_Vernaux *src,
165 Elf_External_Vernaux *dst)
252b5132 166{
dc810e39
AM
167 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
168 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
169 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
170 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
171 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
172}
173
174/* Swap in a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_in (bfd *abfd,
178 const Elf_External_Versym *src,
179 Elf_Internal_Versym *dst)
252b5132 180{
dc810e39 181 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
182}
183
184/* Swap out a Versym structure. */
185
186void
217aa764
AM
187_bfd_elf_swap_versym_out (bfd *abfd,
188 const Elf_Internal_Versym *src,
189 Elf_External_Versym *dst)
252b5132 190{
dc810e39 191 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
192}
193
194/* Standard ELF hash function. Do not change this function; you will
195 cause invalid hash tables to be generated. */
3a99b017 196
252b5132 197unsigned long
217aa764 198bfd_elf_hash (const char *namearg)
252b5132 199{
3a99b017 200 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
201 unsigned long h = 0;
202 unsigned long g;
203 int ch;
204
205 while ((ch = *name++) != '\0')
206 {
207 h = (h << 4) + ch;
208 if ((g = (h & 0xf0000000)) != 0)
209 {
210 h ^= g >> 24;
211 /* The ELF ABI says `h &= ~g', but this is equivalent in
212 this case and on some machines one insn instead of two. */
213 h ^= g;
214 }
215 }
32dfa85d 216 return h & 0xffffffff;
252b5132
RH
217}
218
fdc90cb4
JJ
219/* DT_GNU_HASH hash function. Do not change this function; you will
220 cause invalid hash tables to be generated. */
221
222unsigned long
223bfd_elf_gnu_hash (const char *namearg)
224{
225 const unsigned char *name = (const unsigned char *) namearg;
226 unsigned long h = 5381;
227 unsigned char ch;
228
229 while ((ch = *name++) != '\0')
230 h = (h << 5) + h + ch;
231 return h & 0xffffffff;
232}
233
0c8d6e5c
AM
234/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
235 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 236bfd_boolean
0c8d6e5c 237bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 238 size_t object_size,
4dfe6ac6 239 enum elf_target_id object_id)
252b5132 240{
0ffa91dd
NC
241 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
242 abfd->tdata.any = bfd_zalloc (abfd, object_size);
243 if (abfd->tdata.any == NULL)
244 return FALSE;
252b5132 245
0ffa91dd 246 elf_object_id (abfd) = object_id;
c0355132
AM
247 if (abfd->direction != read_direction)
248 {
249 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
250 if (o == NULL)
251 return FALSE;
252 elf_tdata (abfd)->o = o;
253 elf_program_header_size (abfd) = (bfd_size_type) -1;
254 }
b34976b6 255 return TRUE;
252b5132
RH
256}
257
0ffa91dd
NC
258
259bfd_boolean
ae95ffa6 260bfd_elf_make_object (bfd *abfd)
0ffa91dd 261{
ae95ffa6 262 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 263 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 264 bed->target_id);
0ffa91dd
NC
265}
266
b34976b6 267bfd_boolean
217aa764 268bfd_elf_mkcorefile (bfd *abfd)
252b5132 269{
c044fabd 270 /* I think this can be done just like an object file. */
228e534f
AM
271 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
272 return FALSE;
273 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
274 return elf_tdata (abfd)->core != NULL;
252b5132
RH
275}
276
72a80a16 277static char *
217aa764 278bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
279{
280 Elf_Internal_Shdr **i_shdrp;
f075ee0c 281 bfd_byte *shstrtab = NULL;
dc810e39
AM
282 file_ptr offset;
283 bfd_size_type shstrtabsize;
252b5132
RH
284
285 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
286 if (i_shdrp == 0
287 || shindex >= elf_numsections (abfd)
288 || i_shdrp[shindex] == 0)
f075ee0c 289 return NULL;
252b5132 290
f075ee0c 291 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
292 if (shstrtab == NULL)
293 {
c044fabd 294 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
295 offset = i_shdrp[shindex]->sh_offset;
296 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
297
298 /* Allocate and clear an extra byte at the end, to prevent crashes
299 in case the string table is not terminated. */
3471d59d 300 if (shstrtabsize + 1 <= 1
06614111
NC
301 || bfd_seek (abfd, offset, SEEK_SET) != 0
302 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL)
c6c60d09
JJ
303 shstrtab = NULL;
304 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
305 {
306 if (bfd_get_error () != bfd_error_system_call)
307 bfd_set_error (bfd_error_file_truncated);
06614111 308 bfd_release (abfd, shstrtab);
c6c60d09 309 shstrtab = NULL;
3471d59d
CC
310 /* Once we've failed to read it, make sure we don't keep
311 trying. Otherwise, we'll keep allocating space for
312 the string table over and over. */
313 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
314 }
315 else
316 shstrtab[shstrtabsize] = '\0';
217aa764 317 i_shdrp[shindex]->contents = shstrtab;
252b5132 318 }
f075ee0c 319 return (char *) shstrtab;
252b5132
RH
320}
321
322char *
217aa764
AM
323bfd_elf_string_from_elf_section (bfd *abfd,
324 unsigned int shindex,
325 unsigned int strindex)
252b5132
RH
326{
327 Elf_Internal_Shdr *hdr;
328
329 if (strindex == 0)
330 return "";
331
74f2e02b
AM
332 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
333 return NULL;
334
252b5132
RH
335 hdr = elf_elfsections (abfd)[shindex];
336
06614111
NC
337 if (hdr->contents == NULL)
338 {
339 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
340 {
341 /* PR 17512: file: f057ec89. */
695344c0 342 /* xgettext:c-format */
63a5468a
AM
343 _bfd_error_handler (_("%B: attempt to load strings from"
344 " a non-string section (number %d)"),
06614111
NC
345 abfd, shindex);
346 return NULL;
347 }
b1fa9dd6 348
06614111
NC
349 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
350 return NULL;
351 }
252b5132
RH
352
353 if (strindex >= hdr->sh_size)
354 {
1b3a8575 355 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
4eca0228 356 _bfd_error_handler
695344c0 357 /* xgettext:c-format */
d42c267e
AM
358 (_("%B: invalid string offset %u >= %Lu for section `%s'"),
359 abfd, strindex, hdr->sh_size,
1b3a8575 360 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 361 ? ".shstrtab"
1b3a8575 362 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 363 return NULL;
252b5132
RH
364 }
365
366 return ((char *) hdr->contents) + strindex;
367}
368
6cdc0ccc
AM
369/* Read and convert symbols to internal format.
370 SYMCOUNT specifies the number of symbols to read, starting from
371 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
372 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
373 symbols, and symbol section index extensions, respectively.
374 Returns a pointer to the internal symbol buffer (malloced if necessary)
375 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
376
377Elf_Internal_Sym *
217aa764
AM
378bfd_elf_get_elf_syms (bfd *ibfd,
379 Elf_Internal_Shdr *symtab_hdr,
380 size_t symcount,
381 size_t symoffset,
382 Elf_Internal_Sym *intsym_buf,
383 void *extsym_buf,
384 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
385{
386 Elf_Internal_Shdr *shndx_hdr;
217aa764 387 void *alloc_ext;
df622259 388 const bfd_byte *esym;
6cdc0ccc
AM
389 Elf_External_Sym_Shndx *alloc_extshndx;
390 Elf_External_Sym_Shndx *shndx;
4dd07732 391 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
392 Elf_Internal_Sym *isym;
393 Elf_Internal_Sym *isymend;
9c5bfbb7 394 const struct elf_backend_data *bed;
6cdc0ccc
AM
395 size_t extsym_size;
396 bfd_size_type amt;
397 file_ptr pos;
398
e44a2c9c
AM
399 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
400 abort ();
401
6cdc0ccc
AM
402 if (symcount == 0)
403 return intsym_buf;
404
405 /* Normal syms might have section extension entries. */
406 shndx_hdr = NULL;
6a40cf0c
NC
407 if (elf_symtab_shndx_list (ibfd) != NULL)
408 {
409 elf_section_list * entry;
410 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
411
412 /* Find an index section that is linked to this symtab section. */
413 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
315350be
NC
414 {
415 /* PR 20063. */
416 if (entry->hdr.sh_link >= elf_numsections (ibfd))
417 continue;
418
419 if (sections[entry->hdr.sh_link] == symtab_hdr)
420 {
421 shndx_hdr = & entry->hdr;
422 break;
423 };
424 }
6a40cf0c
NC
425
426 if (shndx_hdr == NULL)
427 {
428 if (symtab_hdr == & elf_symtab_hdr (ibfd))
429 /* Not really accurate, but this was how the old code used to work. */
430 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
431 /* Otherwise we do nothing. The assumption is that
432 the index table will not be needed. */
433 }
434 }
6cdc0ccc
AM
435
436 /* Read the symbols. */
437 alloc_ext = NULL;
438 alloc_extshndx = NULL;
4dd07732 439 alloc_intsym = NULL;
6cdc0ccc
AM
440 bed = get_elf_backend_data (ibfd);
441 extsym_size = bed->s->sizeof_sym;
ef53be89 442 amt = (bfd_size_type) symcount * extsym_size;
6cdc0ccc
AM
443 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
444 if (extsym_buf == NULL)
445 {
d0fb9a8d 446 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
447 extsym_buf = alloc_ext;
448 }
449 if (extsym_buf == NULL
450 || bfd_seek (ibfd, pos, SEEK_SET) != 0
451 || bfd_bread (extsym_buf, amt, ibfd) != amt)
452 {
453 intsym_buf = NULL;
454 goto out;
455 }
456
457 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
458 extshndx_buf = NULL;
459 else
460 {
ef53be89 461 amt = (bfd_size_type) symcount * sizeof (Elf_External_Sym_Shndx);
6cdc0ccc
AM
462 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
463 if (extshndx_buf == NULL)
464 {
a50b1753 465 alloc_extshndx = (Elf_External_Sym_Shndx *)
07d6d2b8 466 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
467 extshndx_buf = alloc_extshndx;
468 }
469 if (extshndx_buf == NULL
470 || bfd_seek (ibfd, pos, SEEK_SET) != 0
471 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
472 {
473 intsym_buf = NULL;
474 goto out;
475 }
476 }
477
478 if (intsym_buf == NULL)
479 {
a50b1753 480 alloc_intsym = (Elf_Internal_Sym *)
07d6d2b8 481 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 482 intsym_buf = alloc_intsym;
6cdc0ccc
AM
483 if (intsym_buf == NULL)
484 goto out;
485 }
486
487 /* Convert the symbols to internal form. */
488 isymend = intsym_buf + symcount;
a50b1753 489 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
07d6d2b8 490 shndx = extshndx_buf;
6cdc0ccc
AM
491 isym < isymend;
492 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
493 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
494 {
495 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
695344c0 496 /* xgettext:c-format */
63a5468a
AM
497 _bfd_error_handler (_("%B symbol number %lu references"
498 " nonexistent SHT_SYMTAB_SHNDX section"),
4eca0228 499 ibfd, (unsigned long) symoffset);
4dd07732
AM
500 if (alloc_intsym != NULL)
501 free (alloc_intsym);
8384fb8f
AM
502 intsym_buf = NULL;
503 goto out;
504 }
6cdc0ccc
AM
505
506 out:
507 if (alloc_ext != NULL)
508 free (alloc_ext);
509 if (alloc_extshndx != NULL)
510 free (alloc_extshndx);
511
512 return intsym_buf;
513}
514
5cab59f6
AM
515/* Look up a symbol name. */
516const char *
be8dd2ca
AM
517bfd_elf_sym_name (bfd *abfd,
518 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
519 Elf_Internal_Sym *isym,
520 asection *sym_sec)
5cab59f6 521{
26c61ae5 522 const char *name;
5cab59f6 523 unsigned int iname = isym->st_name;
be8dd2ca 524 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 525
138f35cc
JJ
526 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
527 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 528 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
529 {
530 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
531 shindex = elf_elfheader (abfd)->e_shstrndx;
532 }
533
26c61ae5
L
534 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
535 if (name == NULL)
536 name = "(null)";
537 else if (sym_sec && *name == '\0')
538 name = bfd_section_name (abfd, sym_sec);
539
540 return name;
5cab59f6
AM
541}
542
dbb410c3
AM
543/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
544 sections. The first element is the flags, the rest are section
545 pointers. */
546
547typedef union elf_internal_group {
548 Elf_Internal_Shdr *shdr;
549 unsigned int flags;
550} Elf_Internal_Group;
551
b885599b
AM
552/* Return the name of the group signature symbol. Why isn't the
553 signature just a string? */
554
555static const char *
217aa764 556group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 557{
9dce4196 558 Elf_Internal_Shdr *hdr;
9dce4196
AM
559 unsigned char esym[sizeof (Elf64_External_Sym)];
560 Elf_External_Sym_Shndx eshndx;
561 Elf_Internal_Sym isym;
b885599b 562
13792e9d
L
563 /* First we need to ensure the symbol table is available. Make sure
564 that it is a symbol table section. */
4fbb74a6
AM
565 if (ghdr->sh_link >= elf_numsections (abfd))
566 return NULL;
13792e9d
L
567 hdr = elf_elfsections (abfd) [ghdr->sh_link];
568 if (hdr->sh_type != SHT_SYMTAB
569 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
570 return NULL;
571
9dce4196
AM
572 /* Go read the symbol. */
573 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
574 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
575 &isym, esym, &eshndx) == NULL)
b885599b 576 return NULL;
9dce4196 577
26c61ae5 578 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
579}
580
dbb410c3
AM
581/* Set next_in_group list pointer, and group name for NEWSECT. */
582
b34976b6 583static bfd_boolean
217aa764 584setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
585{
586 unsigned int num_group = elf_tdata (abfd)->num_group;
587
588 /* If num_group is zero, read in all SHT_GROUP sections. The count
589 is set to -1 if there are no SHT_GROUP sections. */
590 if (num_group == 0)
591 {
592 unsigned int i, shnum;
593
594 /* First count the number of groups. If we have a SHT_GROUP
595 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 596 shnum = elf_numsections (abfd);
dbb410c3 597 num_group = 0;
08a40648 598
44534af3 599#define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
1783205a 600 ( (shdr)->sh_type == SHT_GROUP \
44534af3 601 && (shdr)->sh_size >= minsize \
1783205a
NC
602 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
603 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 604
dbb410c3
AM
605 for (i = 0; i < shnum; i++)
606 {
607 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 608
44534af3 609 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3
AM
610 num_group += 1;
611 }
612
613 if (num_group == 0)
20dbb49d
L
614 {
615 num_group = (unsigned) -1;
616 elf_tdata (abfd)->num_group = num_group;
ce497010 617 elf_tdata (abfd)->group_sect_ptr = NULL;
20dbb49d
L
618 }
619 else
dbb410c3
AM
620 {
621 /* We keep a list of elf section headers for group sections,
622 so we can find them quickly. */
20dbb49d 623 bfd_size_type amt;
d0fb9a8d 624
20dbb49d 625 elf_tdata (abfd)->num_group = num_group;
a50b1753 626 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
07d6d2b8 627 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 628 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 629 return FALSE;
ce497010 630 memset (elf_tdata (abfd)->group_sect_ptr, 0, num_group * sizeof (Elf_Internal_Shdr *));
dbb410c3 631 num_group = 0;
ce497010 632
dbb410c3
AM
633 for (i = 0; i < shnum; i++)
634 {
635 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 636
44534af3 637 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3 638 {
973ffd63 639 unsigned char *src;
dbb410c3
AM
640 Elf_Internal_Group *dest;
641
07d6d2b8
AM
642 /* Make sure the group section has a BFD section
643 attached to it. */
644 if (!bfd_section_from_shdr (abfd, i))
645 return FALSE;
646
dbb410c3
AM
647 /* Add to list of sections. */
648 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
649 num_group += 1;
650
651 /* Read the raw contents. */
652 BFD_ASSERT (sizeof (*dest) >= 4);
653 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753 654 shdr->contents = (unsigned char *)
07d6d2b8 655 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
656 /* PR binutils/4110: Handle corrupt group headers. */
657 if (shdr->contents == NULL)
658 {
659 _bfd_error_handler
695344c0 660 /* xgettext:c-format */
63a5468a 661 (_("%B: corrupt size field in group section"
76cfced5 662 " header: %#Lx"), abfd, shdr->sh_size);
1783205a 663 bfd_set_error (bfd_error_bad_value);
493a3386
NC
664 -- num_group;
665 continue;
1783205a
NC
666 }
667
668 memset (shdr->contents, 0, amt);
669
670 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
671 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
672 != shdr->sh_size))
493a3386
NC
673 {
674 _bfd_error_handler
695344c0 675 /* xgettext:c-format */
63a5468a 676 (_("%B: invalid size field in group section"
76cfced5 677 " header: %#Lx"), abfd, shdr->sh_size);
493a3386
NC
678 bfd_set_error (bfd_error_bad_value);
679 -- num_group;
63a5468a
AM
680 /* PR 17510: If the group contents are even
681 partially corrupt, do not allow any of the
682 contents to be used. */
493a3386
NC
683 memset (shdr->contents, 0, amt);
684 continue;
685 }
708d7d0d 686
dbb410c3
AM
687 /* Translate raw contents, a flag word followed by an
688 array of elf section indices all in target byte order,
689 to the flag word followed by an array of elf section
690 pointers. */
691 src = shdr->contents + shdr->sh_size;
692 dest = (Elf_Internal_Group *) (shdr->contents + amt);
06614111 693
dbb410c3
AM
694 while (1)
695 {
696 unsigned int idx;
697
698 src -= 4;
699 --dest;
700 idx = H_GET_32 (abfd, src);
701 if (src == shdr->contents)
702 {
703 dest->flags = idx;
b885599b
AM
704 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
705 shdr->bfd_section->flags
706 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
707 break;
708 }
709 if (idx >= shnum)
710 {
4eca0228
AM
711 _bfd_error_handler
712 (_("%B: invalid SHT_GROUP entry"), abfd);
dbb410c3
AM
713 idx = 0;
714 }
715 dest->shdr = elf_elfsections (abfd)[idx];
716 }
717 }
718 }
493a3386
NC
719
720 /* PR 17510: Corrupt binaries might contain invalid groups. */
721 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
722 {
723 elf_tdata (abfd)->num_group = num_group;
724
725 /* If all groups are invalid then fail. */
726 if (num_group == 0)
727 {
728 elf_tdata (abfd)->group_sect_ptr = NULL;
729 elf_tdata (abfd)->num_group = num_group = -1;
4eca0228
AM
730 _bfd_error_handler
731 (_("%B: no valid group sections found"), abfd);
493a3386
NC
732 bfd_set_error (bfd_error_bad_value);
733 }
734 }
dbb410c3
AM
735 }
736 }
737
738 if (num_group != (unsigned) -1)
739 {
564e11c9
JW
740 unsigned int search_offset = elf_tdata (abfd)->group_search_offset;
741 unsigned int j;
dbb410c3 742
564e11c9 743 for (j = 0; j < num_group; j++)
dbb410c3 744 {
564e11c9
JW
745 /* Begin search from previous found group. */
746 unsigned i = (j + search_offset) % num_group;
747
dbb410c3 748 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
ce497010 749 Elf_Internal_Group *idx;
0c54f692 750 bfd_size_type n_elt;
ce497010
NC
751
752 if (shdr == NULL)
753 continue;
754
755 idx = (Elf_Internal_Group *) shdr->contents;
0c54f692
NC
756 if (idx == NULL || shdr->sh_size < 4)
757 {
758 /* See PR 21957 for a reproducer. */
759 /* xgettext:c-format */
760 _bfd_error_handler (_("%B: group section '%A' has no contents"),
761 abfd, shdr->bfd_section);
762 elf_tdata (abfd)->group_sect_ptr[i] = NULL;
763 bfd_set_error (bfd_error_bad_value);
764 return FALSE;
765 }
ce497010 766 n_elt = shdr->sh_size / 4;
dbb410c3
AM
767
768 /* Look through this group's sections to see if current
769 section is a member. */
770 while (--n_elt != 0)
771 if ((++idx)->shdr == hdr)
772 {
e0e8c97f 773 asection *s = NULL;
dbb410c3
AM
774
775 /* We are a member of this group. Go looking through
776 other members to see if any others are linked via
777 next_in_group. */
778 idx = (Elf_Internal_Group *) shdr->contents;
779 n_elt = shdr->sh_size / 4;
780 while (--n_elt != 0)
781 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 782 && elf_next_in_group (s) != NULL)
dbb410c3
AM
783 break;
784 if (n_elt != 0)
785 {
dbb410c3
AM
786 /* Snarf the group name from other member, and
787 insert current section in circular list. */
945906ff
AM
788 elf_group_name (newsect) = elf_group_name (s);
789 elf_next_in_group (newsect) = elf_next_in_group (s);
790 elf_next_in_group (s) = newsect;
dbb410c3
AM
791 }
792 else
793 {
dbb410c3
AM
794 const char *gname;
795
b885599b
AM
796 gname = group_signature (abfd, shdr);
797 if (gname == NULL)
b34976b6 798 return FALSE;
945906ff 799 elf_group_name (newsect) = gname;
dbb410c3
AM
800
801 /* Start a circular list with one element. */
945906ff 802 elf_next_in_group (newsect) = newsect;
dbb410c3 803 }
b885599b 804
9dce4196
AM
805 /* If the group section has been created, point to the
806 new member. */
dbb410c3 807 if (shdr->bfd_section != NULL)
945906ff 808 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 809
564e11c9
JW
810 elf_tdata (abfd)->group_search_offset = i;
811 j = num_group - 1;
dbb410c3
AM
812 break;
813 }
814 }
815 }
816
945906ff 817 if (elf_group_name (newsect) == NULL)
dbb410c3 818 {
695344c0 819 /* xgettext:c-format */
0c54f692 820 _bfd_error_handler (_("%B: no group info for section '%A'"),
4eca0228 821 abfd, newsect);
493a3386 822 return FALSE;
dbb410c3 823 }
b34976b6 824 return TRUE;
dbb410c3
AM
825}
826
3d7f7666 827bfd_boolean
dd863624 828_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
829{
830 unsigned int i;
831 unsigned int num_group = elf_tdata (abfd)->num_group;
832 bfd_boolean result = TRUE;
dd863624
L
833 asection *s;
834
835 /* Process SHF_LINK_ORDER. */
836 for (s = abfd->sections; s != NULL; s = s->next)
837 {
838 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
839 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
840 {
841 unsigned int elfsec = this_hdr->sh_link;
842 /* FIXME: The old Intel compiler and old strip/objcopy may
843 not set the sh_link or sh_info fields. Hence we could
844 get the situation where elfsec is 0. */
845 if (elfsec == 0)
846 {
4fbb74a6 847 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
848 if (bed->link_order_error_handler)
849 bed->link_order_error_handler
695344c0 850 /* xgettext:c-format */
dd863624
L
851 (_("%B: warning: sh_link not set for section `%A'"),
852 abfd, s);
853 }
854 else
855 {
91d6fa6a 856 asection *linksec = NULL;
25bbc984 857
4fbb74a6
AM
858 if (elfsec < elf_numsections (abfd))
859 {
860 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 861 linksec = this_hdr->bfd_section;
4fbb74a6 862 }
25bbc984
L
863
864 /* PR 1991, 2008:
865 Some strip/objcopy may leave an incorrect value in
866 sh_link. We don't want to proceed. */
91d6fa6a 867 if (linksec == NULL)
25bbc984 868 {
4eca0228 869 _bfd_error_handler
695344c0 870 /* xgettext:c-format */
25bbc984 871 (_("%B: sh_link [%d] in section `%A' is incorrect"),
c08bb8dd 872 s->owner, elfsec, s);
25bbc984
L
873 result = FALSE;
874 }
875
91d6fa6a 876 elf_linked_to_section (s) = linksec;
dd863624
L
877 }
878 }
53720c49
AM
879 else if (this_hdr->sh_type == SHT_GROUP
880 && elf_next_in_group (s) == NULL)
881 {
4eca0228 882 _bfd_error_handler
695344c0 883 /* xgettext:c-format */
53720c49
AM
884 (_("%B: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
885 abfd, elf_section_data (s)->this_idx);
886 result = FALSE;
887 }
dd863624 888 }
3d7f7666 889
dd863624 890 /* Process section groups. */
3d7f7666
L
891 if (num_group == (unsigned) -1)
892 return result;
893
894 for (i = 0; i < num_group; i++)
895 {
896 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
4b0e8a5f
NC
897 Elf_Internal_Group *idx;
898 unsigned int n_elt;
3d7f7666 899
4b0e8a5f
NC
900 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
901 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
902 {
4eca0228 903 _bfd_error_handler
695344c0 904 /* xgettext:c-format */
4b0e8a5f
NC
905 (_("%B: section group entry number %u is corrupt"),
906 abfd, i);
907 result = FALSE;
908 continue;
909 }
910
911 idx = (Elf_Internal_Group *) shdr->contents;
912 n_elt = shdr->sh_size / 4;
1b786873 913
3d7f7666 914 while (--n_elt != 0)
24d3e51b
NC
915 {
916 ++ idx;
917
918 if (idx->shdr == NULL)
919 continue;
920 else if (idx->shdr->bfd_section)
921 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
db4677b8
AM
922 else if (idx->shdr->sh_type != SHT_RELA
923 && idx->shdr->sh_type != SHT_REL)
24d3e51b
NC
924 {
925 /* There are some unknown sections in the group. */
926 _bfd_error_handler
927 /* xgettext:c-format */
928 (_("%B: unknown type [%#x] section `%s' in group [%A]"),
929 abfd,
930 idx->shdr->sh_type,
931 bfd_elf_string_from_elf_section (abfd,
932 (elf_elfheader (abfd)
933 ->e_shstrndx),
934 idx->shdr->sh_name),
935 shdr->bfd_section);
936 result = FALSE;
937 }
938 }
3d7f7666 939 }
24d3e51b 940
3d7f7666
L
941 return result;
942}
943
72adc230
AM
944bfd_boolean
945bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
946{
947 return elf_next_in_group (sec) != NULL;
948}
949
f6fe1ccd
L
950static char *
951convert_debug_to_zdebug (bfd *abfd, const char *name)
952{
953 unsigned int len = strlen (name);
954 char *new_name = bfd_alloc (abfd, len + 2);
955 if (new_name == NULL)
956 return NULL;
957 new_name[0] = '.';
958 new_name[1] = 'z';
959 memcpy (new_name + 2, name + 1, len);
960 return new_name;
961}
962
963static char *
964convert_zdebug_to_debug (bfd *abfd, const char *name)
965{
966 unsigned int len = strlen (name);
967 char *new_name = bfd_alloc (abfd, len);
968 if (new_name == NULL)
969 return NULL;
970 new_name[0] = '.';
971 memcpy (new_name + 1, name + 2, len - 1);
972 return new_name;
973}
974
252b5132
RH
975/* Make a BFD section from an ELF section. We store a pointer to the
976 BFD section in the bfd_section field of the header. */
977
b34976b6 978bfd_boolean
217aa764
AM
979_bfd_elf_make_section_from_shdr (bfd *abfd,
980 Elf_Internal_Shdr *hdr,
6dc132d9
L
981 const char *name,
982 int shindex)
252b5132
RH
983{
984 asection *newsect;
985 flagword flags;
9c5bfbb7 986 const struct elf_backend_data *bed;
252b5132
RH
987
988 if (hdr->bfd_section != NULL)
4e011fb5 989 return TRUE;
252b5132
RH
990
991 newsect = bfd_make_section_anyway (abfd, name);
992 if (newsect == NULL)
b34976b6 993 return FALSE;
252b5132 994
1829f4b2
AM
995 hdr->bfd_section = newsect;
996 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 997 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 998
2f89ff8d
L
999 /* Always use the real type/flags. */
1000 elf_section_type (newsect) = hdr->sh_type;
1001 elf_section_flags (newsect) = hdr->sh_flags;
1002
252b5132
RH
1003 newsect->filepos = hdr->sh_offset;
1004
1005 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
1006 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
1007 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 1008 bfd_log2 (hdr->sh_addralign)))
b34976b6 1009 return FALSE;
252b5132
RH
1010
1011 flags = SEC_NO_FLAGS;
1012 if (hdr->sh_type != SHT_NOBITS)
1013 flags |= SEC_HAS_CONTENTS;
dbb410c3 1014 if (hdr->sh_type == SHT_GROUP)
7bdf4127 1015 flags |= SEC_GROUP;
252b5132
RH
1016 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1017 {
1018 flags |= SEC_ALLOC;
1019 if (hdr->sh_type != SHT_NOBITS)
1020 flags |= SEC_LOAD;
1021 }
1022 if ((hdr->sh_flags & SHF_WRITE) == 0)
1023 flags |= SEC_READONLY;
1024 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
1025 flags |= SEC_CODE;
1026 else if ((flags & SEC_LOAD) != 0)
1027 flags |= SEC_DATA;
f5fa8ca2
JJ
1028 if ((hdr->sh_flags & SHF_MERGE) != 0)
1029 {
1030 flags |= SEC_MERGE;
1031 newsect->entsize = hdr->sh_entsize;
f5fa8ca2 1032 }
84865015
NC
1033 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1034 flags |= SEC_STRINGS;
dbb410c3
AM
1035 if (hdr->sh_flags & SHF_GROUP)
1036 if (!setup_group (abfd, hdr, newsect))
b34976b6 1037 return FALSE;
13ae64f3
JJ
1038 if ((hdr->sh_flags & SHF_TLS) != 0)
1039 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
1040 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1041 flags |= SEC_EXCLUDE;
252b5132 1042
3d2b39cf 1043 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 1044 {
3d2b39cf
L
1045 /* The debugging sections appear to be recognized only by name,
1046 not any sort of flag. Their SEC_ALLOC bits are cleared. */
3d2b39cf
L
1047 if (name [0] == '.')
1048 {
f073ced3
AM
1049 const char *p;
1050 int n;
1051 if (name[1] == 'd')
1052 p = ".debug", n = 6;
1053 else if (name[1] == 'g' && name[2] == 'n')
1054 p = ".gnu.linkonce.wi.", n = 17;
1055 else if (name[1] == 'g' && name[2] == 'd')
1056 p = ".gdb_index", n = 11; /* yes we really do mean 11. */
1057 else if (name[1] == 'l')
1058 p = ".line", n = 5;
1059 else if (name[1] == 's')
1060 p = ".stab", n = 5;
1061 else if (name[1] == 'z')
1062 p = ".zdebug", n = 7;
1063 else
1064 p = NULL, n = 0;
1065 if (p != NULL && strncmp (name, p, n) == 0)
3d2b39cf
L
1066 flags |= SEC_DEBUGGING;
1067 }
1068 }
252b5132
RH
1069
1070 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1071 only link a single copy of the section. This is used to support
1072 g++. g++ will emit each template expansion in its own section.
1073 The symbols will be defined as weak, so that multiple definitions
1074 are permitted. The GNU linker extension is to actually discard
1075 all but one of the sections. */
0112cd26 1076 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 1077 && elf_next_in_group (newsect) == NULL)
252b5132
RH
1078 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1079
fa152c49
JW
1080 bed = get_elf_backend_data (abfd);
1081 if (bed->elf_backend_section_flags)
1082 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 1083 return FALSE;
fa152c49 1084
252b5132 1085 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 1086 return FALSE;
252b5132 1087
718175fa
JK
1088 /* We do not parse the PT_NOTE segments as we are interested even in the
1089 separate debug info files which may have the segments offsets corrupted.
1090 PT_NOTEs from the core files are currently not parsed using BFD. */
1091 if (hdr->sh_type == SHT_NOTE)
1092 {
baea7ef1 1093 bfd_byte *contents;
718175fa 1094
baea7ef1 1095 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
1096 return FALSE;
1097
276da9b3
L
1098 elf_parse_notes (abfd, (char *) contents, hdr->sh_size,
1099 hdr->sh_offset, hdr->sh_addralign);
718175fa
JK
1100 free (contents);
1101 }
1102
252b5132
RH
1103 if ((flags & SEC_ALLOC) != 0)
1104 {
1105 Elf_Internal_Phdr *phdr;
6ffd7900
AM
1106 unsigned int i, nload;
1107
1108 /* Some ELF linkers produce binaries with all the program header
1109 p_paddr fields zero. If we have such a binary with more than
1110 one PT_LOAD header, then leave the section lma equal to vma
1111 so that we don't create sections with overlapping lma. */
1112 phdr = elf_tdata (abfd)->phdr;
1113 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1114 if (phdr->p_paddr != 0)
1115 break;
1116 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1117 ++nload;
1118 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1119 return TRUE;
252b5132 1120
252b5132
RH
1121 phdr = elf_tdata (abfd)->phdr;
1122 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1123 {
86b2281f
AM
1124 if (((phdr->p_type == PT_LOAD
1125 && (hdr->sh_flags & SHF_TLS) == 0)
1126 || phdr->p_type == PT_TLS)
9a83a553 1127 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 1128 {
88967714
AM
1129 if ((flags & SEC_LOAD) == 0)
1130 newsect->lma = (phdr->p_paddr
1131 + hdr->sh_addr - phdr->p_vaddr);
1132 else
1133 /* We used to use the same adjustment for SEC_LOAD
1134 sections, but that doesn't work if the segment
1135 is packed with code from multiple VMAs.
1136 Instead we calculate the section LMA based on
1137 the segment LMA. It is assumed that the
1138 segment will contain sections with contiguous
1139 LMAs, even if the VMAs are not. */
1140 newsect->lma = (phdr->p_paddr
1141 + hdr->sh_offset - phdr->p_offset);
1142
1143 /* With contiguous segments, we can't tell from file
1144 offsets whether a section with zero size should
1145 be placed at the end of one segment or the
1146 beginning of the next. Decide based on vaddr. */
1147 if (hdr->sh_addr >= phdr->p_vaddr
1148 && (hdr->sh_addr + hdr->sh_size
1149 <= phdr->p_vaddr + phdr->p_memsz))
1150 break;
252b5132
RH
1151 }
1152 }
1153 }
1154
4a114e3e
L
1155 /* Compress/decompress DWARF debug sections with names: .debug_* and
1156 .zdebug_*, after the section flags is set. */
1157 if ((flags & SEC_DEBUGGING)
1158 && ((name[1] == 'd' && name[6] == '_')
1159 || (name[1] == 'z' && name[7] == '_')))
1160 {
1161 enum { nothing, compress, decompress } action = nothing;
151411f8 1162 int compression_header_size;
dab394de 1163 bfd_size_type uncompressed_size;
151411f8
L
1164 bfd_boolean compressed
1165 = bfd_is_section_compressed_with_header (abfd, newsect,
dab394de
L
1166 &compression_header_size,
1167 &uncompressed_size);
4a114e3e 1168
151411f8 1169 if (compressed)
4a114e3e
L
1170 {
1171 /* Compressed section. Check if we should decompress. */
1172 if ((abfd->flags & BFD_DECOMPRESS))
1173 action = decompress;
1174 }
151411f8
L
1175
1176 /* Compress the uncompressed section or convert from/to .zdebug*
1177 section. Check if we should compress. */
1178 if (action == nothing)
4a114e3e 1179 {
151411f8
L
1180 if (newsect->size != 0
1181 && (abfd->flags & BFD_COMPRESS)
1182 && compression_header_size >= 0
dab394de 1183 && uncompressed_size > 0
151411f8
L
1184 && (!compressed
1185 || ((compression_header_size > 0)
1186 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
4a114e3e 1187 action = compress;
151411f8
L
1188 else
1189 return TRUE;
4a114e3e
L
1190 }
1191
151411f8 1192 if (action == compress)
4a114e3e 1193 {
4a114e3e
L
1194 if (!bfd_init_section_compress_status (abfd, newsect))
1195 {
4eca0228 1196 _bfd_error_handler
695344c0 1197 /* xgettext:c-format */
bc823199 1198 (_("%B: unable to initialize compress status for section %s"),
4a114e3e
L
1199 abfd, name);
1200 return FALSE;
1201 }
151411f8
L
1202 }
1203 else
1204 {
4a114e3e
L
1205 if (!bfd_init_section_decompress_status (abfd, newsect))
1206 {
4eca0228 1207 _bfd_error_handler
695344c0 1208 /* xgettext:c-format */
bc823199 1209 (_("%B: unable to initialize decompress status for section %s"),
4a114e3e
L
1210 abfd, name);
1211 return FALSE;
1212 }
151411f8
L
1213 }
1214
f6fe1ccd 1215 if (abfd->is_linker_input)
151411f8 1216 {
f6fe1ccd
L
1217 if (name[1] == 'z'
1218 && (action == decompress
1219 || (action == compress
1220 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
4e011fb5 1221 {
f6fe1ccd
L
1222 /* Convert section name from .zdebug_* to .debug_* so
1223 that linker will consider this section as a debug
1224 section. */
1225 char *new_name = convert_zdebug_to_debug (abfd, name);
151411f8
L
1226 if (new_name == NULL)
1227 return FALSE;
f6fe1ccd 1228 bfd_rename_section (abfd, newsect, new_name);
151411f8 1229 }
4a114e3e 1230 }
f6fe1ccd
L
1231 else
1232 /* For objdump, don't rename the section. For objcopy, delay
1233 section rename to elf_fake_sections. */
1234 newsect->flags |= SEC_ELF_RENAME;
4a114e3e
L
1235 }
1236
b34976b6 1237 return TRUE;
252b5132
RH
1238}
1239
84865015
NC
1240const char *const bfd_elf_section_type_names[] =
1241{
252b5132
RH
1242 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1243 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1244 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1245};
1246
1049f94e 1247/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1248 output, and the reloc is against an external symbol, and nothing
1249 has given us any additional addend, the resulting reloc will also
1250 be against the same symbol. In such a case, we don't want to
1251 change anything about the way the reloc is handled, since it will
1252 all be done at final link time. Rather than put special case code
1253 into bfd_perform_relocation, all the reloc types use this howto
1254 function. It just short circuits the reloc if producing
1049f94e 1255 relocatable output against an external symbol. */
252b5132 1256
252b5132 1257bfd_reloc_status_type
217aa764
AM
1258bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1259 arelent *reloc_entry,
1260 asymbol *symbol,
1261 void *data ATTRIBUTE_UNUSED,
1262 asection *input_section,
1263 bfd *output_bfd,
1264 char **error_message ATTRIBUTE_UNUSED)
1265{
1266 if (output_bfd != NULL
252b5132
RH
1267 && (symbol->flags & BSF_SECTION_SYM) == 0
1268 && (! reloc_entry->howto->partial_inplace
1269 || reloc_entry->addend == 0))
1270 {
1271 reloc_entry->address += input_section->output_offset;
1272 return bfd_reloc_ok;
1273 }
1274
1275 return bfd_reloc_continue;
1276}
1277\f
84865015
NC
1278/* Returns TRUE if section A matches section B.
1279 Names, addresses and links may be different, but everything else
1280 should be the same. */
1281
1282static bfd_boolean
5522f910
NC
1283section_match (const Elf_Internal_Shdr * a,
1284 const Elf_Internal_Shdr * b)
84865015
NC
1285{
1286 return
07d6d2b8 1287 a->sh_type == b->sh_type
5522f910
NC
1288 && (a->sh_flags & ~ SHF_INFO_LINK)
1289 == (b->sh_flags & ~ SHF_INFO_LINK)
84865015
NC
1290 && a->sh_addralign == b->sh_addralign
1291 && a->sh_size == b->sh_size
1292 && a->sh_entsize == b->sh_entsize
1293 /* FIXME: Check sh_addr ? */
1294 ;
1295}
1296
1297/* Find a section in OBFD that has the same characteristics
1298 as IHEADER. Return the index of this section or SHN_UNDEF if
1299 none can be found. Check's section HINT first, as this is likely
1300 to be the correct section. */
1301
1302static unsigned int
5cc4ca83
ST
1303find_link (const bfd *obfd, const Elf_Internal_Shdr *iheader,
1304 const unsigned int hint)
84865015
NC
1305{
1306 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1307 unsigned int i;
1308
a55c9876
NC
1309 BFD_ASSERT (iheader != NULL);
1310
1311 /* See PR 20922 for a reproducer of the NULL test. */
5cc4ca83
ST
1312 if (hint < elf_numsections (obfd)
1313 && oheaders[hint] != NULL
a55c9876 1314 && section_match (oheaders[hint], iheader))
84865015
NC
1315 return hint;
1316
1317 for (i = 1; i < elf_numsections (obfd); i++)
1318 {
1319 Elf_Internal_Shdr * oheader = oheaders[i];
1320
a55c9876
NC
1321 if (oheader == NULL)
1322 continue;
84865015
NC
1323 if (section_match (oheader, iheader))
1324 /* FIXME: Do we care if there is a potential for
1325 multiple matches ? */
1326 return i;
1327 }
1328
1329 return SHN_UNDEF;
1330}
1331
5522f910
NC
1332/* PR 19938: Attempt to set the ELF section header fields of an OS or
1333 Processor specific section, based upon a matching input section.
1334 Returns TRUE upon success, FALSE otherwise. */
07d6d2b8 1335
5522f910
NC
1336static bfd_boolean
1337copy_special_section_fields (const bfd *ibfd,
1338 bfd *obfd,
1339 const Elf_Internal_Shdr *iheader,
1340 Elf_Internal_Shdr *oheader,
1341 const unsigned int secnum)
1342{
1343 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1344 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1345 bfd_boolean changed = FALSE;
1346 unsigned int sh_link;
1347
1348 if (oheader->sh_type == SHT_NOBITS)
1349 {
1350 /* This is a feature for objcopy --only-keep-debug:
1351 When a section's type is changed to NOBITS, we preserve
1352 the sh_link and sh_info fields so that they can be
1353 matched up with the original.
1354
1355 Note: Strictly speaking these assignments are wrong.
1356 The sh_link and sh_info fields should point to the
1357 relevent sections in the output BFD, which may not be in
1358 the same location as they were in the input BFD. But
1359 the whole point of this action is to preserve the
1360 original values of the sh_link and sh_info fields, so
1361 that they can be matched up with the section headers in
1362 the original file. So strictly speaking we may be
1363 creating an invalid ELF file, but it is only for a file
1364 that just contains debug info and only for sections
1365 without any contents. */
1366 if (oheader->sh_link == 0)
1367 oheader->sh_link = iheader->sh_link;
1368 if (oheader->sh_info == 0)
1369 oheader->sh_info = iheader->sh_info;
1370 return TRUE;
1371 }
1372
1373 /* Allow the target a chance to decide how these fields should be set. */
1374 if (bed->elf_backend_copy_special_section_fields != NULL
1375 && bed->elf_backend_copy_special_section_fields
1376 (ibfd, obfd, iheader, oheader))
1377 return TRUE;
1378
1379 /* We have an iheader which might match oheader, and which has non-zero
1380 sh_info and/or sh_link fields. Attempt to follow those links and find
1381 the section in the output bfd which corresponds to the linked section
1382 in the input bfd. */
1383 if (iheader->sh_link != SHN_UNDEF)
1384 {
4f3ca05b
NC
1385 /* See PR 20931 for a reproducer. */
1386 if (iheader->sh_link >= elf_numsections (ibfd))
1387 {
76cfced5 1388 _bfd_error_handler
4f3ca05b
NC
1389 /* xgettext:c-format */
1390 (_("%B: Invalid sh_link field (%d) in section number %d"),
1391 ibfd, iheader->sh_link, secnum);
1392 return FALSE;
1393 }
1394
5522f910
NC
1395 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1396 if (sh_link != SHN_UNDEF)
1397 {
1398 oheader->sh_link = sh_link;
1399 changed = TRUE;
1400 }
1401 else
1402 /* FIXME: Should we install iheader->sh_link
1403 if we could not find a match ? */
76cfced5 1404 _bfd_error_handler
695344c0 1405 /* xgettext:c-format */
5522f910
NC
1406 (_("%B: Failed to find link section for section %d"), obfd, secnum);
1407 }
1408
1409 if (iheader->sh_info)
1410 {
1411 /* The sh_info field can hold arbitrary information, but if the
1412 SHF_LINK_INFO flag is set then it should be interpreted as a
1413 section index. */
1414 if (iheader->sh_flags & SHF_INFO_LINK)
1415 {
1416 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1417 iheader->sh_info);
1418 if (sh_link != SHN_UNDEF)
1419 oheader->sh_flags |= SHF_INFO_LINK;
1420 }
1421 else
1422 /* No idea what it means - just copy it. */
1423 sh_link = iheader->sh_info;
1424
1425 if (sh_link != SHN_UNDEF)
1426 {
1427 oheader->sh_info = sh_link;
1428 changed = TRUE;
1429 }
1430 else
76cfced5 1431 _bfd_error_handler
695344c0 1432 /* xgettext:c-format */
5522f910
NC
1433 (_("%B: Failed to find info section for section %d"), obfd, secnum);
1434 }
1435
1436 return changed;
1437}
07d6d2b8 1438
0ac4564e
L
1439/* Copy the program header and other data from one object module to
1440 another. */
252b5132 1441
b34976b6 1442bfd_boolean
217aa764 1443_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050 1444{
5522f910
NC
1445 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1446 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1447 const struct elf_backend_data *bed;
84865015
NC
1448 unsigned int i;
1449
2d502050 1450 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
84865015 1451 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1452 return TRUE;
2d502050 1453
57b828ef
L
1454 if (!elf_flags_init (obfd))
1455 {
1456 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1457 elf_flags_init (obfd) = TRUE;
1458 }
2d502050 1459
0ac4564e 1460 elf_gp (obfd) = elf_gp (ibfd);
57b828ef
L
1461
1462 /* Also copy the EI_OSABI field. */
1463 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1464 elf_elfheader (ibfd)->e_ident[EI_OSABI];
104d59d1 1465
5522f910
NC
1466 /* If set, copy the EI_ABIVERSION field. */
1467 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1468 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1469 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
07d6d2b8 1470
104d59d1
JM
1471 /* Copy object attributes. */
1472 _bfd_elf_copy_obj_attributes (ibfd, obfd);
63b9bbb7 1473
84865015
NC
1474 if (iheaders == NULL || oheaders == NULL)
1475 return TRUE;
63b9bbb7 1476
5522f910
NC
1477 bed = get_elf_backend_data (obfd);
1478
1479 /* Possibly copy other fields in the section header. */
84865015 1480 for (i = 1; i < elf_numsections (obfd); i++)
63b9bbb7 1481 {
84865015
NC
1482 unsigned int j;
1483 Elf_Internal_Shdr * oheader = oheaders[i];
63b9bbb7 1484
5522f910
NC
1485 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1486 because of a special case need for generating separate debug info
1487 files. See below for more details. */
84865015
NC
1488 if (oheader == NULL
1489 || (oheader->sh_type != SHT_NOBITS
5522f910
NC
1490 && oheader->sh_type < SHT_LOOS))
1491 continue;
1492
1493 /* Ignore empty sections, and sections whose
1494 fields have already been initialised. */
1495 if (oheader->sh_size == 0
84865015
NC
1496 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1497 continue;
63b9bbb7 1498
84865015 1499 /* Scan for the matching section in the input bfd.
5522f910
NC
1500 First we try for a direct mapping between the input and output sections. */
1501 for (j = 1; j < elf_numsections (ibfd); j++)
1502 {
1503 const Elf_Internal_Shdr * iheader = iheaders[j];
1504
1505 if (iheader == NULL)
1506 continue;
1507
1508 if (oheader->bfd_section != NULL
1509 && iheader->bfd_section != NULL
1510 && iheader->bfd_section->output_section != NULL
1511 && iheader->bfd_section->output_section == oheader->bfd_section)
1512 {
1513 /* We have found a connection from the input section to the
1514 output section. Attempt to copy the header fields. If
1515 this fails then do not try any further sections - there
1516 should only be a one-to-one mapping between input and output. */
1517 if (! copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1518 j = elf_numsections (ibfd);
1519 break;
1520 }
1521 }
1522
1523 if (j < elf_numsections (ibfd))
1524 continue;
1525
1526 /* That failed. So try to deduce the corresponding input section.
84865015
NC
1527 Unfortunately we cannot compare names as the output string table
1528 is empty, so instead we check size, address and type. */
1529 for (j = 1; j < elf_numsections (ibfd); j++)
1530 {
5522f910 1531 const Elf_Internal_Shdr * iheader = iheaders[j];
84865015 1532
5522f910
NC
1533 if (iheader == NULL)
1534 continue;
1535
1536 /* Try matching fields in the input section's header.
1537 Since --only-keep-debug turns all non-debug sections into
84865015
NC
1538 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1539 input type. */
1540 if ((oheader->sh_type == SHT_NOBITS
1541 || iheader->sh_type == oheader->sh_type)
5522f910
NC
1542 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1543 == (oheader->sh_flags & ~ SHF_INFO_LINK)
84865015
NC
1544 && iheader->sh_addralign == oheader->sh_addralign
1545 && iheader->sh_entsize == oheader->sh_entsize
1546 && iheader->sh_size == oheader->sh_size
1547 && iheader->sh_addr == oheader->sh_addr
1548 && (iheader->sh_info != oheader->sh_info
1549 || iheader->sh_link != oheader->sh_link))
63b9bbb7 1550 {
5522f910
NC
1551 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1552 break;
63b9bbb7
NC
1553 }
1554 }
5522f910
NC
1555
1556 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1557 {
1558 /* Final attempt. Call the backend copy function
1559 with a NULL input section. */
1560 if (bed->elf_backend_copy_special_section_fields != NULL)
1561 bed->elf_backend_copy_special_section_fields (ibfd, obfd, NULL, oheader);
1562 }
63b9bbb7
NC
1563 }
1564
b34976b6 1565 return TRUE;
2d502050
L
1566}
1567
cedc298e
L
1568static const char *
1569get_segment_type (unsigned int p_type)
1570{
1571 const char *pt;
1572 switch (p_type)
1573 {
1574 case PT_NULL: pt = "NULL"; break;
1575 case PT_LOAD: pt = "LOAD"; break;
1576 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1577 case PT_INTERP: pt = "INTERP"; break;
1578 case PT_NOTE: pt = "NOTE"; break;
1579 case PT_SHLIB: pt = "SHLIB"; break;
1580 case PT_PHDR: pt = "PHDR"; break;
1581 case PT_TLS: pt = "TLS"; break;
1582 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1583 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1584 case PT_GNU_RELRO: pt = "RELRO"; break;
1585 default: pt = NULL; break;
1586 }
1587 return pt;
1588}
1589
f0b79d91
L
1590/* Print out the program headers. */
1591
b34976b6 1592bfd_boolean
217aa764 1593_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1594{
a50b1753 1595 FILE *f = (FILE *) farg;
252b5132
RH
1596 Elf_Internal_Phdr *p;
1597 asection *s;
1598 bfd_byte *dynbuf = NULL;
1599
1600 p = elf_tdata (abfd)->phdr;
1601 if (p != NULL)
1602 {
1603 unsigned int i, c;
1604
1605 fprintf (f, _("\nProgram Header:\n"));
1606 c = elf_elfheader (abfd)->e_phnum;
1607 for (i = 0; i < c; i++, p++)
1608 {
cedc298e 1609 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1610 char buf[20];
1611
cedc298e 1612 if (pt == NULL)
252b5132 1613 {
cedc298e
L
1614 sprintf (buf, "0x%lx", p->p_type);
1615 pt = buf;
252b5132 1616 }
dc810e39 1617 fprintf (f, "%8s off 0x", pt);
60b89a18 1618 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1619 fprintf (f, " vaddr 0x");
60b89a18 1620 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1621 fprintf (f, " paddr 0x");
60b89a18 1622 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1623 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1624 fprintf (f, " filesz 0x");
60b89a18 1625 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1626 fprintf (f, " memsz 0x");
60b89a18 1627 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1628 fprintf (f, " flags %c%c%c",
1629 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1630 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1631 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1632 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1633 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1634 fprintf (f, "\n");
1635 }
1636 }
1637
1638 s = bfd_get_section_by_name (abfd, ".dynamic");
1639 if (s != NULL)
1640 {
cb33740c 1641 unsigned int elfsec;
dc810e39 1642 unsigned long shlink;
252b5132
RH
1643 bfd_byte *extdyn, *extdynend;
1644 size_t extdynsize;
217aa764 1645 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1646
1647 fprintf (f, _("\nDynamic Section:\n"));
1648
eea6121a 1649 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1650 goto error_return;
1651
1652 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1653 if (elfsec == SHN_BAD)
252b5132 1654 goto error_return;
dc810e39 1655 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1656
1657 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1658 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1659
1660 extdyn = dynbuf;
06614111
NC
1661 /* PR 17512: file: 6f427532. */
1662 if (s->size < extdynsize)
1663 goto error_return;
eea6121a 1664 extdynend = extdyn + s->size;
1036838a 1665 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
07d6d2b8 1666 Fix range check. */
1036838a 1667 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
252b5132
RH
1668 {
1669 Elf_Internal_Dyn dyn;
ad9563d6 1670 const char *name = "";
252b5132 1671 char ab[20];
b34976b6 1672 bfd_boolean stringp;
ad9563d6 1673 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1674
217aa764 1675 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1676
1677 if (dyn.d_tag == DT_NULL)
1678 break;
1679
b34976b6 1680 stringp = FALSE;
252b5132
RH
1681 switch (dyn.d_tag)
1682 {
1683 default:
ad9563d6
CM
1684 if (bed->elf_backend_get_target_dtag)
1685 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1686
1687 if (!strcmp (name, ""))
1688 {
cd9af601 1689 sprintf (ab, "%#" BFD_VMA_FMT "x", dyn.d_tag);
ad9563d6
CM
1690 name = ab;
1691 }
252b5132
RH
1692 break;
1693
b34976b6 1694 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1695 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1696 case DT_PLTGOT: name = "PLTGOT"; break;
1697 case DT_HASH: name = "HASH"; break;
1698 case DT_STRTAB: name = "STRTAB"; break;
1699 case DT_SYMTAB: name = "SYMTAB"; break;
1700 case DT_RELA: name = "RELA"; break;
1701 case DT_RELASZ: name = "RELASZ"; break;
1702 case DT_RELAENT: name = "RELAENT"; break;
1703 case DT_STRSZ: name = "STRSZ"; break;
1704 case DT_SYMENT: name = "SYMENT"; break;
1705 case DT_INIT: name = "INIT"; break;
1706 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1707 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1708 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1709 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1710 case DT_REL: name = "REL"; break;
1711 case DT_RELSZ: name = "RELSZ"; break;
1712 case DT_RELENT: name = "RELENT"; break;
1713 case DT_PLTREL: name = "PLTREL"; break;
1714 case DT_DEBUG: name = "DEBUG"; break;
1715 case DT_TEXTREL: name = "TEXTREL"; break;
1716 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1717 case DT_BIND_NOW: name = "BIND_NOW"; break;
1718 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1719 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1720 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1721 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1722 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1723 case DT_FLAGS: name = "FLAGS"; break;
1724 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1725 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1726 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1727 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1728 case DT_MOVEENT: name = "MOVEENT"; break;
1729 case DT_MOVESZ: name = "MOVESZ"; break;
1730 case DT_FEATURE: name = "FEATURE"; break;
1731 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1732 case DT_SYMINSZ: name = "SYMINSZ"; break;
1733 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1734 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1735 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1736 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1737 case DT_PLTPAD: name = "PLTPAD"; break;
1738 case DT_MOVETAB: name = "MOVETAB"; break;
1739 case DT_SYMINFO: name = "SYMINFO"; break;
1740 case DT_RELACOUNT: name = "RELACOUNT"; break;
1741 case DT_RELCOUNT: name = "RELCOUNT"; break;
1742 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1743 case DT_VERSYM: name = "VERSYM"; break;
1744 case DT_VERDEF: name = "VERDEF"; break;
1745 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1746 case DT_VERNEED: name = "VERNEED"; break;
1747 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1748 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1749 case DT_USED: name = "USED"; break;
b34976b6 1750 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1751 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1752 }
1753
ad9563d6 1754 fprintf (f, " %-20s ", name);
252b5132 1755 if (! stringp)
a1f3c56e
AN
1756 {
1757 fprintf (f, "0x");
1758 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1759 }
252b5132
RH
1760 else
1761 {
1762 const char *string;
dc810e39 1763 unsigned int tagv = dyn.d_un.d_val;
252b5132 1764
dc810e39 1765 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1766 if (string == NULL)
1767 goto error_return;
1768 fprintf (f, "%s", string);
1769 }
1770 fprintf (f, "\n");
1771 }
1772
1773 free (dynbuf);
1774 dynbuf = NULL;
1775 }
1776
1777 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1778 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1779 {
fc0e6df6 1780 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1781 return FALSE;
252b5132
RH
1782 }
1783
1784 if (elf_dynverdef (abfd) != 0)
1785 {
1786 Elf_Internal_Verdef *t;
1787
1788 fprintf (f, _("\nVersion definitions:\n"));
1789 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1790 {
1791 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1792 t->vd_flags, t->vd_hash,
1793 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1794 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1795 {
1796 Elf_Internal_Verdaux *a;
1797
1798 fprintf (f, "\t");
1799 for (a = t->vd_auxptr->vda_nextptr;
1800 a != NULL;
1801 a = a->vda_nextptr)
d0fb9a8d
JJ
1802 fprintf (f, "%s ",
1803 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1804 fprintf (f, "\n");
1805 }
1806 }
1807 }
1808
1809 if (elf_dynverref (abfd) != 0)
1810 {
1811 Elf_Internal_Verneed *t;
1812
1813 fprintf (f, _("\nVersion References:\n"));
1814 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1815 {
1816 Elf_Internal_Vernaux *a;
1817
d0fb9a8d
JJ
1818 fprintf (f, _(" required from %s:\n"),
1819 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1820 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1821 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1822 a->vna_flags, a->vna_other,
1823 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1824 }
1825 }
1826
b34976b6 1827 return TRUE;
252b5132
RH
1828
1829 error_return:
1830 if (dynbuf != NULL)
1831 free (dynbuf);
b34976b6 1832 return FALSE;
252b5132
RH
1833}
1834
bb4d2ac2
L
1835/* Get version string. */
1836
1837const char *
60bb06bc
L
1838_bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1839 bfd_boolean *hidden)
bb4d2ac2
L
1840{
1841 const char *version_string = NULL;
1842 if (elf_dynversym (abfd) != 0
1843 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1844 {
1845 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1846
1847 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1848 vernum &= VERSYM_VERSION;
1849
1850 if (vernum == 0)
1851 version_string = "";
1852 else if (vernum == 1)
1853 version_string = "Base";
1854 else if (vernum <= elf_tdata (abfd)->cverdefs)
1855 version_string =
1856 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1857 else
1858 {
1859 Elf_Internal_Verneed *t;
1860
1861 version_string = "";
1862 for (t = elf_tdata (abfd)->verref;
1863 t != NULL;
1864 t = t->vn_nextref)
1865 {
1866 Elf_Internal_Vernaux *a;
1867
1868 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1869 {
1870 if (a->vna_other == vernum)
1871 {
1872 version_string = a->vna_nodename;
1873 break;
1874 }
1875 }
1876 }
1877 }
1878 }
1879 return version_string;
1880}
1881
252b5132
RH
1882/* Display ELF-specific fields of a symbol. */
1883
1884void
217aa764
AM
1885bfd_elf_print_symbol (bfd *abfd,
1886 void *filep,
1887 asymbol *symbol,
1888 bfd_print_symbol_type how)
252b5132 1889{
a50b1753 1890 FILE *file = (FILE *) filep;
252b5132
RH
1891 switch (how)
1892 {
1893 case bfd_print_symbol_name:
1894 fprintf (file, "%s", symbol->name);
1895 break;
1896 case bfd_print_symbol_more:
1897 fprintf (file, "elf ");
60b89a18 1898 bfd_fprintf_vma (abfd, file, symbol->value);
cd9af601 1899 fprintf (file, " %x", symbol->flags);
252b5132
RH
1900 break;
1901 case bfd_print_symbol_all:
1902 {
4e8a9624
AM
1903 const char *section_name;
1904 const char *name = NULL;
9c5bfbb7 1905 const struct elf_backend_data *bed;
7a13edea 1906 unsigned char st_other;
dbb410c3 1907 bfd_vma val;
bb4d2ac2
L
1908 const char *version_string;
1909 bfd_boolean hidden;
c044fabd 1910
252b5132 1911 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1912
1913 bed = get_elf_backend_data (abfd);
1914 if (bed->elf_backend_print_symbol_all)
c044fabd 1915 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1916
1917 if (name == NULL)
1918 {
7ee38065 1919 name = symbol->name;
217aa764 1920 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1921 }
1922
252b5132
RH
1923 fprintf (file, " %s\t", section_name);
1924 /* Print the "other" value for a symbol. For common symbols,
1925 we've already printed the size; now print the alignment.
1926 For other symbols, we have no specified alignment, and
1927 we've printed the address; now print the size. */
dcf6c779 1928 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1929 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1930 else
1931 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1932 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1933
1934 /* If we have version information, print it. */
60bb06bc
L
1935 version_string = _bfd_elf_get_symbol_version_string (abfd,
1936 symbol,
1937 &hidden);
bb4d2ac2 1938 if (version_string)
252b5132 1939 {
bb4d2ac2 1940 if (!hidden)
252b5132
RH
1941 fprintf (file, " %-11s", version_string);
1942 else
1943 {
1944 int i;
1945
1946 fprintf (file, " (%s)", version_string);
1947 for (i = 10 - strlen (version_string); i > 0; --i)
1948 putc (' ', file);
1949 }
1950 }
1951
1952 /* If the st_other field is not zero, print it. */
7a13edea 1953 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1954
7a13edea
NC
1955 switch (st_other)
1956 {
1957 case 0: break;
1958 case STV_INTERNAL: fprintf (file, " .internal"); break;
1959 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1960 case STV_PROTECTED: fprintf (file, " .protected"); break;
1961 default:
1962 /* Some other non-defined flags are also present, so print
1963 everything hex. */
1964 fprintf (file, " 0x%02x", (unsigned int) st_other);
1965 }
252b5132 1966
587ff49e 1967 fprintf (file, " %s", name);
252b5132
RH
1968 }
1969 break;
1970 }
1971}
252b5132
RH
1972\f
1973/* ELF .o/exec file reading */
1974
c044fabd 1975/* Create a new bfd section from an ELF section header. */
252b5132 1976
b34976b6 1977bfd_boolean
217aa764 1978bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1979{
4fbb74a6
AM
1980 Elf_Internal_Shdr *hdr;
1981 Elf_Internal_Ehdr *ehdr;
1982 const struct elf_backend_data *bed;
90937f86 1983 const char *name;
bf67003b
NC
1984 bfd_boolean ret = TRUE;
1985 static bfd_boolean * sections_being_created = NULL;
5a4b0ccc 1986 static bfd * sections_being_created_abfd = NULL;
bf67003b 1987 static unsigned int nesting = 0;
252b5132 1988
4fbb74a6
AM
1989 if (shindex >= elf_numsections (abfd))
1990 return FALSE;
1991
bf67003b
NC
1992 if (++ nesting > 3)
1993 {
1994 /* PR17512: A corrupt ELF binary might contain a recursive group of
06614111 1995 sections, with each the string indicies pointing to the next in the
bf67003b
NC
1996 loop. Detect this here, by refusing to load a section that we are
1997 already in the process of loading. We only trigger this test if
1998 we have nested at least three sections deep as normal ELF binaries
5a4b0ccc
NC
1999 can expect to recurse at least once.
2000
2001 FIXME: It would be better if this array was attached to the bfd,
2002 rather than being held in a static pointer. */
2003
2004 if (sections_being_created_abfd != abfd)
2005 sections_being_created = NULL;
bf67003b
NC
2006 if (sections_being_created == NULL)
2007 {
2008 /* FIXME: It would be more efficient to attach this array to the bfd somehow. */
2009 sections_being_created = (bfd_boolean *)
2010 bfd_zalloc (abfd, elf_numsections (abfd) * sizeof (bfd_boolean));
5a4b0ccc 2011 sections_being_created_abfd = abfd;
bf67003b
NC
2012 }
2013 if (sections_being_created [shindex])
2014 {
4eca0228 2015 _bfd_error_handler
bf67003b
NC
2016 (_("%B: warning: loop in section dependencies detected"), abfd);
2017 return FALSE;
2018 }
2019 sections_being_created [shindex] = TRUE;
2020 }
2021
4fbb74a6
AM
2022 hdr = elf_elfsections (abfd)[shindex];
2023 ehdr = elf_elfheader (abfd);
2024 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 2025 hdr->sh_name);
933d961a 2026 if (name == NULL)
bf67003b 2027 goto fail;
252b5132 2028
4fbb74a6 2029 bed = get_elf_backend_data (abfd);
252b5132
RH
2030 switch (hdr->sh_type)
2031 {
2032 case SHT_NULL:
2033 /* Inactive section. Throw it away. */
bf67003b 2034 goto success;
252b5132 2035
bf67003b
NC
2036 case SHT_PROGBITS: /* Normal section with contents. */
2037 case SHT_NOBITS: /* .bss section. */
2038 case SHT_HASH: /* .hash section. */
2039 case SHT_NOTE: /* .note section. */
25e27870
L
2040 case SHT_INIT_ARRAY: /* .init_array section. */
2041 case SHT_FINI_ARRAY: /* .fini_array section. */
2042 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 2043 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 2044 case SHT_GNU_HASH: /* .gnu.hash section. */
bf67003b
NC
2045 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2046 goto success;
252b5132 2047
797fc050 2048 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 2049 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2050 goto fail;
2051
cfcac11d
NC
2052 if (hdr->sh_link > elf_numsections (abfd))
2053 {
caa83f8b 2054 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
2055 field set to SHN_BEFORE or SHN_AFTER. */
2056 switch (bfd_get_arch (abfd))
2057 {
caa83f8b 2058 case bfd_arch_i386:
cfcac11d
NC
2059 case bfd_arch_sparc:
2060 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
2061 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
2062 break;
2063 /* Otherwise fall through. */
2064 default:
bf67003b 2065 goto fail;
cfcac11d
NC
2066 }
2067 }
2068 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
bf67003b 2069 goto fail;
cfcac11d 2070 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
2071 {
2072 Elf_Internal_Shdr *dynsymhdr;
2073
2074 /* The shared libraries distributed with hpux11 have a bogus
2075 sh_link field for the ".dynamic" section. Find the
2076 string table for the ".dynsym" section instead. */
2077 if (elf_dynsymtab (abfd) != 0)
2078 {
2079 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2080 hdr->sh_link = dynsymhdr->sh_link;
2081 }
2082 else
2083 {
2084 unsigned int i, num_sec;
2085
2086 num_sec = elf_numsections (abfd);
2087 for (i = 1; i < num_sec; i++)
2088 {
2089 dynsymhdr = elf_elfsections (abfd)[i];
2090 if (dynsymhdr->sh_type == SHT_DYNSYM)
2091 {
2092 hdr->sh_link = dynsymhdr->sh_link;
2093 break;
2094 }
2095 }
2096 }
2097 }
bf67003b 2098 goto success;
797fc050 2099
bf67003b 2100 case SHT_SYMTAB: /* A symbol table. */
252b5132 2101 if (elf_onesymtab (abfd) == shindex)
bf67003b 2102 goto success;
252b5132 2103
a50b2160 2104 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2105 goto fail;
2106
3337c1e5 2107 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
eee3b786
AM
2108 {
2109 if (hdr->sh_size != 0)
bf67003b 2110 goto fail;
eee3b786
AM
2111 /* Some assemblers erroneously set sh_info to one with a
2112 zero sh_size. ld sees this as a global symbol count
2113 of (unsigned) -1. Fix it here. */
2114 hdr->sh_info = 0;
bf67003b 2115 goto success;
eee3b786 2116 }
bf67003b 2117
16ad13ec
NC
2118 /* PR 18854: A binary might contain more than one symbol table.
2119 Unusual, but possible. Warn, but continue. */
2120 if (elf_onesymtab (abfd) != 0)
2121 {
4eca0228 2122 _bfd_error_handler
695344c0 2123 /* xgettext:c-format */
63a5468a
AM
2124 (_("%B: warning: multiple symbol tables detected"
2125 " - ignoring the table in section %u"),
16ad13ec
NC
2126 abfd, shindex);
2127 goto success;
2128 }
252b5132 2129 elf_onesymtab (abfd) = shindex;
6a40cf0c
NC
2130 elf_symtab_hdr (abfd) = *hdr;
2131 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
252b5132
RH
2132 abfd->flags |= HAS_SYMS;
2133
2134 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
2135 SHF_ALLOC is set, and this is a shared object, then we also
2136 treat this section as a BFD section. We can not base the
2137 decision purely on SHF_ALLOC, because that flag is sometimes
2138 set in a relocatable object file, which would confuse the
2139 linker. */
252b5132
RH
2140 if ((hdr->sh_flags & SHF_ALLOC) != 0
2141 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
2142 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2143 shindex))
bf67003b 2144 goto fail;
252b5132 2145
1b3a8575
AM
2146 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2147 can't read symbols without that section loaded as well. It
2148 is most likely specified by the next section header. */
6a40cf0c
NC
2149 {
2150 elf_section_list * entry;
2151 unsigned int i, num_sec;
1b3a8575 2152
6a40cf0c
NC
2153 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2154 if (entry->hdr.sh_link == shindex)
2155 goto success;
2156
2157 num_sec = elf_numsections (abfd);
2158 for (i = shindex + 1; i < num_sec; i++)
2159 {
2160 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2161
2162 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2163 && hdr2->sh_link == shindex)
2164 break;
2165 }
2166
2167 if (i == num_sec)
2168 for (i = 1; i < shindex; i++)
1b3a8575
AM
2169 {
2170 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
6a40cf0c 2171
1b3a8575
AM
2172 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2173 && hdr2->sh_link == shindex)
2174 break;
2175 }
6a40cf0c
NC
2176
2177 if (i != shindex)
2178 ret = bfd_section_from_shdr (abfd, i);
2179 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2180 goto success;
2181 }
252b5132 2182
bf67003b 2183 case SHT_DYNSYM: /* A dynamic symbol table. */
252b5132 2184 if (elf_dynsymtab (abfd) == shindex)
bf67003b 2185 goto success;
252b5132 2186
a50b2160 2187 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2188 goto fail;
2189
eee3b786
AM
2190 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2191 {
2192 if (hdr->sh_size != 0)
bf67003b
NC
2193 goto fail;
2194
eee3b786
AM
2195 /* Some linkers erroneously set sh_info to one with a
2196 zero sh_size. ld sees this as a global symbol count
2197 of (unsigned) -1. Fix it here. */
2198 hdr->sh_info = 0;
bf67003b 2199 goto success;
eee3b786 2200 }
bf67003b 2201
16ad13ec
NC
2202 /* PR 18854: A binary might contain more than one dynamic symbol table.
2203 Unusual, but possible. Warn, but continue. */
2204 if (elf_dynsymtab (abfd) != 0)
2205 {
4eca0228 2206 _bfd_error_handler
695344c0 2207 /* xgettext:c-format */
63a5468a
AM
2208 (_("%B: warning: multiple dynamic symbol tables detected"
2209 " - ignoring the table in section %u"),
16ad13ec
NC
2210 abfd, shindex);
2211 goto success;
2212 }
252b5132
RH
2213 elf_dynsymtab (abfd) = shindex;
2214 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2215 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2216 abfd->flags |= HAS_SYMS;
2217
2218 /* Besides being a symbol table, we also treat this as a regular
2219 section, so that objcopy can handle it. */
bf67003b
NC
2220 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2221 goto success;
252b5132 2222
bf67003b 2223 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
6a40cf0c
NC
2224 {
2225 elf_section_list * entry;
9ad5cbcf 2226
6a40cf0c
NC
2227 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2228 if (entry->ndx == shindex)
2229 goto success;
07d6d2b8 2230
6a40cf0c
NC
2231 entry = bfd_alloc (abfd, sizeof * entry);
2232 if (entry == NULL)
2233 goto fail;
2234 entry->ndx = shindex;
2235 entry->hdr = * hdr;
2236 entry->next = elf_symtab_shndx_list (abfd);
2237 elf_symtab_shndx_list (abfd) = entry;
2238 elf_elfsections (abfd)[shindex] = & entry->hdr;
2239 goto success;
2240 }
9ad5cbcf 2241
bf67003b 2242 case SHT_STRTAB: /* A string table. */
252b5132 2243 if (hdr->bfd_section != NULL)
bf67003b
NC
2244 goto success;
2245
252b5132
RH
2246 if (ehdr->e_shstrndx == shindex)
2247 {
2248 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2249 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
bf67003b 2250 goto success;
252b5132 2251 }
bf67003b 2252
1b3a8575
AM
2253 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2254 {
2255 symtab_strtab:
2256 elf_tdata (abfd)->strtab_hdr = *hdr;
2257 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
bf67003b 2258 goto success;
1b3a8575 2259 }
bf67003b 2260
1b3a8575
AM
2261 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2262 {
2263 dynsymtab_strtab:
2264 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2265 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2266 elf_elfsections (abfd)[shindex] = hdr;
2267 /* We also treat this as a regular section, so that objcopy
2268 can handle it. */
bf67003b
NC
2269 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2270 shindex);
2271 goto success;
1b3a8575 2272 }
252b5132 2273
1b3a8575
AM
2274 /* If the string table isn't one of the above, then treat it as a
2275 regular section. We need to scan all the headers to be sure,
2276 just in case this strtab section appeared before the above. */
2277 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2278 {
2279 unsigned int i, num_sec;
252b5132 2280
1b3a8575
AM
2281 num_sec = elf_numsections (abfd);
2282 for (i = 1; i < num_sec; i++)
2283 {
2284 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2285 if (hdr2->sh_link == shindex)
2286 {
933d961a
JJ
2287 /* Prevent endless recursion on broken objects. */
2288 if (i == shindex)
bf67003b 2289 goto fail;
1b3a8575 2290 if (! bfd_section_from_shdr (abfd, i))
bf67003b 2291 goto fail;
1b3a8575
AM
2292 if (elf_onesymtab (abfd) == i)
2293 goto symtab_strtab;
2294 if (elf_dynsymtab (abfd) == i)
2295 goto dynsymtab_strtab;
2296 }
2297 }
2298 }
bf67003b
NC
2299 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2300 goto success;
252b5132
RH
2301
2302 case SHT_REL:
2303 case SHT_RELA:
2304 /* *These* do a lot of work -- but build no sections! */
2305 {
2306 asection *target_sect;
d4730f92 2307 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 2308 unsigned int num_sec = elf_numsections (abfd);
d4730f92 2309 struct bfd_elf_section_data *esdt;
252b5132 2310
aa2ca951
JJ
2311 if (hdr->sh_entsize
2312 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160 2313 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
bf67003b 2314 goto fail;
a50b2160 2315
03ae5f59 2316 /* Check for a bogus link to avoid crashing. */
4fbb74a6 2317 if (hdr->sh_link >= num_sec)
03ae5f59 2318 {
4eca0228 2319 _bfd_error_handler
695344c0 2320 /* xgettext:c-format */
76cfced5 2321 (_("%B: invalid link %u for reloc section %s (index %u)"),
4eca0228 2322 abfd, hdr->sh_link, name, shindex);
bf67003b
NC
2323 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2324 shindex);
2325 goto success;
03ae5f59
ILT
2326 }
2327
252b5132
RH
2328 /* For some incomprehensible reason Oracle distributes
2329 libraries for Solaris in which some of the objects have
2330 bogus sh_link fields. It would be nice if we could just
2331 reject them, but, unfortunately, some people need to use
2332 them. We scan through the section headers; if we find only
2333 one suitable symbol table, we clobber the sh_link to point
83b89087
L
2334 to it. I hope this doesn't break anything.
2335
2336 Don't do it on executable nor shared library. */
2337 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2338 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
2339 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2340 {
9ad5cbcf 2341 unsigned int scan;
252b5132
RH
2342 int found;
2343
2344 found = 0;
9ad5cbcf 2345 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2346 {
2347 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2348 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2349 {
2350 if (found != 0)
2351 {
2352 found = 0;
2353 break;
2354 }
2355 found = scan;
2356 }
2357 }
2358 if (found != 0)
2359 hdr->sh_link = found;
2360 }
2361
2362 /* Get the symbol table. */
1b3a8575
AM
2363 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2364 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2365 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
bf67003b 2366 goto fail;
252b5132
RH
2367
2368 /* If this reloc section does not use the main symbol table we
2369 don't treat it as a reloc section. BFD can't adequately
2370 represent such a section, so at least for now, we don't
c044fabd 2371 try. We just present it as a normal section. We also
60bcf0fa 2372 can't use it as a reloc section if it points to the null
83b89087
L
2373 section, an invalid section, another reloc section, or its
2374 sh_link points to the null section. */
185ef66d 2375 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 2376 || hdr->sh_link == SHN_UNDEF
185ef66d 2377 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
2378 || hdr->sh_info >= num_sec
2379 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2380 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
bf67003b
NC
2381 {
2382 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2383 shindex);
2384 goto success;
2385 }
252b5132
RH
2386
2387 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
bf67003b
NC
2388 goto fail;
2389
252b5132
RH
2390 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2391 if (target_sect == NULL)
bf67003b 2392 goto fail;
252b5132 2393
d4730f92
BS
2394 esdt = elf_section_data (target_sect);
2395 if (hdr->sh_type == SHT_RELA)
2396 p_hdr = &esdt->rela.hdr;
252b5132 2397 else
d4730f92
BS
2398 p_hdr = &esdt->rel.hdr;
2399
06614111
NC
2400 /* PR 17512: file: 0b4f81b7. */
2401 if (*p_hdr != NULL)
2402 goto fail;
ef53be89 2403 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
d4730f92 2404 if (hdr2 == NULL)
bf67003b 2405 goto fail;
252b5132 2406 *hdr2 = *hdr;
d4730f92 2407 *p_hdr = hdr2;
252b5132 2408 elf_elfsections (abfd)[shindex] = hdr2;
056bafd4
MR
2409 target_sect->reloc_count += (NUM_SHDR_ENTRIES (hdr)
2410 * bed->s->int_rels_per_ext_rel);
252b5132
RH
2411 target_sect->flags |= SEC_RELOC;
2412 target_sect->relocation = NULL;
2413 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2414 /* In the section to which the relocations apply, mark whether
2415 its relocations are of the REL or RELA variety. */
72730e0c 2416 if (hdr->sh_size != 0)
d4730f92
BS
2417 {
2418 if (hdr->sh_type == SHT_RELA)
2419 target_sect->use_rela_p = 1;
2420 }
252b5132 2421 abfd->flags |= HAS_RELOC;
bf67003b 2422 goto success;
252b5132 2423 }
252b5132
RH
2424
2425 case SHT_GNU_verdef:
2426 elf_dynverdef (abfd) = shindex;
2427 elf_tdata (abfd)->dynverdef_hdr = *hdr;
bf67003b
NC
2428 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2429 goto success;
252b5132
RH
2430
2431 case SHT_GNU_versym:
a50b2160 2432 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
bf67003b
NC
2433 goto fail;
2434
252b5132
RH
2435 elf_dynversym (abfd) = shindex;
2436 elf_tdata (abfd)->dynversym_hdr = *hdr;
bf67003b
NC
2437 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2438 goto success;
252b5132
RH
2439
2440 case SHT_GNU_verneed:
2441 elf_dynverref (abfd) = shindex;
2442 elf_tdata (abfd)->dynverref_hdr = *hdr;
bf67003b
NC
2443 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2444 goto success;
252b5132
RH
2445
2446 case SHT_SHLIB:
bf67003b 2447 goto success;
252b5132 2448
dbb410c3 2449 case SHT_GROUP:
44534af3 2450 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
bf67003b
NC
2451 goto fail;
2452
6dc132d9 2453 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2454 goto fail;
2455
bf67003b 2456 goto success;
dbb410c3 2457
252b5132 2458 default:
104d59d1
JM
2459 /* Possibly an attributes section. */
2460 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2461 || hdr->sh_type == bed->obj_attrs_section_type)
2462 {
2463 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2464 goto fail;
104d59d1 2465 _bfd_elf_parse_attributes (abfd, hdr);
bf67003b 2466 goto success;
104d59d1
JM
2467 }
2468
252b5132 2469 /* Check for any processor-specific section types. */
3eb70a79 2470 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2471 goto success;
3eb70a79
L
2472
2473 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2474 {
2475 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2476 /* FIXME: How to properly handle allocated section reserved
2477 for applications? */
4eca0228 2478 _bfd_error_handler
695344c0 2479 /* xgettext:c-format */
76cfced5
AM
2480 (_("%B: unknown type [%#x] section `%s'"),
2481 abfd, hdr->sh_type, name);
3eb70a79 2482 else
bf67003b
NC
2483 {
2484 /* Allow sections reserved for applications. */
2485 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2486 shindex);
2487 goto success;
2488 }
3eb70a79
L
2489 }
2490 else if (hdr->sh_type >= SHT_LOPROC
2491 && hdr->sh_type <= SHT_HIPROC)
2492 /* FIXME: We should handle this section. */
4eca0228 2493 _bfd_error_handler
695344c0 2494 /* xgettext:c-format */
76cfced5
AM
2495 (_("%B: unknown type [%#x] section `%s'"),
2496 abfd, hdr->sh_type, name);
3eb70a79 2497 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
2498 {
2499 /* Unrecognised OS-specific sections. */
2500 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2501 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 2502 required to correctly process the section and the file should
ff15b240 2503 be rejected with an error message. */
4eca0228 2504 _bfd_error_handler
695344c0 2505 /* xgettext:c-format */
76cfced5
AM
2506 (_("%B: unknown type [%#x] section `%s'"),
2507 abfd, hdr->sh_type, name);
ff15b240 2508 else
bf67003b
NC
2509 {
2510 /* Otherwise it should be processed. */
2511 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2512 goto success;
2513 }
ff15b240 2514 }
3eb70a79
L
2515 else
2516 /* FIXME: We should handle this section. */
4eca0228 2517 _bfd_error_handler
695344c0 2518 /* xgettext:c-format */
76cfced5
AM
2519 (_("%B: unknown type [%#x] section `%s'"),
2520 abfd, hdr->sh_type, name);
3eb70a79 2521
bf67003b 2522 goto fail;
252b5132
RH
2523 }
2524
bf67003b
NC
2525 fail:
2526 ret = FALSE;
2527 success:
e5b470e2 2528 if (sections_being_created && sections_being_created_abfd == abfd)
bf67003b
NC
2529 sections_being_created [shindex] = FALSE;
2530 if (-- nesting == 0)
5a4b0ccc
NC
2531 {
2532 sections_being_created = NULL;
2533 sections_being_created_abfd = abfd;
2534 }
bf67003b 2535 return ret;
252b5132
RH
2536}
2537
87d72d41 2538/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2539
87d72d41
AM
2540Elf_Internal_Sym *
2541bfd_sym_from_r_symndx (struct sym_cache *cache,
2542 bfd *abfd,
2543 unsigned long r_symndx)
ec338859 2544{
ec338859
AM
2545 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2546
a5d1b3b5
AM
2547 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2548 {
2549 Elf_Internal_Shdr *symtab_hdr;
2550 unsigned char esym[sizeof (Elf64_External_Sym)];
2551 Elf_External_Sym_Shndx eshndx;
ec338859 2552
a5d1b3b5
AM
2553 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2554 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2555 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2556 return NULL;
9ad5cbcf 2557
a5d1b3b5
AM
2558 if (cache->abfd != abfd)
2559 {
2560 memset (cache->indx, -1, sizeof (cache->indx));
2561 cache->abfd = abfd;
2562 }
2563 cache->indx[ent] = r_symndx;
ec338859 2564 }
a5d1b3b5 2565
87d72d41 2566 return &cache->sym[ent];
ec338859
AM
2567}
2568
252b5132
RH
2569/* Given an ELF section number, retrieve the corresponding BFD
2570 section. */
2571
2572asection *
91d6fa6a 2573bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2574{
91d6fa6a 2575 if (sec_index >= elf_numsections (abfd))
252b5132 2576 return NULL;
91d6fa6a 2577 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2578}
2579
b35d266b 2580static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2581{
0112cd26 2582 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 2583 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2584};
2585
b35d266b 2586static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2587{
0112cd26 2588 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
07d6d2b8 2589 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2590};
2591
b35d266b 2592static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2593{
07d6d2b8
AM
2594 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2595 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
a9a72a65
DE
2596 /* There are more DWARF sections than these, but they needn't be added here
2597 unless you have to cope with broken compilers that don't emit section
2598 attributes or you want to help the user writing assembler. */
07d6d2b8
AM
2599 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2600 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2601 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2602 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
0112cd26 2603 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
07d6d2b8
AM
2604 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2605 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2606 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2607 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2608};
2609
b35d266b 2610static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2611{
07d6d2b8 2612 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
6f9dbcd4 2613 { STRING_COMMA_LEN (".fini_array"), -2, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
07d6d2b8 2614 { NULL, 0 , 0, 0, 0 }
7f4d3958
L
2615};
2616
b35d266b 2617static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2618{
0112cd26 2619 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
2620 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
2621 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2622 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
0112cd26
NC
2623 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2624 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
07d6d2b8
AM
2625 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2626 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2627 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2628 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2629};
2630
b35d266b 2631static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2632{
07d6d2b8
AM
2633 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2634 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2635};
2636
b35d266b 2637static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2638{
07d6d2b8 2639 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
6f9dbcd4 2640 { STRING_COMMA_LEN (".init_array"), -2, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
2641 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2642 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2643};
2644
b35d266b 2645static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2646{
0112cd26 2647 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
07d6d2b8 2648 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2649};
2650
b35d266b 2651static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2652{
0112cd26 2653 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
07d6d2b8
AM
2654 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2655 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2656};
2657
b35d266b 2658static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2659{
6f9dbcd4 2660 { STRING_COMMA_LEN (".preinit_array"), -2, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
2661 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2662 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2663};
2664
b35d266b 2665static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2666{
0112cd26
NC
2667 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2668 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
07d6d2b8
AM
2669 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2670 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2671 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2672};
2673
b35d266b 2674static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2675{
0112cd26
NC
2676 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2677 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2678 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2679 /* See struct bfd_elf_special_section declaration for the semantics of
2680 this special case where .prefix_length != strlen (.prefix). */
2681 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
07d6d2b8 2682 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2683};
2684
b35d266b 2685static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2686{
07d6d2b8
AM
2687 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2688 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
0112cd26 2689 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
07d6d2b8 2690 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2691};
2692
1b315056
CS
2693static const struct bfd_elf_special_section special_sections_z[] =
2694{
07d6d2b8
AM
2695 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2696 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
1b315056
CS
2697 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2698 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
07d6d2b8 2699 { NULL, 0, 0, 0, 0 }
1b315056
CS
2700};
2701
e4c93b56 2702static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2703{
7f4d3958 2704 special_sections_b, /* 'b' */
98ece1b3 2705 special_sections_c, /* 'c' */
7f4d3958
L
2706 special_sections_d, /* 'd' */
2707 NULL, /* 'e' */
2708 special_sections_f, /* 'f' */
2709 special_sections_g, /* 'g' */
2710 special_sections_h, /* 'h' */
2711 special_sections_i, /* 'i' */
2712 NULL, /* 'j' */
2713 NULL, /* 'k' */
2714 special_sections_l, /* 'l' */
2715 NULL, /* 'm' */
2716 special_sections_n, /* 'n' */
2717 NULL, /* 'o' */
2718 special_sections_p, /* 'p' */
2719 NULL, /* 'q' */
2720 special_sections_r, /* 'r' */
2721 special_sections_s, /* 's' */
2722 special_sections_t, /* 't' */
1b315056
CS
2723 NULL, /* 'u' */
2724 NULL, /* 'v' */
2725 NULL, /* 'w' */
2726 NULL, /* 'x' */
2727 NULL, /* 'y' */
2728 special_sections_z /* 'z' */
7f4d3958
L
2729};
2730
551b43fd
AM
2731const struct bfd_elf_special_section *
2732_bfd_elf_get_special_section (const char *name,
2733 const struct bfd_elf_special_section *spec,
2734 unsigned int rela)
2f89ff8d
L
2735{
2736 int i;
7f4d3958 2737 int len;
7f4d3958 2738
551b43fd 2739 len = strlen (name);
7f4d3958 2740
551b43fd 2741 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2742 {
2743 int suffix_len;
551b43fd 2744 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2745
2746 if (len < prefix_len)
2747 continue;
551b43fd 2748 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2749 continue;
2750
551b43fd 2751 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2752 if (suffix_len <= 0)
2753 {
2754 if (name[prefix_len] != 0)
2755 {
2756 if (suffix_len == 0)
2757 continue;
2758 if (name[prefix_len] != '.'
2759 && (suffix_len == -2
551b43fd 2760 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2761 continue;
2762 }
2763 }
2764 else
2765 {
2766 if (len < prefix_len + suffix_len)
2767 continue;
2768 if (memcmp (name + len - suffix_len,
551b43fd 2769 spec[i].prefix + prefix_len,
7dcb9820
AM
2770 suffix_len) != 0)
2771 continue;
2772 }
551b43fd 2773 return &spec[i];
7dcb9820 2774 }
2f89ff8d
L
2775
2776 return NULL;
2777}
2778
7dcb9820 2779const struct bfd_elf_special_section *
29ef7005 2780_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2781{
551b43fd
AM
2782 int i;
2783 const struct bfd_elf_special_section *spec;
29ef7005 2784 const struct elf_backend_data *bed;
2f89ff8d
L
2785
2786 /* See if this is one of the special sections. */
551b43fd
AM
2787 if (sec->name == NULL)
2788 return NULL;
2f89ff8d 2789
29ef7005
L
2790 bed = get_elf_backend_data (abfd);
2791 spec = bed->special_sections;
2792 if (spec)
2793 {
2794 spec = _bfd_elf_get_special_section (sec->name,
2795 bed->special_sections,
2796 sec->use_rela_p);
2797 if (spec != NULL)
2798 return spec;
2799 }
2800
551b43fd
AM
2801 if (sec->name[0] != '.')
2802 return NULL;
2f89ff8d 2803
551b43fd 2804 i = sec->name[1] - 'b';
1b315056 2805 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2806 return NULL;
2807
2808 spec = special_sections[i];
2f89ff8d 2809
551b43fd
AM
2810 if (spec == NULL)
2811 return NULL;
2812
2813 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2814}
2815
b34976b6 2816bfd_boolean
217aa764 2817_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2818{
2819 struct bfd_elf_section_data *sdata;
551b43fd 2820 const struct elf_backend_data *bed;
7dcb9820 2821 const struct bfd_elf_special_section *ssect;
252b5132 2822
f0abc2a1
AM
2823 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2824 if (sdata == NULL)
2825 {
a50b1753 2826 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
07d6d2b8 2827 sizeof (*sdata));
f0abc2a1
AM
2828 if (sdata == NULL)
2829 return FALSE;
217aa764 2830 sec->used_by_bfd = sdata;
f0abc2a1 2831 }
bf572ba0 2832
551b43fd
AM
2833 /* Indicate whether or not this section should use RELA relocations. */
2834 bed = get_elf_backend_data (abfd);
2835 sec->use_rela_p = bed->default_use_rela_p;
2836
e843e0f8
L
2837 /* When we read a file, we don't need to set ELF section type and
2838 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2839 anyway. We will set ELF section type and flags for all linker
2840 created sections. If user specifies BFD section flags, we will
2841 set ELF section type and flags based on BFD section flags in
02ecc8e9
L
2842 elf_fake_sections. Special handling for .init_array/.fini_array
2843 output sections since they may contain .ctors/.dtors input
2844 sections. We don't want _bfd_elf_init_private_section_data to
2845 copy ELF section type from .ctors/.dtors input sections. */
2846 if (abfd->direction != read_direction
3496cb2a 2847 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2848 {
551b43fd 2849 ssect = (*bed->get_sec_type_attr) (abfd, sec);
02ecc8e9
L
2850 if (ssect != NULL
2851 && (!sec->flags
2852 || (sec->flags & SEC_LINKER_CREATED) != 0
2853 || ssect->type == SHT_INIT_ARRAY
2854 || ssect->type == SHT_FINI_ARRAY))
a31501e9
L
2855 {
2856 elf_section_type (sec) = ssect->type;
2857 elf_section_flags (sec) = ssect->attr;
2858 }
2f89ff8d
L
2859 }
2860
f592407e 2861 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2862}
2863
2864/* Create a new bfd section from an ELF program header.
2865
2866 Since program segments have no names, we generate a synthetic name
2867 of the form segment<NUM>, where NUM is generally the index in the
2868 program header table. For segments that are split (see below) we
2869 generate the names segment<NUM>a and segment<NUM>b.
2870
2871 Note that some program segments may have a file size that is different than
2872 (less than) the memory size. All this means is that at execution the
2873 system must allocate the amount of memory specified by the memory size,
2874 but only initialize it with the first "file size" bytes read from the
2875 file. This would occur for example, with program segments consisting
2876 of combined data+bss.
2877
2878 To handle the above situation, this routine generates TWO bfd sections
2879 for the single program segment. The first has the length specified by
2880 the file size of the segment, and the second has the length specified
2881 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2882 into its initialized and uninitialized parts.
252b5132
RH
2883
2884 */
2885
b34976b6 2886bfd_boolean
217aa764
AM
2887_bfd_elf_make_section_from_phdr (bfd *abfd,
2888 Elf_Internal_Phdr *hdr,
91d6fa6a 2889 int hdr_index,
a50b1753 2890 const char *type_name)
252b5132
RH
2891{
2892 asection *newsect;
2893 char *name;
2894 char namebuf[64];
d4c88bbb 2895 size_t len;
252b5132
RH
2896 int split;
2897
2898 split = ((hdr->p_memsz > 0)
2899 && (hdr->p_filesz > 0)
2900 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2901
2902 if (hdr->p_filesz > 0)
252b5132 2903 {
91d6fa6a 2904 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2905 len = strlen (namebuf) + 1;
a50b1753 2906 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2907 if (!name)
2908 return FALSE;
2909 memcpy (name, namebuf, len);
2910 newsect = bfd_make_section (abfd, name);
2911 if (newsect == NULL)
2912 return FALSE;
2913 newsect->vma = hdr->p_vaddr;
2914 newsect->lma = hdr->p_paddr;
2915 newsect->size = hdr->p_filesz;
2916 newsect->filepos = hdr->p_offset;
2917 newsect->flags |= SEC_HAS_CONTENTS;
2918 newsect->alignment_power = bfd_log2 (hdr->p_align);
2919 if (hdr->p_type == PT_LOAD)
252b5132 2920 {
d5191d0c
AM
2921 newsect->flags |= SEC_ALLOC;
2922 newsect->flags |= SEC_LOAD;
2923 if (hdr->p_flags & PF_X)
2924 {
2925 /* FIXME: all we known is that it has execute PERMISSION,
2926 may be data. */
2927 newsect->flags |= SEC_CODE;
2928 }
2929 }
2930 if (!(hdr->p_flags & PF_W))
2931 {
2932 newsect->flags |= SEC_READONLY;
252b5132 2933 }
252b5132
RH
2934 }
2935
d5191d0c 2936 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2937 {
d5191d0c
AM
2938 bfd_vma align;
2939
91d6fa6a 2940 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2941 len = strlen (namebuf) + 1;
a50b1753 2942 name = (char *) bfd_alloc (abfd, len);
252b5132 2943 if (!name)
b34976b6 2944 return FALSE;
d4c88bbb 2945 memcpy (name, namebuf, len);
252b5132
RH
2946 newsect = bfd_make_section (abfd, name);
2947 if (newsect == NULL)
b34976b6 2948 return FALSE;
252b5132
RH
2949 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2950 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2951 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2952 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2953 align = newsect->vma & -newsect->vma;
2954 if (align == 0 || align > hdr->p_align)
2955 align = hdr->p_align;
2956 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2957 if (hdr->p_type == PT_LOAD)
2958 {
d5191d0c
AM
2959 /* Hack for gdb. Segments that have not been modified do
2960 not have their contents written to a core file, on the
2961 assumption that a debugger can find the contents in the
2962 executable. We flag this case by setting the fake
2963 section size to zero. Note that "real" bss sections will
2964 always have their contents dumped to the core file. */
2965 if (bfd_get_format (abfd) == bfd_core)
2966 newsect->size = 0;
252b5132
RH
2967 newsect->flags |= SEC_ALLOC;
2968 if (hdr->p_flags & PF_X)
2969 newsect->flags |= SEC_CODE;
2970 }
2971 if (!(hdr->p_flags & PF_W))
2972 newsect->flags |= SEC_READONLY;
2973 }
2974
b34976b6 2975 return TRUE;
252b5132
RH
2976}
2977
b34976b6 2978bfd_boolean
91d6fa6a 2979bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2980{
9c5bfbb7 2981 const struct elf_backend_data *bed;
20cfcaae
NC
2982
2983 switch (hdr->p_type)
2984 {
2985 case PT_NULL:
91d6fa6a 2986 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2987
2988 case PT_LOAD:
91d6fa6a 2989 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2990
2991 case PT_DYNAMIC:
91d6fa6a 2992 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2993
2994 case PT_INTERP:
91d6fa6a 2995 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2996
2997 case PT_NOTE:
91d6fa6a 2998 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2999 return FALSE;
276da9b3
L
3000 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz,
3001 hdr->p_align))
b34976b6
AM
3002 return FALSE;
3003 return TRUE;
20cfcaae
NC
3004
3005 case PT_SHLIB:
91d6fa6a 3006 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
3007
3008 case PT_PHDR:
91d6fa6a 3009 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 3010
811072d8 3011 case PT_GNU_EH_FRAME:
91d6fa6a 3012 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
3013 "eh_frame_hdr");
3014
2b05f1b7 3015 case PT_GNU_STACK:
91d6fa6a 3016 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 3017
8c37241b 3018 case PT_GNU_RELRO:
91d6fa6a 3019 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 3020
20cfcaae 3021 default:
8c1acd09 3022 /* Check for any processor-specific program segment types. */
20cfcaae 3023 bed = get_elf_backend_data (abfd);
91d6fa6a 3024 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
3025 }
3026}
3027
d4730f92
BS
3028/* Return the REL_HDR for SEC, assuming there is only a single one, either
3029 REL or RELA. */
3030
3031Elf_Internal_Shdr *
3032_bfd_elf_single_rel_hdr (asection *sec)
3033{
3034 if (elf_section_data (sec)->rel.hdr)
3035 {
3036 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3037 return elf_section_data (sec)->rel.hdr;
3038 }
3039 else
3040 return elf_section_data (sec)->rela.hdr;
3041}
3042
3e19fb8f
L
3043static bfd_boolean
3044_bfd_elf_set_reloc_sh_name (bfd *abfd,
3045 Elf_Internal_Shdr *rel_hdr,
3046 const char *sec_name,
3047 bfd_boolean use_rela_p)
3048{
3049 char *name = (char *) bfd_alloc (abfd,
3050 sizeof ".rela" + strlen (sec_name));
3051 if (name == NULL)
3052 return FALSE;
3053
3054 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3055 rel_hdr->sh_name =
3056 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3057 FALSE);
3058 if (rel_hdr->sh_name == (unsigned int) -1)
3059 return FALSE;
3060
3061 return TRUE;
3062}
3063
d4730f92
BS
3064/* Allocate and initialize a section-header for a new reloc section,
3065 containing relocations against ASECT. It is stored in RELDATA. If
3066 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3067 relocations. */
23bc299b 3068
5d13b3b3 3069static bfd_boolean
217aa764 3070_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 3071 struct bfd_elf_section_reloc_data *reldata,
f6fe1ccd 3072 const char *sec_name,
3e19fb8f
L
3073 bfd_boolean use_rela_p,
3074 bfd_boolean delay_st_name_p)
23bc299b 3075{
d4730f92 3076 Elf_Internal_Shdr *rel_hdr;
9c5bfbb7 3077 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3078
d4730f92 3079 BFD_ASSERT (reldata->hdr == NULL);
ef53be89 3080 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
d4730f92 3081 reldata->hdr = rel_hdr;
23bc299b 3082
3e19fb8f
L
3083 if (delay_st_name_p)
3084 rel_hdr->sh_name = (unsigned int) -1;
3085 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3086 use_rela_p))
b34976b6 3087 return FALSE;
23bc299b
MM
3088 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3089 rel_hdr->sh_entsize = (use_rela_p
3090 ? bed->s->sizeof_rela
3091 : bed->s->sizeof_rel);
72de5009 3092 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
28e07a05 3093 rel_hdr->sh_flags = 0;
23bc299b
MM
3094 rel_hdr->sh_addr = 0;
3095 rel_hdr->sh_size = 0;
3096 rel_hdr->sh_offset = 0;
3097
b34976b6 3098 return TRUE;
23bc299b
MM
3099}
3100
94be91de
JB
3101/* Return the default section type based on the passed in section flags. */
3102
3103int
3104bfd_elf_get_default_section_type (flagword flags)
3105{
3106 if ((flags & SEC_ALLOC) != 0
2e76e85a 3107 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
3108 return SHT_NOBITS;
3109 return SHT_PROGBITS;
3110}
3111
d4730f92
BS
3112struct fake_section_arg
3113{
3114 struct bfd_link_info *link_info;
3115 bfd_boolean failed;
3116};
3117
252b5132
RH
3118/* Set up an ELF internal section header for a section. */
3119
252b5132 3120static void
d4730f92 3121elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 3122{
d4730f92 3123 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 3124 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3125 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 3126 Elf_Internal_Shdr *this_hdr;
0414f35b 3127 unsigned int sh_type;
0ce398f1 3128 const char *name = asect->name;
3e19fb8f 3129 bfd_boolean delay_st_name_p = FALSE;
252b5132 3130
d4730f92 3131 if (arg->failed)
252b5132
RH
3132 {
3133 /* We already failed; just get out of the bfd_map_over_sections
08a40648 3134 loop. */
252b5132
RH
3135 return;
3136 }
3137
d4730f92 3138 this_hdr = &esd->this_hdr;
252b5132 3139
f6fe1ccd 3140 if (arg->link_info)
0ce398f1 3141 {
f6fe1ccd
L
3142 /* ld: compress DWARF debug sections with names: .debug_*. */
3143 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
3144 && (asect->flags & SEC_DEBUGGING)
3145 && name[1] == 'd'
3146 && name[6] == '_')
3147 {
3148 /* Set SEC_ELF_COMPRESS to indicate this section should be
3149 compressed. */
3150 asect->flags |= SEC_ELF_COMPRESS;
0ce398f1 3151
dd905818 3152 /* If this section will be compressed, delay adding section
3e19fb8f
L
3153 name to section name section after it is compressed in
3154 _bfd_elf_assign_file_positions_for_non_load. */
3155 delay_st_name_p = TRUE;
f6fe1ccd
L
3156 }
3157 }
3158 else if ((asect->flags & SEC_ELF_RENAME))
3159 {
3160 /* objcopy: rename output DWARF debug section. */
3161 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
3162 {
3163 /* When we decompress or compress with SHF_COMPRESSED,
3164 convert section name from .zdebug_* to .debug_* if
3165 needed. */
3166 if (name[1] == 'z')
3167 {
3168 char *new_name = convert_zdebug_to_debug (abfd, name);
3169 if (new_name == NULL)
3170 {
3171 arg->failed = TRUE;
3172 return;
3173 }
3174 name = new_name;
3175 }
3176 }
3177 else if (asect->compress_status == COMPRESS_SECTION_DONE)
0ce398f1 3178 {
f6fe1ccd
L
3179 /* PR binutils/18087: Compression does not always make a
3180 section smaller. So only rename the section when
3181 compression has actually taken place. If input section
3182 name is .zdebug_*, we should never compress it again. */
3183 char *new_name = convert_debug_to_zdebug (abfd, name);
0ce398f1
L
3184 if (new_name == NULL)
3185 {
3186 arg->failed = TRUE;
3187 return;
3188 }
f6fe1ccd
L
3189 BFD_ASSERT (name[1] != 'z');
3190 name = new_name;
0ce398f1
L
3191 }
3192 }
3193
3e19fb8f
L
3194 if (delay_st_name_p)
3195 this_hdr->sh_name = (unsigned int) -1;
3196 else
252b5132 3197 {
3e19fb8f
L
3198 this_hdr->sh_name
3199 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3200 name, FALSE);
3201 if (this_hdr->sh_name == (unsigned int) -1)
3202 {
3203 arg->failed = TRUE;
3204 return;
3205 }
252b5132
RH
3206 }
3207
a4d8e49b 3208 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
3209
3210 if ((asect->flags & SEC_ALLOC) != 0
3211 || asect->user_set_vma)
3212 this_hdr->sh_addr = asect->vma;
3213 else
3214 this_hdr->sh_addr = 0;
3215
3216 this_hdr->sh_offset = 0;
eea6121a 3217 this_hdr->sh_size = asect->size;
252b5132 3218 this_hdr->sh_link = 0;
c86934ce
NC
3219 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3220 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3221 {
4eca0228 3222 _bfd_error_handler
695344c0 3223 /* xgettext:c-format */
c86934ce 3224 (_("%B: error: Alignment power %d of section `%A' is too big"),
c08bb8dd 3225 abfd, asect->alignment_power, asect);
c86934ce
NC
3226 arg->failed = TRUE;
3227 return;
3228 }
72de5009 3229 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
3230 /* The sh_entsize and sh_info fields may have been set already by
3231 copy_private_section_data. */
3232
3233 this_hdr->bfd_section = asect;
3234 this_hdr->contents = NULL;
3235
3cddba1e
L
3236 /* If the section type is unspecified, we set it based on
3237 asect->flags. */
98ece1b3
AM
3238 if ((asect->flags & SEC_GROUP) != 0)
3239 sh_type = SHT_GROUP;
98ece1b3 3240 else
94be91de 3241 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 3242
3cddba1e 3243 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
3244 this_hdr->sh_type = sh_type;
3245 else if (this_hdr->sh_type == SHT_NOBITS
3246 && sh_type == SHT_PROGBITS
3247 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 3248 {
98ece1b3
AM
3249 /* Warn if we are changing a NOBITS section to PROGBITS, but
3250 allow the link to proceed. This can happen when users link
3251 non-bss input sections to bss output sections, or emit data
3252 to a bss output section via a linker script. */
4eca0228 3253 _bfd_error_handler
58f0869b 3254 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 3255 this_hdr->sh_type = sh_type;
3cddba1e
L
3256 }
3257
2f89ff8d 3258 switch (this_hdr->sh_type)
252b5132 3259 {
2f89ff8d 3260 default:
2f89ff8d
L
3261 break;
3262
3263 case SHT_STRTAB:
2f89ff8d
L
3264 case SHT_NOTE:
3265 case SHT_NOBITS:
3266 case SHT_PROGBITS:
3267 break;
606851fb
AM
3268
3269 case SHT_INIT_ARRAY:
3270 case SHT_FINI_ARRAY:
3271 case SHT_PREINIT_ARRAY:
3272 this_hdr->sh_entsize = bed->s->arch_size / 8;
3273 break;
2f89ff8d
L
3274
3275 case SHT_HASH:
c7ac6ff8 3276 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 3277 break;
5de3bf90 3278
2f89ff8d 3279 case SHT_DYNSYM:
252b5132 3280 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
3281 break;
3282
3283 case SHT_DYNAMIC:
252b5132 3284 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
3285 break;
3286
3287 case SHT_RELA:
3288 if (get_elf_backend_data (abfd)->may_use_rela_p)
3289 this_hdr->sh_entsize = bed->s->sizeof_rela;
3290 break;
3291
3292 case SHT_REL:
3293 if (get_elf_backend_data (abfd)->may_use_rel_p)
3294 this_hdr->sh_entsize = bed->s->sizeof_rel;
3295 break;
3296
3297 case SHT_GNU_versym:
252b5132 3298 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
3299 break;
3300
3301 case SHT_GNU_verdef:
252b5132
RH
3302 this_hdr->sh_entsize = 0;
3303 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3304 cverdefs. The linker will set cverdefs, but sh_info will be
3305 zero. */
252b5132
RH
3306 if (this_hdr->sh_info == 0)
3307 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3308 else
3309 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3310 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
3311 break;
3312
3313 case SHT_GNU_verneed:
252b5132
RH
3314 this_hdr->sh_entsize = 0;
3315 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3316 cverrefs. The linker will set cverrefs, but sh_info will be
3317 zero. */
252b5132
RH
3318 if (this_hdr->sh_info == 0)
3319 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3320 else
3321 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3322 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
3323 break;
3324
3325 case SHT_GROUP:
1783205a 3326 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 3327 break;
fdc90cb4
JJ
3328
3329 case SHT_GNU_HASH:
3330 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3331 break;
dbb410c3 3332 }
252b5132
RH
3333
3334 if ((asect->flags & SEC_ALLOC) != 0)
3335 this_hdr->sh_flags |= SHF_ALLOC;
3336 if ((asect->flags & SEC_READONLY) == 0)
3337 this_hdr->sh_flags |= SHF_WRITE;
3338 if ((asect->flags & SEC_CODE) != 0)
3339 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
3340 if ((asect->flags & SEC_MERGE) != 0)
3341 {
3342 this_hdr->sh_flags |= SHF_MERGE;
3343 this_hdr->sh_entsize = asect->entsize;
f5fa8ca2 3344 }
84865015
NC
3345 if ((asect->flags & SEC_STRINGS) != 0)
3346 this_hdr->sh_flags |= SHF_STRINGS;
1126897b 3347 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 3348 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 3349 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
3350 {
3351 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
3352 if (asect->size == 0
3353 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 3354 {
3a800eb9 3355 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 3356
704afa60 3357 this_hdr->sh_size = 0;
3a800eb9
AM
3358 if (o != NULL)
3359 {
704afa60 3360 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
3361 if (this_hdr->sh_size != 0)
3362 this_hdr->sh_type = SHT_NOBITS;
3363 }
704afa60
JJ
3364 }
3365 }
18ae9cc1
L
3366 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3367 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 3368
d4730f92
BS
3369 /* If the section has relocs, set up a section header for the
3370 SHT_REL[A] section. If two relocation sections are required for
3371 this section, it is up to the processor-specific back-end to
3372 create the other. */
3373 if ((asect->flags & SEC_RELOC) != 0)
3374 {
3375 /* When doing a relocatable link, create both REL and RELA sections if
3376 needed. */
3377 if (arg->link_info
3378 /* Do the normal setup if we wouldn't create any sections here. */
3379 && esd->rel.count + esd->rela.count > 0
0e1862bb
L
3380 && (bfd_link_relocatable (arg->link_info)
3381 || arg->link_info->emitrelocations))
d4730f92
BS
3382 {
3383 if (esd->rel.count && esd->rel.hdr == NULL
28e07a05 3384 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name,
db4677b8 3385 FALSE, delay_st_name_p))
d4730f92
BS
3386 {
3387 arg->failed = TRUE;
3388 return;
3389 }
3390 if (esd->rela.count && esd->rela.hdr == NULL
28e07a05 3391 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name,
db4677b8 3392 TRUE, delay_st_name_p))
d4730f92
BS
3393 {
3394 arg->failed = TRUE;
3395 return;
3396 }
3397 }
3398 else if (!_bfd_elf_init_reloc_shdr (abfd,
3399 (asect->use_rela_p
3400 ? &esd->rela : &esd->rel),
f6fe1ccd 3401 name,
3e19fb8f
L
3402 asect->use_rela_p,
3403 delay_st_name_p))
db4677b8 3404 {
d4730f92 3405 arg->failed = TRUE;
db4677b8
AM
3406 return;
3407 }
d4730f92
BS
3408 }
3409
252b5132 3410 /* Check for processor-specific section types. */
0414f35b 3411 sh_type = this_hdr->sh_type;
e1fddb6b
AO
3412 if (bed->elf_backend_fake_sections
3413 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
db4677b8
AM
3414 {
3415 arg->failed = TRUE;
3416 return;
3417 }
252b5132 3418
42bb2e33 3419 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
3420 {
3421 /* Don't change the header type from NOBITS if we are being
42bb2e33 3422 called for objcopy --only-keep-debug. */
0414f35b
AM
3423 this_hdr->sh_type = sh_type;
3424 }
252b5132
RH
3425}
3426
bcacc0f5
AM
3427/* Fill in the contents of a SHT_GROUP section. Called from
3428 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3429 when ELF targets use the generic linker, ld. Called for ld -r
3430 from bfd_elf_final_link. */
dbb410c3 3431
1126897b 3432void
217aa764 3433bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 3434{
a50b1753 3435 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 3436 asection *elt, *first;
dbb410c3 3437 unsigned char *loc;
b34976b6 3438 bfd_boolean gas;
dbb410c3 3439
7e4111ad
L
3440 /* Ignore linker created group section. See elfNN_ia64_object_p in
3441 elfxx-ia64.c. */
3442 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
3443 || *failedptr)
3444 return;
3445
bcacc0f5
AM
3446 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3447 {
3448 unsigned long symindx = 0;
3449
3450 /* elf_group_id will have been set up by objcopy and the
3451 generic linker. */
3452 if (elf_group_id (sec) != NULL)
3453 symindx = elf_group_id (sec)->udata.i;
1126897b 3454
bcacc0f5
AM
3455 if (symindx == 0)
3456 {
3457 /* If called from the assembler, swap_out_syms will have set up
3458 elf_section_syms. */
3459 BFD_ASSERT (elf_section_syms (abfd) != NULL);
3460 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3461 }
3462 elf_section_data (sec)->this_hdr.sh_info = symindx;
3463 }
3464 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 3465 {
bcacc0f5
AM
3466 /* The ELF backend linker sets sh_info to -2 when the group
3467 signature symbol is global, and thus the index can't be
3468 set until all local symbols are output. */
53720c49
AM
3469 asection *igroup;
3470 struct bfd_elf_section_data *sec_data;
3471 unsigned long symndx;
3472 unsigned long extsymoff;
bcacc0f5
AM
3473 struct elf_link_hash_entry *h;
3474
53720c49
AM
3475 /* The point of this little dance to the first SHF_GROUP section
3476 then back to the SHT_GROUP section is that this gets us to
3477 the SHT_GROUP in the input object. */
3478 igroup = elf_sec_group (elf_next_in_group (sec));
3479 sec_data = elf_section_data (igroup);
3480 symndx = sec_data->this_hdr.sh_info;
3481 extsymoff = 0;
bcacc0f5
AM
3482 if (!elf_bad_symtab (igroup->owner))
3483 {
3484 Elf_Internal_Shdr *symtab_hdr;
3485
3486 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3487 extsymoff = symtab_hdr->sh_info;
3488 }
3489 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3490 while (h->root.type == bfd_link_hash_indirect
3491 || h->root.type == bfd_link_hash_warning)
3492 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3493
3494 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 3495 }
dbb410c3 3496
1126897b 3497 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 3498 gas = TRUE;
dbb410c3
AM
3499 if (sec->contents == NULL)
3500 {
b34976b6 3501 gas = FALSE;
a50b1753 3502 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
3503
3504 /* Arrange for the section to be written out. */
3505 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
3506 if (sec->contents == NULL)
3507 {
b34976b6 3508 *failedptr = TRUE;
dbb410c3
AM
3509 return;
3510 }
3511 }
3512
eea6121a 3513 loc = sec->contents + sec->size;
dbb410c3 3514
9dce4196
AM
3515 /* Get the pointer to the first section in the group that gas
3516 squirreled away here. objcopy arranges for this to be set to the
3517 start of the input section group. */
3518 first = elt = elf_next_in_group (sec);
dbb410c3
AM
3519
3520 /* First element is a flag word. Rest of section is elf section
3521 indices for all the sections of the group. Write them backwards
3522 just to keep the group in the same order as given in .section
3523 directives, not that it matters. */
3524 while (elt != NULL)
3525 {
9dce4196 3526 asection *s;
9dce4196 3527
9dce4196 3528 s = elt;
415f38a6
AM
3529 if (!gas)
3530 s = s->output_section;
3531 if (s != NULL
3532 && !bfd_is_abs_section (s))
01e1a5bc 3533 {
db4677b8 3534 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
28e07a05
AM
3535 struct bfd_elf_section_data *input_elf_sec = elf_section_data (elt);
3536
3537 if (elf_sec->rel.hdr != NULL
3538 && (gas
3539 || (input_elf_sec->rel.hdr != NULL
3540 && input_elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0))
db4677b8 3541 {
28e07a05 3542 elf_sec->rel.hdr->sh_flags |= SHF_GROUP;
db4677b8
AM
3543 loc -= 4;
3544 H_PUT_32 (abfd, elf_sec->rel.idx, loc);
3545 }
28e07a05
AM
3546 if (elf_sec->rela.hdr != NULL
3547 && (gas
3548 || (input_elf_sec->rela.hdr != NULL
3549 && input_elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0))
db4677b8 3550 {
28e07a05 3551 elf_sec->rela.hdr->sh_flags |= SHF_GROUP;
db4677b8
AM
3552 loc -= 4;
3553 H_PUT_32 (abfd, elf_sec->rela.idx, loc);
3554 }
01e1a5bc 3555 loc -= 4;
db4677b8 3556 H_PUT_32 (abfd, elf_sec->this_idx, loc);
01e1a5bc 3557 }
945906ff 3558 elt = elf_next_in_group (elt);
9dce4196
AM
3559 if (elt == first)
3560 break;
dbb410c3
AM
3561 }
3562
7bdf4127
AB
3563 loc -= 4;
3564 BFD_ASSERT (loc == sec->contents);
dbb410c3 3565
9dce4196 3566 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
3567}
3568
bce964aa
AM
3569/* Given NAME, the name of a relocation section stripped of its
3570 .rel/.rela prefix, return the section in ABFD to which the
3571 relocations apply. */
bd53a53a
L
3572
3573asection *
bce964aa
AM
3574_bfd_elf_plt_get_reloc_section (bfd *abfd, const char *name)
3575{
3576 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3577 section likely apply to .got.plt or .got section. */
3578 if (get_elf_backend_data (abfd)->want_got_plt
3579 && strcmp (name, ".plt") == 0)
3580 {
3581 asection *sec;
3582
3583 name = ".got.plt";
3584 sec = bfd_get_section_by_name (abfd, name);
3585 if (sec != NULL)
3586 return sec;
3587 name = ".got";
3588 }
3589
3590 return bfd_get_section_by_name (abfd, name);
3591}
3592
3593/* Return the section to which RELOC_SEC applies. */
3594
3595static asection *
3596elf_get_reloc_section (asection *reloc_sec)
bd53a53a
L
3597{
3598 const char *name;
3599 unsigned int type;
3600 bfd *abfd;
bce964aa 3601 const struct elf_backend_data *bed;
bd53a53a
L
3602
3603 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3604 if (type != SHT_REL && type != SHT_RELA)
3605 return NULL;
3606
3607 /* We look up the section the relocs apply to by name. */
3608 name = reloc_sec->name;
bce964aa
AM
3609 if (strncmp (name, ".rel", 4) != 0)
3610 return NULL;
3611 name += 4;
3612 if (type == SHT_RELA && *name++ != 'a')
3613 return NULL;
bd53a53a 3614
bd53a53a 3615 abfd = reloc_sec->owner;
bce964aa
AM
3616 bed = get_elf_backend_data (abfd);
3617 return bed->get_reloc_section (abfd, name);
bd53a53a
L
3618}
3619
252b5132
RH
3620/* Assign all ELF section numbers. The dummy first section is handled here
3621 too. The link/info pointers for the standard section types are filled
3622 in here too, while we're at it. */
3623
b34976b6 3624static bfd_boolean
da9f89d4 3625assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
3626{
3627 struct elf_obj_tdata *t = elf_tdata (abfd);
3628 asection *sec;
3e19fb8f 3629 unsigned int section_number;
252b5132 3630 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 3631 struct bfd_elf_section_data *d;
3516e984 3632 bfd_boolean need_symtab;
252b5132
RH
3633
3634 section_number = 1;
3635
2b0f7ef9
JJ
3636 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3637
da9f89d4 3638 /* SHT_GROUP sections are in relocatable files only. */
7bdf4127 3639 if (link_info == NULL || !link_info->resolve_section_groups)
252b5132 3640 {
ef53be89 3641 size_t reloc_count = 0;
14f2c699 3642
da9f89d4 3643 /* Put SHT_GROUP sections first. */
04dd1667 3644 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 3645 {
5daa8fe7 3646 d = elf_section_data (sec);
da9f89d4
L
3647
3648 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 3649 {
5daa8fe7 3650 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
3651 {
3652 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 3653 bfd_section_list_remove (abfd, sec);
da9f89d4 3654 abfd->section_count--;
da9f89d4 3655 }
08a40648 3656 else
4fbb74a6 3657 d->this_idx = section_number++;
da9f89d4 3658 }
14f2c699
L
3659
3660 /* Count relocations. */
3661 reloc_count += sec->reloc_count;
47cc2cf5 3662 }
14f2c699
L
3663
3664 /* Clear HAS_RELOC if there are no relocations. */
3665 if (reloc_count == 0)
3666 abfd->flags &= ~HAS_RELOC;
47cc2cf5
PB
3667 }
3668
3669 for (sec = abfd->sections; sec; sec = sec->next)
3670 {
3671 d = elf_section_data (sec);
3672
3673 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 3674 d->this_idx = section_number++;
3e19fb8f
L
3675 if (d->this_hdr.sh_name != (unsigned int) -1)
3676 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 3677 if (d->rel.hdr)
2b0f7ef9 3678 {
d4730f92 3679 d->rel.idx = section_number++;
3e19fb8f
L
3680 if (d->rel.hdr->sh_name != (unsigned int) -1)
3681 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 3682 }
d4730f92
BS
3683 else
3684 d->rel.idx = 0;
23bc299b 3685
d4730f92 3686 if (d->rela.hdr)
2b0f7ef9 3687 {
d4730f92 3688 d->rela.idx = section_number++;
3e19fb8f
L
3689 if (d->rela.hdr->sh_name != (unsigned int) -1)
3690 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 3691 }
23bc299b 3692 else
d4730f92 3693 d->rela.idx = 0;
252b5132
RH
3694 }
3695
3516e984
L
3696 need_symtab = (bfd_get_symcount (abfd) > 0
3697 || (link_info == NULL
3698 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3699 == HAS_RELOC)));
3700 if (need_symtab)
252b5132 3701 {
12bd6957 3702 elf_onesymtab (abfd) = section_number++;
2b0f7ef9 3703 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 3704 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 3705 {
6a40cf0c
NC
3706 elf_section_list * entry;
3707
3708 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3709
3710 entry = bfd_zalloc (abfd, sizeof * entry);
3711 entry->ndx = section_number++;
3712 elf_symtab_shndx_list (abfd) = entry;
3713 entry->hdr.sh_name
9ad5cbcf 3714 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3715 ".symtab_shndx", FALSE);
6a40cf0c 3716 if (entry->hdr.sh_name == (unsigned int) -1)
b34976b6 3717 return FALSE;
9ad5cbcf 3718 }
12bd6957 3719 elf_strtab_sec (abfd) = section_number++;
2b0f7ef9 3720 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3721 }
3722
dd905818
NC
3723 elf_shstrtab_sec (abfd) = section_number++;
3724 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3725 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3726
1c52a645
L
3727 if (section_number >= SHN_LORESERVE)
3728 {
695344c0 3729 /* xgettext:c-format */
1c52a645
L
3730 _bfd_error_handler (_("%B: too many sections: %u"),
3731 abfd, section_number);
3732 return FALSE;
3733 }
3734
9ad5cbcf 3735 elf_numsections (abfd) = section_number;
252b5132
RH
3736 elf_elfheader (abfd)->e_shnum = section_number;
3737
3738 /* Set up the list of section header pointers, in agreement with the
3739 indices. */
a50b1753 3740 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
07d6d2b8 3741 sizeof (Elf_Internal_Shdr *));
252b5132 3742 if (i_shdrp == NULL)
b34976b6 3743 return FALSE;
252b5132 3744
a50b1753 3745 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
07d6d2b8 3746 sizeof (Elf_Internal_Shdr));
252b5132
RH
3747 if (i_shdrp[0] == NULL)
3748 {
3749 bfd_release (abfd, i_shdrp);
b34976b6 3750 return FALSE;
252b5132 3751 }
252b5132
RH
3752
3753 elf_elfsections (abfd) = i_shdrp;
3754
12bd6957 3755 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3516e984 3756 if (need_symtab)
252b5132 3757 {
12bd6957 3758 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
4fbb74a6 3759 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf 3760 {
6a40cf0c
NC
3761 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3762 BFD_ASSERT (entry != NULL);
3763 i_shdrp[entry->ndx] = & entry->hdr;
3764 entry->hdr.sh_link = elf_onesymtab (abfd);
9ad5cbcf 3765 }
12bd6957
AM
3766 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3767 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
252b5132 3768 }
38ce5b11 3769
252b5132
RH
3770 for (sec = abfd->sections; sec; sec = sec->next)
3771 {
252b5132 3772 asection *s;
252b5132 3773
91d6fa6a
NC
3774 d = elf_section_data (sec);
3775
252b5132 3776 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3777 if (d->rel.idx != 0)
3778 i_shdrp[d->rel.idx] = d->rel.hdr;
3779 if (d->rela.idx != 0)
3780 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3781
3782 /* Fill in the sh_link and sh_info fields while we're at it. */
3783
3784 /* sh_link of a reloc section is the section index of the symbol
3785 table. sh_info is the section index of the section to which
3786 the relocation entries apply. */
d4730f92 3787 if (d->rel.idx != 0)
252b5132 3788 {
12bd6957 3789 d->rel.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3790 d->rel.hdr->sh_info = d->this_idx;
9ef5d938 3791 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
252b5132 3792 }
d4730f92 3793 if (d->rela.idx != 0)
23bc299b 3794 {
12bd6957 3795 d->rela.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3796 d->rela.hdr->sh_info = d->this_idx;
9ef5d938 3797 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
23bc299b 3798 }
252b5132 3799
38ce5b11
L
3800 /* We need to set up sh_link for SHF_LINK_ORDER. */
3801 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3802 {
3803 s = elf_linked_to_section (sec);
3804 if (s)
38ce5b11 3805 {
f2876037 3806 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3807 if (link_info != NULL)
38ce5b11 3808 {
f2876037 3809 /* Check discarded linkonce section. */
dbaa2011 3810 if (discarded_section (s))
38ce5b11 3811 {
ccd2ec6a 3812 asection *kept;
4eca0228 3813 _bfd_error_handler
695344c0 3814 /* xgettext:c-format */
63a5468a
AM
3815 (_("%B: sh_link of section `%A' points to"
3816 " discarded section `%A' of `%B'"),
ccd2ec6a
L
3817 abfd, d->this_hdr.bfd_section,
3818 s, s->owner);
3819 /* Point to the kept section if it has the same
3820 size as the discarded one. */
c0f00686 3821 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3822 if (kept == NULL)
185d09ad 3823 {
ccd2ec6a
L
3824 bfd_set_error (bfd_error_bad_value);
3825 return FALSE;
185d09ad 3826 }
ccd2ec6a 3827 s = kept;
38ce5b11 3828 }
e424ecc8 3829
ccd2ec6a
L
3830 s = s->output_section;
3831 BFD_ASSERT (s != NULL);
38ce5b11 3832 }
f2876037
L
3833 else
3834 {
3835 /* Handle objcopy. */
3836 if (s->output_section == NULL)
3837 {
4eca0228 3838 _bfd_error_handler
695344c0 3839 /* xgettext:c-format */
63a5468a
AM
3840 (_("%B: sh_link of section `%A' points to"
3841 " removed section `%A' of `%B'"),
f2876037
L
3842 abfd, d->this_hdr.bfd_section, s, s->owner);
3843 bfd_set_error (bfd_error_bad_value);
3844 return FALSE;
3845 }
3846 s = s->output_section;
3847 }
ccd2ec6a
L
3848 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3849 }
3850 else
3851 {
3852 /* PR 290:
3853 The Intel C compiler generates SHT_IA_64_UNWIND with
3854 SHF_LINK_ORDER. But it doesn't set the sh_link or
3855 sh_info fields. Hence we could get the situation
08a40648 3856 where s is NULL. */
ccd2ec6a
L
3857 const struct elf_backend_data *bed
3858 = get_elf_backend_data (abfd);
3859 if (bed->link_order_error_handler)
3860 bed->link_order_error_handler
695344c0 3861 /* xgettext:c-format */
ccd2ec6a
L
3862 (_("%B: warning: sh_link not set for section `%A'"),
3863 abfd, sec);
38ce5b11
L
3864 }
3865 }
3866
252b5132
RH
3867 switch (d->this_hdr.sh_type)
3868 {
3869 case SHT_REL:
3870 case SHT_RELA:
3871 /* A reloc section which we are treating as a normal BFD
3872 section. sh_link is the section index of the symbol
3873 table. sh_info is the section index of the section to
3874 which the relocation entries apply. We assume that an
3875 allocated reloc section uses the dynamic symbol table.
3876 FIXME: How can we be sure? */
3877 s = bfd_get_section_by_name (abfd, ".dynsym");
3878 if (s != NULL)
3879 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3880
bce964aa 3881 s = elf_get_reloc_section (sec);
252b5132 3882 if (s != NULL)
9ef5d938
L
3883 {
3884 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3885 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3886 }
252b5132
RH
3887 break;
3888
3889 case SHT_STRTAB:
3890 /* We assume that a section named .stab*str is a stabs
3891 string section. We look for a section with the same name
3892 but without the trailing ``str'', and set its sh_link
3893 field to point to this section. */
0112cd26 3894 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3895 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3896 {
3897 size_t len;
3898 char *alc;
3899
3900 len = strlen (sec->name);
a50b1753 3901 alc = (char *) bfd_malloc (len - 2);
252b5132 3902 if (alc == NULL)
b34976b6 3903 return FALSE;
d4c88bbb 3904 memcpy (alc, sec->name, len - 3);
252b5132
RH
3905 alc[len - 3] = '\0';
3906 s = bfd_get_section_by_name (abfd, alc);
3907 free (alc);
3908 if (s != NULL)
3909 {
3910 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3911
3912 /* This is a .stab section. */
0594c12d
AM
3913 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3914 elf_section_data (s)->this_hdr.sh_entsize
3915 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3916 }
3917 }
3918 break;
3919
3920 case SHT_DYNAMIC:
3921 case SHT_DYNSYM:
3922 case SHT_GNU_verneed:
3923 case SHT_GNU_verdef:
3924 /* sh_link is the section header index of the string table
3925 used for the dynamic entries, or the symbol table, or the
3926 version strings. */
3927 s = bfd_get_section_by_name (abfd, ".dynstr");
3928 if (s != NULL)
3929 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3930 break;
3931
7f1204bb
JJ
3932 case SHT_GNU_LIBLIST:
3933 /* sh_link is the section header index of the prelink library
08a40648
AM
3934 list used for the dynamic entries, or the symbol table, or
3935 the version strings. */
7f1204bb
JJ
3936 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3937 ? ".dynstr" : ".gnu.libstr");
3938 if (s != NULL)
3939 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3940 break;
3941
252b5132 3942 case SHT_HASH:
fdc90cb4 3943 case SHT_GNU_HASH:
252b5132
RH
3944 case SHT_GNU_versym:
3945 /* sh_link is the section header index of the symbol table
3946 this hash table or version table is for. */
3947 s = bfd_get_section_by_name (abfd, ".dynsym");
3948 if (s != NULL)
3949 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3950 break;
dbb410c3
AM
3951
3952 case SHT_GROUP:
12bd6957 3953 d->this_hdr.sh_link = elf_onesymtab (abfd);
252b5132
RH
3954 }
3955 }
3956
3e19fb8f
L
3957 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
3958 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
3959 debug section name from .debug_* to .zdebug_* if needed. */
3960
b34976b6 3961 return TRUE;
252b5132
RH
3962}
3963
5372391b 3964static bfd_boolean
217aa764 3965sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3966{
3967 /* If the backend has a special mapping, use it. */
9c5bfbb7 3968 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3969 if (bed->elf_backend_sym_is_global)
3970 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3971
e47bf690 3972 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3973 || bfd_is_und_section (bfd_get_section (sym))
3974 || bfd_is_com_section (bfd_get_section (sym)));
3975}
3976
76359541
TP
3977/* Filter global symbols of ABFD to include in the import library. All
3978 SYMCOUNT symbols of ABFD can be examined from their pointers in
3979 SYMS. Pointers of symbols to keep should be stored contiguously at
3980 the beginning of that array.
3981
3982 Returns the number of symbols to keep. */
3983
3984unsigned int
3985_bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
3986 asymbol **syms, long symcount)
3987{
3988 long src_count, dst_count = 0;
3989
3990 for (src_count = 0; src_count < symcount; src_count++)
3991 {
3992 asymbol *sym = syms[src_count];
3993 char *name = (char *) bfd_asymbol_name (sym);
3994 struct bfd_link_hash_entry *h;
3995
3996 if (!sym_is_global (abfd, sym))
3997 continue;
3998
3999 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, FALSE);
5df1bc57
AM
4000 if (h == NULL)
4001 continue;
76359541
TP
4002 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
4003 continue;
76359541
TP
4004 if (h->linker_def || h->ldscript_def)
4005 continue;
4006
4007 syms[dst_count++] = sym;
4008 }
4009
4010 syms[dst_count] = NULL;
4011
4012 return dst_count;
4013}
4014
5372391b 4015/* Don't output section symbols for sections that are not going to be
c6d8cab4 4016 output, that are duplicates or there is no BFD section. */
5372391b
AM
4017
4018static bfd_boolean
4019ignore_section_sym (bfd *abfd, asymbol *sym)
4020{
c6d8cab4
L
4021 elf_symbol_type *type_ptr;
4022
4023 if ((sym->flags & BSF_SECTION_SYM) == 0)
4024 return FALSE;
4025
4026 type_ptr = elf_symbol_from (abfd, sym);
4027 return ((type_ptr != NULL
4028 && type_ptr->internal_elf_sym.st_shndx != 0
4029 && bfd_is_abs_section (sym->section))
4030 || !(sym->section->owner == abfd
0f0a5e58 4031 || (sym->section->output_section->owner == abfd
2633a79c
AM
4032 && sym->section->output_offset == 0)
4033 || bfd_is_abs_section (sym->section)));
5372391b
AM
4034}
4035
2633a79c
AM
4036/* Map symbol from it's internal number to the external number, moving
4037 all local symbols to be at the head of the list. */
4038
b34976b6 4039static bfd_boolean
12bd6957 4040elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
252b5132 4041{
dc810e39 4042 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
4043 asymbol **syms = bfd_get_outsymbols (abfd);
4044 asymbol **sect_syms;
dc810e39
AM
4045 unsigned int num_locals = 0;
4046 unsigned int num_globals = 0;
4047 unsigned int num_locals2 = 0;
4048 unsigned int num_globals2 = 0;
7292b3ac 4049 unsigned int max_index = 0;
dc810e39 4050 unsigned int idx;
252b5132
RH
4051 asection *asect;
4052 asymbol **new_syms;
252b5132
RH
4053
4054#ifdef DEBUG
4055 fprintf (stderr, "elf_map_symbols\n");
4056 fflush (stderr);
4057#endif
4058
252b5132
RH
4059 for (asect = abfd->sections; asect; asect = asect->next)
4060 {
4061 if (max_index < asect->index)
4062 max_index = asect->index;
4063 }
4064
4065 max_index++;
a50b1753 4066 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 4067 if (sect_syms == NULL)
b34976b6 4068 return FALSE;
252b5132 4069 elf_section_syms (abfd) = sect_syms;
4e89ac30 4070 elf_num_section_syms (abfd) = max_index;
252b5132 4071
079e9a2f
AM
4072 /* Init sect_syms entries for any section symbols we have already
4073 decided to output. */
252b5132
RH
4074 for (idx = 0; idx < symcount; idx++)
4075 {
dc810e39 4076 asymbol *sym = syms[idx];
c044fabd 4077
252b5132 4078 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 4079 && sym->value == 0
2633a79c
AM
4080 && !ignore_section_sym (abfd, sym)
4081 && !bfd_is_abs_section (sym->section))
252b5132 4082 {
5372391b 4083 asection *sec = sym->section;
252b5132 4084
5372391b
AM
4085 if (sec->owner != abfd)
4086 sec = sec->output_section;
252b5132 4087
5372391b 4088 sect_syms[sec->index] = syms[idx];
252b5132
RH
4089 }
4090 }
4091
252b5132
RH
4092 /* Classify all of the symbols. */
4093 for (idx = 0; idx < symcount; idx++)
4094 {
2633a79c 4095 if (sym_is_global (abfd, syms[idx]))
252b5132 4096 num_globals++;
2633a79c
AM
4097 else if (!ignore_section_sym (abfd, syms[idx]))
4098 num_locals++;
252b5132 4099 }
079e9a2f 4100
5372391b 4101 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
4102 sections will already have a section symbol in outsymbols, but
4103 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4104 at least in that case. */
252b5132
RH
4105 for (asect = abfd->sections; asect; asect = asect->next)
4106 {
079e9a2f 4107 if (sect_syms[asect->index] == NULL)
252b5132 4108 {
079e9a2f 4109 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
4110 num_locals++;
4111 else
4112 num_globals++;
252b5132
RH
4113 }
4114 }
4115
4116 /* Now sort the symbols so the local symbols are first. */
a50b1753 4117 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
07d6d2b8 4118 sizeof (asymbol *));
dc810e39 4119
252b5132 4120 if (new_syms == NULL)
b34976b6 4121 return FALSE;
252b5132
RH
4122
4123 for (idx = 0; idx < symcount; idx++)
4124 {
4125 asymbol *sym = syms[idx];
dc810e39 4126 unsigned int i;
252b5132 4127
2633a79c
AM
4128 if (sym_is_global (abfd, sym))
4129 i = num_locals + num_globals2++;
4130 else if (!ignore_section_sym (abfd, sym))
252b5132
RH
4131 i = num_locals2++;
4132 else
2633a79c 4133 continue;
252b5132
RH
4134 new_syms[i] = sym;
4135 sym->udata.i = i + 1;
4136 }
4137 for (asect = abfd->sections; asect; asect = asect->next)
4138 {
079e9a2f 4139 if (sect_syms[asect->index] == NULL)
252b5132 4140 {
079e9a2f 4141 asymbol *sym = asect->symbol;
dc810e39 4142 unsigned int i;
252b5132 4143
079e9a2f 4144 sect_syms[asect->index] = sym;
252b5132
RH
4145 if (!sym_is_global (abfd, sym))
4146 i = num_locals2++;
4147 else
4148 i = num_locals + num_globals2++;
4149 new_syms[i] = sym;
4150 sym->udata.i = i + 1;
4151 }
4152 }
4153
4154 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4155
12bd6957 4156 *pnum_locals = num_locals;
b34976b6 4157 return TRUE;
252b5132
RH
4158}
4159
4160/* Align to the maximum file alignment that could be required for any
4161 ELF data structure. */
4162
268b6b39 4163static inline file_ptr
217aa764 4164align_file_position (file_ptr off, int align)
252b5132
RH
4165{
4166 return (off + align - 1) & ~(align - 1);
4167}
4168
4169/* Assign a file position to a section, optionally aligning to the
4170 required section alignment. */
4171
217aa764
AM
4172file_ptr
4173_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4174 file_ptr offset,
4175 bfd_boolean align)
252b5132 4176{
72de5009
AM
4177 if (align && i_shdrp->sh_addralign > 1)
4178 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
4179 i_shdrp->sh_offset = offset;
4180 if (i_shdrp->bfd_section != NULL)
4181 i_shdrp->bfd_section->filepos = offset;
4182 if (i_shdrp->sh_type != SHT_NOBITS)
4183 offset += i_shdrp->sh_size;
4184 return offset;
4185}
4186
4187/* Compute the file positions we are going to put the sections at, and
4188 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4189 is not NULL, this is being called by the ELF backend linker. */
4190
b34976b6 4191bfd_boolean
217aa764
AM
4192_bfd_elf_compute_section_file_positions (bfd *abfd,
4193 struct bfd_link_info *link_info)
252b5132 4194{
9c5bfbb7 4195 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 4196 struct fake_section_arg fsargs;
b34976b6 4197 bfd_boolean failed;
ef10c3ac 4198 struct elf_strtab_hash *strtab = NULL;
252b5132 4199 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 4200 bfd_boolean need_symtab;
252b5132
RH
4201
4202 if (abfd->output_has_begun)
b34976b6 4203 return TRUE;
252b5132
RH
4204
4205 /* Do any elf backend specific processing first. */
4206 if (bed->elf_backend_begin_write_processing)
4207 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4208
4209 if (! prep_headers (abfd))
b34976b6 4210 return FALSE;
252b5132 4211
e6c51ed4 4212 /* Post process the headers if necessary. */
78245035 4213 (*bed->elf_backend_post_process_headers) (abfd, link_info);
e6c51ed4 4214
d4730f92
BS
4215 fsargs.failed = FALSE;
4216 fsargs.link_info = link_info;
4217 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4218 if (fsargs.failed)
b34976b6 4219 return FALSE;
252b5132 4220
da9f89d4 4221 if (!assign_section_numbers (abfd, link_info))
b34976b6 4222 return FALSE;
252b5132
RH
4223
4224 /* The backend linker builds symbol table information itself. */
3516e984
L
4225 need_symtab = (link_info == NULL
4226 && (bfd_get_symcount (abfd) > 0
4227 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4228 == HAS_RELOC)));
4229 if (need_symtab)
252b5132
RH
4230 {
4231 /* Non-zero if doing a relocatable link. */
4232 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4233
4234 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 4235 return FALSE;
252b5132
RH
4236 }
4237
d4730f92 4238 failed = FALSE;
1126897b 4239 if (link_info == NULL)
dbb410c3 4240 {
1126897b 4241 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 4242 if (failed)
b34976b6 4243 return FALSE;
dbb410c3
AM
4244 }
4245
252b5132
RH
4246 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
4247 /* sh_name was set in prep_headers. */
4248 shstrtab_hdr->sh_type = SHT_STRTAB;
84865015 4249 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
252b5132 4250 shstrtab_hdr->sh_addr = 0;
946748d5 4251 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4252 shstrtab_hdr->sh_entsize = 0;
4253 shstrtab_hdr->sh_link = 0;
4254 shstrtab_hdr->sh_info = 0;
3e19fb8f 4255 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4256 shstrtab_hdr->sh_addralign = 1;
4257
c84fca4d 4258 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 4259 return FALSE;
252b5132 4260
3516e984 4261 if (need_symtab)
252b5132
RH
4262 {
4263 file_ptr off;
4264 Elf_Internal_Shdr *hdr;
4265
12bd6957 4266 off = elf_next_file_pos (abfd);
252b5132 4267
6a40cf0c 4268 hdr = & elf_symtab_hdr (abfd);
b34976b6 4269 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4270
6a40cf0c
NC
4271 if (elf_symtab_shndx_list (abfd) != NULL)
4272 {
4273 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4274 if (hdr->sh_size != 0)
4275 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4276 /* FIXME: What about other symtab_shndx sections in the list ? */
4277 }
9ad5cbcf 4278
252b5132 4279 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 4280 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4281
12bd6957 4282 elf_next_file_pos (abfd) = off;
252b5132
RH
4283
4284 /* Now that we know where the .strtab section goes, write it
08a40648 4285 out. */
252b5132 4286 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
ef10c3ac 4287 || ! _bfd_elf_strtab_emit (abfd, strtab))
b34976b6 4288 return FALSE;
ef10c3ac 4289 _bfd_elf_strtab_free (strtab);
252b5132
RH
4290 }
4291
b34976b6 4292 abfd->output_has_begun = TRUE;
252b5132 4293
b34976b6 4294 return TRUE;
252b5132
RH
4295}
4296
8ded5a0f
AM
4297/* Make an initial estimate of the size of the program header. If we
4298 get the number wrong here, we'll redo section placement. */
4299
4300static bfd_size_type
4301get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4302{
4303 size_t segs;
4304 asection *s;
2b05f1b7 4305 const struct elf_backend_data *bed;
8ded5a0f
AM
4306
4307 /* Assume we will need exactly two PT_LOAD segments: one for text
4308 and one for data. */
4309 segs = 2;
4310
4311 s = bfd_get_section_by_name (abfd, ".interp");
4312 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4313 {
4314 /* If we have a loadable interpreter section, we need a
4315 PT_INTERP segment. In this case, assume we also need a
4316 PT_PHDR segment, although that may not be true for all
4317 targets. */
e9a38e0f 4318 segs += 2;
8ded5a0f
AM
4319 }
4320
4321 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4322 {
4323 /* We need a PT_DYNAMIC segment. */
4324 ++segs;
f210dcff 4325 }
08a40648 4326
ceae84aa 4327 if (info != NULL && info->relro)
f210dcff
L
4328 {
4329 /* We need a PT_GNU_RELRO segment. */
4330 ++segs;
8ded5a0f
AM
4331 }
4332
12bd6957 4333 if (elf_eh_frame_hdr (abfd))
8ded5a0f
AM
4334 {
4335 /* We need a PT_GNU_EH_FRAME segment. */
4336 ++segs;
4337 }
4338
12bd6957 4339 if (elf_stack_flags (abfd))
8ded5a0f 4340 {
2b05f1b7
L
4341 /* We need a PT_GNU_STACK segment. */
4342 ++segs;
4343 }
94b11780 4344
2b05f1b7
L
4345 for (s = abfd->sections; s != NULL; s = s->next)
4346 {
8ded5a0f 4347 if ((s->flags & SEC_LOAD) != 0
0112cd26 4348 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
4349 {
4350 /* We need a PT_NOTE segment. */
4351 ++segs;
1c5265b5
JJ
4352 /* Try to create just one PT_NOTE segment
4353 for all adjacent loadable .note* sections.
4354 gABI requires that within a PT_NOTE segment
4355 (and also inside of each SHT_NOTE section)
4356 each note is padded to a multiple of 4 size,
4357 so we check whether the sections are correctly
4358 aligned. */
4359 if (s->alignment_power == 2)
4360 while (s->next != NULL
4361 && s->next->alignment_power == 2
4362 && (s->next->flags & SEC_LOAD) != 0
4363 && CONST_STRNEQ (s->next->name, ".note"))
4364 s = s->next;
8ded5a0f
AM
4365 }
4366 }
4367
4368 for (s = abfd->sections; s != NULL; s = s->next)
4369 {
4370 if (s->flags & SEC_THREAD_LOCAL)
4371 {
4372 /* We need a PT_TLS segment. */
4373 ++segs;
4374 break;
4375 }
4376 }
4377
2b05f1b7 4378 bed = get_elf_backend_data (abfd);
a91e1603
L
4379
4380 if ((abfd->flags & D_PAGED) != 0)
4381 {
4382 /* Add a PT_GNU_MBIND segment for each mbind section. */
4383 unsigned int page_align_power = bfd_log2 (bed->commonpagesize);
4384 for (s = abfd->sections; s != NULL; s = s->next)
4385 if (elf_section_flags (s) & SHF_GNU_MBIND)
4386 {
4387 if (elf_section_data (s)->this_hdr.sh_info
4388 > PT_GNU_MBIND_NUM)
4389 {
4390 _bfd_error_handler
4391 /* xgettext:c-format */
4392 (_("%B: GNU_MBIN section `%A' has invalid sh_info field: %d"),
4393 abfd, s, elf_section_data (s)->this_hdr.sh_info);
4394 continue;
4395 }
4396 /* Align mbind section to page size. */
4397 if (s->alignment_power < page_align_power)
4398 s->alignment_power = page_align_power;
4399 segs ++;
4400 }
4401 }
4402
4403 /* Let the backend count up any program headers it might need. */
4404 if (bed->elf_backend_additional_program_headers)
8ded5a0f
AM
4405 {
4406 int a;
4407
4408 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4409 if (a == -1)
4410 abort ();
4411 segs += a;
4412 }
4413
4414 return segs * bed->s->sizeof_phdr;
4415}
4416
2ea37f1c
NC
4417/* Find the segment that contains the output_section of section. */
4418
4419Elf_Internal_Phdr *
4420_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4421{
4422 struct elf_segment_map *m;
4423 Elf_Internal_Phdr *p;
4424
12bd6957 4425 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
2ea37f1c
NC
4426 m != NULL;
4427 m = m->next, p++)
4428 {
4429 int i;
4430
4431 for (i = m->count - 1; i >= 0; i--)
4432 if (m->sections[i] == section)
4433 return p;
4434 }
4435
4436 return NULL;
4437}
4438
252b5132
RH
4439/* Create a mapping from a set of sections to a program segment. */
4440
217aa764
AM
4441static struct elf_segment_map *
4442make_mapping (bfd *abfd,
4443 asection **sections,
4444 unsigned int from,
4445 unsigned int to,
4446 bfd_boolean phdr)
252b5132
RH
4447{
4448 struct elf_segment_map *m;
4449 unsigned int i;
4450 asection **hdrpp;
dc810e39 4451 bfd_size_type amt;
252b5132 4452
dc810e39
AM
4453 amt = sizeof (struct elf_segment_map);
4454 amt += (to - from - 1) * sizeof (asection *);
a50b1753 4455 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4456 if (m == NULL)
4457 return NULL;
4458 m->next = NULL;
4459 m->p_type = PT_LOAD;
4460 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4461 m->sections[i - from] = *hdrpp;
4462 m->count = to - from;
4463
4464 if (from == 0 && phdr)
4465 {
4466 /* Include the headers in the first PT_LOAD segment. */
4467 m->includes_filehdr = 1;
4468 m->includes_phdrs = 1;
4469 }
4470
4471 return m;
4472}
4473
229fcec5
MM
4474/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4475 on failure. */
4476
4477struct elf_segment_map *
4478_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4479{
4480 struct elf_segment_map *m;
4481
a50b1753 4482 m = (struct elf_segment_map *) bfd_zalloc (abfd,
07d6d2b8 4483 sizeof (struct elf_segment_map));
229fcec5
MM
4484 if (m == NULL)
4485 return NULL;
4486 m->next = NULL;
4487 m->p_type = PT_DYNAMIC;
4488 m->count = 1;
4489 m->sections[0] = dynsec;
08a40648 4490
229fcec5
MM
4491 return m;
4492}
4493
8ded5a0f 4494/* Possibly add or remove segments from the segment map. */
252b5132 4495
b34976b6 4496static bfd_boolean
3dea8fca
AM
4497elf_modify_segment_map (bfd *abfd,
4498 struct bfd_link_info *info,
4499 bfd_boolean remove_empty_load)
252b5132 4500{
252e386e 4501 struct elf_segment_map **m;
8ded5a0f 4502 const struct elf_backend_data *bed;
252b5132 4503
8ded5a0f
AM
4504 /* The placement algorithm assumes that non allocated sections are
4505 not in PT_LOAD segments. We ensure this here by removing such
4506 sections from the segment map. We also remove excluded
252e386e
AM
4507 sections. Finally, any PT_LOAD segment without sections is
4508 removed. */
12bd6957 4509 m = &elf_seg_map (abfd);
252e386e 4510 while (*m)
8ded5a0f
AM
4511 {
4512 unsigned int i, new_count;
252b5132 4513
252e386e 4514 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 4515 {
252e386e
AM
4516 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4517 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4518 || (*m)->p_type != PT_LOAD))
8ded5a0f 4519 {
252e386e
AM
4520 (*m)->sections[new_count] = (*m)->sections[i];
4521 new_count++;
8ded5a0f
AM
4522 }
4523 }
252e386e 4524 (*m)->count = new_count;
252b5132 4525
1a9ccd70
NC
4526 if (remove_empty_load
4527 && (*m)->p_type == PT_LOAD
4528 && (*m)->count == 0
4529 && !(*m)->includes_phdrs)
252e386e
AM
4530 *m = (*m)->next;
4531 else
4532 m = &(*m)->next;
8ded5a0f 4533 }
252b5132 4534
8ded5a0f
AM
4535 bed = get_elf_backend_data (abfd);
4536 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 4537 {
252e386e 4538 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 4539 return FALSE;
252b5132 4540 }
252b5132 4541
8ded5a0f
AM
4542 return TRUE;
4543}
252b5132 4544
8ded5a0f 4545/* Set up a mapping from BFD sections to program segments. */
252b5132 4546
8ded5a0f
AM
4547bfd_boolean
4548_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4549{
4550 unsigned int count;
4551 struct elf_segment_map *m;
4552 asection **sections = NULL;
4553 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 4554 bfd_boolean no_user_phdrs;
252b5132 4555
12bd6957 4556 no_user_phdrs = elf_seg_map (abfd) == NULL;
d324f6d6
RM
4557
4558 if (info != NULL)
4559 info->user_phdrs = !no_user_phdrs;
4560
3dea8fca 4561 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 4562 {
8ded5a0f
AM
4563 asection *s;
4564 unsigned int i;
4565 struct elf_segment_map *mfirst;
4566 struct elf_segment_map **pm;
4567 asection *last_hdr;
4568 bfd_vma last_size;
4569 unsigned int phdr_index;
4570 bfd_vma maxpagesize;
4571 asection **hdrpp;
4572 bfd_boolean phdr_in_segment = TRUE;
4573 bfd_boolean writable;
2888249f 4574 bfd_boolean executable;
8ded5a0f
AM
4575 int tls_count = 0;
4576 asection *first_tls = NULL;
a91e1603 4577 asection *first_mbind = NULL;
8ded5a0f
AM
4578 asection *dynsec, *eh_frame_hdr;
4579 bfd_size_type amt;
8d06853e 4580 bfd_vma addr_mask, wrap_to = 0;
1a9ccd70 4581 bfd_boolean linker_created_pt_phdr_segment = FALSE;
252b5132 4582
8ded5a0f 4583 /* Select the allocated sections, and sort them. */
252b5132 4584
a50b1753 4585 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
07d6d2b8 4586 sizeof (asection *));
8ded5a0f 4587 if (sections == NULL)
252b5132 4588 goto error_return;
252b5132 4589
8d06853e
AM
4590 /* Calculate top address, avoiding undefined behaviour of shift
4591 left operator when shift count is equal to size of type
4592 being shifted. */
4593 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4594 addr_mask = (addr_mask << 1) + 1;
4595
8ded5a0f
AM
4596 i = 0;
4597 for (s = abfd->sections; s != NULL; s = s->next)
4598 {
4599 if ((s->flags & SEC_ALLOC) != 0)
4600 {
4601 sections[i] = s;
4602 ++i;
8d06853e
AM
4603 /* A wrapping section potentially clashes with header. */
4604 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
4605 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
4606 }
4607 }
4608 BFD_ASSERT (i <= bfd_count_sections (abfd));
4609 count = i;
252b5132 4610
8ded5a0f 4611 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 4612
8ded5a0f 4613 /* Build the mapping. */
252b5132 4614
8ded5a0f
AM
4615 mfirst = NULL;
4616 pm = &mfirst;
252b5132 4617
8ded5a0f
AM
4618 /* If we have a .interp section, then create a PT_PHDR segment for
4619 the program headers and a PT_INTERP segment for the .interp
4620 section. */
4621 s = bfd_get_section_by_name (abfd, ".interp");
4622 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4623 {
4624 amt = sizeof (struct elf_segment_map);
a50b1753 4625 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4626 if (m == NULL)
4627 goto error_return;
4628 m->next = NULL;
4629 m->p_type = PT_PHDR;
f882209d 4630 m->p_flags = PF_R;
8ded5a0f
AM
4631 m->p_flags_valid = 1;
4632 m->includes_phdrs = 1;
1a9ccd70 4633 linker_created_pt_phdr_segment = TRUE;
8ded5a0f
AM
4634 *pm = m;
4635 pm = &m->next;
252b5132 4636
8ded5a0f 4637 amt = sizeof (struct elf_segment_map);
a50b1753 4638 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4639 if (m == NULL)
4640 goto error_return;
4641 m->next = NULL;
4642 m->p_type = PT_INTERP;
4643 m->count = 1;
4644 m->sections[0] = s;
4645
4646 *pm = m;
4647 pm = &m->next;
252b5132 4648 }
8ded5a0f
AM
4649
4650 /* Look through the sections. We put sections in the same program
4651 segment when the start of the second section can be placed within
4652 a few bytes of the end of the first section. */
4653 last_hdr = NULL;
4654 last_size = 0;
4655 phdr_index = 0;
4656 maxpagesize = bed->maxpagesize;
063bb025
NC
4657 /* PR 17512: file: c8455299.
4658 Avoid divide-by-zero errors later on.
4659 FIXME: Should we abort if the maxpagesize is zero ? */
4660 if (maxpagesize == 0)
4661 maxpagesize = 1;
8ded5a0f 4662 writable = FALSE;
2888249f 4663 executable = FALSE;
8ded5a0f
AM
4664 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4665 if (dynsec != NULL
4666 && (dynsec->flags & SEC_LOAD) == 0)
4667 dynsec = NULL;
4668
4669 /* Deal with -Ttext or something similar such that the first section
4670 is not adjacent to the program headers. This is an
4671 approximation, since at this point we don't know exactly how many
4672 program headers we will need. */
4673 if (count > 0)
252b5132 4674 {
12bd6957 4675 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 4676
62d7a5f6 4677 if (phdr_size == (bfd_size_type) -1)
8ded5a0f 4678 phdr_size = get_program_header_size (abfd, info);
d2bcb0d1 4679 phdr_size += bed->s->sizeof_ehdr;
8ded5a0f 4680 if ((abfd->flags & D_PAGED) == 0
8d06853e
AM
4681 || (sections[0]->lma & addr_mask) < phdr_size
4682 || ((sections[0]->lma & addr_mask) % maxpagesize
4683 < phdr_size % maxpagesize)
4684 || (sections[0]->lma & addr_mask & -maxpagesize) < wrap_to)
1a9ccd70
NC
4685 {
4686 /* PR 20815: The ELF standard says that a PT_PHDR segment, if
4687 present, must be included as part of the memory image of the
4688 program. Ie it must be part of a PT_LOAD segment as well.
4689 If we have had to create our own PT_PHDR segment, but it is
4690 not going to be covered by the first PT_LOAD segment, then
4691 force the inclusion if we can... */
4692 if ((abfd->flags & D_PAGED) != 0
4693 && linker_created_pt_phdr_segment)
4694 phdr_in_segment = TRUE;
4695 else
4696 phdr_in_segment = FALSE;
4697 }
252b5132
RH
4698 }
4699
8ded5a0f 4700 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 4701 {
8ded5a0f
AM
4702 asection *hdr;
4703 bfd_boolean new_segment;
4704
4705 hdr = *hdrpp;
4706
4707 /* See if this section and the last one will fit in the same
4708 segment. */
4709
4710 if (last_hdr == NULL)
4711 {
4712 /* If we don't have a segment yet, then we don't need a new
4713 one (we build the last one after this loop). */
4714 new_segment = FALSE;
4715 }
4716 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4717 {
4718 /* If this section has a different relation between the
4719 virtual address and the load address, then we need a new
4720 segment. */
4721 new_segment = TRUE;
4722 }
b5599592
AM
4723 else if (hdr->lma < last_hdr->lma + last_size
4724 || last_hdr->lma + last_size < last_hdr->lma)
4725 {
4726 /* If this section has a load address that makes it overlap
4727 the previous section, then we need a new segment. */
4728 new_segment = TRUE;
4729 }
76cb3a89
AM
4730 else if ((abfd->flags & D_PAGED) != 0
4731 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4732 == (hdr->lma & -maxpagesize)))
4733 {
4734 /* If we are demand paged then we can't map two disk
4735 pages onto the same memory page. */
4736 new_segment = FALSE;
4737 }
39948a60
NC
4738 /* In the next test we have to be careful when last_hdr->lma is close
4739 to the end of the address space. If the aligned address wraps
4740 around to the start of the address space, then there are no more
4741 pages left in memory and it is OK to assume that the current
4742 section can be included in the current segment. */
76cb3a89
AM
4743 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4744 + maxpagesize > last_hdr->lma)
4745 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4746 + maxpagesize <= hdr->lma))
8ded5a0f
AM
4747 {
4748 /* If putting this section in this segment would force us to
4749 skip a page in the segment, then we need a new segment. */
4750 new_segment = TRUE;
4751 }
4752 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
76cb3a89 4753 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
8ded5a0f 4754 {
e5654c0f
AM
4755 /* We don't want to put a loaded section after a
4756 nonloaded (ie. bss style) section in the same segment
4757 as that will force the non-loaded section to be loaded.
76cb3a89 4758 Consider .tbss sections as loaded for this purpose. */
8ded5a0f
AM
4759 new_segment = TRUE;
4760 }
4761 else if ((abfd->flags & D_PAGED) == 0)
4762 {
4763 /* If the file is not demand paged, which means that we
4764 don't require the sections to be correctly aligned in the
4765 file, then there is no other reason for a new segment. */
4766 new_segment = FALSE;
4767 }
2888249f
L
4768 else if (info != NULL
4769 && info->separate_code
4770 && executable != ((hdr->flags & SEC_CODE) != 0))
4771 {
4772 new_segment = TRUE;
4773 }
8ded5a0f 4774 else if (! writable
76cb3a89 4775 && (hdr->flags & SEC_READONLY) == 0)
8ded5a0f
AM
4776 {
4777 /* We don't want to put a writable section in a read only
76cb3a89 4778 segment. */
8ded5a0f
AM
4779 new_segment = TRUE;
4780 }
4781 else
4782 {
4783 /* Otherwise, we can use the same segment. */
4784 new_segment = FALSE;
4785 }
4786
2889e75b 4787 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
4788 if (last_hdr != NULL
4789 && info != NULL
4790 && info->callbacks->override_segment_assignment != NULL)
4791 new_segment
4792 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4793 last_hdr,
4794 new_segment);
2889e75b 4795
8ded5a0f
AM
4796 if (! new_segment)
4797 {
4798 if ((hdr->flags & SEC_READONLY) == 0)
4799 writable = TRUE;
2888249f
L
4800 if ((hdr->flags & SEC_CODE) != 0)
4801 executable = TRUE;
8ded5a0f
AM
4802 last_hdr = hdr;
4803 /* .tbss sections effectively have zero size. */
4804 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4805 != SEC_THREAD_LOCAL)
4806 last_size = hdr->size;
4807 else
4808 last_size = 0;
4809 continue;
4810 }
4811
4812 /* We need a new program segment. We must create a new program
4813 header holding all the sections from phdr_index until hdr. */
4814
4815 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4816 if (m == NULL)
4817 goto error_return;
4818
4819 *pm = m;
4820 pm = &m->next;
4821
252b5132 4822 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 4823 writable = TRUE;
8ded5a0f
AM
4824 else
4825 writable = FALSE;
4826
2888249f
L
4827 if ((hdr->flags & SEC_CODE) == 0)
4828 executable = FALSE;
4829 else
4830 executable = TRUE;
4831
baaff79e
JJ
4832 last_hdr = hdr;
4833 /* .tbss sections effectively have zero size. */
e5caec89 4834 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 4835 last_size = hdr->size;
baaff79e
JJ
4836 else
4837 last_size = 0;
8ded5a0f
AM
4838 phdr_index = i;
4839 phdr_in_segment = FALSE;
252b5132
RH
4840 }
4841
86b2281f
AM
4842 /* Create a final PT_LOAD program segment, but not if it's just
4843 for .tbss. */
4844 if (last_hdr != NULL
4845 && (i - phdr_index != 1
4846 || ((last_hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4847 != SEC_THREAD_LOCAL)))
8ded5a0f
AM
4848 {
4849 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4850 if (m == NULL)
4851 goto error_return;
252b5132 4852
8ded5a0f
AM
4853 *pm = m;
4854 pm = &m->next;
4855 }
252b5132 4856
8ded5a0f
AM
4857 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4858 if (dynsec != NULL)
4859 {
4860 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4861 if (m == NULL)
4862 goto error_return;
4863 *pm = m;
4864 pm = &m->next;
4865 }
252b5132 4866
1c5265b5
JJ
4867 /* For each batch of consecutive loadable .note sections,
4868 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4869 because if we link together nonloadable .note sections and
4870 loadable .note sections, we will generate two .note sections
4871 in the output file. FIXME: Using names for section types is
4872 bogus anyhow. */
8ded5a0f
AM
4873 for (s = abfd->sections; s != NULL; s = s->next)
4874 {
4875 if ((s->flags & SEC_LOAD) != 0
0112cd26 4876 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 4877 {
1c5265b5 4878 asection *s2;
91d6fa6a
NC
4879
4880 count = 1;
8ded5a0f 4881 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
4882 if (s->alignment_power == 2)
4883 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
4884 {
4885 if (s2->next->alignment_power == 2
4886 && (s2->next->flags & SEC_LOAD) != 0
4887 && CONST_STRNEQ (s2->next->name, ".note")
8d06853e
AM
4888 && align_power (s2->lma + s2->size, 2)
4889 == s2->next->lma)
55b581a6
JJ
4890 count++;
4891 else
4892 break;
4893 }
1c5265b5 4894 amt += (count - 1) * sizeof (asection *);
a50b1753 4895 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4896 if (m == NULL)
4897 goto error_return;
4898 m->next = NULL;
4899 m->p_type = PT_NOTE;
1c5265b5
JJ
4900 m->count = count;
4901 while (count > 1)
4902 {
4903 m->sections[m->count - count--] = s;
4904 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
4905 s = s->next;
4906 }
4907 m->sections[m->count - 1] = s;
4908 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
4909 *pm = m;
4910 pm = &m->next;
4911 }
4912 if (s->flags & SEC_THREAD_LOCAL)
4913 {
4914 if (! tls_count)
4915 first_tls = s;
4916 tls_count++;
4917 }
a91e1603
L
4918 if (first_mbind == NULL
4919 && (elf_section_flags (s) & SHF_GNU_MBIND) != 0)
4920 first_mbind = s;
8ded5a0f 4921 }
252b5132 4922
8ded5a0f
AM
4923 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
4924 if (tls_count > 0)
4925 {
8ded5a0f
AM
4926 amt = sizeof (struct elf_segment_map);
4927 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 4928 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4929 if (m == NULL)
4930 goto error_return;
4931 m->next = NULL;
4932 m->p_type = PT_TLS;
4933 m->count = tls_count;
4934 /* Mandated PF_R. */
4935 m->p_flags = PF_R;
4936 m->p_flags_valid = 1;
d923cae0 4937 s = first_tls;
91d6fa6a 4938 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f 4939 {
d923cae0
L
4940 if ((s->flags & SEC_THREAD_LOCAL) == 0)
4941 {
4942 _bfd_error_handler
4943 (_("%B: TLS sections are not adjacent:"), abfd);
4944 s = first_tls;
4945 i = 0;
4946 while (i < (unsigned int) tls_count)
4947 {
4948 if ((s->flags & SEC_THREAD_LOCAL) != 0)
4949 {
4950 _bfd_error_handler (_(" TLS: %A"), s);
4951 i++;
4952 }
4953 else
4954 _bfd_error_handler (_(" non-TLS: %A"), s);
4955 s = s->next;
4956 }
4957 bfd_set_error (bfd_error_bad_value);
4958 goto error_return;
4959 }
4960 m->sections[i] = s;
4961 s = s->next;
8ded5a0f 4962 }
252b5132 4963
8ded5a0f
AM
4964 *pm = m;
4965 pm = &m->next;
4966 }
252b5132 4967
a91e1603
L
4968 if (first_mbind && (abfd->flags & D_PAGED) != 0)
4969 for (s = first_mbind; s != NULL; s = s->next)
4970 if ((elf_section_flags (s) & SHF_GNU_MBIND) != 0
4971 && (elf_section_data (s)->this_hdr.sh_info
4972 <= PT_GNU_MBIND_NUM))
4973 {
4974 /* Mandated PF_R. */
4975 unsigned long p_flags = PF_R;
4976 if ((s->flags & SEC_READONLY) == 0)
4977 p_flags |= PF_W;
4978 if ((s->flags & SEC_CODE) != 0)
4979 p_flags |= PF_X;
4980
4981 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
4982 m = bfd_zalloc (abfd, amt);
4983 if (m == NULL)
4984 goto error_return;
4985 m->next = NULL;
4986 m->p_type = (PT_GNU_MBIND_LO
4987 + elf_section_data (s)->this_hdr.sh_info);
4988 m->count = 1;
4989 m->p_flags_valid = 1;
4990 m->sections[0] = s;
4991 m->p_flags = p_flags;
4992
4993 *pm = m;
4994 pm = &m->next;
4995 }
4996
8ded5a0f
AM
4997 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4998 segment. */
12bd6957 4999 eh_frame_hdr = elf_eh_frame_hdr (abfd);
8ded5a0f
AM
5000 if (eh_frame_hdr != NULL
5001 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 5002 {
dc810e39 5003 amt = sizeof (struct elf_segment_map);
a50b1753 5004 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
5005 if (m == NULL)
5006 goto error_return;
5007 m->next = NULL;
8ded5a0f 5008 m->p_type = PT_GNU_EH_FRAME;
252b5132 5009 m->count = 1;
8ded5a0f 5010 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
5011
5012 *pm = m;
5013 pm = &m->next;
5014 }
13ae64f3 5015
12bd6957 5016 if (elf_stack_flags (abfd))
13ae64f3 5017 {
8ded5a0f 5018 amt = sizeof (struct elf_segment_map);
a50b1753 5019 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
5020 if (m == NULL)
5021 goto error_return;
5022 m->next = NULL;
2b05f1b7 5023 m->p_type = PT_GNU_STACK;
12bd6957 5024 m->p_flags = elf_stack_flags (abfd);
04c3a755 5025 m->p_align = bed->stack_align;
8ded5a0f 5026 m->p_flags_valid = 1;
04c3a755
NS
5027 m->p_align_valid = m->p_align != 0;
5028 if (info->stacksize > 0)
5029 {
5030 m->p_size = info->stacksize;
5031 m->p_size_valid = 1;
5032 }
252b5132 5033
8ded5a0f
AM
5034 *pm = m;
5035 pm = &m->next;
5036 }
65765700 5037
ceae84aa 5038 if (info != NULL && info->relro)
8ded5a0f 5039 {
f210dcff
L
5040 for (m = mfirst; m != NULL; m = m->next)
5041 {
3832a4d8
AM
5042 if (m->p_type == PT_LOAD
5043 && m->count != 0
5044 && m->sections[0]->vma >= info->relro_start
5045 && m->sections[0]->vma < info->relro_end)
f210dcff 5046 {
3832a4d8
AM
5047 i = m->count;
5048 while (--i != (unsigned) -1)
5049 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
5050 == (SEC_LOAD | SEC_HAS_CONTENTS))
5051 break;
5052
43a8475c 5053 if (i != (unsigned) -1)
f210dcff
L
5054 break;
5055 }
be01b344 5056 }
f210dcff
L
5057
5058 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
5059 if (m != NULL)
5060 {
5061 amt = sizeof (struct elf_segment_map);
a50b1753 5062 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
5063 if (m == NULL)
5064 goto error_return;
5065 m->next = NULL;
5066 m->p_type = PT_GNU_RELRO;
f210dcff
L
5067 *pm = m;
5068 pm = &m->next;
5069 }
8ded5a0f 5070 }
9ee5e499 5071
8ded5a0f 5072 free (sections);
12bd6957 5073 elf_seg_map (abfd) = mfirst;
9ee5e499
JJ
5074 }
5075
3dea8fca 5076 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 5077 return FALSE;
8c37241b 5078
12bd6957 5079 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
8ded5a0f 5080 ++count;
12bd6957 5081 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
252b5132 5082
b34976b6 5083 return TRUE;
252b5132
RH
5084
5085 error_return:
5086 if (sections != NULL)
5087 free (sections);
b34976b6 5088 return FALSE;
252b5132
RH
5089}
5090
5091/* Sort sections by address. */
5092
5093static int
217aa764 5094elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
5095{
5096 const asection *sec1 = *(const asection **) arg1;
5097 const asection *sec2 = *(const asection **) arg2;
eecdbe52 5098 bfd_size_type size1, size2;
252b5132
RH
5099
5100 /* Sort by LMA first, since this is the address used to
5101 place the section into a segment. */
5102 if (sec1->lma < sec2->lma)
5103 return -1;
5104 else if (sec1->lma > sec2->lma)
5105 return 1;
5106
5107 /* Then sort by VMA. Normally the LMA and the VMA will be
5108 the same, and this will do nothing. */
5109 if (sec1->vma < sec2->vma)
5110 return -1;
5111 else if (sec1->vma > sec2->vma)
5112 return 1;
5113
5114 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
5115
07c6e936 5116#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
5117
5118 if (TOEND (sec1))
5119 {
5120 if (TOEND (sec2))
00a7cdc5
NC
5121 {
5122 /* If the indicies are the same, do not return 0
5123 here, but continue to try the next comparison. */
5124 if (sec1->target_index - sec2->target_index != 0)
5125 return sec1->target_index - sec2->target_index;
5126 }
252b5132
RH
5127 else
5128 return 1;
5129 }
00a7cdc5 5130 else if (TOEND (sec2))
252b5132
RH
5131 return -1;
5132
5133#undef TOEND
5134
00a7cdc5
NC
5135 /* Sort by size, to put zero sized sections
5136 before others at the same address. */
252b5132 5137
eea6121a
AM
5138 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
5139 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
5140
5141 if (size1 < size2)
252b5132 5142 return -1;
eecdbe52 5143 if (size1 > size2)
252b5132
RH
5144 return 1;
5145
5146 return sec1->target_index - sec2->target_index;
5147}
5148
340b6d91
AC
5149/* Ian Lance Taylor writes:
5150
5151 We shouldn't be using % with a negative signed number. That's just
5152 not good. We have to make sure either that the number is not
5153 negative, or that the number has an unsigned type. When the types
5154 are all the same size they wind up as unsigned. When file_ptr is a
5155 larger signed type, the arithmetic winds up as signed long long,
5156 which is wrong.
5157
5158 What we're trying to say here is something like ``increase OFF by
5159 the least amount that will cause it to be equal to the VMA modulo
5160 the page size.'' */
5161/* In other words, something like:
5162
5163 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5164 off_offset = off % bed->maxpagesize;
5165 if (vma_offset < off_offset)
5166 adjustment = vma_offset + bed->maxpagesize - off_offset;
5167 else
5168 adjustment = vma_offset - off_offset;
08a40648 5169
de194d85 5170 which can be collapsed into the expression below. */
340b6d91
AC
5171
5172static file_ptr
5173vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5174{
dc9155b2
NC
5175 /* PR binutils/16199: Handle an alignment of zero. */
5176 if (maxpagesize == 0)
5177 maxpagesize = 1;
340b6d91
AC
5178 return ((vma - off) % maxpagesize);
5179}
5180
6d33f217
L
5181static void
5182print_segment_map (const struct elf_segment_map *m)
5183{
5184 unsigned int j;
5185 const char *pt = get_segment_type (m->p_type);
5186 char buf[32];
5187
5188 if (pt == NULL)
5189 {
5190 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5191 sprintf (buf, "LOPROC+%7.7x",
5192 (unsigned int) (m->p_type - PT_LOPROC));
5193 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5194 sprintf (buf, "LOOS+%7.7x",
5195 (unsigned int) (m->p_type - PT_LOOS));
5196 else
5197 snprintf (buf, sizeof (buf), "%8.8x",
5198 (unsigned int) m->p_type);
5199 pt = buf;
5200 }
4a97a0e5 5201 fflush (stdout);
6d33f217
L
5202 fprintf (stderr, "%s:", pt);
5203 for (j = 0; j < m->count; j++)
5204 fprintf (stderr, " %s", m->sections [j]->name);
5205 putc ('\n',stderr);
4a97a0e5 5206 fflush (stderr);
6d33f217
L
5207}
5208
32812159
AM
5209static bfd_boolean
5210write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5211{
5212 void *buf;
5213 bfd_boolean ret;
5214
5215 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5216 return FALSE;
5217 buf = bfd_zmalloc (len);
5218 if (buf == NULL)
5219 return FALSE;
5220 ret = bfd_bwrite (buf, len, abfd) == len;
5221 free (buf);
5222 return ret;
5223}
5224
252b5132
RH
5225/* Assign file positions to the sections based on the mapping from
5226 sections to segments. This function also sets up some fields in
f3520d2f 5227 the file header. */
252b5132 5228
b34976b6 5229static bfd_boolean
f3520d2f
AM
5230assign_file_positions_for_load_sections (bfd *abfd,
5231 struct bfd_link_info *link_info)
252b5132
RH
5232{
5233 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5234 struct elf_segment_map *m;
252b5132 5235 Elf_Internal_Phdr *phdrs;
252b5132 5236 Elf_Internal_Phdr *p;
02bf8d82 5237 file_ptr off;
3f570048 5238 bfd_size_type maxpagesize;
a8c75b76 5239 unsigned int pt_load_count = 0;
f3520d2f 5240 unsigned int alloc;
0920dee7 5241 unsigned int i, j;
2b0bc088 5242 bfd_vma header_pad = 0;
252b5132 5243
e36284ab 5244 if (link_info == NULL
ceae84aa 5245 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 5246 return FALSE;
252b5132 5247
8ded5a0f 5248 alloc = 0;
12bd6957 5249 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
2b0bc088
NC
5250 {
5251 ++alloc;
5252 if (m->header_size)
5253 header_pad = m->header_size;
5254 }
252b5132 5255
82f2dbf7
NC
5256 if (alloc)
5257 {
5258 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5259 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5260 }
5261 else
5262 {
5263 /* PR binutils/12467. */
5264 elf_elfheader (abfd)->e_phoff = 0;
5265 elf_elfheader (abfd)->e_phentsize = 0;
5266 }
d324f6d6 5267
8ded5a0f 5268 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 5269
12bd6957
AM
5270 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
5271 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
8ded5a0f 5272 else
12bd6957 5273 BFD_ASSERT (elf_program_header_size (abfd)
59e0647f 5274 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
5275
5276 if (alloc == 0)
f3520d2f 5277 {
12bd6957 5278 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
8ded5a0f 5279 return TRUE;
f3520d2f 5280 }
252b5132 5281
12bd6957 5282 /* We're writing the size in elf_program_header_size (abfd),
57268894
HPN
5283 see assign_file_positions_except_relocs, so make sure we have
5284 that amount allocated, with trailing space cleared.
12bd6957
AM
5285 The variable alloc contains the computed need, while
5286 elf_program_header_size (abfd) contains the size used for the
57268894
HPN
5287 layout.
5288 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5289 where the layout is forced to according to a larger size in the
5290 last iterations for the testcase ld-elf/header. */
12bd6957 5291 BFD_ASSERT (elf_program_header_size (abfd) % bed->s->sizeof_phdr
57268894 5292 == 0);
a50b1753
NC
5293 phdrs = (Elf_Internal_Phdr *)
5294 bfd_zalloc2 (abfd,
07d6d2b8
AM
5295 (elf_program_header_size (abfd) / bed->s->sizeof_phdr),
5296 sizeof (Elf_Internal_Phdr));
f3520d2f 5297 elf_tdata (abfd)->phdr = phdrs;
252b5132 5298 if (phdrs == NULL)
b34976b6 5299 return FALSE;
252b5132 5300
3f570048
AM
5301 maxpagesize = 1;
5302 if ((abfd->flags & D_PAGED) != 0)
5303 maxpagesize = bed->maxpagesize;
5304
252b5132
RH
5305 off = bed->s->sizeof_ehdr;
5306 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
5307 if (header_pad < (bfd_vma) off)
5308 header_pad = 0;
5309 else
5310 header_pad -= off;
5311 off += header_pad;
252b5132 5312
12bd6957 5313 for (m = elf_seg_map (abfd), p = phdrs, j = 0;
252b5132 5314 m != NULL;
0920dee7 5315 m = m->next, p++, j++)
252b5132 5316 {
252b5132 5317 asection **secpp;
bf988460
AM
5318 bfd_vma off_adjust;
5319 bfd_boolean no_contents;
252b5132
RH
5320
5321 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 5322 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
5323 not be done to the PT_NOTE section of a corefile, which may
5324 contain several pseudo-sections artificially created by bfd.
5325 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
5326 if (m->count > 1
5327 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 5328 && m->p_type == PT_NOTE))
252b5132
RH
5329 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5330 elf_sort_sections);
5331
b301b248
AM
5332 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5333 number of sections with contents contributing to both p_filesz
5334 and p_memsz, followed by a number of sections with no contents
5335 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 5336 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 5337 p->p_type = m->p_type;
28a7f3e7 5338 p->p_flags = m->p_flags;
252b5132 5339
3f570048
AM
5340 if (m->count == 0)
5341 p->p_vaddr = 0;
5342 else
3271a814 5343 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
5344
5345 if (m->p_paddr_valid)
5346 p->p_paddr = m->p_paddr;
5347 else if (m->count == 0)
5348 p->p_paddr = 0;
5349 else
08a40648 5350 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
5351
5352 if (p->p_type == PT_LOAD
5353 && (abfd->flags & D_PAGED) != 0)
5354 {
5355 /* p_align in demand paged PT_LOAD segments effectively stores
5356 the maximum page size. When copying an executable with
5357 objcopy, we set m->p_align from the input file. Use this
5358 value for maxpagesize rather than bed->maxpagesize, which
5359 may be different. Note that we use maxpagesize for PT_TLS
5360 segment alignment later in this function, so we are relying
5361 on at least one PT_LOAD segment appearing before a PT_TLS
5362 segment. */
5363 if (m->p_align_valid)
5364 maxpagesize = m->p_align;
5365
5366 p->p_align = maxpagesize;
a8c75b76 5367 pt_load_count += 1;
3f570048 5368 }
3271a814
NS
5369 else if (m->p_align_valid)
5370 p->p_align = m->p_align;
e970b90a
DJ
5371 else if (m->count == 0)
5372 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
5373 else
5374 p->p_align = 0;
5375
bf988460
AM
5376 no_contents = FALSE;
5377 off_adjust = 0;
252b5132 5378 if (p->p_type == PT_LOAD
b301b248 5379 && m->count > 0)
252b5132 5380 {
b301b248 5381 bfd_size_type align;
a49e53ed 5382 unsigned int align_power = 0;
b301b248 5383
3271a814
NS
5384 if (m->p_align_valid)
5385 align = p->p_align;
5386 else
252b5132 5387 {
3271a814
NS
5388 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5389 {
5390 unsigned int secalign;
08a40648 5391
3271a814
NS
5392 secalign = bfd_get_section_alignment (abfd, *secpp);
5393 if (secalign > align_power)
5394 align_power = secalign;
5395 }
5396 align = (bfd_size_type) 1 << align_power;
5397 if (align < maxpagesize)
5398 align = maxpagesize;
b301b248 5399 }
252b5132 5400
02bf8d82
AM
5401 for (i = 0; i < m->count; i++)
5402 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5403 /* If we aren't making room for this section, then
5404 it must be SHT_NOBITS regardless of what we've
5405 set via struct bfd_elf_special_section. */
5406 elf_section_type (m->sections[i]) = SHT_NOBITS;
5407
bf988460 5408 /* Find out whether this segment contains any loadable
aea274d3
AM
5409 sections. */
5410 no_contents = TRUE;
5411 for (i = 0; i < m->count; i++)
5412 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5413 {
5414 no_contents = FALSE;
5415 break;
5416 }
bf988460 5417
85cfcbfb 5418 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
a8c75b76
AM
5419
5420 /* Broken hardware and/or kernel require that files do not
5421 map the same page with different permissions on some hppa
5422 processors. */
5423 if (pt_load_count > 1
5424 && bed->no_page_alias
5425 && (off & (maxpagesize - 1)) != 0
5426 && (off & -maxpagesize) == ((off + off_adjust) & -maxpagesize))
5427 off_adjust += maxpagesize;
bf988460
AM
5428 off += off_adjust;
5429 if (no_contents)
5430 {
5431 /* We shouldn't need to align the segment on disk since
5432 the segment doesn't need file space, but the gABI
5433 arguably requires the alignment and glibc ld.so
5434 checks it. So to comply with the alignment
5435 requirement but not waste file space, we adjust
5436 p_offset for just this segment. (OFF_ADJUST is
5437 subtracted from OFF later.) This may put p_offset
5438 past the end of file, but that shouldn't matter. */
5439 }
5440 else
5441 off_adjust = 0;
252b5132 5442 }
b1a6d0b1
NC
5443 /* Make sure the .dynamic section is the first section in the
5444 PT_DYNAMIC segment. */
5445 else if (p->p_type == PT_DYNAMIC
5446 && m->count > 1
5447 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5448 {
5449 _bfd_error_handler
63a5468a
AM
5450 (_("%B: The first section in the PT_DYNAMIC segment"
5451 " is not the .dynamic section"),
b301b248 5452 abfd);
b1a6d0b1
NC
5453 bfd_set_error (bfd_error_bad_value);
5454 return FALSE;
5455 }
3f001e84
JK
5456 /* Set the note section type to SHT_NOTE. */
5457 else if (p->p_type == PT_NOTE)
5458 for (i = 0; i < m->count; i++)
5459 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 5460
252b5132
RH
5461 p->p_offset = 0;
5462 p->p_filesz = 0;
5463 p->p_memsz = 0;
5464
5465 if (m->includes_filehdr)
5466 {
bf988460 5467 if (!m->p_flags_valid)
252b5132 5468 p->p_flags |= PF_R;
252b5132
RH
5469 p->p_filesz = bed->s->sizeof_ehdr;
5470 p->p_memsz = bed->s->sizeof_ehdr;
5471 if (m->count > 0)
5472 {
9ab82472
L
5473 if (p->p_vaddr < (bfd_vma) off
5474 || (!m->p_paddr_valid
5475 && p->p_paddr < (bfd_vma) off))
252b5132 5476 {
4eca0228 5477 _bfd_error_handler
63a5468a
AM
5478 (_("%B: Not enough room for program headers,"
5479 " try linking with -N"),
b301b248 5480 abfd);
252b5132 5481 bfd_set_error (bfd_error_bad_value);
b34976b6 5482 return FALSE;
252b5132
RH
5483 }
5484
5485 p->p_vaddr -= off;
bf988460 5486 if (!m->p_paddr_valid)
252b5132
RH
5487 p->p_paddr -= off;
5488 }
252b5132
RH
5489 }
5490
5491 if (m->includes_phdrs)
5492 {
bf988460 5493 if (!m->p_flags_valid)
252b5132
RH
5494 p->p_flags |= PF_R;
5495
f3520d2f 5496 if (!m->includes_filehdr)
252b5132
RH
5497 {
5498 p->p_offset = bed->s->sizeof_ehdr;
5499
5500 if (m->count > 0)
5501 {
252b5132 5502 p->p_vaddr -= off - p->p_offset;
bf988460 5503 if (!m->p_paddr_valid)
252b5132
RH
5504 p->p_paddr -= off - p->p_offset;
5505 }
252b5132
RH
5506 }
5507
5508 p->p_filesz += alloc * bed->s->sizeof_phdr;
5509 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
5510 if (m->count)
5511 {
5512 p->p_filesz += header_pad;
5513 p->p_memsz += header_pad;
5514 }
252b5132
RH
5515 }
5516
5517 if (p->p_type == PT_LOAD
5518 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5519 {
bf988460 5520 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 5521 p->p_offset = off;
252b5132
RH
5522 else
5523 {
5524 file_ptr adjust;
5525
5526 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
5527 if (!no_contents)
5528 p->p_filesz += adjust;
252b5132
RH
5529 p->p_memsz += adjust;
5530 }
5531 }
5532
1ea63fd2
AM
5533 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5534 maps. Set filepos for sections in PT_LOAD segments, and in
5535 core files, for sections in PT_NOTE segments.
5536 assign_file_positions_for_non_load_sections will set filepos
5537 for other sections and update p_filesz for other segments. */
252b5132
RH
5538 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5539 {
5540 asection *sec;
252b5132 5541 bfd_size_type align;
627b32bc 5542 Elf_Internal_Shdr *this_hdr;
252b5132
RH
5543
5544 sec = *secpp;
02bf8d82 5545 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 5546 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 5547
88967714
AM
5548 if ((p->p_type == PT_LOAD
5549 || p->p_type == PT_TLS)
5550 && (this_hdr->sh_type != SHT_NOBITS
5551 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5552 && ((this_hdr->sh_flags & SHF_TLS) == 0
5553 || p->p_type == PT_TLS))))
252b5132 5554 {
b5599592
AM
5555 bfd_vma p_start = p->p_paddr;
5556 bfd_vma p_end = p_start + p->p_memsz;
5557 bfd_vma s_start = sec->lma;
5558 bfd_vma adjust = s_start - p_end;
252b5132 5559
a2d1e028
L
5560 if (adjust != 0
5561 && (s_start < p_end
5562 || p_end < p_start))
252b5132 5563 {
4eca0228 5564 _bfd_error_handler
695344c0 5565 /* xgettext:c-format */
76cfced5
AM
5566 (_("%B: section %A lma %#Lx adjusted to %#Lx"),
5567 abfd, sec, s_start, p_end);
88967714 5568 adjust = 0;
b5599592 5569 sec->lma = p_end;
1cfb7d1e 5570 }
3ac9b6c9 5571 p->p_memsz += adjust;
1cfb7d1e 5572
88967714
AM
5573 if (this_hdr->sh_type != SHT_NOBITS)
5574 {
32812159
AM
5575 if (p->p_filesz + adjust < p->p_memsz)
5576 {
5577 /* We have a PROGBITS section following NOBITS ones.
07d6d2b8 5578 Allocate file space for the NOBITS section(s) and
32812159
AM
5579 zero it. */
5580 adjust = p->p_memsz - p->p_filesz;
5581 if (!write_zeros (abfd, off, adjust))
5582 return FALSE;
5583 }
88967714
AM
5584 off += adjust;
5585 p->p_filesz += adjust;
252b5132 5586 }
252b5132
RH
5587 }
5588
5589 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5590 {
b301b248
AM
5591 /* The section at i == 0 is the one that actually contains
5592 everything. */
4a938328
MS
5593 if (i == 0)
5594 {
627b32bc 5595 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
5596 off += this_hdr->sh_size;
5597 p->p_filesz = this_hdr->sh_size;
b301b248
AM
5598 p->p_memsz = 0;
5599 p->p_align = 1;
252b5132 5600 }
4a938328 5601 else
252b5132 5602 {
b301b248 5603 /* The rest are fake sections that shouldn't be written. */
252b5132 5604 sec->filepos = 0;
eea6121a 5605 sec->size = 0;
b301b248
AM
5606 sec->flags = 0;
5607 continue;
252b5132 5608 }
252b5132
RH
5609 }
5610 else
5611 {
1e951488 5612 if (p->p_type == PT_LOAD)
b301b248 5613 {
1e951488
AM
5614 this_hdr->sh_offset = sec->filepos = off;
5615 if (this_hdr->sh_type != SHT_NOBITS)
5616 off += this_hdr->sh_size;
5617 }
5618 else if (this_hdr->sh_type == SHT_NOBITS
5619 && (this_hdr->sh_flags & SHF_TLS) != 0
5620 && this_hdr->sh_offset == 0)
5621 {
5622 /* This is a .tbss section that didn't get a PT_LOAD.
5623 (See _bfd_elf_map_sections_to_segments "Create a
5624 final PT_LOAD".) Set sh_offset to the value it
5625 would have if we had created a zero p_filesz and
5626 p_memsz PT_LOAD header for the section. This
5627 also makes the PT_TLS header have the same
5628 p_offset value. */
5629 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5630 off, align);
5631 this_hdr->sh_offset = sec->filepos = off + adjust;
b301b248 5632 }
252b5132 5633
02bf8d82 5634 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 5635 {
6a3cd2b4 5636 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
5637 /* A load section without SHF_ALLOC is something like
5638 a note section in a PT_NOTE segment. These take
5639 file space but are not loaded into memory. */
5640 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 5641 p->p_memsz += this_hdr->sh_size;
b301b248 5642 }
6a3cd2b4 5643 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 5644 {
6a3cd2b4
AM
5645 if (p->p_type == PT_TLS)
5646 p->p_memsz += this_hdr->sh_size;
5647
5648 /* .tbss is special. It doesn't contribute to p_memsz of
5649 normal segments. */
5650 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5651 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
5652 }
5653
b10a8ae0
L
5654 if (align > p->p_align
5655 && !m->p_align_valid
5656 && (p->p_type != PT_LOAD
5657 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
5658 p->p_align = align;
5659 }
5660
bf988460 5661 if (!m->p_flags_valid)
252b5132
RH
5662 {
5663 p->p_flags |= PF_R;
02bf8d82 5664 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 5665 p->p_flags |= PF_X;
02bf8d82 5666 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
5667 p->p_flags |= PF_W;
5668 }
5669 }
43a8475c 5670
bf988460 5671 off -= off_adjust;
0920dee7 5672
7c928300
AM
5673 /* Check that all sections are in a PT_LOAD segment.
5674 Don't check funky gdb generated core files. */
5675 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
5676 {
5677 bfd_boolean check_vma = TRUE;
5678
5679 for (i = 1; i < m->count; i++)
5680 if (m->sections[i]->vma == m->sections[i - 1]->vma
5681 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5682 ->this_hdr), p) != 0
5683 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5684 ->this_hdr), p) != 0)
0920dee7 5685 {
9a83a553
AM
5686 /* Looks like we have overlays packed into the segment. */
5687 check_vma = FALSE;
5688 break;
0920dee7 5689 }
9a83a553
AM
5690
5691 for (i = 0; i < m->count; i++)
5692 {
5693 Elf_Internal_Shdr *this_hdr;
5694 asection *sec;
5695
5696 sec = m->sections[i];
5697 this_hdr = &(elf_section_data(sec)->this_hdr);
86b2281f
AM
5698 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5699 && !ELF_TBSS_SPECIAL (this_hdr, p))
9a83a553 5700 {
4eca0228 5701 _bfd_error_handler
695344c0 5702 /* xgettext:c-format */
9a83a553
AM
5703 (_("%B: section `%A' can't be allocated in segment %d"),
5704 abfd, sec, j);
5705 print_segment_map (m);
5706 }
5707 }
5708 }
252b5132
RH
5709 }
5710
12bd6957 5711 elf_next_file_pos (abfd) = off;
f3520d2f
AM
5712 return TRUE;
5713}
5714
5715/* Assign file positions for the other sections. */
5716
5717static bfd_boolean
5718assign_file_positions_for_non_load_sections (bfd *abfd,
5719 struct bfd_link_info *link_info)
5720{
5721 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5722 Elf_Internal_Shdr **i_shdrpp;
e06efbf1 5723 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
f3520d2f
AM
5724 Elf_Internal_Phdr *phdrs;
5725 Elf_Internal_Phdr *p;
5726 struct elf_segment_map *m;
62655c7b 5727 struct elf_segment_map *hdrs_segment;
f3520d2f
AM
5728 bfd_vma filehdr_vaddr, filehdr_paddr;
5729 bfd_vma phdrs_vaddr, phdrs_paddr;
5730 file_ptr off;
f3520d2f
AM
5731 unsigned int count;
5732
5c182d5f 5733 i_shdrpp = elf_elfsections (abfd);
e06efbf1 5734 end_hdrpp = i_shdrpp + elf_numsections (abfd);
12bd6957 5735 off = elf_next_file_pos (abfd);
e06efbf1 5736 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
5c182d5f 5737 {
5c182d5f
AM
5738 Elf_Internal_Shdr *hdr;
5739
5740 hdr = *hdrpp;
5741 if (hdr->bfd_section != NULL
252e386e
AM
5742 && (hdr->bfd_section->filepos != 0
5743 || (hdr->sh_type == SHT_NOBITS
5744 && hdr->contents == NULL)))
627b32bc 5745 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
5746 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
5747 {
e8d2ba53 5748 if (hdr->sh_size != 0)
4eca0228 5749 _bfd_error_handler
695344c0 5750 /* xgettext:c-format */
e8d2ba53
AM
5751 (_("%B: warning: allocated section `%s' not in segment"),
5752 abfd,
5753 (hdr->bfd_section == NULL
5754 ? "*unknown*"
5755 : hdr->bfd_section->name));
3ba71138
L
5756 /* We don't need to page align empty sections. */
5757 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
5758 off += vma_page_aligned_bias (hdr->sh_addr, off,
5759 bed->maxpagesize);
5760 else
5761 off += vma_page_aligned_bias (hdr->sh_addr, off,
5762 hdr->sh_addralign);
5763 off = _bfd_elf_assign_file_position_for_section (hdr, off,
5764 FALSE);
5765 }
5766 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5767 && hdr->bfd_section == NULL)
0ce398f1
L
5768 || (hdr->bfd_section != NULL
5769 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS))
5770 /* Compress DWARF debug sections. */
12bd6957 5771 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6a40cf0c
NC
5772 || (elf_symtab_shndx_list (abfd) != NULL
5773 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
5774 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
5775 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
5c182d5f
AM
5776 hdr->sh_offset = -1;
5777 else
5778 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
5779 }
5780
252b5132
RH
5781 /* Now that we have set the section file positions, we can set up
5782 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
5783 count = 0;
5784 filehdr_vaddr = 0;
5785 filehdr_paddr = 0;
5786 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
5787 phdrs_paddr = 0;
62655c7b 5788 hdrs_segment = NULL;
f3520d2f 5789 phdrs = elf_tdata (abfd)->phdr;
12bd6957 5790 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
f3520d2f
AM
5791 {
5792 ++count;
5793 if (p->p_type != PT_LOAD)
5794 continue;
5795
5796 if (m->includes_filehdr)
5797 {
5798 filehdr_vaddr = p->p_vaddr;
5799 filehdr_paddr = p->p_paddr;
5800 }
5801 if (m->includes_phdrs)
5802 {
5803 phdrs_vaddr = p->p_vaddr;
5804 phdrs_paddr = p->p_paddr;
5805 if (m->includes_filehdr)
5806 {
62655c7b 5807 hdrs_segment = m;
f3520d2f
AM
5808 phdrs_vaddr += bed->s->sizeof_ehdr;
5809 phdrs_paddr += bed->s->sizeof_ehdr;
5810 }
5811 }
5812 }
5813
62655c7b
RM
5814 if (hdrs_segment != NULL && link_info != NULL)
5815 {
5816 /* There is a segment that contains both the file headers and the
5817 program headers, so provide a symbol __ehdr_start pointing there.
5818 A program can use this to examine itself robustly. */
5819
5820 struct elf_link_hash_entry *hash
5821 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5822 FALSE, FALSE, TRUE);
5823 /* If the symbol was referenced and not defined, define it. */
5824 if (hash != NULL
5825 && (hash->root.type == bfd_link_hash_new
5826 || hash->root.type == bfd_link_hash_undefined
5827 || hash->root.type == bfd_link_hash_undefweak
5828 || hash->root.type == bfd_link_hash_common))
5829 {
5830 asection *s = NULL;
5831 if (hdrs_segment->count != 0)
5832 /* The segment contains sections, so use the first one. */
5833 s = hdrs_segment->sections[0];
5834 else
5835 /* Use the first (i.e. lowest-addressed) section in any segment. */
12bd6957 5836 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62655c7b
RM
5837 if (m->count != 0)
5838 {
5839 s = m->sections[0];
5840 break;
5841 }
5842
5843 if (s != NULL)
5844 {
5845 hash->root.u.def.value = filehdr_vaddr - s->vma;
5846 hash->root.u.def.section = s;
5847 }
5848 else
5849 {
5850 hash->root.u.def.value = filehdr_vaddr;
5851 hash->root.u.def.section = bfd_abs_section_ptr;
5852 }
5853
5854 hash->root.type = bfd_link_hash_defined;
5855 hash->def_regular = 1;
5856 hash->non_elf = 0;
5857 }
5858 }
5859
12bd6957 5860 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
252b5132 5861 {
129af99f 5862 if (p->p_type == PT_GNU_RELRO)
252b5132 5863 {
f2731e0c 5864 bfd_vma start, end;
1ea63fd2 5865
129af99f 5866 if (link_info != NULL)
8c37241b 5867 {
129af99f 5868 /* During linking the range of the RELRO segment is passed
f2731e0c
AM
5869 in link_info. Note that there may be padding between
5870 relro_start and the first RELRO section. */
5871 start = link_info->relro_start;
5872 end = link_info->relro_end;
5873 }
5874 else if (m->count != 0)
5875 {
5876 if (!m->p_size_valid)
5877 abort ();
5878 start = m->sections[0]->vma;
5879 end = start + m->p_size;
5880 }
5881 else
5882 {
5883 start = 0;
5884 end = 0;
5885 }
5886
5887 if (start < end)
5888 {
5889 struct elf_segment_map *lm;
5890 const Elf_Internal_Phdr *lp;
5891 unsigned int i;
5892
5893 /* Find a LOAD segment containing a section in the RELRO
5894 segment. */
12bd6957 5895 for (lm = elf_seg_map (abfd), lp = phdrs;
3146fac4
AM
5896 lm != NULL;
5897 lm = lm->next, lp++)
8c37241b
JJ
5898 {
5899 if (lp->p_type == PT_LOAD
3146fac4 5900 && lm->count != 0
f2731e0c
AM
5901 && lm->sections[lm->count - 1]->vma >= start
5902 && lm->sections[0]->vma < end)
8c37241b
JJ
5903 break;
5904 }
3146fac4 5905 BFD_ASSERT (lm != NULL);
f2731e0c
AM
5906
5907 /* Find the section starting the RELRO segment. */
5908 for (i = 0; i < lm->count; i++)
129af99f 5909 {
f2731e0c
AM
5910 asection *s = lm->sections[i];
5911 if (s->vma >= start
5912 && s->vma < end
5913 && s->size != 0)
129af99f
AS
5914 break;
5915 }
f2731e0c
AM
5916 BFD_ASSERT (i < lm->count);
5917
5918 p->p_vaddr = lm->sections[i]->vma;
5919 p->p_paddr = lm->sections[i]->lma;
5920 p->p_offset = lm->sections[i]->filepos;
5921 p->p_memsz = end - p->p_vaddr;
5922 p->p_filesz = p->p_memsz;
5923
5924 /* The RELRO segment typically ends a few bytes into
5925 .got.plt but other layouts are possible. In cases
5926 where the end does not match any loaded section (for
5927 instance is in file padding), trim p_filesz back to
5928 correspond to the end of loaded section contents. */
5929 if (p->p_filesz > lp->p_vaddr + lp->p_filesz - p->p_vaddr)
5930 p->p_filesz = lp->p_vaddr + lp->p_filesz - p->p_vaddr;
b84a33b5 5931
f3944f72 5932 /* Preserve the alignment and flags if they are valid. The
07d6d2b8 5933 gold linker generates RW/4 for the PT_GNU_RELRO section.
f3944f72
L
5934 It is better for objcopy/strip to honor these attributes
5935 otherwise gdb will choke when using separate debug files.
5936 */
5937 if (!m->p_align_valid)
5938 p->p_align = 1;
5939 if (!m->p_flags_valid)
341b8ee7 5940 p->p_flags = PF_R;
129af99f 5941 }
9433b9b1 5942 else
b84a33b5
AM
5943 {
5944 memset (p, 0, sizeof *p);
5945 p->p_type = PT_NULL;
5946 }
129af99f 5947 }
04c3a755
NS
5948 else if (p->p_type == PT_GNU_STACK)
5949 {
5950 if (m->p_size_valid)
5951 p->p_memsz = m->p_size;
5952 }
129af99f
AS
5953 else if (m->count != 0)
5954 {
e06efbf1 5955 unsigned int i;
1a9ccd70 5956
129af99f
AS
5957 if (p->p_type != PT_LOAD
5958 && (p->p_type != PT_NOTE
5959 || bfd_get_format (abfd) != bfd_core))
5960 {
1a9ccd70
NC
5961 /* A user specified segment layout may include a PHDR
5962 segment that overlaps with a LOAD segment... */
5963 if (p->p_type == PT_PHDR)
5964 {
5965 m->count = 0;
5966 continue;
5967 }
5968
c86934ce
NC
5969 if (m->includes_filehdr || m->includes_phdrs)
5970 {
b1fa9dd6 5971 /* PR 17512: file: 2195325e. */
4eca0228 5972 _bfd_error_handler
76cfced5
AM
5973 (_("%B: error: non-load segment %d includes file header "
5974 "and/or program header"),
5975 abfd, (int) (p - phdrs));
c86934ce
NC
5976 return FALSE;
5977 }
129af99f 5978
86b2281f 5979 p->p_filesz = 0;
129af99f 5980 p->p_offset = m->sections[0]->filepos;
86b2281f
AM
5981 for (i = m->count; i-- != 0;)
5982 {
5983 asection *sect = m->sections[i];
5984 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
5985 if (hdr->sh_type != SHT_NOBITS)
5986 {
5987 p->p_filesz = (sect->filepos - m->sections[0]->filepos
5988 + hdr->sh_size);
5989 break;
5990 }
5991 }
129af99f
AS
5992 }
5993 }
5994 else if (m->includes_filehdr)
5995 {
5996 p->p_vaddr = filehdr_vaddr;
5997 if (! m->p_paddr_valid)
5998 p->p_paddr = filehdr_paddr;
5999 }
6000 else if (m->includes_phdrs)
6001 {
6002 p->p_vaddr = phdrs_vaddr;
6003 if (! m->p_paddr_valid)
6004 p->p_paddr = phdrs_paddr;
252b5132
RH
6005 }
6006 }
6007
12bd6957 6008 elf_next_file_pos (abfd) = off;
252b5132 6009
b34976b6 6010 return TRUE;
252b5132
RH
6011}
6012
6a40cf0c
NC
6013static elf_section_list *
6014find_section_in_list (unsigned int i, elf_section_list * list)
6015{
6016 for (;list != NULL; list = list->next)
6017 if (list->ndx == i)
6018 break;
6019 return list;
6020}
6021
252b5132
RH
6022/* Work out the file positions of all the sections. This is called by
6023 _bfd_elf_compute_section_file_positions. All the section sizes and
6024 VMAs must be known before this is called.
6025
e0638f70
AM
6026 Reloc sections come in two flavours: Those processed specially as
6027 "side-channel" data attached to a section to which they apply, and
6028 those that bfd doesn't process as relocations. The latter sort are
6029 stored in a normal bfd section by bfd_section_from_shdr. We don't
6030 consider the former sort here, unless they form part of the loadable
6031 image. Reloc sections not assigned here will be handled later by
6032 assign_file_positions_for_relocs.
252b5132
RH
6033
6034 We also don't set the positions of the .symtab and .strtab here. */
6035
b34976b6 6036static bfd_boolean
c84fca4d
AO
6037assign_file_positions_except_relocs (bfd *abfd,
6038 struct bfd_link_info *link_info)
252b5132 6039{
5c182d5f
AM
6040 struct elf_obj_tdata *tdata = elf_tdata (abfd);
6041 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
9c5bfbb7 6042 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
6043
6044 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
6045 && bfd_get_format (abfd) != bfd_core)
6046 {
5c182d5f
AM
6047 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
6048 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
6049 Elf_Internal_Shdr **hdrpp;
6050 unsigned int i;
a485e98e 6051 file_ptr off;
252b5132
RH
6052
6053 /* Start after the ELF header. */
6054 off = i_ehdrp->e_ehsize;
6055
6056 /* We are not creating an executable, which means that we are
6057 not creating a program header, and that the actual order of
6058 the sections in the file is unimportant. */
9ad5cbcf 6059 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
6060 {
6061 Elf_Internal_Shdr *hdr;
6062
6063 hdr = *hdrpp;
e0638f70
AM
6064 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6065 && hdr->bfd_section == NULL)
0ce398f1
L
6066 || (hdr->bfd_section != NULL
6067 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS))
6068 /* Compress DWARF debug sections. */
12bd6957 6069 || i == elf_onesymtab (abfd)
6a40cf0c
NC
6070 || (elf_symtab_shndx_list (abfd) != NULL
6071 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
6072 || i == elf_strtab_sec (abfd)
6073 || i == elf_shstrtab_sec (abfd))
252b5132
RH
6074 {
6075 hdr->sh_offset = -1;
252b5132 6076 }
9ad5cbcf 6077 else
b34976b6 6078 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 6079 }
a485e98e
AM
6080
6081 elf_next_file_pos (abfd) = off;
252b5132
RH
6082 }
6083 else
6084 {
f3520d2f
AM
6085 unsigned int alloc;
6086
252b5132 6087 /* Assign file positions for the loaded sections based on the
08a40648 6088 assignment of sections to segments. */
f3520d2f
AM
6089 if (!assign_file_positions_for_load_sections (abfd, link_info))
6090 return FALSE;
6091
6092 /* And for non-load sections. */
6093 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
6094 return FALSE;
6095
e36284ab
AM
6096 if (bed->elf_backend_modify_program_headers != NULL)
6097 {
6098 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
6099 return FALSE;
6100 }
6101
58e7ebac 6102 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=. */
0e1862bb 6103 if (link_info != NULL && bfd_link_pie (link_info))
58e7ebac
L
6104 {
6105 unsigned int num_segments = elf_elfheader (abfd)->e_phnum;
6106 Elf_Internal_Phdr *segment = elf_tdata (abfd)->phdr;
6107 Elf_Internal_Phdr *end_segment = &segment[num_segments];
6108
6109 /* Find the lowest p_vaddr in PT_LOAD segments. */
6110 bfd_vma p_vaddr = (bfd_vma) -1;
6111 for (; segment < end_segment; segment++)
6112 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
6113 p_vaddr = segment->p_vaddr;
6114
6115 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
6116 segments is non-zero. */
6117 if (p_vaddr)
6118 i_ehdrp->e_type = ET_EXEC;
6119 }
6120
f3520d2f 6121 /* Write out the program headers. */
12bd6957 6122 alloc = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
1a9ccd70
NC
6123
6124 /* Sort the program headers into the ordering required by the ELF standard. */
6125 if (alloc == 0)
6126 return TRUE;
6127
1a9ccd70
NC
6128 /* PR ld/20815 - Check that the program header segment, if present, will
6129 be loaded into memory. FIXME: The check below is not sufficient as
6130 really all PT_LOAD segments should be checked before issuing an error
6131 message. Plus the PHDR segment does not have to be the first segment
6132 in the program header table. But this version of the check should
cd584857
NC
6133 catch all real world use cases.
6134
6135 FIXME: We used to have code here to sort the PT_LOAD segments into
6136 ascending order, as per the ELF spec. But this breaks some programs,
6137 including the Linux kernel. But really either the spec should be
07d6d2b8 6138 changed or the programs updated. */
1a9ccd70 6139 if (alloc > 1
cd584857
NC
6140 && tdata->phdr[0].p_type == PT_PHDR
6141 && ! bed->elf_backend_allow_non_load_phdr (abfd, tdata->phdr, alloc)
6142 && tdata->phdr[1].p_type == PT_LOAD
6143 && (tdata->phdr[1].p_vaddr > tdata->phdr[0].p_vaddr
6144 || (tdata->phdr[1].p_vaddr + tdata->phdr[1].p_memsz)
6145 < (tdata->phdr[0].p_vaddr + tdata->phdr[0].p_memsz)))
1a9ccd70
NC
6146 {
6147 /* The fix for this error is usually to edit the linker script being
6148 used and set up the program headers manually. Either that or
6149 leave room for the headers at the start of the SECTIONS. */
6150 _bfd_error_handler (_("\
6151%B: error: PHDR segment not covered by LOAD segment"),
6152 abfd);
1a9ccd70
NC
6153 return FALSE;
6154 }
6155
f3520d2f 6156 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
cd584857
NC
6157 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
6158 return FALSE;
252b5132
RH
6159 }
6160
b34976b6 6161 return TRUE;
252b5132
RH
6162}
6163
b34976b6 6164static bfd_boolean
217aa764 6165prep_headers (bfd *abfd)
252b5132 6166{
3d540e93 6167 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 6168 struct elf_strtab_hash *shstrtab;
9c5bfbb7 6169 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
6170
6171 i_ehdrp = elf_elfheader (abfd);
252b5132 6172
2b0f7ef9 6173 shstrtab = _bfd_elf_strtab_init ();
252b5132 6174 if (shstrtab == NULL)
b34976b6 6175 return FALSE;
252b5132
RH
6176
6177 elf_shstrtab (abfd) = shstrtab;
6178
6179 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
6180 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
6181 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
6182 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
6183
6184 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
6185 i_ehdrp->e_ident[EI_DATA] =
6186 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
6187 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
6188
252b5132
RH
6189 if ((abfd->flags & DYNAMIC) != 0)
6190 i_ehdrp->e_type = ET_DYN;
6191 else if ((abfd->flags & EXEC_P) != 0)
6192 i_ehdrp->e_type = ET_EXEC;
6193 else if (bfd_get_format (abfd) == bfd_core)
6194 i_ehdrp->e_type = ET_CORE;
6195 else
6196 i_ehdrp->e_type = ET_REL;
6197
6198 switch (bfd_get_arch (abfd))
6199 {
6200 case bfd_arch_unknown:
6201 i_ehdrp->e_machine = EM_NONE;
6202 break;
aa4f99bb
AO
6203
6204 /* There used to be a long list of cases here, each one setting
6205 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6206 in the corresponding bfd definition. To avoid duplication,
6207 the switch was removed. Machines that need special handling
6208 can generally do it in elf_backend_final_write_processing(),
6209 unless they need the information earlier than the final write.
6210 Such need can generally be supplied by replacing the tests for
6211 e_machine with the conditions used to determine it. */
252b5132 6212 default:
9c5bfbb7
AM
6213 i_ehdrp->e_machine = bed->elf_machine_code;
6214 }
aa4f99bb 6215
252b5132
RH
6216 i_ehdrp->e_version = bed->s->ev_current;
6217 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
6218
c044fabd 6219 /* No program header, for now. */
252b5132
RH
6220 i_ehdrp->e_phoff = 0;
6221 i_ehdrp->e_phentsize = 0;
6222 i_ehdrp->e_phnum = 0;
6223
c044fabd 6224 /* Each bfd section is section header entry. */
252b5132
RH
6225 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6226 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6227
c044fabd 6228 /* If we're building an executable, we'll need a program header table. */
252b5132 6229 if (abfd->flags & EXEC_P)
0e71e495
BE
6230 /* It all happens later. */
6231 ;
252b5132
RH
6232 else
6233 {
6234 i_ehdrp->e_phentsize = 0;
252b5132
RH
6235 i_ehdrp->e_phoff = 0;
6236 }
6237
6238 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 6239 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 6240 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 6241 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 6242 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 6243 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132 6244 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
17ca87fc 6245 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
252b5132 6246 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 6247 return FALSE;
252b5132 6248
b34976b6 6249 return TRUE;
252b5132
RH
6250}
6251
6252/* Assign file positions for all the reloc sections which are not part
a485e98e 6253 of the loadable file image, and the file position of section headers. */
252b5132 6254
0ce398f1
L
6255static bfd_boolean
6256_bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
252b5132
RH
6257{
6258 file_ptr off;
e06efbf1 6259 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
3e19fb8f 6260 Elf_Internal_Shdr *shdrp;
a485e98e
AM
6261 Elf_Internal_Ehdr *i_ehdrp;
6262 const struct elf_backend_data *bed;
252b5132 6263
12bd6957 6264 off = elf_next_file_pos (abfd);
252b5132 6265
e06efbf1
L
6266 shdrpp = elf_elfsections (abfd);
6267 end_shdrpp = shdrpp + elf_numsections (abfd);
6268 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
252b5132 6269 {
252b5132 6270 shdrp = *shdrpp;
0ce398f1
L
6271 if (shdrp->sh_offset == -1)
6272 {
3e19fb8f 6273 asection *sec = shdrp->bfd_section;
0ce398f1
L
6274 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
6275 || shdrp->sh_type == SHT_RELA);
6276 if (is_rel
3e19fb8f 6277 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
0ce398f1
L
6278 {
6279 if (!is_rel)
6280 {
3e19fb8f
L
6281 const char *name = sec->name;
6282 struct bfd_elf_section_data *d;
6283
0ce398f1 6284 /* Compress DWARF debug sections. */
3e19fb8f 6285 if (!bfd_compress_section (abfd, sec,
0ce398f1
L
6286 shdrp->contents))
6287 return FALSE;
3e19fb8f
L
6288
6289 if (sec->compress_status == COMPRESS_SECTION_DONE
6290 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
6291 {
6292 /* If section is compressed with zlib-gnu, convert
6293 section name from .debug_* to .zdebug_*. */
6294 char *new_name
6295 = convert_debug_to_zdebug (abfd, name);
6296 if (new_name == NULL)
6297 return FALSE;
6298 name = new_name;
6299 }
dd905818 6300 /* Add section name to section name section. */
3e19fb8f
L
6301 if (shdrp->sh_name != (unsigned int) -1)
6302 abort ();
6303 shdrp->sh_name
6304 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6305 name, FALSE);
6306 d = elf_section_data (sec);
6307
dd905818 6308 /* Add reloc section name to section name section. */
3e19fb8f
L
6309 if (d->rel.hdr
6310 && !_bfd_elf_set_reloc_sh_name (abfd,
6311 d->rel.hdr,
6312 name, FALSE))
6313 return FALSE;
6314 if (d->rela.hdr
6315 && !_bfd_elf_set_reloc_sh_name (abfd,
6316 d->rela.hdr,
91cb26da 6317 name, TRUE))
3e19fb8f
L
6318 return FALSE;
6319
0ce398f1 6320 /* Update section size and contents. */
3e19fb8f
L
6321 shdrp->sh_size = sec->size;
6322 shdrp->contents = sec->contents;
0ce398f1
L
6323 shdrp->bfd_section->contents = NULL;
6324 }
6325 off = _bfd_elf_assign_file_position_for_section (shdrp,
6326 off,
6327 TRUE);
6328 }
6329 }
252b5132
RH
6330 }
6331
3e19fb8f
L
6332 /* Place section name section after DWARF debug sections have been
6333 compressed. */
6334 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6335 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6336 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6337 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
6338
6339 /* Place the section headers. */
a485e98e
AM
6340 i_ehdrp = elf_elfheader (abfd);
6341 bed = get_elf_backend_data (abfd);
6342 off = align_file_position (off, 1 << bed->s->log_file_align);
6343 i_ehdrp->e_shoff = off;
6344 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
12bd6957 6345 elf_next_file_pos (abfd) = off;
0ce398f1
L
6346
6347 return TRUE;
252b5132
RH
6348}
6349
b34976b6 6350bfd_boolean
217aa764 6351_bfd_elf_write_object_contents (bfd *abfd)
252b5132 6352{
9c5bfbb7 6353 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6354 Elf_Internal_Shdr **i_shdrp;
b34976b6 6355 bfd_boolean failed;
9ad5cbcf 6356 unsigned int count, num_sec;
30e8ee25 6357 struct elf_obj_tdata *t;
252b5132
RH
6358
6359 if (! abfd->output_has_begun
217aa764 6360 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6361 return FALSE;
252b5132
RH
6362
6363 i_shdrp = elf_elfsections (abfd);
252b5132 6364
b34976b6 6365 failed = FALSE;
252b5132
RH
6366 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6367 if (failed)
b34976b6 6368 return FALSE;
252b5132 6369
0ce398f1
L
6370 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6371 return FALSE;
252b5132 6372
c044fabd 6373 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
6374 num_sec = elf_numsections (abfd);
6375 for (count = 1; count < num_sec; count++)
252b5132 6376 {
3e19fb8f
L
6377 i_shdrp[count]->sh_name
6378 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6379 i_shdrp[count]->sh_name);
252b5132 6380 if (bed->elf_backend_section_processing)
75506100
MR
6381 if (!(*bed->elf_backend_section_processing) (abfd, i_shdrp[count]))
6382 return FALSE;
252b5132
RH
6383 if (i_shdrp[count]->contents)
6384 {
dc810e39
AM
6385 bfd_size_type amt = i_shdrp[count]->sh_size;
6386
252b5132 6387 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 6388 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 6389 return FALSE;
252b5132
RH
6390 }
6391 }
6392
6393 /* Write out the section header names. */
30e8ee25 6394 t = elf_tdata (abfd);
26ae6d5e 6395 if (elf_shstrtab (abfd) != NULL
30e8ee25 6396 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 6397 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 6398 return FALSE;
252b5132
RH
6399
6400 if (bed->elf_backend_final_write_processing)
12bd6957 6401 (*bed->elf_backend_final_write_processing) (abfd, elf_linker (abfd));
252b5132 6402
ff59fc36
RM
6403 if (!bed->s->write_shdrs_and_ehdr (abfd))
6404 return FALSE;
6405
6406 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
c0355132
AM
6407 if (t->o->build_id.after_write_object_contents != NULL)
6408 return (*t->o->build_id.after_write_object_contents) (abfd);
ff59fc36
RM
6409
6410 return TRUE;
252b5132
RH
6411}
6412
b34976b6 6413bfd_boolean
217aa764 6414_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 6415{
c044fabd 6416 /* Hopefully this can be done just like an object file. */
252b5132
RH
6417 return _bfd_elf_write_object_contents (abfd);
6418}
c044fabd
KH
6419
6420/* Given a section, search the header to find them. */
6421
cb33740c 6422unsigned int
198beae2 6423_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 6424{
9c5bfbb7 6425 const struct elf_backend_data *bed;
91d6fa6a 6426 unsigned int sec_index;
252b5132 6427
9ad5cbcf
AM
6428 if (elf_section_data (asect) != NULL
6429 && elf_section_data (asect)->this_idx != 0)
6430 return elf_section_data (asect)->this_idx;
6431
6432 if (bfd_is_abs_section (asect))
91d6fa6a 6433 sec_index = SHN_ABS;
af746e92 6434 else if (bfd_is_com_section (asect))
91d6fa6a 6435 sec_index = SHN_COMMON;
af746e92 6436 else if (bfd_is_und_section (asect))
91d6fa6a 6437 sec_index = SHN_UNDEF;
af746e92 6438 else
91d6fa6a 6439 sec_index = SHN_BAD;
252b5132 6440
af746e92 6441 bed = get_elf_backend_data (abfd);
252b5132
RH
6442 if (bed->elf_backend_section_from_bfd_section)
6443 {
91d6fa6a 6444 int retval = sec_index;
9ad5cbcf 6445
af746e92
AM
6446 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6447 return retval;
252b5132
RH
6448 }
6449
91d6fa6a 6450 if (sec_index == SHN_BAD)
af746e92 6451 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 6452
91d6fa6a 6453 return sec_index;
252b5132
RH
6454}
6455
6456/* Given a BFD symbol, return the index in the ELF symbol table, or -1
6457 on error. */
6458
6459int
217aa764 6460_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
6461{
6462 asymbol *asym_ptr = *asym_ptr_ptr;
6463 int idx;
6464 flagword flags = asym_ptr->flags;
6465
6466 /* When gas creates relocations against local labels, it creates its
6467 own symbol for the section, but does put the symbol into the
6468 symbol chain, so udata is 0. When the linker is generating
6469 relocatable output, this section symbol may be for one of the
6470 input sections rather than the output section. */
6471 if (asym_ptr->udata.i == 0
6472 && (flags & BSF_SECTION_SYM)
6473 && asym_ptr->section)
6474 {
5372391b 6475 asection *sec;
252b5132
RH
6476 int indx;
6477
5372391b
AM
6478 sec = asym_ptr->section;
6479 if (sec->owner != abfd && sec->output_section != NULL)
6480 sec = sec->output_section;
6481 if (sec->owner == abfd
6482 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 6483 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
6484 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
6485 }
6486
6487 idx = asym_ptr->udata.i;
6488
6489 if (idx == 0)
6490 {
6491 /* This case can occur when using --strip-symbol on a symbol
08a40648 6492 which is used in a relocation entry. */
4eca0228 6493 _bfd_error_handler
695344c0 6494 /* xgettext:c-format */
d003868e
AM
6495 (_("%B: symbol `%s' required but not present"),
6496 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
6497 bfd_set_error (bfd_error_no_symbols);
6498 return -1;
6499 }
6500
6501#if DEBUG & 4
6502 {
6503 fprintf (stderr,
cd9af601
AM
6504 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8x\n",
6505 (long) asym_ptr, asym_ptr->name, idx, flags);
252b5132
RH
6506 fflush (stderr);
6507 }
6508#endif
6509
6510 return idx;
6511}
6512
84d1d650 6513/* Rewrite program header information. */
252b5132 6514
b34976b6 6515static bfd_boolean
84d1d650 6516rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 6517{
b34976b6
AM
6518 Elf_Internal_Ehdr *iehdr;
6519 struct elf_segment_map *map;
6520 struct elf_segment_map *map_first;
6521 struct elf_segment_map **pointer_to_map;
6522 Elf_Internal_Phdr *segment;
6523 asection *section;
6524 unsigned int i;
6525 unsigned int num_segments;
6526 bfd_boolean phdr_included = FALSE;
5c44b38e 6527 bfd_boolean p_paddr_valid;
b34976b6
AM
6528 bfd_vma maxpagesize;
6529 struct elf_segment_map *phdr_adjust_seg = NULL;
6530 unsigned int phdr_adjust_num = 0;
9c5bfbb7 6531 const struct elf_backend_data *bed;
bc67d8a6 6532
caf47ea6 6533 bed = get_elf_backend_data (ibfd);
252b5132
RH
6534 iehdr = elf_elfheader (ibfd);
6535
bc67d8a6 6536 map_first = NULL;
c044fabd 6537 pointer_to_map = &map_first;
252b5132
RH
6538
6539 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
6540 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6541
6542 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
6543#define SEGMENT_END(segment, start) \
6544 (start + (segment->p_memsz > segment->p_filesz \
6545 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 6546
eecdbe52
JJ
6547#define SECTION_SIZE(section, segment) \
6548 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6549 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 6550 ? section->size : 0)
eecdbe52 6551
b34976b6 6552 /* Returns TRUE if the given section is contained within
bc67d8a6 6553 the given segment. VMA addresses are compared. */
aecc8f8a
AM
6554#define IS_CONTAINED_BY_VMA(section, segment) \
6555 (section->vma >= segment->p_vaddr \
eecdbe52 6556 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 6557 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 6558
b34976b6 6559 /* Returns TRUE if the given section is contained within
bc67d8a6 6560 the given segment. LMA addresses are compared. */
aecc8f8a
AM
6561#define IS_CONTAINED_BY_LMA(section, segment, base) \
6562 (section->lma >= base \
eecdbe52 6563 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 6564 <= SEGMENT_END (segment, base)))
252b5132 6565
0efc80c8
L
6566 /* Handle PT_NOTE segment. */
6567#define IS_NOTE(p, s) \
aecc8f8a 6568 (p->p_type == PT_NOTE \
0efc80c8 6569 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 6570 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6571 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6572 <= p->p_offset + p->p_filesz))
252b5132 6573
0efc80c8
L
6574 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6575 etc. */
6576#define IS_COREFILE_NOTE(p, s) \
6577 (IS_NOTE (p, s) \
6578 && bfd_get_format (ibfd) == bfd_core \
6579 && s->vma == 0 \
6580 && s->lma == 0)
6581
252b5132
RH
6582 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6583 linker, which generates a PT_INTERP section with p_vaddr and
6584 p_memsz set to 0. */
aecc8f8a
AM
6585#define IS_SOLARIS_PT_INTERP(p, s) \
6586 (p->p_vaddr == 0 \
6587 && p->p_paddr == 0 \
6588 && p->p_memsz == 0 \
6589 && p->p_filesz > 0 \
6590 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 6591 && s->size > 0 \
aecc8f8a 6592 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6593 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6594 <= p->p_offset + p->p_filesz))
5c440b1e 6595
bc67d8a6
NC
6596 /* Decide if the given section should be included in the given segment.
6597 A section will be included if:
f5ffc919 6598 1. It is within the address space of the segment -- we use the LMA
08a40648 6599 if that is set for the segment and the VMA otherwise,
0efc80c8 6600 2. It is an allocated section or a NOTE section in a PT_NOTE
d324f6d6 6601 segment.
bc67d8a6 6602 3. There is an output section associated with it,
eecdbe52 6603 4. The section has not already been allocated to a previous segment.
2b05f1b7 6604 5. PT_GNU_STACK segments do not include any sections.
03394ac9 6605 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
6606 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6607 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 6608 (with the possible exception of .dynamic). */
9f17e2a6 6609#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
6610 ((((segment->p_paddr \
6611 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
6612 : IS_CONTAINED_BY_VMA (section, segment)) \
6613 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 6614 || IS_NOTE (segment, section)) \
2b05f1b7
L
6615 && segment->p_type != PT_GNU_STACK \
6616 && (segment->p_type != PT_TLS \
6617 || (section->flags & SEC_THREAD_LOCAL)) \
6618 && (segment->p_type == PT_LOAD \
6619 || segment->p_type == PT_TLS \
6620 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6621 && (segment->p_type != PT_DYNAMIC \
6622 || SECTION_SIZE (section, segment) > 0 \
6623 || (segment->p_paddr \
6624 ? segment->p_paddr != section->lma \
6625 : segment->p_vaddr != section->vma) \
6626 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
6627 == 0)) \
0067a569 6628 && !section->segment_mark)
bc67d8a6 6629
9f17e2a6
L
6630/* If the output section of a section in the input segment is NULL,
6631 it is removed from the corresponding output segment. */
6632#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
6633 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
6634 && section->output_section != NULL)
6635
b34976b6 6636 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
6637#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6638 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6639
6640 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6641 their VMA address ranges and their LMA address ranges overlap.
6642 It is possible to have overlapping VMA ranges without overlapping LMA
6643 ranges. RedBoot images for example can have both .data and .bss mapped
6644 to the same VMA range, but with the .data section mapped to a different
6645 LMA. */
aecc8f8a 6646#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 6647 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 6648 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 6649 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 6650 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
6651
6652 /* Initialise the segment mark field. */
6653 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 6654 section->segment_mark = FALSE;
bc67d8a6 6655
5c44b38e
AM
6656 /* The Solaris linker creates program headers in which all the
6657 p_paddr fields are zero. When we try to objcopy or strip such a
6658 file, we get confused. Check for this case, and if we find it
6659 don't set the p_paddr_valid fields. */
6660 p_paddr_valid = FALSE;
6661 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6662 i < num_segments;
6663 i++, segment++)
6664 if (segment->p_paddr != 0)
6665 {
6666 p_paddr_valid = TRUE;
6667 break;
6668 }
6669
252b5132 6670 /* Scan through the segments specified in the program header
bc67d8a6 6671 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 6672 in the loadable segments. These can be created by weird
aecc8f8a 6673 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
6674 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6675 i < num_segments;
c044fabd 6676 i++, segment++)
252b5132 6677 {
252b5132 6678 unsigned int j;
c044fabd 6679 Elf_Internal_Phdr *segment2;
252b5132 6680
aecc8f8a
AM
6681 if (segment->p_type == PT_INTERP)
6682 for (section = ibfd->sections; section; section = section->next)
6683 if (IS_SOLARIS_PT_INTERP (segment, section))
6684 {
6685 /* Mininal change so that the normal section to segment
4cc11e76 6686 assignment code will work. */
aecc8f8a
AM
6687 segment->p_vaddr = section->vma;
6688 break;
6689 }
6690
bc67d8a6 6691 if (segment->p_type != PT_LOAD)
b10a8ae0
L
6692 {
6693 /* Remove PT_GNU_RELRO segment. */
6694 if (segment->p_type == PT_GNU_RELRO)
6695 segment->p_type = PT_NULL;
6696 continue;
6697 }
c044fabd 6698
bc67d8a6 6699 /* Determine if this segment overlaps any previous segments. */
0067a569 6700 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
6701 {
6702 bfd_signed_vma extra_length;
c044fabd 6703
bc67d8a6 6704 if (segment2->p_type != PT_LOAD
0067a569 6705 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 6706 continue;
c044fabd 6707
bc67d8a6
NC
6708 /* Merge the two segments together. */
6709 if (segment2->p_vaddr < segment->p_vaddr)
6710 {
c044fabd 6711 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 6712 SEGMENT. */
0067a569
AM
6713 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
6714 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 6715
bc67d8a6
NC
6716 if (extra_length > 0)
6717 {
0067a569 6718 segment2->p_memsz += extra_length;
bc67d8a6
NC
6719 segment2->p_filesz += extra_length;
6720 }
c044fabd 6721
bc67d8a6 6722 segment->p_type = PT_NULL;
c044fabd 6723
bc67d8a6
NC
6724 /* Since we have deleted P we must restart the outer loop. */
6725 i = 0;
6726 segment = elf_tdata (ibfd)->phdr;
6727 break;
6728 }
6729 else
6730 {
c044fabd 6731 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 6732 SEGMENT2. */
0067a569
AM
6733 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
6734 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 6735
bc67d8a6
NC
6736 if (extra_length > 0)
6737 {
0067a569 6738 segment->p_memsz += extra_length;
bc67d8a6
NC
6739 segment->p_filesz += extra_length;
6740 }
c044fabd 6741
bc67d8a6
NC
6742 segment2->p_type = PT_NULL;
6743 }
6744 }
6745 }
c044fabd 6746
bc67d8a6
NC
6747 /* The second scan attempts to assign sections to segments. */
6748 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6749 i < num_segments;
0067a569 6750 i++, segment++)
bc67d8a6 6751 {
0067a569
AM
6752 unsigned int section_count;
6753 asection **sections;
6754 asection *output_section;
6755 unsigned int isec;
6756 bfd_vma matching_lma;
6757 bfd_vma suggested_lma;
6758 unsigned int j;
dc810e39 6759 bfd_size_type amt;
0067a569
AM
6760 asection *first_section;
6761 bfd_boolean first_matching_lma;
6762 bfd_boolean first_suggested_lma;
bc67d8a6
NC
6763
6764 if (segment->p_type == PT_NULL)
6765 continue;
c044fabd 6766
9f17e2a6 6767 first_section = NULL;
bc67d8a6 6768 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
6769 for (section = ibfd->sections, section_count = 0;
6770 section != NULL;
6771 section = section->next)
9f17e2a6
L
6772 {
6773 /* Find the first section in the input segment, which may be
6774 removed from the corresponding output segment. */
6775 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
6776 {
6777 if (first_section == NULL)
6778 first_section = section;
6779 if (section->output_section != NULL)
6780 ++section_count;
6781 }
6782 }
811072d8 6783
b5f852ea
NC
6784 /* Allocate a segment map big enough to contain
6785 all of the sections we have selected. */
dc810e39
AM
6786 amt = sizeof (struct elf_segment_map);
6787 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6788 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 6789 if (map == NULL)
b34976b6 6790 return FALSE;
252b5132
RH
6791
6792 /* Initialise the fields of the segment map. Default to
6793 using the physical address of the segment in the input BFD. */
0067a569
AM
6794 map->next = NULL;
6795 map->p_type = segment->p_type;
6796 map->p_flags = segment->p_flags;
bc67d8a6 6797 map->p_flags_valid = 1;
55d55ac7 6798
9f17e2a6
L
6799 /* If the first section in the input segment is removed, there is
6800 no need to preserve segment physical address in the corresponding
6801 output segment. */
945c025a 6802 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
6803 {
6804 map->p_paddr = segment->p_paddr;
5c44b38e 6805 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 6806 }
252b5132
RH
6807
6808 /* Determine if this segment contains the ELF file header
6809 and if it contains the program headers themselves. */
bc67d8a6
NC
6810 map->includes_filehdr = (segment->p_offset == 0
6811 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 6812 map->includes_phdrs = 0;
252b5132 6813
0067a569 6814 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 6815 {
bc67d8a6
NC
6816 map->includes_phdrs =
6817 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6818 && (segment->p_offset + segment->p_filesz
252b5132
RH
6819 >= ((bfd_vma) iehdr->e_phoff
6820 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 6821
bc67d8a6 6822 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 6823 phdr_included = TRUE;
252b5132
RH
6824 }
6825
bc67d8a6 6826 if (section_count == 0)
252b5132
RH
6827 {
6828 /* Special segments, such as the PT_PHDR segment, may contain
6829 no sections, but ordinary, loadable segments should contain
1ed89aa9 6830 something. They are allowed by the ELF spec however, so only
07d6d2b8 6831 a warning is produced.
f98450c6
NC
6832 There is however the valid use case of embedded systems which
6833 have segments with p_filesz of 0 and a p_memsz > 0 to initialize
6834 flash memory with zeros. No warning is shown for that case. */
6835 if (segment->p_type == PT_LOAD
6836 && (segment->p_filesz > 0 || segment->p_memsz == 0))
6837 /* xgettext:c-format */
76cfced5
AM
6838 _bfd_error_handler (_("%B: warning: Empty loadable segment detected"
6839 " at vaddr=%#Lx, is this intentional?"),
f98450c6 6840 ibfd, segment->p_vaddr);
252b5132 6841
bc67d8a6 6842 map->count = 0;
c044fabd
KH
6843 *pointer_to_map = map;
6844 pointer_to_map = &map->next;
252b5132
RH
6845
6846 continue;
6847 }
6848
6849 /* Now scan the sections in the input BFD again and attempt
6850 to add their corresponding output sections to the segment map.
6851 The problem here is how to handle an output section which has
6852 been moved (ie had its LMA changed). There are four possibilities:
6853
6854 1. None of the sections have been moved.
6855 In this case we can continue to use the segment LMA from the
6856 input BFD.
6857
6858 2. All of the sections have been moved by the same amount.
6859 In this case we can change the segment's LMA to match the LMA
6860 of the first section.
6861
6862 3. Some of the sections have been moved, others have not.
6863 In this case those sections which have not been moved can be
6864 placed in the current segment which will have to have its size,
6865 and possibly its LMA changed, and a new segment or segments will
6866 have to be created to contain the other sections.
6867
b5f852ea 6868 4. The sections have been moved, but not by the same amount.
252b5132
RH
6869 In this case we can change the segment's LMA to match the LMA
6870 of the first section and we will have to create a new segment
6871 or segments to contain the other sections.
6872
6873 In order to save time, we allocate an array to hold the section
6874 pointers that we are interested in. As these sections get assigned
6875 to a segment, they are removed from this array. */
6876
a50b1753 6877 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 6878 if (sections == NULL)
b34976b6 6879 return FALSE;
252b5132
RH
6880
6881 /* Step One: Scan for segment vs section LMA conflicts.
6882 Also add the sections to the section array allocated above.
6883 Also add the sections to the current segment. In the common
6884 case, where the sections have not been moved, this means that
6885 we have completely filled the segment, and there is nothing
6886 more to do. */
252b5132 6887 isec = 0;
72730e0c 6888 matching_lma = 0;
252b5132 6889 suggested_lma = 0;
0067a569
AM
6890 first_matching_lma = TRUE;
6891 first_suggested_lma = TRUE;
252b5132 6892
461c4b2e 6893 for (section = first_section, j = 0;
bc67d8a6
NC
6894 section != NULL;
6895 section = section->next)
252b5132 6896 {
caf47ea6 6897 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 6898 {
bc67d8a6
NC
6899 output_section = section->output_section;
6900
0067a569 6901 sections[j++] = section;
252b5132
RH
6902
6903 /* The Solaris native linker always sets p_paddr to 0.
6904 We try to catch that case here, and set it to the
5e8d7549
NC
6905 correct value. Note - some backends require that
6906 p_paddr be left as zero. */
5c44b38e 6907 if (!p_paddr_valid
4455705d 6908 && segment->p_vaddr != 0
0067a569 6909 && !bed->want_p_paddr_set_to_zero
252b5132 6910 && isec == 0
bc67d8a6 6911 && output_section->lma != 0
0067a569
AM
6912 && output_section->vma == (segment->p_vaddr
6913 + (map->includes_filehdr
6914 ? iehdr->e_ehsize
6915 : 0)
6916 + (map->includes_phdrs
6917 ? (iehdr->e_phnum
6918 * iehdr->e_phentsize)
6919 : 0)))
bc67d8a6 6920 map->p_paddr = segment->p_vaddr;
252b5132
RH
6921
6922 /* Match up the physical address of the segment with the
6923 LMA address of the output section. */
bc67d8a6 6924 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 6925 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
6926 || (bed->want_p_paddr_set_to_zero
6927 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 6928 {
0067a569
AM
6929 if (first_matching_lma || output_section->lma < matching_lma)
6930 {
6931 matching_lma = output_section->lma;
6932 first_matching_lma = FALSE;
6933 }
252b5132
RH
6934
6935 /* We assume that if the section fits within the segment
bc67d8a6 6936 then it does not overlap any other section within that
252b5132 6937 segment. */
0067a569
AM
6938 map->sections[isec++] = output_section;
6939 }
6940 else if (first_suggested_lma)
6941 {
6942 suggested_lma = output_section->lma;
6943 first_suggested_lma = FALSE;
252b5132 6944 }
147d51c2
L
6945
6946 if (j == section_count)
6947 break;
252b5132
RH
6948 }
6949 }
6950
bc67d8a6 6951 BFD_ASSERT (j == section_count);
252b5132
RH
6952
6953 /* Step Two: Adjust the physical address of the current segment,
6954 if necessary. */
bc67d8a6 6955 if (isec == section_count)
252b5132
RH
6956 {
6957 /* All of the sections fitted within the segment as currently
6958 specified. This is the default case. Add the segment to
6959 the list of built segments and carry on to process the next
6960 program header in the input BFD. */
bc67d8a6 6961 map->count = section_count;
c044fabd
KH
6962 *pointer_to_map = map;
6963 pointer_to_map = &map->next;
08a40648 6964
5c44b38e
AM
6965 if (p_paddr_valid
6966 && !bed->want_p_paddr_set_to_zero
147d51c2 6967 && matching_lma != map->p_paddr
5c44b38e
AM
6968 && !map->includes_filehdr
6969 && !map->includes_phdrs)
3271a814
NS
6970 /* There is some padding before the first section in the
6971 segment. So, we must account for that in the output
6972 segment's vma. */
6973 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 6974
252b5132
RH
6975 free (sections);
6976 continue;
6977 }
252b5132
RH
6978 else
6979 {
0067a569 6980 if (!first_matching_lma)
72730e0c
AM
6981 {
6982 /* At least one section fits inside the current segment.
6983 Keep it, but modify its physical address to match the
6984 LMA of the first section that fitted. */
bc67d8a6 6985 map->p_paddr = matching_lma;
72730e0c
AM
6986 }
6987 else
6988 {
6989 /* None of the sections fitted inside the current segment.
6990 Change the current segment's physical address to match
6991 the LMA of the first section. */
bc67d8a6 6992 map->p_paddr = suggested_lma;
72730e0c
AM
6993 }
6994
bc67d8a6
NC
6995 /* Offset the segment physical address from the lma
6996 to allow for space taken up by elf headers. */
6997 if (map->includes_filehdr)
010c8431
AM
6998 {
6999 if (map->p_paddr >= iehdr->e_ehsize)
7000 map->p_paddr -= iehdr->e_ehsize;
7001 else
7002 {
7003 map->includes_filehdr = FALSE;
7004 map->includes_phdrs = FALSE;
7005 }
7006 }
252b5132 7007
bc67d8a6
NC
7008 if (map->includes_phdrs)
7009 {
010c8431
AM
7010 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
7011 {
7012 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
7013
7014 /* iehdr->e_phnum is just an estimate of the number
7015 of program headers that we will need. Make a note
7016 here of the number we used and the segment we chose
7017 to hold these headers, so that we can adjust the
7018 offset when we know the correct value. */
7019 phdr_adjust_num = iehdr->e_phnum;
7020 phdr_adjust_seg = map;
7021 }
7022 else
7023 map->includes_phdrs = FALSE;
bc67d8a6 7024 }
252b5132
RH
7025 }
7026
7027 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 7028 those that fit to the current segment and removing them from the
252b5132
RH
7029 sections array; but making sure not to leave large gaps. Once all
7030 possible sections have been assigned to the current segment it is
7031 added to the list of built segments and if sections still remain
7032 to be assigned, a new segment is constructed before repeating
7033 the loop. */
7034 isec = 0;
7035 do
7036 {
bc67d8a6 7037 map->count = 0;
252b5132 7038 suggested_lma = 0;
0067a569 7039 first_suggested_lma = TRUE;
252b5132
RH
7040
7041 /* Fill the current segment with sections that fit. */
bc67d8a6 7042 for (j = 0; j < section_count; j++)
252b5132 7043 {
bc67d8a6 7044 section = sections[j];
252b5132 7045
bc67d8a6 7046 if (section == NULL)
252b5132
RH
7047 continue;
7048
bc67d8a6 7049 output_section = section->output_section;
252b5132 7050
bc67d8a6 7051 BFD_ASSERT (output_section != NULL);
c044fabd 7052
bc67d8a6
NC
7053 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
7054 || IS_COREFILE_NOTE (segment, section))
252b5132 7055 {
bc67d8a6 7056 if (map->count == 0)
252b5132
RH
7057 {
7058 /* If the first section in a segment does not start at
bc67d8a6
NC
7059 the beginning of the segment, then something is
7060 wrong. */
0067a569
AM
7061 if (output_section->lma
7062 != (map->p_paddr
7063 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
7064 + (map->includes_phdrs
7065 ? iehdr->e_phnum * iehdr->e_phentsize
7066 : 0)))
252b5132
RH
7067 abort ();
7068 }
7069 else
7070 {
0067a569 7071 asection *prev_sec;
252b5132 7072
bc67d8a6 7073 prev_sec = map->sections[map->count - 1];
252b5132
RH
7074
7075 /* If the gap between the end of the previous section
bc67d8a6
NC
7076 and the start of this section is more than
7077 maxpagesize then we need to start a new segment. */
eea6121a 7078 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 7079 maxpagesize)
caf47ea6 7080 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 7081 || (prev_sec->lma + prev_sec->size
079e9a2f 7082 > output_section->lma))
252b5132 7083 {
0067a569
AM
7084 if (first_suggested_lma)
7085 {
7086 suggested_lma = output_section->lma;
7087 first_suggested_lma = FALSE;
7088 }
252b5132
RH
7089
7090 continue;
7091 }
7092 }
7093
bc67d8a6 7094 map->sections[map->count++] = output_section;
252b5132
RH
7095 ++isec;
7096 sections[j] = NULL;
b34976b6 7097 section->segment_mark = TRUE;
252b5132 7098 }
0067a569
AM
7099 else if (first_suggested_lma)
7100 {
7101 suggested_lma = output_section->lma;
7102 first_suggested_lma = FALSE;
7103 }
252b5132
RH
7104 }
7105
bc67d8a6 7106 BFD_ASSERT (map->count > 0);
252b5132
RH
7107
7108 /* Add the current segment to the list of built segments. */
c044fabd
KH
7109 *pointer_to_map = map;
7110 pointer_to_map = &map->next;
252b5132 7111
bc67d8a6 7112 if (isec < section_count)
252b5132
RH
7113 {
7114 /* We still have not allocated all of the sections to
7115 segments. Create a new segment here, initialise it
7116 and carry on looping. */
dc810e39
AM
7117 amt = sizeof (struct elf_segment_map);
7118 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
5964fc3a 7119 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 7120 if (map == NULL)
5ed6aba4
NC
7121 {
7122 free (sections);
7123 return FALSE;
7124 }
252b5132
RH
7125
7126 /* Initialise the fields of the segment map. Set the physical
7127 physical address to the LMA of the first section that has
7128 not yet been assigned. */
0067a569
AM
7129 map->next = NULL;
7130 map->p_type = segment->p_type;
7131 map->p_flags = segment->p_flags;
7132 map->p_flags_valid = 1;
7133 map->p_paddr = suggested_lma;
5c44b38e 7134 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 7135 map->includes_filehdr = 0;
0067a569 7136 map->includes_phdrs = 0;
252b5132
RH
7137 }
7138 }
bc67d8a6 7139 while (isec < section_count);
252b5132
RH
7140
7141 free (sections);
7142 }
7143
12bd6957 7144 elf_seg_map (obfd) = map_first;
bc67d8a6
NC
7145
7146 /* If we had to estimate the number of program headers that were
9ad5cbcf 7147 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
7148 the offset if necessary. */
7149 if (phdr_adjust_seg != NULL)
7150 {
7151 unsigned int count;
c044fabd 7152
bc67d8a6 7153 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 7154 count++;
252b5132 7155
bc67d8a6
NC
7156 if (count > phdr_adjust_num)
7157 phdr_adjust_seg->p_paddr
7158 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
7159 }
c044fabd 7160
bc67d8a6 7161#undef SEGMENT_END
eecdbe52 7162#undef SECTION_SIZE
bc67d8a6
NC
7163#undef IS_CONTAINED_BY_VMA
7164#undef IS_CONTAINED_BY_LMA
0efc80c8 7165#undef IS_NOTE
252b5132 7166#undef IS_COREFILE_NOTE
bc67d8a6 7167#undef IS_SOLARIS_PT_INTERP
9f17e2a6 7168#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
7169#undef INCLUDE_SECTION_IN_SEGMENT
7170#undef SEGMENT_AFTER_SEGMENT
7171#undef SEGMENT_OVERLAPS
b34976b6 7172 return TRUE;
252b5132
RH
7173}
7174
84d1d650
L
7175/* Copy ELF program header information. */
7176
7177static bfd_boolean
7178copy_elf_program_header (bfd *ibfd, bfd *obfd)
7179{
7180 Elf_Internal_Ehdr *iehdr;
7181 struct elf_segment_map *map;
7182 struct elf_segment_map *map_first;
7183 struct elf_segment_map **pointer_to_map;
7184 Elf_Internal_Phdr *segment;
7185 unsigned int i;
7186 unsigned int num_segments;
7187 bfd_boolean phdr_included = FALSE;
88967714 7188 bfd_boolean p_paddr_valid;
84d1d650
L
7189
7190 iehdr = elf_elfheader (ibfd);
7191
7192 map_first = NULL;
7193 pointer_to_map = &map_first;
7194
88967714
AM
7195 /* If all the segment p_paddr fields are zero, don't set
7196 map->p_paddr_valid. */
7197 p_paddr_valid = FALSE;
84d1d650 7198 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
7199 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7200 i < num_segments;
7201 i++, segment++)
7202 if (segment->p_paddr != 0)
7203 {
7204 p_paddr_valid = TRUE;
7205 break;
7206 }
7207
84d1d650
L
7208 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7209 i < num_segments;
7210 i++, segment++)
7211 {
7212 asection *section;
7213 unsigned int section_count;
7214 bfd_size_type amt;
7215 Elf_Internal_Shdr *this_hdr;
53020534 7216 asection *first_section = NULL;
a76e6f2f 7217 asection *lowest_section;
84d1d650 7218
84d1d650
L
7219 /* Compute how many sections are in this segment. */
7220 for (section = ibfd->sections, section_count = 0;
7221 section != NULL;
7222 section = section->next)
7223 {
7224 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7225 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 7226 {
a76e6f2f
AM
7227 if (first_section == NULL)
7228 first_section = section;
3271a814
NS
7229 section_count++;
7230 }
84d1d650
L
7231 }
7232
7233 /* Allocate a segment map big enough to contain
7234 all of the sections we have selected. */
7235 amt = sizeof (struct elf_segment_map);
7236 if (section_count != 0)
7237 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 7238 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
7239 if (map == NULL)
7240 return FALSE;
7241
7242 /* Initialize the fields of the output segment map with the
7243 input segment. */
7244 map->next = NULL;
7245 map->p_type = segment->p_type;
7246 map->p_flags = segment->p_flags;
7247 map->p_flags_valid = 1;
7248 map->p_paddr = segment->p_paddr;
88967714 7249 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
7250 map->p_align = segment->p_align;
7251 map->p_align_valid = 1;
3271a814 7252 map->p_vaddr_offset = 0;
84d1d650 7253
04c3a755
NS
7254 if (map->p_type == PT_GNU_RELRO
7255 || map->p_type == PT_GNU_STACK)
b10a8ae0
L
7256 {
7257 /* The PT_GNU_RELRO segment may contain the first a few
7258 bytes in the .got.plt section even if the whole .got.plt
7259 section isn't in the PT_GNU_RELRO segment. We won't
04c3a755
NS
7260 change the size of the PT_GNU_RELRO segment.
7261 Similarly, PT_GNU_STACK size is significant on uclinux
7262 systems. */
9433b9b1 7263 map->p_size = segment->p_memsz;
b10a8ae0
L
7264 map->p_size_valid = 1;
7265 }
7266
84d1d650
L
7267 /* Determine if this segment contains the ELF file header
7268 and if it contains the program headers themselves. */
7269 map->includes_filehdr = (segment->p_offset == 0
7270 && segment->p_filesz >= iehdr->e_ehsize);
7271
7272 map->includes_phdrs = 0;
7273 if (! phdr_included || segment->p_type != PT_LOAD)
7274 {
7275 map->includes_phdrs =
7276 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7277 && (segment->p_offset + segment->p_filesz
7278 >= ((bfd_vma) iehdr->e_phoff
7279 + iehdr->e_phnum * iehdr->e_phentsize)));
7280
7281 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7282 phdr_included = TRUE;
7283 }
7284
bbefd0a9 7285 lowest_section = NULL;
84d1d650
L
7286 if (section_count != 0)
7287 {
7288 unsigned int isec = 0;
7289
53020534 7290 for (section = first_section;
84d1d650
L
7291 section != NULL;
7292 section = section->next)
7293 {
7294 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7295 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
7296 {
7297 map->sections[isec++] = section->output_section;
a76e6f2f
AM
7298 if ((section->flags & SEC_ALLOC) != 0)
7299 {
7300 bfd_vma seg_off;
7301
bbefd0a9
AM
7302 if (lowest_section == NULL
7303 || section->lma < lowest_section->lma)
fb8a5684
AM
7304 lowest_section = section;
7305
a76e6f2f
AM
7306 /* Section lmas are set up from PT_LOAD header
7307 p_paddr in _bfd_elf_make_section_from_shdr.
7308 If this header has a p_paddr that disagrees
7309 with the section lma, flag the p_paddr as
7310 invalid. */
7311 if ((section->flags & SEC_LOAD) != 0)
7312 seg_off = this_hdr->sh_offset - segment->p_offset;
7313 else
7314 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7315 if (section->lma - segment->p_paddr != seg_off)
7316 map->p_paddr_valid = FALSE;
7317 }
53020534
L
7318 if (isec == section_count)
7319 break;
7320 }
84d1d650
L
7321 }
7322 }
7323
a76e6f2f
AM
7324 if (map->includes_filehdr && lowest_section != NULL)
7325 /* We need to keep the space used by the headers fixed. */
7326 map->header_size = lowest_section->vma - segment->p_vaddr;
d324f6d6 7327
a76e6f2f
AM
7328 if (!map->includes_phdrs
7329 && !map->includes_filehdr
7330 && map->p_paddr_valid)
7331 /* There is some other padding before the first section. */
7332 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
7333 - segment->p_paddr);
7334
84d1d650
L
7335 map->count = section_count;
7336 *pointer_to_map = map;
7337 pointer_to_map = &map->next;
7338 }
7339
12bd6957 7340 elf_seg_map (obfd) = map_first;
84d1d650
L
7341 return TRUE;
7342}
7343
7344/* Copy private BFD data. This copies or rewrites ELF program header
7345 information. */
7346
7347static bfd_boolean
7348copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7349{
84d1d650
L
7350 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7351 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7352 return TRUE;
7353
7354 if (elf_tdata (ibfd)->phdr == NULL)
7355 return TRUE;
7356
7357 if (ibfd->xvec == obfd->xvec)
7358 {
cb3ff1e5
NC
7359 /* Check to see if any sections in the input BFD
7360 covered by ELF program header have changed. */
d55ce4e2 7361 Elf_Internal_Phdr *segment;
84d1d650
L
7362 asection *section, *osec;
7363 unsigned int i, num_segments;
7364 Elf_Internal_Shdr *this_hdr;
147d51c2
L
7365 const struct elf_backend_data *bed;
7366
7367 bed = get_elf_backend_data (ibfd);
7368
7369 /* Regenerate the segment map if p_paddr is set to 0. */
7370 if (bed->want_p_paddr_set_to_zero)
7371 goto rewrite;
84d1d650
L
7372
7373 /* Initialize the segment mark field. */
7374 for (section = obfd->sections; section != NULL;
7375 section = section->next)
7376 section->segment_mark = FALSE;
7377
7378 num_segments = elf_elfheader (ibfd)->e_phnum;
7379 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7380 i < num_segments;
7381 i++, segment++)
7382 {
5f6999aa
NC
7383 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7384 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7385 which severly confuses things, so always regenerate the segment
7386 map in this case. */
7387 if (segment->p_paddr == 0
7388 && segment->p_memsz == 0
7389 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 7390 goto rewrite;
5f6999aa 7391
84d1d650
L
7392 for (section = ibfd->sections;
7393 section != NULL; section = section->next)
7394 {
7395 /* We mark the output section so that we know it comes
7396 from the input BFD. */
7397 osec = section->output_section;
7398 if (osec)
7399 osec->segment_mark = TRUE;
7400
7401 /* Check if this section is covered by the segment. */
7402 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7403 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
7404 {
7405 /* FIXME: Check if its output section is changed or
7406 removed. What else do we need to check? */
7407 if (osec == NULL
7408 || section->flags != osec->flags
7409 || section->lma != osec->lma
7410 || section->vma != osec->vma
7411 || section->size != osec->size
7412 || section->rawsize != osec->rawsize
7413 || section->alignment_power != osec->alignment_power)
7414 goto rewrite;
7415 }
7416 }
7417 }
7418
cb3ff1e5 7419 /* Check to see if any output section do not come from the
84d1d650
L
7420 input BFD. */
7421 for (section = obfd->sections; section != NULL;
7422 section = section->next)
7423 {
535b785f 7424 if (!section->segment_mark)
84d1d650
L
7425 goto rewrite;
7426 else
7427 section->segment_mark = FALSE;
7428 }
7429
7430 return copy_elf_program_header (ibfd, obfd);
7431 }
7432
7433rewrite:
f1d85785
L
7434 if (ibfd->xvec == obfd->xvec)
7435 {
7436 /* When rewriting program header, set the output maxpagesize to
7437 the maximum alignment of input PT_LOAD segments. */
7438 Elf_Internal_Phdr *segment;
7439 unsigned int i;
7440 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7441 bfd_vma maxpagesize = 0;
7442
7443 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7444 i < num_segments;
7445 i++, segment++)
7446 if (segment->p_type == PT_LOAD
7447 && maxpagesize < segment->p_align)
c86934ce
NC
7448 {
7449 /* PR 17512: file: f17299af. */
7450 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
695344c0 7451 /* xgettext:c-format */
76cfced5
AM
7452 _bfd_error_handler (_("%B: warning: segment alignment of %#Lx"
7453 " is too large"),
7454 ibfd, segment->p_align);
c86934ce
NC
7455 else
7456 maxpagesize = segment->p_align;
7457 }
f1d85785
L
7458
7459 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
7460 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
7461 }
7462
84d1d650
L
7463 return rewrite_elf_program_header (ibfd, obfd);
7464}
7465
ccd2ec6a
L
7466/* Initialize private output section information from input section. */
7467
7468bfd_boolean
7469_bfd_elf_init_private_section_data (bfd *ibfd,
7470 asection *isec,
7471 bfd *obfd,
7472 asection *osec,
7473 struct bfd_link_info *link_info)
7474
7475{
7476 Elf_Internal_Shdr *ihdr, *ohdr;
0e1862bb
L
7477 bfd_boolean final_link = (link_info != NULL
7478 && !bfd_link_relocatable (link_info));
ccd2ec6a
L
7479
7480 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7481 || obfd->xvec->flavour != bfd_target_elf_flavour)
7482 return TRUE;
7483
ba85c43e
NC
7484 BFD_ASSERT (elf_section_data (osec) != NULL);
7485
dfa7b0b8
AM
7486 /* For objcopy and relocatable link, don't copy the output ELF
7487 section type from input if the output BFD section flags have been
7488 set to something different. For a final link allow some flags
7489 that the linker clears to differ. */
42bb2e33 7490 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
7491 && (osec->flags == isec->flags
7492 || (final_link
7493 && ((osec->flags ^ isec->flags)
0814be7d 7494 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 7495 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
7496
7497 /* FIXME: Is this correct for all OS/PROC specific flags? */
7498 elf_section_flags (osec) |= (elf_section_flags (isec)
7499 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a 7500
a91e1603
L
7501 /* Copy sh_info from input for mbind section. */
7502 if (elf_section_flags (isec) & SHF_GNU_MBIND)
7503 elf_section_data (osec)->this_hdr.sh_info
7504 = elf_section_data (isec)->this_hdr.sh_info;
7505
ccd2ec6a
L
7506 /* Set things up for objcopy and relocatable link. The output
7507 SHT_GROUP section will have its elf_next_in_group pointing back
7508 to the input group members. Ignore linker created group section.
7509 See elfNN_ia64_object_p in elfxx-ia64.c. */
7bdf4127
AB
7510 if ((link_info == NULL
7511 || !link_info->resolve_section_groups)
7512 && (elf_sec_group (isec) == NULL
7513 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0))
ccd2ec6a 7514 {
7bdf4127
AB
7515 if (elf_section_flags (isec) & SHF_GROUP)
7516 elf_section_flags (osec) |= SHF_GROUP;
7517 elf_next_in_group (osec) = elf_next_in_group (isec);
7518 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
7519 }
7520
7bdf4127
AB
7521 /* If not decompress, preserve SHF_COMPRESSED. */
7522 if (!final_link && (ibfd->flags & BFD_DECOMPRESS) == 0)
7523 elf_section_flags (osec) |= (elf_section_flags (isec)
7524 & SHF_COMPRESSED);
7525
ccd2ec6a
L
7526 ihdr = &elf_section_data (isec)->this_hdr;
7527
7528 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7529 don't use the output section of the linked-to section since it
7530 may be NULL at this point. */
7531 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7532 {
7533 ohdr = &elf_section_data (osec)->this_hdr;
7534 ohdr->sh_flags |= SHF_LINK_ORDER;
7535 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7536 }
7537
7538 osec->use_rela_p = isec->use_rela_p;
7539
7540 return TRUE;
7541}
7542
252b5132
RH
7543/* Copy private section information. This copies over the entsize
7544 field, and sometimes the info field. */
7545
b34976b6 7546bfd_boolean
217aa764
AM
7547_bfd_elf_copy_private_section_data (bfd *ibfd,
7548 asection *isec,
7549 bfd *obfd,
7550 asection *osec)
252b5132
RH
7551{
7552 Elf_Internal_Shdr *ihdr, *ohdr;
7553
7554 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7555 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 7556 return TRUE;
252b5132 7557
252b5132
RH
7558 ihdr = &elf_section_data (isec)->this_hdr;
7559 ohdr = &elf_section_data (osec)->this_hdr;
7560
7561 ohdr->sh_entsize = ihdr->sh_entsize;
7562
7563 if (ihdr->sh_type == SHT_SYMTAB
7564 || ihdr->sh_type == SHT_DYNSYM
7565 || ihdr->sh_type == SHT_GNU_verneed
7566 || ihdr->sh_type == SHT_GNU_verdef)
7567 ohdr->sh_info = ihdr->sh_info;
7568
ccd2ec6a
L
7569 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7570 NULL);
252b5132
RH
7571}
7572
d0bf826b
AM
7573/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7574 necessary if we are removing either the SHT_GROUP section or any of
7575 the group member sections. DISCARDED is the value that a section's
7576 output_section has if the section will be discarded, NULL when this
7577 function is called from objcopy, bfd_abs_section_ptr when called
7578 from the linker. */
80fccad2
BW
7579
7580bfd_boolean
d0bf826b 7581_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 7582{
30288845
AM
7583 asection *isec;
7584
30288845 7585 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 7586 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
7587 {
7588 asection *first = elf_next_in_group (isec);
7589 asection *s = first;
d0bf826b
AM
7590 bfd_size_type removed = 0;
7591
30288845
AM
7592 while (s != NULL)
7593 {
415f38a6
AM
7594 /* If this member section is being output but the
7595 SHT_GROUP section is not, then clear the group info
7596 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
7597 if (s->output_section != discarded
7598 && isec->output_section == discarded)
30288845
AM
7599 {
7600 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7601 elf_group_name (s->output_section) = NULL;
7602 }
415f38a6
AM
7603 /* Conversely, if the member section is not being output
7604 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
7605 else if (s->output_section == discarded
7606 && isec->output_section != discarded)
7607 removed += 4;
30288845
AM
7608 s = elf_next_in_group (s);
7609 if (s == first)
7610 break;
7611 }
d0bf826b
AM
7612 if (removed != 0)
7613 {
7614 if (discarded != NULL)
7615 {
7616 /* If we've been called for ld -r, then we need to
7617 adjust the input section size. This function may
7618 be called multiple times, so save the original
7619 size. */
7620 if (isec->rawsize == 0)
7621 isec->rawsize = isec->size;
7622 isec->size = isec->rawsize - removed;
7623 }
7624 else
7625 {
7626 /* Adjust the output section size when called from
7627 objcopy. */
7628 isec->output_section->size -= removed;
7629 }
7630 }
30288845
AM
7631 }
7632
80fccad2
BW
7633 return TRUE;
7634}
7635
d0bf826b
AM
7636/* Copy private header information. */
7637
7638bfd_boolean
7639_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
7640{
7641 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7642 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7643 return TRUE;
7644
7645 /* Copy over private BFD data if it has not already been copied.
7646 This must be done here, rather than in the copy_private_bfd_data
7647 entry point, because the latter is called after the section
7648 contents have been set, which means that the program headers have
7649 already been worked out. */
12bd6957 7650 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
d0bf826b
AM
7651 {
7652 if (! copy_private_bfd_data (ibfd, obfd))
7653 return FALSE;
7654 }
7655
7656 return _bfd_elf_fixup_group_sections (ibfd, NULL);
7657}
7658
252b5132
RH
7659/* Copy private symbol information. If this symbol is in a section
7660 which we did not map into a BFD section, try to map the section
7661 index correctly. We use special macro definitions for the mapped
7662 section indices; these definitions are interpreted by the
7663 swap_out_syms function. */
7664
9ad5cbcf
AM
7665#define MAP_ONESYMTAB (SHN_HIOS + 1)
7666#define MAP_DYNSYMTAB (SHN_HIOS + 2)
7667#define MAP_STRTAB (SHN_HIOS + 3)
7668#define MAP_SHSTRTAB (SHN_HIOS + 4)
7669#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 7670
b34976b6 7671bfd_boolean
217aa764
AM
7672_bfd_elf_copy_private_symbol_data (bfd *ibfd,
7673 asymbol *isymarg,
7674 bfd *obfd,
7675 asymbol *osymarg)
252b5132
RH
7676{
7677 elf_symbol_type *isym, *osym;
7678
7679 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7680 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 7681 return TRUE;
252b5132
RH
7682
7683 isym = elf_symbol_from (ibfd, isymarg);
7684 osym = elf_symbol_from (obfd, osymarg);
7685
7686 if (isym != NULL
8424d8f5 7687 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
7688 && osym != NULL
7689 && bfd_is_abs_section (isym->symbol.section))
7690 {
7691 unsigned int shndx;
7692
7693 shndx = isym->internal_elf_sym.st_shndx;
7694 if (shndx == elf_onesymtab (ibfd))
7695 shndx = MAP_ONESYMTAB;
7696 else if (shndx == elf_dynsymtab (ibfd))
7697 shndx = MAP_DYNSYMTAB;
12bd6957 7698 else if (shndx == elf_strtab_sec (ibfd))
252b5132 7699 shndx = MAP_STRTAB;
12bd6957 7700 else if (shndx == elf_shstrtab_sec (ibfd))
252b5132 7701 shndx = MAP_SHSTRTAB;
6a40cf0c 7702 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
9ad5cbcf 7703 shndx = MAP_SYM_SHNDX;
252b5132
RH
7704 osym->internal_elf_sym.st_shndx = shndx;
7705 }
7706
b34976b6 7707 return TRUE;
252b5132
RH
7708}
7709
7710/* Swap out the symbols. */
7711
b34976b6 7712static bfd_boolean
217aa764 7713swap_out_syms (bfd *abfd,
ef10c3ac 7714 struct elf_strtab_hash **sttp,
217aa764 7715 int relocatable_p)
252b5132 7716{
9c5bfbb7 7717 const struct elf_backend_data *bed;
079e9a2f
AM
7718 int symcount;
7719 asymbol **syms;
ef10c3ac 7720 struct elf_strtab_hash *stt;
079e9a2f 7721 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 7722 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 7723 Elf_Internal_Shdr *symstrtab_hdr;
ef10c3ac 7724 struct elf_sym_strtab *symstrtab;
f075ee0c
AM
7725 bfd_byte *outbound_syms;
7726 bfd_byte *outbound_shndx;
ef10c3ac
L
7727 unsigned long outbound_syms_index;
7728 unsigned long outbound_shndx_index;
079e9a2f 7729 int idx;
12bd6957 7730 unsigned int num_locals;
079e9a2f 7731 bfd_size_type amt;
174fd7f9 7732 bfd_boolean name_local_sections;
252b5132 7733
12bd6957 7734 if (!elf_map_symbols (abfd, &num_locals))
b34976b6 7735 return FALSE;
252b5132 7736
c044fabd 7737 /* Dump out the symtabs. */
ef10c3ac 7738 stt = _bfd_elf_strtab_init ();
079e9a2f 7739 if (stt == NULL)
b34976b6 7740 return FALSE;
252b5132 7741
079e9a2f
AM
7742 bed = get_elf_backend_data (abfd);
7743 symcount = bfd_get_symcount (abfd);
7744 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
7745 symtab_hdr->sh_type = SHT_SYMTAB;
7746 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
7747 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
12bd6957 7748 symtab_hdr->sh_info = num_locals + 1;
72de5009 7749 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
7750
7751 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
7752 symstrtab_hdr->sh_type = SHT_STRTAB;
7753
ef10c3ac
L
7754 /* Allocate buffer to swap out the .strtab section. */
7755 symstrtab = (struct elf_sym_strtab *) bfd_malloc ((symcount + 1)
7756 * sizeof (*symstrtab));
7757 if (symstrtab == NULL)
7758 {
7759 _bfd_elf_strtab_free (stt);
7760 return FALSE;
7761 }
7762
a50b1753 7763 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
07d6d2b8 7764 bed->s->sizeof_sym);
079e9a2f 7765 if (outbound_syms == NULL)
5ed6aba4 7766 {
ef10c3ac
L
7767error_return:
7768 _bfd_elf_strtab_free (stt);
7769 free (symstrtab);
5ed6aba4
NC
7770 return FALSE;
7771 }
217aa764 7772 symtab_hdr->contents = outbound_syms;
ef10c3ac 7773 outbound_syms_index = 0;
252b5132 7774
9ad5cbcf 7775 outbound_shndx = NULL;
ef10c3ac 7776 outbound_shndx_index = 0;
6a40cf0c
NC
7777
7778 if (elf_symtab_shndx_list (abfd))
9ad5cbcf 7779 {
6a40cf0c
NC
7780 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
7781 if (symtab_shndx_hdr->sh_name != 0)
7782 {
7783 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
7784 outbound_shndx = (bfd_byte *)
7785 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
7786 if (outbound_shndx == NULL)
7787 goto error_return;
5ed6aba4 7788
6a40cf0c
NC
7789 symtab_shndx_hdr->contents = outbound_shndx;
7790 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
7791 symtab_shndx_hdr->sh_size = amt;
7792 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
7793 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
7794 }
7795 /* FIXME: What about any other headers in the list ? */
9ad5cbcf
AM
7796 }
7797
589e6347 7798 /* Now generate the data (for "contents"). */
079e9a2f
AM
7799 {
7800 /* Fill in zeroth symbol and swap it out. */
7801 Elf_Internal_Sym sym;
7802 sym.st_name = 0;
7803 sym.st_value = 0;
7804 sym.st_size = 0;
7805 sym.st_info = 0;
7806 sym.st_other = 0;
7807 sym.st_shndx = SHN_UNDEF;
35fc36a8 7808 sym.st_target_internal = 0;
ef10c3ac
L
7809 symstrtab[0].sym = sym;
7810 symstrtab[0].dest_index = outbound_syms_index;
7811 symstrtab[0].destshndx_index = outbound_shndx_index;
7812 outbound_syms_index++;
9ad5cbcf 7813 if (outbound_shndx != NULL)
ef10c3ac 7814 outbound_shndx_index++;
079e9a2f 7815 }
252b5132 7816
174fd7f9
RS
7817 name_local_sections
7818 = (bed->elf_backend_name_local_section_symbols
7819 && bed->elf_backend_name_local_section_symbols (abfd));
7820
079e9a2f 7821 syms = bfd_get_outsymbols (abfd);
ef10c3ac 7822 for (idx = 0; idx < symcount;)
252b5132 7823 {
252b5132 7824 Elf_Internal_Sym sym;
079e9a2f
AM
7825 bfd_vma value = syms[idx]->value;
7826 elf_symbol_type *type_ptr;
7827 flagword flags = syms[idx]->flags;
7828 int type;
252b5132 7829
174fd7f9
RS
7830 if (!name_local_sections
7831 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
7832 {
7833 /* Local section symbols have no name. */
ef10c3ac 7834 sym.st_name = (unsigned long) -1;
079e9a2f
AM
7835 }
7836 else
7837 {
ef10c3ac
L
7838 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
7839 to get the final offset for st_name. */
7840 sym.st_name
7841 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
7842 FALSE);
079e9a2f 7843 if (sym.st_name == (unsigned long) -1)
ef10c3ac 7844 goto error_return;
079e9a2f 7845 }
252b5132 7846
079e9a2f 7847 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 7848
079e9a2f
AM
7849 if ((flags & BSF_SECTION_SYM) == 0
7850 && bfd_is_com_section (syms[idx]->section))
7851 {
7852 /* ELF common symbols put the alignment into the `value' field,
7853 and the size into the `size' field. This is backwards from
7854 how BFD handles it, so reverse it here. */
7855 sym.st_size = value;
7856 if (type_ptr == NULL
7857 || type_ptr->internal_elf_sym.st_value == 0)
7858 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
7859 else
7860 sym.st_value = type_ptr->internal_elf_sym.st_value;
7861 sym.st_shndx = _bfd_elf_section_from_bfd_section
7862 (abfd, syms[idx]->section);
7863 }
7864 else
7865 {
7866 asection *sec = syms[idx]->section;
cb33740c 7867 unsigned int shndx;
252b5132 7868
079e9a2f
AM
7869 if (sec->output_section)
7870 {
7871 value += sec->output_offset;
7872 sec = sec->output_section;
7873 }
589e6347 7874
079e9a2f
AM
7875 /* Don't add in the section vma for relocatable output. */
7876 if (! relocatable_p)
7877 value += sec->vma;
7878 sym.st_value = value;
7879 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
7880
7881 if (bfd_is_abs_section (sec)
7882 && type_ptr != NULL
7883 && type_ptr->internal_elf_sym.st_shndx != 0)
7884 {
7885 /* This symbol is in a real ELF section which we did
7886 not create as a BFD section. Undo the mapping done
7887 by copy_private_symbol_data. */
7888 shndx = type_ptr->internal_elf_sym.st_shndx;
7889 switch (shndx)
7890 {
7891 case MAP_ONESYMTAB:
7892 shndx = elf_onesymtab (abfd);
7893 break;
7894 case MAP_DYNSYMTAB:
7895 shndx = elf_dynsymtab (abfd);
7896 break;
7897 case MAP_STRTAB:
12bd6957 7898 shndx = elf_strtab_sec (abfd);
079e9a2f
AM
7899 break;
7900 case MAP_SHSTRTAB:
12bd6957 7901 shndx = elf_shstrtab_sec (abfd);
079e9a2f 7902 break;
9ad5cbcf 7903 case MAP_SYM_SHNDX:
6a40cf0c
NC
7904 if (elf_symtab_shndx_list (abfd))
7905 shndx = elf_symtab_shndx_list (abfd)->ndx;
9ad5cbcf 7906 break;
079e9a2f 7907 default:
15bc576a 7908 shndx = SHN_ABS;
079e9a2f
AM
7909 break;
7910 }
7911 }
7912 else
7913 {
7914 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 7915
cb33740c 7916 if (shndx == SHN_BAD)
079e9a2f
AM
7917 {
7918 asection *sec2;
7919
7920 /* Writing this would be a hell of a lot easier if
7921 we had some decent documentation on bfd, and
7922 knew what to expect of the library, and what to
7923 demand of applications. For example, it
7924 appears that `objcopy' might not set the
7925 section of a symbol to be a section that is
7926 actually in the output file. */
7927 sec2 = bfd_get_section_by_name (abfd, sec->name);
5df1bc57
AM
7928 if (sec2 != NULL)
7929 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
7930 if (shndx == SHN_BAD)
589e6347 7931 {
695344c0 7932 /* xgettext:c-format */
589e6347
NC
7933 _bfd_error_handler (_("\
7934Unable to find equivalent output section for symbol '%s' from section '%s'"),
7935 syms[idx]->name ? syms[idx]->name : "<Local sym>",
7936 sec->name);
811072d8 7937 bfd_set_error (bfd_error_invalid_operation);
ef10c3ac 7938 goto error_return;
589e6347 7939 }
079e9a2f
AM
7940 }
7941 }
252b5132 7942
079e9a2f
AM
7943 sym.st_shndx = shndx;
7944 }
252b5132 7945
13ae64f3
JJ
7946 if ((flags & BSF_THREAD_LOCAL) != 0)
7947 type = STT_TLS;
d8045f23
NC
7948 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
7949 type = STT_GNU_IFUNC;
13ae64f3 7950 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
7951 type = STT_FUNC;
7952 else if ((flags & BSF_OBJECT) != 0)
7953 type = STT_OBJECT;
d9352518
DB
7954 else if ((flags & BSF_RELC) != 0)
7955 type = STT_RELC;
7956 else if ((flags & BSF_SRELC) != 0)
7957 type = STT_SRELC;
079e9a2f
AM
7958 else
7959 type = STT_NOTYPE;
252b5132 7960
13ae64f3
JJ
7961 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
7962 type = STT_TLS;
7963
589e6347 7964 /* Processor-specific types. */
079e9a2f
AM
7965 if (type_ptr != NULL
7966 && bed->elf_backend_get_symbol_type)
7967 type = ((*bed->elf_backend_get_symbol_type)
7968 (&type_ptr->internal_elf_sym, type));
252b5132 7969
079e9a2f
AM
7970 if (flags & BSF_SECTION_SYM)
7971 {
7972 if (flags & BSF_GLOBAL)
7973 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
7974 else
7975 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
7976 }
7977 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 7978 {
b8871f35
L
7979 if (type != STT_TLS)
7980 {
7981 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
7982 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
7983 ? STT_COMMON : STT_OBJECT);
7984 else
7985 type = ((flags & BSF_ELF_COMMON) != 0
7986 ? STT_COMMON : STT_OBJECT);
7987 }
7988 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 7989 }
079e9a2f
AM
7990 else if (bfd_is_und_section (syms[idx]->section))
7991 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
7992 ? STB_WEAK
7993 : STB_GLOBAL),
7994 type);
7995 else if (flags & BSF_FILE)
7996 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
7997 else
7998 {
7999 int bind = STB_LOCAL;
252b5132 8000
079e9a2f
AM
8001 if (flags & BSF_LOCAL)
8002 bind = STB_LOCAL;
3e7a7d11
NC
8003 else if (flags & BSF_GNU_UNIQUE)
8004 bind = STB_GNU_UNIQUE;
079e9a2f
AM
8005 else if (flags & BSF_WEAK)
8006 bind = STB_WEAK;
8007 else if (flags & BSF_GLOBAL)
8008 bind = STB_GLOBAL;
252b5132 8009
079e9a2f
AM
8010 sym.st_info = ELF_ST_INFO (bind, type);
8011 }
252b5132 8012
079e9a2f 8013 if (type_ptr != NULL)
35fc36a8
RS
8014 {
8015 sym.st_other = type_ptr->internal_elf_sym.st_other;
8016 sym.st_target_internal
8017 = type_ptr->internal_elf_sym.st_target_internal;
8018 }
079e9a2f 8019 else
35fc36a8
RS
8020 {
8021 sym.st_other = 0;
8022 sym.st_target_internal = 0;
8023 }
252b5132 8024
ef10c3ac
L
8025 idx++;
8026 symstrtab[idx].sym = sym;
8027 symstrtab[idx].dest_index = outbound_syms_index;
8028 symstrtab[idx].destshndx_index = outbound_shndx_index;
8029
8030 outbound_syms_index++;
9ad5cbcf 8031 if (outbound_shndx != NULL)
ef10c3ac
L
8032 outbound_shndx_index++;
8033 }
8034
8035 /* Finalize the .strtab section. */
8036 _bfd_elf_strtab_finalize (stt);
8037
8038 /* Swap out the .strtab section. */
8039 for (idx = 0; idx <= symcount; idx++)
8040 {
8041 struct elf_sym_strtab *elfsym = &symstrtab[idx];
8042 if (elfsym->sym.st_name == (unsigned long) -1)
8043 elfsym->sym.st_name = 0;
8044 else
8045 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
8046 elfsym->sym.st_name);
8047 bed->s->swap_symbol_out (abfd, &elfsym->sym,
8048 (outbound_syms
8049 + (elfsym->dest_index
8050 * bed->s->sizeof_sym)),
8051 (outbound_shndx
8052 + (elfsym->destshndx_index
8053 * sizeof (Elf_External_Sym_Shndx))));
079e9a2f 8054 }
ef10c3ac 8055 free (symstrtab);
252b5132 8056
079e9a2f 8057 *sttp = stt;
ef10c3ac 8058 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
079e9a2f 8059 symstrtab_hdr->sh_type = SHT_STRTAB;
84865015 8060 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
079e9a2f
AM
8061 symstrtab_hdr->sh_addr = 0;
8062 symstrtab_hdr->sh_entsize = 0;
8063 symstrtab_hdr->sh_link = 0;
8064 symstrtab_hdr->sh_info = 0;
8065 symstrtab_hdr->sh_addralign = 1;
252b5132 8066
b34976b6 8067 return TRUE;
252b5132
RH
8068}
8069
8070/* Return the number of bytes required to hold the symtab vector.
8071
8072 Note that we base it on the count plus 1, since we will null terminate
8073 the vector allocated based on this size. However, the ELF symbol table
8074 always has a dummy entry as symbol #0, so it ends up even. */
8075
8076long
217aa764 8077_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
8078{
8079 long symcount;
8080 long symtab_size;
8081 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
8082
8083 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
8084 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8085 if (symcount > 0)
8086 symtab_size -= sizeof (asymbol *);
252b5132
RH
8087
8088 return symtab_size;
8089}
8090
8091long
217aa764 8092_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
8093{
8094 long symcount;
8095 long symtab_size;
8096 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
8097
8098 if (elf_dynsymtab (abfd) == 0)
8099 {
8100 bfd_set_error (bfd_error_invalid_operation);
8101 return -1;
8102 }
8103
8104 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
8105 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8106 if (symcount > 0)
8107 symtab_size -= sizeof (asymbol *);
252b5132
RH
8108
8109 return symtab_size;
8110}
8111
8112long
217aa764
AM
8113_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
8114 sec_ptr asect)
252b5132
RH
8115{
8116 return (asect->reloc_count + 1) * sizeof (arelent *);
8117}
8118
8119/* Canonicalize the relocs. */
8120
8121long
217aa764
AM
8122_bfd_elf_canonicalize_reloc (bfd *abfd,
8123 sec_ptr section,
8124 arelent **relptr,
8125 asymbol **symbols)
252b5132
RH
8126{
8127 arelent *tblptr;
8128 unsigned int i;
9c5bfbb7 8129 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 8130
b34976b6 8131 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
8132 return -1;
8133
8134 tblptr = section->relocation;
8135 for (i = 0; i < section->reloc_count; i++)
8136 *relptr++ = tblptr++;
8137
8138 *relptr = NULL;
8139
8140 return section->reloc_count;
8141}
8142
8143long
6cee3f79 8144_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 8145{
9c5bfbb7 8146 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 8147 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
8148
8149 if (symcount >= 0)
8150 bfd_get_symcount (abfd) = symcount;
8151 return symcount;
8152}
8153
8154long
217aa764
AM
8155_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
8156 asymbol **allocation)
252b5132 8157{
9c5bfbb7 8158 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 8159 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
8160
8161 if (symcount >= 0)
8162 bfd_get_dynamic_symcount (abfd) = symcount;
8163 return symcount;
252b5132
RH
8164}
8165
8615f3f2
AM
8166/* Return the size required for the dynamic reloc entries. Any loadable
8167 section that was actually installed in the BFD, and has type SHT_REL
8168 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
8169 dynamic reloc section. */
252b5132
RH
8170
8171long
217aa764 8172_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
8173{
8174 long ret;
8175 asection *s;
8176
8177 if (elf_dynsymtab (abfd) == 0)
8178 {
8179 bfd_set_error (bfd_error_invalid_operation);
8180 return -1;
8181 }
8182
8183 ret = sizeof (arelent *);
8184 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 8185 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
8186 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8187 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 8188 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
8189 * sizeof (arelent *));
8190
8191 return ret;
8192}
8193
8615f3f2
AM
8194/* Canonicalize the dynamic relocation entries. Note that we return the
8195 dynamic relocations as a single block, although they are actually
8196 associated with particular sections; the interface, which was
8197 designed for SunOS style shared libraries, expects that there is only
8198 one set of dynamic relocs. Any loadable section that was actually
8199 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8200 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
8201
8202long
217aa764
AM
8203_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
8204 arelent **storage,
8205 asymbol **syms)
252b5132 8206{
217aa764 8207 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
8208 asection *s;
8209 long ret;
8210
8211 if (elf_dynsymtab (abfd) == 0)
8212 {
8213 bfd_set_error (bfd_error_invalid_operation);
8214 return -1;
8215 }
8216
8217 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
8218 ret = 0;
8219 for (s = abfd->sections; s != NULL; s = s->next)
8220 {
266b05cf 8221 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
8222 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8223 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8224 {
8225 arelent *p;
8226 long count, i;
8227
b34976b6 8228 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 8229 return -1;
eea6121a 8230 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
8231 p = s->relocation;
8232 for (i = 0; i < count; i++)
8233 *storage++ = p++;
8234 ret += count;
8235 }
8236 }
8237
8238 *storage = NULL;
8239
8240 return ret;
8241}
8242\f
8243/* Read in the version information. */
8244
b34976b6 8245bfd_boolean
fc0e6df6 8246_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
8247{
8248 bfd_byte *contents = NULL;
fc0e6df6
PB
8249 unsigned int freeidx = 0;
8250
8251 if (elf_dynverref (abfd) != 0)
8252 {
8253 Elf_Internal_Shdr *hdr;
8254 Elf_External_Verneed *everneed;
8255 Elf_Internal_Verneed *iverneed;
8256 unsigned int i;
d0fb9a8d 8257 bfd_byte *contents_end;
fc0e6df6
PB
8258
8259 hdr = &elf_tdata (abfd)->dynverref_hdr;
8260
bd61e135
AM
8261 if (hdr->sh_info == 0
8262 || hdr->sh_info > hdr->sh_size / sizeof (Elf_External_Verneed))
d0fb9a8d 8263 {
601a03ba 8264error_return_bad_verref:
4eca0228 8265 _bfd_error_handler
601a03ba
AM
8266 (_("%B: .gnu.version_r invalid entry"), abfd);
8267 bfd_set_error (bfd_error_bad_value);
d0fb9a8d
JJ
8268error_return_verref:
8269 elf_tdata (abfd)->verref = NULL;
8270 elf_tdata (abfd)->cverrefs = 0;
8271 goto error_return;
8272 }
601a03ba
AM
8273
8274 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
8275 if (contents == NULL)
8276 goto error_return_verref;
8277
fc0e6df6
PB
8278 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
8279 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 8280 goto error_return_verref;
fc0e6df6 8281
601a03ba 8282 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
bd61e135 8283 bfd_alloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
601a03ba
AM
8284
8285 if (elf_tdata (abfd)->verref == NULL)
d0fb9a8d
JJ
8286 goto error_return_verref;
8287
8288 BFD_ASSERT (sizeof (Elf_External_Verneed)
8289 == sizeof (Elf_External_Vernaux));
8290 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
8291 everneed = (Elf_External_Verneed *) contents;
8292 iverneed = elf_tdata (abfd)->verref;
8293 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8294 {
8295 Elf_External_Vernaux *evernaux;
8296 Elf_Internal_Vernaux *ivernaux;
8297 unsigned int j;
8298
8299 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8300
8301 iverneed->vn_bfd = abfd;
8302
8303 iverneed->vn_filename =
8304 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8305 iverneed->vn_file);
8306 if (iverneed->vn_filename == NULL)
601a03ba 8307 goto error_return_bad_verref;
fc0e6df6 8308
d0fb9a8d
JJ
8309 if (iverneed->vn_cnt == 0)
8310 iverneed->vn_auxptr = NULL;
8311 else
8312 {
a50b1753 8313 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
07d6d2b8
AM
8314 bfd_alloc2 (abfd, iverneed->vn_cnt,
8315 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
8316 if (iverneed->vn_auxptr == NULL)
8317 goto error_return_verref;
8318 }
8319
8320 if (iverneed->vn_aux
8321 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8322 goto error_return_bad_verref;
fc0e6df6
PB
8323
8324 evernaux = ((Elf_External_Vernaux *)
8325 ((bfd_byte *) everneed + iverneed->vn_aux));
8326 ivernaux = iverneed->vn_auxptr;
8327 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8328 {
8329 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8330
8331 ivernaux->vna_nodename =
8332 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8333 ivernaux->vna_name);
8334 if (ivernaux->vna_nodename == NULL)
601a03ba 8335 goto error_return_bad_verref;
fc0e6df6 8336
25ff461f
AM
8337 if (ivernaux->vna_other > freeidx)
8338 freeidx = ivernaux->vna_other;
8339
8340 ivernaux->vna_nextptr = NULL;
8341 if (ivernaux->vna_next == 0)
8342 {
8343 iverneed->vn_cnt = j + 1;
8344 break;
8345 }
fc0e6df6
PB
8346 if (j + 1 < iverneed->vn_cnt)
8347 ivernaux->vna_nextptr = ivernaux + 1;
fc0e6df6 8348
d0fb9a8d
JJ
8349 if (ivernaux->vna_next
8350 > (size_t) (contents_end - (bfd_byte *) evernaux))
601a03ba 8351 goto error_return_bad_verref;
d0fb9a8d 8352
fc0e6df6
PB
8353 evernaux = ((Elf_External_Vernaux *)
8354 ((bfd_byte *) evernaux + ivernaux->vna_next));
fc0e6df6
PB
8355 }
8356
25ff461f
AM
8357 iverneed->vn_nextref = NULL;
8358 if (iverneed->vn_next == 0)
8359 break;
fc0e6df6
PB
8360 if (i + 1 < hdr->sh_info)
8361 iverneed->vn_nextref = iverneed + 1;
fc0e6df6 8362
d0fb9a8d
JJ
8363 if (iverneed->vn_next
8364 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8365 goto error_return_bad_verref;
d0fb9a8d 8366
fc0e6df6
PB
8367 everneed = ((Elf_External_Verneed *)
8368 ((bfd_byte *) everneed + iverneed->vn_next));
8369 }
25ff461f 8370 elf_tdata (abfd)->cverrefs = i;
fc0e6df6
PB
8371
8372 free (contents);
8373 contents = NULL;
8374 }
252b5132
RH
8375
8376 if (elf_dynverdef (abfd) != 0)
8377 {
8378 Elf_Internal_Shdr *hdr;
8379 Elf_External_Verdef *everdef;
8380 Elf_Internal_Verdef *iverdef;
f631889e
UD
8381 Elf_Internal_Verdef *iverdefarr;
8382 Elf_Internal_Verdef iverdefmem;
252b5132 8383 unsigned int i;
062e2358 8384 unsigned int maxidx;
d0fb9a8d 8385 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
8386
8387 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8388
601a03ba
AM
8389 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
8390 {
8391 error_return_bad_verdef:
4eca0228 8392 _bfd_error_handler
601a03ba
AM
8393 (_("%B: .gnu.version_d invalid entry"), abfd);
8394 bfd_set_error (bfd_error_bad_value);
8395 error_return_verdef:
8396 elf_tdata (abfd)->verdef = NULL;
8397 elf_tdata (abfd)->cverdefs = 0;
8398 goto error_return;
8399 }
8400
a50b1753 8401 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132 8402 if (contents == NULL)
601a03ba 8403 goto error_return_verdef;
252b5132 8404 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 8405 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
601a03ba 8406 goto error_return_verdef;
d0fb9a8d
JJ
8407
8408 BFD_ASSERT (sizeof (Elf_External_Verdef)
8409 >= sizeof (Elf_External_Verdaux));
8410 contents_end_def = contents + hdr->sh_size
8411 - sizeof (Elf_External_Verdef);
8412 contents_end_aux = contents + hdr->sh_size
8413 - sizeof (Elf_External_Verdaux);
8414
f631889e
UD
8415 /* We know the number of entries in the section but not the maximum
8416 index. Therefore we have to run through all entries and find
8417 the maximum. */
252b5132 8418 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
8419 maxidx = 0;
8420 for (i = 0; i < hdr->sh_info; ++i)
8421 {
8422 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8423
601a03ba
AM
8424 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
8425 goto error_return_bad_verdef;
062e2358
AM
8426 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
8427 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 8428
25ff461f
AM
8429 if (iverdefmem.vd_next == 0)
8430 break;
8431
d0fb9a8d
JJ
8432 if (iverdefmem.vd_next
8433 > (size_t) (contents_end_def - (bfd_byte *) everdef))
601a03ba 8434 goto error_return_bad_verdef;
d0fb9a8d 8435
f631889e
UD
8436 everdef = ((Elf_External_Verdef *)
8437 ((bfd_byte *) everdef + iverdefmem.vd_next));
8438 }
8439
fc0e6df6
PB
8440 if (default_imported_symver)
8441 {
8442 if (freeidx > maxidx)
8443 maxidx = ++freeidx;
8444 else
8445 freeidx = ++maxidx;
8446 }
201159ec 8447
601a03ba
AM
8448 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
8449 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e 8450 if (elf_tdata (abfd)->verdef == NULL)
601a03ba 8451 goto error_return_verdef;
f631889e
UD
8452
8453 elf_tdata (abfd)->cverdefs = maxidx;
8454
8455 everdef = (Elf_External_Verdef *) contents;
8456 iverdefarr = elf_tdata (abfd)->verdef;
8457 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
8458 {
8459 Elf_External_Verdaux *everdaux;
8460 Elf_Internal_Verdaux *iverdaux;
8461 unsigned int j;
8462
f631889e
UD
8463 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8464
d0fb9a8d 8465 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
601a03ba 8466 goto error_return_bad_verdef;
d0fb9a8d 8467
f631889e 8468 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
595bce75 8469 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
252b5132
RH
8470
8471 iverdef->vd_bfd = abfd;
8472
d0fb9a8d
JJ
8473 if (iverdef->vd_cnt == 0)
8474 iverdef->vd_auxptr = NULL;
8475 else
8476 {
a50b1753 8477 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
07d6d2b8
AM
8478 bfd_alloc2 (abfd, iverdef->vd_cnt,
8479 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
8480 if (iverdef->vd_auxptr == NULL)
8481 goto error_return_verdef;
8482 }
8483
8484 if (iverdef->vd_aux
8485 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
601a03ba 8486 goto error_return_bad_verdef;
252b5132
RH
8487
8488 everdaux = ((Elf_External_Verdaux *)
8489 ((bfd_byte *) everdef + iverdef->vd_aux));
8490 iverdaux = iverdef->vd_auxptr;
8491 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
8492 {
8493 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
8494
8495 iverdaux->vda_nodename =
8496 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8497 iverdaux->vda_name);
8498 if (iverdaux->vda_nodename == NULL)
601a03ba 8499 goto error_return_bad_verdef;
252b5132 8500
25ff461f
AM
8501 iverdaux->vda_nextptr = NULL;
8502 if (iverdaux->vda_next == 0)
8503 {
8504 iverdef->vd_cnt = j + 1;
8505 break;
8506 }
252b5132
RH
8507 if (j + 1 < iverdef->vd_cnt)
8508 iverdaux->vda_nextptr = iverdaux + 1;
252b5132 8509
d0fb9a8d
JJ
8510 if (iverdaux->vda_next
8511 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
601a03ba 8512 goto error_return_bad_verdef;
d0fb9a8d 8513
252b5132
RH
8514 everdaux = ((Elf_External_Verdaux *)
8515 ((bfd_byte *) everdaux + iverdaux->vda_next));
8516 }
8517
595bce75 8518 iverdef->vd_nodename = NULL;
d0fb9a8d
JJ
8519 if (iverdef->vd_cnt)
8520 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 8521
25ff461f
AM
8522 iverdef->vd_nextdef = NULL;
8523 if (iverdef->vd_next == 0)
8524 break;
d0fb9a8d 8525 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132 8526 iverdef->vd_nextdef = iverdef + 1;
252b5132
RH
8527
8528 everdef = ((Elf_External_Verdef *)
8529 ((bfd_byte *) everdef + iverdef->vd_next));
8530 }
8531
8532 free (contents);
8533 contents = NULL;
8534 }
fc0e6df6 8535 else if (default_imported_symver)
252b5132 8536 {
fc0e6df6
PB
8537 if (freeidx < 3)
8538 freeidx = 3;
8539 else
8540 freeidx++;
252b5132 8541
a50b1753 8542 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
07d6d2b8 8543 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 8544 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
8545 goto error_return;
8546
fc0e6df6
PB
8547 elf_tdata (abfd)->cverdefs = freeidx;
8548 }
252b5132 8549
fc0e6df6
PB
8550 /* Create a default version based on the soname. */
8551 if (default_imported_symver)
8552 {
8553 Elf_Internal_Verdef *iverdef;
8554 Elf_Internal_Verdaux *iverdaux;
252b5132 8555
5bb3703f 8556 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
252b5132 8557
fc0e6df6
PB
8558 iverdef->vd_version = VER_DEF_CURRENT;
8559 iverdef->vd_flags = 0;
8560 iverdef->vd_ndx = freeidx;
8561 iverdef->vd_cnt = 1;
252b5132 8562
fc0e6df6 8563 iverdef->vd_bfd = abfd;
252b5132 8564
fc0e6df6
PB
8565 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
8566 if (iverdef->vd_nodename == NULL)
d0fb9a8d 8567 goto error_return_verdef;
fc0e6df6 8568 iverdef->vd_nextdef = NULL;
601a03ba
AM
8569 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
8570 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
d0fb9a8d
JJ
8571 if (iverdef->vd_auxptr == NULL)
8572 goto error_return_verdef;
252b5132 8573
fc0e6df6
PB
8574 iverdaux = iverdef->vd_auxptr;
8575 iverdaux->vda_nodename = iverdef->vd_nodename;
252b5132
RH
8576 }
8577
b34976b6 8578 return TRUE;
252b5132
RH
8579
8580 error_return:
5ed6aba4 8581 if (contents != NULL)
252b5132 8582 free (contents);
b34976b6 8583 return FALSE;
252b5132
RH
8584}
8585\f
8586asymbol *
217aa764 8587_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
8588{
8589 elf_symbol_type *newsym;
8590
201159ec 8591 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof * newsym);
252b5132
RH
8592 if (!newsym)
8593 return NULL;
201159ec
NC
8594 newsym->symbol.the_bfd = abfd;
8595 return &newsym->symbol;
252b5132
RH
8596}
8597
8598void
217aa764
AM
8599_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
8600 asymbol *symbol,
8601 symbol_info *ret)
252b5132
RH
8602{
8603 bfd_symbol_info (symbol, ret);
8604}
8605
8606/* Return whether a symbol name implies a local symbol. Most targets
8607 use this function for the is_local_label_name entry point, but some
8608 override it. */
8609
b34976b6 8610bfd_boolean
217aa764
AM
8611_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
8612 const char *name)
252b5132
RH
8613{
8614 /* Normal local symbols start with ``.L''. */
8615 if (name[0] == '.' && name[1] == 'L')
b34976b6 8616 return TRUE;
252b5132
RH
8617
8618 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
8619 DWARF debugging symbols starting with ``..''. */
8620 if (name[0] == '.' && name[1] == '.')
b34976b6 8621 return TRUE;
252b5132
RH
8622
8623 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
8624 emitting DWARF debugging output. I suspect this is actually a
8625 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
8626 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
8627 underscore to be emitted on some ELF targets). For ease of use,
8628 we treat such symbols as local. */
8629 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 8630 return TRUE;
252b5132 8631
b1fa9dd6
NC
8632 /* Treat assembler generated fake symbols, dollar local labels and
8633 forward-backward labels (aka local labels) as locals.
8634 These labels have the form:
8635
07d6d2b8 8636 L0^A.* (fake symbols)
b1fa9dd6
NC
8637
8638 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
8639
8640 Versions which start with .L will have already been matched above,
8641 so we only need to match the rest. */
8642 if (name[0] == 'L' && ISDIGIT (name[1]))
8643 {
8644 bfd_boolean ret = FALSE;
8645 const char * p;
8646 char c;
8647
8648 for (p = name + 2; (c = *p); p++)
8649 {
8650 if (c == 1 || c == 2)
8651 {
8652 if (c == 1 && p == name + 2)
8653 /* A fake symbol. */
8654 return TRUE;
8655
8656 /* FIXME: We are being paranoid here and treating symbols like
8657 L0^Bfoo as if there were non-local, on the grounds that the
8658 assembler will never generate them. But can any symbol
8659 containing an ASCII value in the range 1-31 ever be anything
8660 other than some kind of local ? */
8661 ret = TRUE;
8662 }
8663
8664 if (! ISDIGIT (c))
8665 {
8666 ret = FALSE;
8667 break;
8668 }
8669 }
8670 return ret;
8671 }
ffa54770 8672
b34976b6 8673 return FALSE;
252b5132
RH
8674}
8675
8676alent *
217aa764
AM
8677_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
8678 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
8679{
8680 abort ();
8681 return NULL;
8682}
8683
b34976b6 8684bfd_boolean
217aa764
AM
8685_bfd_elf_set_arch_mach (bfd *abfd,
8686 enum bfd_architecture arch,
8687 unsigned long machine)
252b5132
RH
8688{
8689 /* If this isn't the right architecture for this backend, and this
8690 isn't the generic backend, fail. */
8691 if (arch != get_elf_backend_data (abfd)->arch
8692 && arch != bfd_arch_unknown
8693 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 8694 return FALSE;
252b5132
RH
8695
8696 return bfd_default_set_arch_mach (abfd, arch, machine);
8697}
8698
d1fad7c6
NC
8699/* Find the nearest line to a particular section and offset,
8700 for error reporting. */
8701
b34976b6 8702bfd_boolean
217aa764 8703_bfd_elf_find_nearest_line (bfd *abfd,
217aa764 8704 asymbol **symbols,
fb167eb2 8705 asection *section,
217aa764
AM
8706 bfd_vma offset,
8707 const char **filename_ptr,
8708 const char **functionname_ptr,
fb167eb2
AM
8709 unsigned int *line_ptr,
8710 unsigned int *discriminator_ptr)
d1fad7c6 8711{
b34976b6 8712 bfd_boolean found;
d1fad7c6 8713
fb167eb2 8714 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
4e8a9624 8715 filename_ptr, functionname_ptr,
fb167eb2
AM
8716 line_ptr, discriminator_ptr,
8717 dwarf_debug_sections, 0,
e00e8198
AM
8718 &elf_tdata (abfd)->dwarf2_find_line_info)
8719 || _bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
8720 filename_ptr, functionname_ptr,
8721 line_ptr))
d1fad7c6
NC
8722 {
8723 if (!*functionname_ptr)
e00e8198
AM
8724 _bfd_elf_find_function (abfd, symbols, section, offset,
8725 *filename_ptr ? NULL : filename_ptr,
8726 functionname_ptr);
b34976b6 8727 return TRUE;
d1fad7c6
NC
8728 }
8729
8730 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
8731 &found, filename_ptr,
8732 functionname_ptr, line_ptr,
8733 &elf_tdata (abfd)->line_info))
b34976b6 8734 return FALSE;
dc43ada5 8735 if (found && (*functionname_ptr || *line_ptr))
b34976b6 8736 return TRUE;
d1fad7c6
NC
8737
8738 if (symbols == NULL)
b34976b6 8739 return FALSE;
d1fad7c6 8740
e00e8198
AM
8741 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
8742 filename_ptr, functionname_ptr))
b34976b6 8743 return FALSE;
d1fad7c6 8744
252b5132 8745 *line_ptr = 0;
b34976b6 8746 return TRUE;
252b5132
RH
8747}
8748
5420f73d
L
8749/* Find the line for a symbol. */
8750
8751bfd_boolean
8752_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
8753 const char **filename_ptr, unsigned int *line_ptr)
9b8d1a36 8754{
fb167eb2
AM
8755 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
8756 filename_ptr, NULL, line_ptr, NULL,
8757 dwarf_debug_sections, 0,
8758 &elf_tdata (abfd)->dwarf2_find_line_info);
5420f73d
L
8759}
8760
4ab527b0
FF
8761/* After a call to bfd_find_nearest_line, successive calls to
8762 bfd_find_inliner_info can be used to get source information about
8763 each level of function inlining that terminated at the address
8764 passed to bfd_find_nearest_line. Currently this is only supported
8765 for DWARF2 with appropriate DWARF3 extensions. */
8766
8767bfd_boolean
8768_bfd_elf_find_inliner_info (bfd *abfd,
8769 const char **filename_ptr,
8770 const char **functionname_ptr,
8771 unsigned int *line_ptr)
8772{
8773 bfd_boolean found;
8774 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
8775 functionname_ptr, line_ptr,
8776 & elf_tdata (abfd)->dwarf2_find_line_info);
8777 return found;
8778}
8779
252b5132 8780int
a6b96beb 8781_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 8782{
8ded5a0f
AM
8783 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8784 int ret = bed->s->sizeof_ehdr;
252b5132 8785
0e1862bb 8786 if (!bfd_link_relocatable (info))
8ded5a0f 8787 {
12bd6957 8788 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 8789
62d7a5f6
AM
8790 if (phdr_size == (bfd_size_type) -1)
8791 {
8792 struct elf_segment_map *m;
8793
8794 phdr_size = 0;
12bd6957 8795 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62d7a5f6 8796 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 8797
62d7a5f6
AM
8798 if (phdr_size == 0)
8799 phdr_size = get_program_header_size (abfd, info);
8800 }
8ded5a0f 8801
12bd6957 8802 elf_program_header_size (abfd) = phdr_size;
8ded5a0f
AM
8803 ret += phdr_size;
8804 }
8805
252b5132
RH
8806 return ret;
8807}
8808
b34976b6 8809bfd_boolean
217aa764
AM
8810_bfd_elf_set_section_contents (bfd *abfd,
8811 sec_ptr section,
0f867abe 8812 const void *location,
217aa764
AM
8813 file_ptr offset,
8814 bfd_size_type count)
252b5132
RH
8815{
8816 Elf_Internal_Shdr *hdr;
1b6aeedb 8817 file_ptr pos;
252b5132
RH
8818
8819 if (! abfd->output_has_begun
217aa764 8820 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 8821 return FALSE;
252b5132 8822
0ce398f1
L
8823 if (!count)
8824 return TRUE;
8825
252b5132 8826 hdr = &elf_section_data (section)->this_hdr;
0ce398f1
L
8827 if (hdr->sh_offset == (file_ptr) -1)
8828 {
8829 /* We must compress this section. Write output to the buffer. */
8830 unsigned char *contents = hdr->contents;
8831 if ((offset + count) > hdr->sh_size
8832 || (section->flags & SEC_ELF_COMPRESS) == 0
8833 || contents == NULL)
8834 abort ();
8835 memcpy (contents + offset, location, count);
8836 return TRUE;
8837 }
dc810e39
AM
8838 pos = hdr->sh_offset + offset;
8839 if (bfd_seek (abfd, pos, SEEK_SET) != 0
8840 || bfd_bwrite (location, count, abfd) != count)
b34976b6 8841 return FALSE;
252b5132 8842
b34976b6 8843 return TRUE;
252b5132
RH
8844}
8845
8846void
217aa764
AM
8847_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
8848 arelent *cache_ptr ATTRIBUTE_UNUSED,
8849 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
8850{
8851 abort ();
8852}
8853
252b5132
RH
8854/* Try to convert a non-ELF reloc into an ELF one. */
8855
b34976b6 8856bfd_boolean
217aa764 8857_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 8858{
c044fabd 8859 /* Check whether we really have an ELF howto. */
252b5132
RH
8860
8861 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
8862 {
8863 bfd_reloc_code_real_type code;
8864 reloc_howto_type *howto;
8865
8866 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 8867 equivalent ELF reloc. */
252b5132
RH
8868
8869 if (areloc->howto->pc_relative)
8870 {
8871 switch (areloc->howto->bitsize)
8872 {
8873 case 8:
8874 code = BFD_RELOC_8_PCREL;
8875 break;
8876 case 12:
8877 code = BFD_RELOC_12_PCREL;
8878 break;
8879 case 16:
8880 code = BFD_RELOC_16_PCREL;
8881 break;
8882 case 24:
8883 code = BFD_RELOC_24_PCREL;
8884 break;
8885 case 32:
8886 code = BFD_RELOC_32_PCREL;
8887 break;
8888 case 64:
8889 code = BFD_RELOC_64_PCREL;
8890 break;
8891 default:
8892 goto fail;
8893 }
8894
8895 howto = bfd_reloc_type_lookup (abfd, code);
8896
8897 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
8898 {
8899 if (howto->pcrel_offset)
8900 areloc->addend += areloc->address;
8901 else
8902 areloc->addend -= areloc->address; /* addend is unsigned!! */
8903 }
8904 }
8905 else
8906 {
8907 switch (areloc->howto->bitsize)
8908 {
8909 case 8:
8910 code = BFD_RELOC_8;
8911 break;
8912 case 14:
8913 code = BFD_RELOC_14;
8914 break;
8915 case 16:
8916 code = BFD_RELOC_16;
8917 break;
8918 case 26:
8919 code = BFD_RELOC_26;
8920 break;
8921 case 32:
8922 code = BFD_RELOC_32;
8923 break;
8924 case 64:
8925 code = BFD_RELOC_64;
8926 break;
8927 default:
8928 goto fail;
8929 }
8930
8931 howto = bfd_reloc_type_lookup (abfd, code);
8932 }
8933
8934 if (howto)
8935 areloc->howto = howto;
8936 else
8937 goto fail;
8938 }
8939
b34976b6 8940 return TRUE;
252b5132
RH
8941
8942 fail:
4eca0228 8943 _bfd_error_handler
695344c0 8944 /* xgettext:c-format */
d003868e
AM
8945 (_("%B: unsupported relocation type %s"),
8946 abfd, areloc->howto->name);
252b5132 8947 bfd_set_error (bfd_error_bad_value);
b34976b6 8948 return FALSE;
252b5132
RH
8949}
8950
b34976b6 8951bfd_boolean
217aa764 8952_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132 8953{
d9071b0c
TG
8954 struct elf_obj_tdata *tdata = elf_tdata (abfd);
8955 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
252b5132 8956 {
c0355132 8957 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 8958 _bfd_elf_strtab_free (elf_shstrtab (abfd));
d9071b0c 8959 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
252b5132
RH
8960 }
8961
8962 return _bfd_generic_close_and_cleanup (abfd);
8963}
8964
8965/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
8966 in the relocation's offset. Thus we cannot allow any sort of sanity
8967 range-checking to interfere. There is nothing else to do in processing
8968 this reloc. */
8969
8970bfd_reloc_status_type
217aa764
AM
8971_bfd_elf_rel_vtable_reloc_fn
8972 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 8973 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
8974 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
8975 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
8976{
8977 return bfd_reloc_ok;
8978}
252b5132
RH
8979\f
8980/* Elf core file support. Much of this only works on native
8981 toolchains, since we rely on knowing the
8982 machine-dependent procfs structure in order to pick
c044fabd 8983 out details about the corefile. */
252b5132
RH
8984
8985#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
8986/* Needed for new procfs interface on sparc-solaris. */
8987# define _STRUCTURED_PROC 1
252b5132
RH
8988# include <sys/procfs.h>
8989#endif
8990
261b8d08
PA
8991/* Return a PID that identifies a "thread" for threaded cores, or the
8992 PID of the main process for non-threaded cores. */
252b5132
RH
8993
8994static int
217aa764 8995elfcore_make_pid (bfd *abfd)
252b5132 8996{
261b8d08
PA
8997 int pid;
8998
228e534f 8999 pid = elf_tdata (abfd)->core->lwpid;
261b8d08 9000 if (pid == 0)
228e534f 9001 pid = elf_tdata (abfd)->core->pid;
261b8d08
PA
9002
9003 return pid;
252b5132
RH
9004}
9005
252b5132
RH
9006/* If there isn't a section called NAME, make one, using
9007 data from SECT. Note, this function will generate a
9008 reference to NAME, so you shouldn't deallocate or
c044fabd 9009 overwrite it. */
252b5132 9010
b34976b6 9011static bfd_boolean
217aa764 9012elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 9013{
c044fabd 9014 asection *sect2;
252b5132
RH
9015
9016 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 9017 return TRUE;
252b5132 9018
117ed4f8 9019 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 9020 if (sect2 == NULL)
b34976b6 9021 return FALSE;
252b5132 9022
eea6121a 9023 sect2->size = sect->size;
252b5132 9024 sect2->filepos = sect->filepos;
252b5132 9025 sect2->alignment_power = sect->alignment_power;
b34976b6 9026 return TRUE;
252b5132
RH
9027}
9028
bb0082d6
AM
9029/* Create a pseudosection containing SIZE bytes at FILEPOS. This
9030 actually creates up to two pseudosections:
9031 - For the single-threaded case, a section named NAME, unless
9032 such a section already exists.
9033 - For the multi-threaded case, a section named "NAME/PID", where
9034 PID is elfcore_make_pid (abfd).
24d3e51b 9035 Both pseudosections have identical contents. */
b34976b6 9036bfd_boolean
217aa764
AM
9037_bfd_elfcore_make_pseudosection (bfd *abfd,
9038 char *name,
9039 size_t size,
9040 ufile_ptr filepos)
bb0082d6
AM
9041{
9042 char buf[100];
9043 char *threaded_name;
d4c88bbb 9044 size_t len;
bb0082d6
AM
9045 asection *sect;
9046
9047 /* Build the section name. */
9048
9049 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 9050 len = strlen (buf) + 1;
a50b1753 9051 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 9052 if (threaded_name == NULL)
b34976b6 9053 return FALSE;
d4c88bbb 9054 memcpy (threaded_name, buf, len);
bb0082d6 9055
117ed4f8
AM
9056 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
9057 SEC_HAS_CONTENTS);
bb0082d6 9058 if (sect == NULL)
b34976b6 9059 return FALSE;
eea6121a 9060 sect->size = size;
bb0082d6 9061 sect->filepos = filepos;
bb0082d6
AM
9062 sect->alignment_power = 2;
9063
936e320b 9064 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
9065}
9066
252b5132 9067/* prstatus_t exists on:
4a938328 9068 solaris 2.5+
252b5132
RH
9069 linux 2.[01] + glibc
9070 unixware 4.2
9071*/
9072
9073#if defined (HAVE_PRSTATUS_T)
a7b97311 9074
b34976b6 9075static bfd_boolean
217aa764 9076elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 9077{
eea6121a 9078 size_t size;
7ee38065 9079 int offset;
252b5132 9080
4a938328
MS
9081 if (note->descsz == sizeof (prstatus_t))
9082 {
9083 prstatus_t prstat;
252b5132 9084
eea6121a 9085 size = sizeof (prstat.pr_reg);
7ee38065 9086 offset = offsetof (prstatus_t, pr_reg);
4a938328 9087 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 9088
fa49d224
NC
9089 /* Do not overwrite the core signal if it
9090 has already been set by another thread. */
228e534f
AM
9091 if (elf_tdata (abfd)->core->signal == 0)
9092 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9093 if (elf_tdata (abfd)->core->pid == 0)
9094 elf_tdata (abfd)->core->pid = prstat.pr_pid;
252b5132 9095
4a938328
MS
9096 /* pr_who exists on:
9097 solaris 2.5+
9098 unixware 4.2
9099 pr_who doesn't exist on:
9100 linux 2.[01]
9101 */
252b5132 9102#if defined (HAVE_PRSTATUS_T_PR_WHO)
228e534f 9103 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 9104#else
228e534f 9105 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
252b5132 9106#endif
4a938328 9107 }
7ee38065 9108#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
9109 else if (note->descsz == sizeof (prstatus32_t))
9110 {
9111 /* 64-bit host, 32-bit corefile */
9112 prstatus32_t prstat;
9113
eea6121a 9114 size = sizeof (prstat.pr_reg);
7ee38065 9115 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
9116 memcpy (&prstat, note->descdata, sizeof (prstat));
9117
fa49d224
NC
9118 /* Do not overwrite the core signal if it
9119 has already been set by another thread. */
228e534f
AM
9120 if (elf_tdata (abfd)->core->signal == 0)
9121 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9122 if (elf_tdata (abfd)->core->pid == 0)
9123 elf_tdata (abfd)->core->pid = prstat.pr_pid;
4a938328
MS
9124
9125 /* pr_who exists on:
9126 solaris 2.5+
9127 unixware 4.2
9128 pr_who doesn't exist on:
9129 linux 2.[01]
9130 */
7ee38065 9131#if defined (HAVE_PRSTATUS32_T_PR_WHO)
228e534f 9132 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 9133#else
228e534f 9134 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
4a938328
MS
9135#endif
9136 }
7ee38065 9137#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
9138 else
9139 {
9140 /* Fail - we don't know how to handle any other
9141 note size (ie. data object type). */
b34976b6 9142 return TRUE;
4a938328 9143 }
252b5132 9144
bb0082d6 9145 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 9146 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 9147 size, note->descpos + offset);
252b5132
RH
9148}
9149#endif /* defined (HAVE_PRSTATUS_T) */
9150
bb0082d6 9151/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 9152static bfd_boolean
217aa764
AM
9153elfcore_make_note_pseudosection (bfd *abfd,
9154 char *name,
9155 Elf_Internal_Note *note)
252b5132 9156{
936e320b
AM
9157 return _bfd_elfcore_make_pseudosection (abfd, name,
9158 note->descsz, note->descpos);
252b5132
RH
9159}
9160
ff08c6bb
JB
9161/* There isn't a consistent prfpregset_t across platforms,
9162 but it doesn't matter, because we don't have to pick this
c044fabd
KH
9163 data structure apart. */
9164
b34976b6 9165static bfd_boolean
217aa764 9166elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
9167{
9168 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9169}
9170
ff08c6bb 9171/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 9172 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 9173 literally. */
c044fabd 9174
b34976b6 9175static bfd_boolean
217aa764 9176elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
9177{
9178 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9179}
9180
4339cae0
L
9181/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9182 with a note type of NT_X86_XSTATE. Just include the whole note's
9183 contents literally. */
9184
9185static bfd_boolean
9186elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
9187{
9188 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
9189}
9190
97753bd5
AM
9191static bfd_boolean
9192elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
9193{
9194 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
9195}
9196
89eeb0bc
LM
9197static bfd_boolean
9198elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
9199{
9200 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
9201}
97753bd5 9202
0675e188
UW
9203static bfd_boolean
9204elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
9205{
9206 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
9207}
9208
d7eeb400
MS
9209static bfd_boolean
9210elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
9211{
9212 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
9213}
9214
9215static bfd_boolean
9216elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
9217{
9218 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
9219}
9220
9221static bfd_boolean
9222elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
9223{
9224 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
9225}
9226
9227static bfd_boolean
9228elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
9229{
9230 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
9231}
9232
9233static bfd_boolean
9234elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9235{
9236 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9237}
9238
355b81d9
UW
9239static bfd_boolean
9240elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9241{
9242 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9243}
9244
9245static bfd_boolean
9246elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9247{
9248 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9249}
9250
abb3f6cc
NC
9251static bfd_boolean
9252elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9253{
9254 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9255}
9256
4ef9f41a
AA
9257static bfd_boolean
9258elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
9259{
9260 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
9261}
9262
9263static bfd_boolean
9264elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
9265{
9266 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
9267}
9268
88ab90e8
AA
9269static bfd_boolean
9270elfcore_grok_s390_gs_cb (bfd *abfd, Elf_Internal_Note *note)
9271{
9272 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-cb", note);
9273}
9274
9275static bfd_boolean
9276elfcore_grok_s390_gs_bc (bfd *abfd, Elf_Internal_Note *note)
9277{
9278 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-bc", note);
9279}
9280
faa9a424
UW
9281static bfd_boolean
9282elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
9283{
9284 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
9285}
9286
652451f8
YZ
9287static bfd_boolean
9288elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
9289{
9290 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
9291}
9292
9293static bfd_boolean
9294elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
9295{
9296 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
9297}
9298
9299static bfd_boolean
9300elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
9301{
9302 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
9303}
9304
252b5132 9305#if defined (HAVE_PRPSINFO_T)
4a938328 9306typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 9307#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9308typedef prpsinfo32_t elfcore_psinfo32_t;
9309#endif
252b5132
RH
9310#endif
9311
9312#if defined (HAVE_PSINFO_T)
4a938328 9313typedef psinfo_t elfcore_psinfo_t;
7ee38065 9314#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9315typedef psinfo32_t elfcore_psinfo32_t;
9316#endif
252b5132
RH
9317#endif
9318
252b5132
RH
9319/* return a malloc'ed copy of a string at START which is at
9320 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 9321 the copy will always have a terminating '\0'. */
252b5132 9322
936e320b 9323char *
217aa764 9324_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 9325{
dc810e39 9326 char *dups;
a50b1753 9327 char *end = (char *) memchr (start, '\0', max);
dc810e39 9328 size_t len;
252b5132
RH
9329
9330 if (end == NULL)
9331 len = max;
9332 else
9333 len = end - start;
9334
a50b1753 9335 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 9336 if (dups == NULL)
252b5132
RH
9337 return NULL;
9338
dc810e39
AM
9339 memcpy (dups, start, len);
9340 dups[len] = '\0';
252b5132 9341
dc810e39 9342 return dups;
252b5132
RH
9343}
9344
bb0082d6 9345#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 9346static bfd_boolean
217aa764 9347elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 9348{
4a938328
MS
9349 if (note->descsz == sizeof (elfcore_psinfo_t))
9350 {
9351 elfcore_psinfo_t psinfo;
252b5132 9352
7ee38065 9353 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9354
335e41d4 9355#if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
228e534f 9356 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9357#endif
228e534f 9358 elf_tdata (abfd)->core->program
936e320b
AM
9359 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9360 sizeof (psinfo.pr_fname));
252b5132 9361
228e534f 9362 elf_tdata (abfd)->core->command
936e320b
AM
9363 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9364 sizeof (psinfo.pr_psargs));
4a938328 9365 }
7ee38065 9366#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
9367 else if (note->descsz == sizeof (elfcore_psinfo32_t))
9368 {
9369 /* 64-bit host, 32-bit corefile */
9370 elfcore_psinfo32_t psinfo;
9371
7ee38065 9372 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9373
335e41d4 9374#if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
228e534f 9375 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9376#endif
228e534f 9377 elf_tdata (abfd)->core->program
936e320b
AM
9378 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9379 sizeof (psinfo.pr_fname));
4a938328 9380
228e534f 9381 elf_tdata (abfd)->core->command
936e320b
AM
9382 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9383 sizeof (psinfo.pr_psargs));
4a938328
MS
9384 }
9385#endif
9386
9387 else
9388 {
9389 /* Fail - we don't know how to handle any other
9390 note size (ie. data object type). */
b34976b6 9391 return TRUE;
4a938328 9392 }
252b5132
RH
9393
9394 /* Note that for some reason, a spurious space is tacked
9395 onto the end of the args in some (at least one anyway)
c044fabd 9396 implementations, so strip it off if it exists. */
252b5132
RH
9397
9398 {
228e534f 9399 char *command = elf_tdata (abfd)->core->command;
252b5132
RH
9400 int n = strlen (command);
9401
9402 if (0 < n && command[n - 1] == ' ')
9403 command[n - 1] = '\0';
9404 }
9405
b34976b6 9406 return TRUE;
252b5132
RH
9407}
9408#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
9409
252b5132 9410#if defined (HAVE_PSTATUS_T)
b34976b6 9411static bfd_boolean
217aa764 9412elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 9413{
f572a39d
AM
9414 if (note->descsz == sizeof (pstatus_t)
9415#if defined (HAVE_PXSTATUS_T)
9416 || note->descsz == sizeof (pxstatus_t)
9417#endif
9418 )
4a938328
MS
9419 {
9420 pstatus_t pstat;
252b5132 9421
4a938328 9422 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9423
228e534f 9424 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328 9425 }
7ee38065 9426#if defined (HAVE_PSTATUS32_T)
4a938328
MS
9427 else if (note->descsz == sizeof (pstatus32_t))
9428 {
9429 /* 64-bit host, 32-bit corefile */
9430 pstatus32_t pstat;
252b5132 9431
4a938328 9432 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9433
228e534f 9434 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328
MS
9435 }
9436#endif
252b5132
RH
9437 /* Could grab some more details from the "representative"
9438 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 9439 NT_LWPSTATUS note, presumably. */
252b5132 9440
b34976b6 9441 return TRUE;
252b5132
RH
9442}
9443#endif /* defined (HAVE_PSTATUS_T) */
9444
252b5132 9445#if defined (HAVE_LWPSTATUS_T)
b34976b6 9446static bfd_boolean
217aa764 9447elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
9448{
9449 lwpstatus_t lwpstat;
9450 char buf[100];
c044fabd 9451 char *name;
d4c88bbb 9452 size_t len;
c044fabd 9453 asection *sect;
252b5132 9454
f572a39d
AM
9455 if (note->descsz != sizeof (lwpstat)
9456#if defined (HAVE_LWPXSTATUS_T)
9457 && note->descsz != sizeof (lwpxstatus_t)
9458#endif
9459 )
b34976b6 9460 return TRUE;
252b5132
RH
9461
9462 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
9463
228e534f 9464 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
a1504221
JB
9465 /* Do not overwrite the core signal if it has already been set by
9466 another thread. */
228e534f
AM
9467 if (elf_tdata (abfd)->core->signal == 0)
9468 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
252b5132 9469
c044fabd 9470 /* Make a ".reg/999" section. */
252b5132
RH
9471
9472 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 9473 len = strlen (buf) + 1;
217aa764 9474 name = bfd_alloc (abfd, len);
252b5132 9475 if (name == NULL)
b34976b6 9476 return FALSE;
d4c88bbb 9477 memcpy (name, buf, len);
252b5132 9478
117ed4f8 9479 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9480 if (sect == NULL)
b34976b6 9481 return FALSE;
252b5132
RH
9482
9483#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9484 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
9485 sect->filepos = note->descpos
9486 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
9487#endif
9488
9489#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 9490 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
9491 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
9492#endif
9493
252b5132
RH
9494 sect->alignment_power = 2;
9495
9496 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9497 return FALSE;
252b5132
RH
9498
9499 /* Make a ".reg2/999" section */
9500
9501 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 9502 len = strlen (buf) + 1;
217aa764 9503 name = bfd_alloc (abfd, len);
252b5132 9504 if (name == NULL)
b34976b6 9505 return FALSE;
d4c88bbb 9506 memcpy (name, buf, len);
252b5132 9507
117ed4f8 9508 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9509 if (sect == NULL)
b34976b6 9510 return FALSE;
252b5132
RH
9511
9512#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9513 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
9514 sect->filepos = note->descpos
9515 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
9516#endif
9517
9518#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 9519 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
9520 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
9521#endif
9522
252b5132
RH
9523 sect->alignment_power = 2;
9524
936e320b 9525 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
9526}
9527#endif /* defined (HAVE_LWPSTATUS_T) */
9528
b34976b6 9529static bfd_boolean
217aa764 9530elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
9531{
9532 char buf[30];
c044fabd 9533 char *name;
d4c88bbb 9534 size_t len;
c044fabd 9535 asection *sect;
4a6636fb
PA
9536 int type;
9537 int is_active_thread;
9538 bfd_vma base_addr;
16e9c715 9539
4a6636fb 9540 if (note->descsz < 728)
b34976b6 9541 return TRUE;
16e9c715 9542
4a6636fb
PA
9543 if (! CONST_STRNEQ (note->namedata, "win32"))
9544 return TRUE;
9545
9546 type = bfd_get_32 (abfd, note->descdata);
c044fabd 9547
4a6636fb 9548 switch (type)
16e9c715 9549 {
4a6636fb 9550 case 1 /* NOTE_INFO_PROCESS */:
228e534f 9551 /* FIXME: need to add ->core->command. */
4a6636fb 9552 /* process_info.pid */
228e534f 9553 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
4a6636fb 9554 /* process_info.signal */
228e534f 9555 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 9556 break;
16e9c715 9557
4a6636fb 9558 case 2 /* NOTE_INFO_THREAD */:
16e9c715 9559 /* Make a ".reg/999" section. */
4a6636fb
PA
9560 /* thread_info.tid */
9561 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 9562
d4c88bbb 9563 len = strlen (buf) + 1;
a50b1753 9564 name = (char *) bfd_alloc (abfd, len);
16e9c715 9565 if (name == NULL)
b34976b6 9566 return FALSE;
c044fabd 9567
d4c88bbb 9568 memcpy (name, buf, len);
16e9c715 9569
117ed4f8 9570 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 9571 if (sect == NULL)
b34976b6 9572 return FALSE;
c044fabd 9573
4a6636fb
PA
9574 /* sizeof (thread_info.thread_context) */
9575 sect->size = 716;
9576 /* offsetof (thread_info.thread_context) */
9577 sect->filepos = note->descpos + 12;
16e9c715
NC
9578 sect->alignment_power = 2;
9579
4a6636fb
PA
9580 /* thread_info.is_active_thread */
9581 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
9582
9583 if (is_active_thread)
16e9c715 9584 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9585 return FALSE;
16e9c715
NC
9586 break;
9587
4a6636fb 9588 case 3 /* NOTE_INFO_MODULE */:
16e9c715 9589 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
9590 /* module_info.base_address */
9591 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 9592 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 9593
d4c88bbb 9594 len = strlen (buf) + 1;
a50b1753 9595 name = (char *) bfd_alloc (abfd, len);
16e9c715 9596 if (name == NULL)
b34976b6 9597 return FALSE;
c044fabd 9598
d4c88bbb 9599 memcpy (name, buf, len);
252b5132 9600
117ed4f8 9601 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 9602
16e9c715 9603 if (sect == NULL)
b34976b6 9604 return FALSE;
c044fabd 9605
eea6121a 9606 sect->size = note->descsz;
16e9c715 9607 sect->filepos = note->descpos;
16e9c715
NC
9608 sect->alignment_power = 2;
9609 break;
9610
9611 default:
b34976b6 9612 return TRUE;
16e9c715
NC
9613 }
9614
b34976b6 9615 return TRUE;
16e9c715 9616}
252b5132 9617
b34976b6 9618static bfd_boolean
217aa764 9619elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 9620{
9c5bfbb7 9621 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 9622
252b5132
RH
9623 switch (note->type)
9624 {
9625 default:
b34976b6 9626 return TRUE;
252b5132 9627
252b5132 9628 case NT_PRSTATUS:
bb0082d6
AM
9629 if (bed->elf_backend_grok_prstatus)
9630 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 9631 return TRUE;
bb0082d6 9632#if defined (HAVE_PRSTATUS_T)
252b5132 9633 return elfcore_grok_prstatus (abfd, note);
bb0082d6 9634#else
b34976b6 9635 return TRUE;
252b5132
RH
9636#endif
9637
9638#if defined (HAVE_PSTATUS_T)
9639 case NT_PSTATUS:
9640 return elfcore_grok_pstatus (abfd, note);
9641#endif
9642
9643#if defined (HAVE_LWPSTATUS_T)
9644 case NT_LWPSTATUS:
9645 return elfcore_grok_lwpstatus (abfd, note);
9646#endif
9647
9648 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
9649 return elfcore_grok_prfpreg (abfd, note);
9650
c044fabd 9651 case NT_WIN32PSTATUS:
16e9c715 9652 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 9653
c044fabd 9654 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
9655 if (note->namesz == 6
9656 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
9657 return elfcore_grok_prxfpreg (abfd, note);
9658 else
b34976b6 9659 return TRUE;
ff08c6bb 9660
4339cae0
L
9661 case NT_X86_XSTATE: /* Linux XSAVE extension */
9662 if (note->namesz == 6
9663 && strcmp (note->namedata, "LINUX") == 0)
9664 return elfcore_grok_xstatereg (abfd, note);
9665 else
9666 return TRUE;
9667
97753bd5
AM
9668 case NT_PPC_VMX:
9669 if (note->namesz == 6
9670 && strcmp (note->namedata, "LINUX") == 0)
9671 return elfcore_grok_ppc_vmx (abfd, note);
9672 else
9673 return TRUE;
9674
89eeb0bc
LM
9675 case NT_PPC_VSX:
9676 if (note->namesz == 6
07d6d2b8
AM
9677 && strcmp (note->namedata, "LINUX") == 0)
9678 return elfcore_grok_ppc_vsx (abfd, note);
89eeb0bc 9679 else
07d6d2b8 9680 return TRUE;
89eeb0bc 9681
0675e188
UW
9682 case NT_S390_HIGH_GPRS:
9683 if (note->namesz == 6
07d6d2b8
AM
9684 && strcmp (note->namedata, "LINUX") == 0)
9685 return elfcore_grok_s390_high_gprs (abfd, note);
0675e188 9686 else
07d6d2b8 9687 return TRUE;
0675e188 9688
d7eeb400
MS
9689 case NT_S390_TIMER:
9690 if (note->namesz == 6
07d6d2b8
AM
9691 && strcmp (note->namedata, "LINUX") == 0)
9692 return elfcore_grok_s390_timer (abfd, note);
d7eeb400 9693 else
07d6d2b8 9694 return TRUE;
d7eeb400
MS
9695
9696 case NT_S390_TODCMP:
9697 if (note->namesz == 6
07d6d2b8
AM
9698 && strcmp (note->namedata, "LINUX") == 0)
9699 return elfcore_grok_s390_todcmp (abfd, note);
d7eeb400 9700 else
07d6d2b8 9701 return TRUE;
d7eeb400
MS
9702
9703 case NT_S390_TODPREG:
9704 if (note->namesz == 6
07d6d2b8
AM
9705 && strcmp (note->namedata, "LINUX") == 0)
9706 return elfcore_grok_s390_todpreg (abfd, note);
d7eeb400 9707 else
07d6d2b8 9708 return TRUE;
d7eeb400
MS
9709
9710 case NT_S390_CTRS:
9711 if (note->namesz == 6
07d6d2b8
AM
9712 && strcmp (note->namedata, "LINUX") == 0)
9713 return elfcore_grok_s390_ctrs (abfd, note);
d7eeb400 9714 else
07d6d2b8 9715 return TRUE;
d7eeb400
MS
9716
9717 case NT_S390_PREFIX:
9718 if (note->namesz == 6
07d6d2b8
AM
9719 && strcmp (note->namedata, "LINUX") == 0)
9720 return elfcore_grok_s390_prefix (abfd, note);
d7eeb400 9721 else
07d6d2b8 9722 return TRUE;
d7eeb400 9723
355b81d9
UW
9724 case NT_S390_LAST_BREAK:
9725 if (note->namesz == 6
07d6d2b8
AM
9726 && strcmp (note->namedata, "LINUX") == 0)
9727 return elfcore_grok_s390_last_break (abfd, note);
355b81d9 9728 else
07d6d2b8 9729 return TRUE;
355b81d9
UW
9730
9731 case NT_S390_SYSTEM_CALL:
9732 if (note->namesz == 6
07d6d2b8
AM
9733 && strcmp (note->namedata, "LINUX") == 0)
9734 return elfcore_grok_s390_system_call (abfd, note);
355b81d9 9735 else
07d6d2b8 9736 return TRUE;
355b81d9 9737
abb3f6cc
NC
9738 case NT_S390_TDB:
9739 if (note->namesz == 6
07d6d2b8
AM
9740 && strcmp (note->namedata, "LINUX") == 0)
9741 return elfcore_grok_s390_tdb (abfd, note);
abb3f6cc 9742 else
07d6d2b8 9743 return TRUE;
abb3f6cc 9744
4ef9f41a
AA
9745 case NT_S390_VXRS_LOW:
9746 if (note->namesz == 6
9747 && strcmp (note->namedata, "LINUX") == 0)
9748 return elfcore_grok_s390_vxrs_low (abfd, note);
9749 else
9750 return TRUE;
9751
9752 case NT_S390_VXRS_HIGH:
9753 if (note->namesz == 6
9754 && strcmp (note->namedata, "LINUX") == 0)
9755 return elfcore_grok_s390_vxrs_high (abfd, note);
9756 else
9757 return TRUE;
9758
88ab90e8
AA
9759 case NT_S390_GS_CB:
9760 if (note->namesz == 6
9761 && strcmp (note->namedata, "LINUX") == 0)
8fe09d74 9762 return elfcore_grok_s390_gs_cb (abfd, note);
88ab90e8
AA
9763 else
9764 return TRUE;
9765
9766 case NT_S390_GS_BC:
9767 if (note->namesz == 6
9768 && strcmp (note->namedata, "LINUX") == 0)
8fe09d74 9769 return elfcore_grok_s390_gs_bc (abfd, note);
88ab90e8
AA
9770 else
9771 return TRUE;
9772
faa9a424
UW
9773 case NT_ARM_VFP:
9774 if (note->namesz == 6
9775 && strcmp (note->namedata, "LINUX") == 0)
9776 return elfcore_grok_arm_vfp (abfd, note);
9777 else
9778 return TRUE;
9779
652451f8
YZ
9780 case NT_ARM_TLS:
9781 if (note->namesz == 6
9782 && strcmp (note->namedata, "LINUX") == 0)
9783 return elfcore_grok_aarch_tls (abfd, note);
9784 else
9785 return TRUE;
9786
9787 case NT_ARM_HW_BREAK:
9788 if (note->namesz == 6
9789 && strcmp (note->namedata, "LINUX") == 0)
9790 return elfcore_grok_aarch_hw_break (abfd, note);
9791 else
9792 return TRUE;
9793
9794 case NT_ARM_HW_WATCH:
9795 if (note->namesz == 6
9796 && strcmp (note->namedata, "LINUX") == 0)
9797 return elfcore_grok_aarch_hw_watch (abfd, note);
9798 else
9799 return TRUE;
9800
252b5132
RH
9801 case NT_PRPSINFO:
9802 case NT_PSINFO:
bb0082d6
AM
9803 if (bed->elf_backend_grok_psinfo)
9804 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 9805 return TRUE;
bb0082d6 9806#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 9807 return elfcore_grok_psinfo (abfd, note);
bb0082d6 9808#else
b34976b6 9809 return TRUE;
252b5132 9810#endif
3333a7c3
RM
9811
9812 case NT_AUXV:
9813 {
117ed4f8
AM
9814 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9815 SEC_HAS_CONTENTS);
3333a7c3
RM
9816
9817 if (sect == NULL)
9818 return FALSE;
eea6121a 9819 sect->size = note->descsz;
3333a7c3 9820 sect->filepos = note->descpos;
3333a7c3
RM
9821 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9822
9823 return TRUE;
9824 }
9015683b 9825
451b7c33
TT
9826 case NT_FILE:
9827 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
9828 note);
9829
9015683b
TT
9830 case NT_SIGINFO:
9831 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
9832 note);
5b2c414d 9833
252b5132
RH
9834 }
9835}
9836
718175fa
JK
9837static bfd_boolean
9838elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
9839{
c74f7d1c 9840 struct bfd_build_id* build_id;
30e8ee25
AM
9841
9842 if (note->descsz == 0)
9843 return FALSE;
9844
c74f7d1c
JT
9845 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
9846 if (build_id == NULL)
718175fa
JK
9847 return FALSE;
9848
c74f7d1c
JT
9849 build_id->size = note->descsz;
9850 memcpy (build_id->data, note->descdata, note->descsz);
9851 abfd->build_id = build_id;
718175fa
JK
9852
9853 return TRUE;
9854}
9855
9856static bfd_boolean
9857elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
9858{
9859 switch (note->type)
9860 {
9861 default:
9862 return TRUE;
9863
46bed679
L
9864 case NT_GNU_PROPERTY_TYPE_0:
9865 return _bfd_elf_parse_gnu_properties (abfd, note);
9866
718175fa
JK
9867 case NT_GNU_BUILD_ID:
9868 return elfobj_grok_gnu_build_id (abfd, note);
9869 }
9870}
9871
e21e5835
NC
9872static bfd_boolean
9873elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
9874{
9875 struct sdt_note *cur =
9876 (struct sdt_note *) bfd_alloc (abfd, sizeof (struct sdt_note)
9877 + note->descsz);
9878
9879 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
9880 cur->size = (bfd_size_type) note->descsz;
9881 memcpy (cur->data, note->descdata, note->descsz);
9882
9883 elf_tdata (abfd)->sdt_note_head = cur;
9884
9885 return TRUE;
9886}
9887
9888static bfd_boolean
9889elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
9890{
9891 switch (note->type)
9892 {
9893 case NT_STAPSDT:
9894 return elfobj_grok_stapsdt_note_1 (abfd, note);
9895
9896 default:
9897 return TRUE;
9898 }
9899}
9900
aa1ed4a9
JB
9901static bfd_boolean
9902elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
9903{
9904 size_t offset;
9905
b5430a3c 9906 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
aa1ed4a9 9907 {
b5430a3c 9908 case ELFCLASS32:
0064d223
JB
9909 if (note->descsz < 108)
9910 return FALSE;
aa1ed4a9
JB
9911 break;
9912
b5430a3c 9913 case ELFCLASS64:
0064d223
JB
9914 if (note->descsz < 120)
9915 return FALSE;
aa1ed4a9
JB
9916 break;
9917
9918 default:
9919 return FALSE;
9920 }
9921
0064d223
JB
9922 /* Check for version 1 in pr_version. */
9923 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
9924 return FALSE;
80a04378 9925
0064d223
JB
9926 offset = 4;
9927
9928 /* Skip over pr_psinfosz. */
b5430a3c 9929 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
0064d223
JB
9930 offset += 4;
9931 else
9932 {
9933 offset += 4; /* Padding before pr_psinfosz. */
9934 offset += 8;
9935 }
9936
aa1ed4a9
JB
9937 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
9938 elf_tdata (abfd)->core->program
9939 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
9940 offset += 17;
9941
9942 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
9943 elf_tdata (abfd)->core->command
9944 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
0064d223
JB
9945 offset += 81;
9946
9947 /* Padding before pr_pid. */
9948 offset += 2;
9949
9950 /* The pr_pid field was added in version "1a". */
9951 if (note->descsz < offset + 4)
9952 return TRUE;
9953
9954 elf_tdata (abfd)->core->pid
9955 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
aa1ed4a9
JB
9956
9957 return TRUE;
9958}
9959
9960static bfd_boolean
9961elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
9962{
9963 size_t offset;
9964 size_t size;
24d3e51b 9965 size_t min_size;
aa1ed4a9 9966
24d3e51b
NC
9967 /* Compute offset of pr_getregsz, skipping over pr_statussz.
9968 Also compute minimum size of this note. */
b5430a3c 9969 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
aa1ed4a9 9970 {
b5430a3c 9971 case ELFCLASS32:
24d3e51b
NC
9972 offset = 4 + 4;
9973 min_size = offset + (4 * 2) + 4 + 4 + 4;
aa1ed4a9
JB
9974 break;
9975
b5430a3c 9976 case ELFCLASS64:
24d3e51b
NC
9977 offset = 4 + 4 + 8; /* Includes padding before pr_statussz. */
9978 min_size = offset + (8 * 2) + 4 + 4 + 4 + 4;
aa1ed4a9
JB
9979 break;
9980
9981 default:
9982 return FALSE;
9983 }
9984
24d3e51b
NC
9985 if (note->descsz < min_size)
9986 return FALSE;
9987
9988 /* Check for version 1 in pr_version. */
9989 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
9990 return FALSE;
aa1ed4a9 9991
24d3e51b
NC
9992 /* Extract size of pr_reg from pr_gregsetsz. */
9993 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
b5430a3c 9994 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
24d3e51b
NC
9995 {
9996 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
9997 offset += 4 * 2;
9998 }
b5430a3c 9999 else
24d3e51b
NC
10000 {
10001 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
10002 offset += 8 * 2;
10003 }
aa1ed4a9 10004
24d3e51b 10005 /* Skip over pr_osreldate. */
aa1ed4a9
JB
10006 offset += 4;
10007
24d3e51b 10008 /* Read signal from pr_cursig. */
aa1ed4a9
JB
10009 if (elf_tdata (abfd)->core->signal == 0)
10010 elf_tdata (abfd)->core->signal
10011 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10012 offset += 4;
10013
24d3e51b 10014 /* Read TID from pr_pid. */
aa1ed4a9
JB
10015 elf_tdata (abfd)->core->lwpid
10016 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10017 offset += 4;
10018
24d3e51b 10019 /* Padding before pr_reg. */
b5430a3c 10020 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS64)
aa1ed4a9
JB
10021 offset += 4;
10022
24d3e51b
NC
10023 /* Make sure that there is enough data remaining in the note. */
10024 if ((note->descsz - offset) < size)
10025 return FALSE;
10026
aa1ed4a9
JB
10027 /* Make a ".reg/999" section and a ".reg" section. */
10028 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
10029 size, note->descpos + offset);
10030}
10031
10032static bfd_boolean
10033elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
10034{
544c67cd
JB
10035 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10036
aa1ed4a9
JB
10037 switch (note->type)
10038 {
10039 case NT_PRSTATUS:
544c67cd
JB
10040 if (bed->elf_backend_grok_freebsd_prstatus)
10041 if ((*bed->elf_backend_grok_freebsd_prstatus) (abfd, note))
10042 return TRUE;
aa1ed4a9
JB
10043 return elfcore_grok_freebsd_prstatus (abfd, note);
10044
10045 case NT_FPREGSET:
10046 return elfcore_grok_prfpreg (abfd, note);
10047
10048 case NT_PRPSINFO:
10049 return elfcore_grok_freebsd_psinfo (abfd, note);
10050
10051 case NT_FREEBSD_THRMISC:
10052 if (note->namesz == 8)
10053 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
10054 else
10055 return TRUE;
10056
ddb2bbcf
JB
10057 case NT_FREEBSD_PROCSTAT_PROC:
10058 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.proc",
10059 note);
10060
10061 case NT_FREEBSD_PROCSTAT_FILES:
10062 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.files",
10063 note);
10064
10065 case NT_FREEBSD_PROCSTAT_VMMAP:
10066 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.vmmap",
10067 note);
10068
3350c5f5
JB
10069 case NT_FREEBSD_PROCSTAT_AUXV:
10070 {
10071 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
10072 SEC_HAS_CONTENTS);
10073
10074 if (sect == NULL)
10075 return FALSE;
10076 sect->size = note->descsz - 4;
10077 sect->filepos = note->descpos + 4;
10078 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10079
10080 return TRUE;
10081 }
10082
aa1ed4a9
JB
10083 case NT_X86_XSTATE:
10084 if (note->namesz == 8)
10085 return elfcore_grok_xstatereg (abfd, note);
10086 else
10087 return TRUE;
10088
e6f3b9c3
JB
10089 case NT_FREEBSD_PTLWPINFO:
10090 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.lwpinfo",
10091 note);
10092
6d5be5d6
JB
10093 case NT_ARM_VFP:
10094 return elfcore_grok_arm_vfp (abfd, note);
10095
aa1ed4a9
JB
10096 default:
10097 return TRUE;
10098 }
10099}
10100
b34976b6 10101static bfd_boolean
217aa764 10102elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
10103{
10104 char *cp;
10105
10106 cp = strchr (note->namedata, '@');
10107 if (cp != NULL)
10108 {
d2b64500 10109 *lwpidp = atoi(cp + 1);
b34976b6 10110 return TRUE;
50b2bdb7 10111 }
b34976b6 10112 return FALSE;
50b2bdb7
AM
10113}
10114
b34976b6 10115static bfd_boolean
217aa764 10116elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 10117{
80a04378
NC
10118 if (note->descsz <= 0x7c + 31)
10119 return FALSE;
10120
50b2bdb7 10121 /* Signal number at offset 0x08. */
228e534f 10122 elf_tdata (abfd)->core->signal
50b2bdb7
AM
10123 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10124
10125 /* Process ID at offset 0x50. */
228e534f 10126 elf_tdata (abfd)->core->pid
50b2bdb7
AM
10127 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
10128
10129 /* Command name at 0x7c (max 32 bytes, including nul). */
228e534f 10130 elf_tdata (abfd)->core->command
50b2bdb7
AM
10131 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
10132
7720ba9f
MK
10133 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
10134 note);
50b2bdb7
AM
10135}
10136
b34976b6 10137static bfd_boolean
217aa764 10138elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
10139{
10140 int lwp;
10141
10142 if (elfcore_netbsd_get_lwpid (note, &lwp))
228e534f 10143 elf_tdata (abfd)->core->lwpid = lwp;
50b2bdb7 10144
b4db1224 10145 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
10146 {
10147 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
10148 find this note before any of the others, which is fine,
10149 since the kernel writes this note out first when it
10150 creates a core file. */
47d9a591 10151
50b2bdb7
AM
10152 return elfcore_grok_netbsd_procinfo (abfd, note);
10153 }
10154
b4db1224
JT
10155 /* As of Jan 2002 there are no other machine-independent notes
10156 defined for NetBSD core files. If the note type is less
10157 than the start of the machine-dependent note types, we don't
10158 understand it. */
47d9a591 10159
b4db1224 10160 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 10161 return TRUE;
50b2bdb7
AM
10162
10163
10164 switch (bfd_get_arch (abfd))
10165 {
08a40648
AM
10166 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
10167 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
10168
10169 case bfd_arch_alpha:
10170 case bfd_arch_sparc:
10171 switch (note->type)
08a40648
AM
10172 {
10173 case NT_NETBSDCORE_FIRSTMACH+0:
10174 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 10175
08a40648
AM
10176 case NT_NETBSDCORE_FIRSTMACH+2:
10177 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 10178
08a40648
AM
10179 default:
10180 return TRUE;
10181 }
50b2bdb7 10182
08a40648
AM
10183 /* On all other arch's, PT_GETREGS == mach+1 and
10184 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
10185
10186 default:
10187 switch (note->type)
08a40648
AM
10188 {
10189 case NT_NETBSDCORE_FIRSTMACH+1:
10190 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 10191
08a40648
AM
10192 case NT_NETBSDCORE_FIRSTMACH+3:
10193 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 10194
08a40648
AM
10195 default:
10196 return TRUE;
10197 }
50b2bdb7
AM
10198 }
10199 /* NOTREACHED */
10200}
10201
67cc5033
MK
10202static bfd_boolean
10203elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10204{
80a04378
NC
10205 if (note->descsz <= 0x48 + 31)
10206 return FALSE;
10207
67cc5033 10208 /* Signal number at offset 0x08. */
228e534f 10209 elf_tdata (abfd)->core->signal
67cc5033
MK
10210 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10211
10212 /* Process ID at offset 0x20. */
228e534f 10213 elf_tdata (abfd)->core->pid
67cc5033
MK
10214 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
10215
10216 /* Command name at 0x48 (max 32 bytes, including nul). */
228e534f 10217 elf_tdata (abfd)->core->command
67cc5033
MK
10218 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
10219
10220 return TRUE;
10221}
10222
10223static bfd_boolean
10224elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
10225{
10226 if (note->type == NT_OPENBSD_PROCINFO)
10227 return elfcore_grok_openbsd_procinfo (abfd, note);
10228
10229 if (note->type == NT_OPENBSD_REGS)
10230 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10231
10232 if (note->type == NT_OPENBSD_FPREGS)
10233 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10234
10235 if (note->type == NT_OPENBSD_XFPREGS)
10236 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
10237
10238 if (note->type == NT_OPENBSD_AUXV)
10239 {
10240 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
10241 SEC_HAS_CONTENTS);
10242
10243 if (sect == NULL)
10244 return FALSE;
10245 sect->size = note->descsz;
10246 sect->filepos = note->descpos;
10247 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10248
10249 return TRUE;
10250 }
10251
10252 if (note->type == NT_OPENBSD_WCOOKIE)
10253 {
10254 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
10255 SEC_HAS_CONTENTS);
10256
10257 if (sect == NULL)
10258 return FALSE;
10259 sect->size = note->descsz;
10260 sect->filepos = note->descpos;
10261 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10262
10263 return TRUE;
10264 }
10265
10266 return TRUE;
10267}
10268
07c6e936 10269static bfd_boolean
d3fd4074 10270elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
10271{
10272 void *ddata = note->descdata;
10273 char buf[100];
10274 char *name;
10275 asection *sect;
f8843e87
AM
10276 short sig;
10277 unsigned flags;
07c6e936 10278
80a04378
NC
10279 if (note->descsz < 16)
10280 return FALSE;
10281
07c6e936 10282 /* nto_procfs_status 'pid' field is at offset 0. */
228e534f 10283 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
07c6e936 10284
f8843e87
AM
10285 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
10286 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
10287
10288 /* nto_procfs_status 'flags' field is at offset 8. */
10289 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
10290
10291 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
10292 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
10293 {
228e534f
AM
10294 elf_tdata (abfd)->core->signal = sig;
10295 elf_tdata (abfd)->core->lwpid = *tid;
f8843e87 10296 }
07c6e936 10297
f8843e87
AM
10298 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
10299 do not come from signals so we make sure we set the current
10300 thread just in case. */
10301 if (flags & 0x00000080)
228e534f 10302 elf_tdata (abfd)->core->lwpid = *tid;
07c6e936
NC
10303
10304 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 10305 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 10306
a50b1753 10307 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10308 if (name == NULL)
10309 return FALSE;
10310 strcpy (name, buf);
10311
117ed4f8 10312 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10313 if (sect == NULL)
10314 return FALSE;
10315
07d6d2b8
AM
10316 sect->size = note->descsz;
10317 sect->filepos = note->descpos;
07c6e936
NC
10318 sect->alignment_power = 2;
10319
10320 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
10321}
10322
10323static bfd_boolean
d69f560c
KW
10324elfcore_grok_nto_regs (bfd *abfd,
10325 Elf_Internal_Note *note,
d3fd4074 10326 long tid,
d69f560c 10327 char *base)
07c6e936
NC
10328{
10329 char buf[100];
10330 char *name;
10331 asection *sect;
10332
d69f560c 10333 /* Make a "(base)/%d" section. */
d3fd4074 10334 sprintf (buf, "%s/%ld", base, tid);
07c6e936 10335
a50b1753 10336 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10337 if (name == NULL)
10338 return FALSE;
10339 strcpy (name, buf);
10340
117ed4f8 10341 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10342 if (sect == NULL)
10343 return FALSE;
10344
07d6d2b8
AM
10345 sect->size = note->descsz;
10346 sect->filepos = note->descpos;
07c6e936
NC
10347 sect->alignment_power = 2;
10348
f8843e87 10349 /* This is the current thread. */
228e534f 10350 if (elf_tdata (abfd)->core->lwpid == tid)
d69f560c 10351 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
10352
10353 return TRUE;
07c6e936
NC
10354}
10355
10356#define BFD_QNT_CORE_INFO 7
10357#define BFD_QNT_CORE_STATUS 8
10358#define BFD_QNT_CORE_GREG 9
10359#define BFD_QNT_CORE_FPREG 10
10360
10361static bfd_boolean
217aa764 10362elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
10363{
10364 /* Every GREG section has a STATUS section before it. Store the
811072d8 10365 tid from the previous call to pass down to the next gregs
07c6e936 10366 function. */
d3fd4074 10367 static long tid = 1;
07c6e936
NC
10368
10369 switch (note->type)
10370 {
d69f560c
KW
10371 case BFD_QNT_CORE_INFO:
10372 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
10373 case BFD_QNT_CORE_STATUS:
10374 return elfcore_grok_nto_status (abfd, note, &tid);
10375 case BFD_QNT_CORE_GREG:
10376 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
10377 case BFD_QNT_CORE_FPREG:
10378 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
10379 default:
10380 return TRUE;
07c6e936
NC
10381 }
10382}
10383
b15fa79e
AM
10384static bfd_boolean
10385elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
10386{
10387 char *name;
10388 asection *sect;
10389 size_t len;
10390
10391 /* Use note name as section name. */
10392 len = note->namesz;
a50b1753 10393 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
10394 if (name == NULL)
10395 return FALSE;
10396 memcpy (name, note->namedata, len);
10397 name[len - 1] = '\0';
10398
10399 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10400 if (sect == NULL)
10401 return FALSE;
10402
07d6d2b8
AM
10403 sect->size = note->descsz;
10404 sect->filepos = note->descpos;
b15fa79e
AM
10405 sect->alignment_power = 1;
10406
10407 return TRUE;
10408}
10409
7c76fa91
MS
10410/* Function: elfcore_write_note
10411
47d9a591 10412 Inputs:
a39f3346 10413 buffer to hold note, and current size of buffer
7c76fa91
MS
10414 name of note
10415 type of note
10416 data for note
10417 size of data for note
10418
a39f3346
AM
10419 Writes note to end of buffer. ELF64 notes are written exactly as
10420 for ELF32, despite the current (as of 2006) ELF gabi specifying
10421 that they ought to have 8-byte namesz and descsz field, and have
10422 8-byte alignment. Other writers, eg. Linux kernel, do the same.
10423
7c76fa91 10424 Return:
a39f3346 10425 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
10426
10427char *
a39f3346 10428elfcore_write_note (bfd *abfd,
217aa764 10429 char *buf,
a39f3346 10430 int *bufsiz,
217aa764 10431 const char *name,
a39f3346 10432 int type,
217aa764 10433 const void *input,
a39f3346 10434 int size)
7c76fa91
MS
10435{
10436 Elf_External_Note *xnp;
d4c88bbb 10437 size_t namesz;
d4c88bbb 10438 size_t newspace;
a39f3346 10439 char *dest;
7c76fa91 10440
d4c88bbb 10441 namesz = 0;
d4c88bbb 10442 if (name != NULL)
a39f3346 10443 namesz = strlen (name) + 1;
d4c88bbb 10444
a39f3346 10445 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 10446
a50b1753 10447 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
10448 if (buf == NULL)
10449 return buf;
a39f3346 10450 dest = buf + *bufsiz;
7c76fa91
MS
10451 *bufsiz += newspace;
10452 xnp = (Elf_External_Note *) dest;
10453 H_PUT_32 (abfd, namesz, xnp->namesz);
10454 H_PUT_32 (abfd, size, xnp->descsz);
10455 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
10456 dest = xnp->name;
10457 if (name != NULL)
10458 {
10459 memcpy (dest, name, namesz);
10460 dest += namesz;
a39f3346 10461 while (namesz & 3)
d4c88bbb
AM
10462 {
10463 *dest++ = '\0';
a39f3346 10464 ++namesz;
d4c88bbb
AM
10465 }
10466 }
10467 memcpy (dest, input, size);
a39f3346
AM
10468 dest += size;
10469 while (size & 3)
10470 {
10471 *dest++ = '\0';
10472 ++size;
10473 }
10474 return buf;
7c76fa91
MS
10475}
10476
7c76fa91 10477char *
217aa764
AM
10478elfcore_write_prpsinfo (bfd *abfd,
10479 char *buf,
10480 int *bufsiz,
10481 const char *fname,
10482 const char *psargs)
7c76fa91 10483{
183e98be
AM
10484 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10485
10486 if (bed->elf_backend_write_core_note != NULL)
10487 {
10488 char *ret;
10489 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
10490 NT_PRPSINFO, fname, psargs);
10491 if (ret != NULL)
10492 return ret;
10493 }
7c76fa91 10494
1f20dca5 10495#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
183e98be
AM
10496#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
10497 if (bed->s->elfclass == ELFCLASS32)
10498 {
10499#if defined (HAVE_PSINFO32_T)
10500 psinfo32_t data;
10501 int note_type = NT_PSINFO;
10502#else
10503 prpsinfo32_t data;
10504 int note_type = NT_PRPSINFO;
10505#endif
10506
10507 memset (&data, 0, sizeof (data));
10508 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
10509 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
10510 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 10511 "CORE", note_type, &data, sizeof (data));
183e98be
AM
10512 }
10513 else
10514#endif
10515 {
7c76fa91 10516#if defined (HAVE_PSINFO_T)
183e98be
AM
10517 psinfo_t data;
10518 int note_type = NT_PSINFO;
7c76fa91 10519#else
183e98be
AM
10520 prpsinfo_t data;
10521 int note_type = NT_PRPSINFO;
7c76fa91
MS
10522#endif
10523
183e98be
AM
10524 memset (&data, 0, sizeof (data));
10525 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
10526 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
10527 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 10528 "CORE", note_type, &data, sizeof (data));
183e98be 10529 }
7c76fa91
MS
10530#endif /* PSINFO_T or PRPSINFO_T */
10531
1f20dca5
UW
10532 free (buf);
10533 return NULL;
10534}
10535
70a38d42
SDJ
10536char *
10537elfcore_write_linux_prpsinfo32
10538 (bfd *abfd, char *buf, int *bufsiz,
10539 const struct elf_internal_linux_prpsinfo *prpsinfo)
10540{
a2f63b2e
MR
10541 if (get_elf_backend_data (abfd)->linux_prpsinfo32_ugid16)
10542 {
10543 struct elf_external_linux_prpsinfo32_ugid16 data;
10544
10545 swap_linux_prpsinfo32_ugid16_out (abfd, prpsinfo, &data);
10546 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
10547 &data, sizeof (data));
10548 }
10549 else
10550 {
10551 struct elf_external_linux_prpsinfo32_ugid32 data;
70a38d42 10552
a2f63b2e
MR
10553 swap_linux_prpsinfo32_ugid32_out (abfd, prpsinfo, &data);
10554 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
10555 &data, sizeof (data));
10556 }
70a38d42
SDJ
10557}
10558
10559char *
10560elfcore_write_linux_prpsinfo64
10561 (bfd *abfd, char *buf, int *bufsiz,
10562 const struct elf_internal_linux_prpsinfo *prpsinfo)
10563{
3c9a7b0d
MR
10564 if (get_elf_backend_data (abfd)->linux_prpsinfo64_ugid16)
10565 {
10566 struct elf_external_linux_prpsinfo64_ugid16 data;
10567
10568 swap_linux_prpsinfo64_ugid16_out (abfd, prpsinfo, &data);
10569 return elfcore_write_note (abfd, buf, bufsiz,
10570 "CORE", NT_PRPSINFO, &data, sizeof (data));
10571 }
10572 else
10573 {
10574 struct elf_external_linux_prpsinfo64_ugid32 data;
70a38d42 10575
3c9a7b0d
MR
10576 swap_linux_prpsinfo64_ugid32_out (abfd, prpsinfo, &data);
10577 return elfcore_write_note (abfd, buf, bufsiz,
10578 "CORE", NT_PRPSINFO, &data, sizeof (data));
10579 }
70a38d42
SDJ
10580}
10581
7c76fa91 10582char *
217aa764
AM
10583elfcore_write_prstatus (bfd *abfd,
10584 char *buf,
10585 int *bufsiz,
10586 long pid,
10587 int cursig,
10588 const void *gregs)
7c76fa91 10589{
183e98be 10590 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 10591
183e98be
AM
10592 if (bed->elf_backend_write_core_note != NULL)
10593 {
10594 char *ret;
10595 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
10596 NT_PRSTATUS,
10597 pid, cursig, gregs);
10598 if (ret != NULL)
10599 return ret;
10600 }
10601
1f20dca5 10602#if defined (HAVE_PRSTATUS_T)
183e98be
AM
10603#if defined (HAVE_PRSTATUS32_T)
10604 if (bed->s->elfclass == ELFCLASS32)
10605 {
10606 prstatus32_t prstat;
10607
10608 memset (&prstat, 0, sizeof (prstat));
10609 prstat.pr_pid = pid;
10610 prstat.pr_cursig = cursig;
10611 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 10612 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
10613 NT_PRSTATUS, &prstat, sizeof (prstat));
10614 }
10615 else
10616#endif
10617 {
10618 prstatus_t prstat;
10619
10620 memset (&prstat, 0, sizeof (prstat));
10621 prstat.pr_pid = pid;
10622 prstat.pr_cursig = cursig;
10623 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 10624 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
10625 NT_PRSTATUS, &prstat, sizeof (prstat));
10626 }
7c76fa91
MS
10627#endif /* HAVE_PRSTATUS_T */
10628
1f20dca5
UW
10629 free (buf);
10630 return NULL;
10631}
10632
51316059
MS
10633#if defined (HAVE_LWPSTATUS_T)
10634char *
217aa764
AM
10635elfcore_write_lwpstatus (bfd *abfd,
10636 char *buf,
10637 int *bufsiz,
10638 long pid,
10639 int cursig,
10640 const void *gregs)
51316059
MS
10641{
10642 lwpstatus_t lwpstat;
183e98be 10643 const char *note_name = "CORE";
51316059
MS
10644
10645 memset (&lwpstat, 0, sizeof (lwpstat));
10646 lwpstat.pr_lwpid = pid >> 16;
10647 lwpstat.pr_cursig = cursig;
10648#if defined (HAVE_LWPSTATUS_T_PR_REG)
d1e8523e 10649 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
51316059
MS
10650#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10651#if !defined(gregs)
10652 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
10653 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
10654#else
10655 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
10656 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
10657#endif
10658#endif
47d9a591 10659 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
10660 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
10661}
10662#endif /* HAVE_LWPSTATUS_T */
10663
7c76fa91
MS
10664#if defined (HAVE_PSTATUS_T)
10665char *
217aa764
AM
10666elfcore_write_pstatus (bfd *abfd,
10667 char *buf,
10668 int *bufsiz,
10669 long pid,
6c10990d
NC
10670 int cursig ATTRIBUTE_UNUSED,
10671 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 10672{
183e98be
AM
10673 const char *note_name = "CORE";
10674#if defined (HAVE_PSTATUS32_T)
10675 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 10676
183e98be
AM
10677 if (bed->s->elfclass == ELFCLASS32)
10678 {
10679 pstatus32_t pstat;
10680
10681 memset (&pstat, 0, sizeof (pstat));
10682 pstat.pr_pid = pid & 0xffff;
10683 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
10684 NT_PSTATUS, &pstat, sizeof (pstat));
10685 return buf;
10686 }
10687 else
10688#endif
10689 {
10690 pstatus_t pstat;
10691
10692 memset (&pstat, 0, sizeof (pstat));
10693 pstat.pr_pid = pid & 0xffff;
10694 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
10695 NT_PSTATUS, &pstat, sizeof (pstat));
10696 return buf;
10697 }
7c76fa91
MS
10698}
10699#endif /* HAVE_PSTATUS_T */
10700
10701char *
217aa764
AM
10702elfcore_write_prfpreg (bfd *abfd,
10703 char *buf,
10704 int *bufsiz,
10705 const void *fpregs,
10706 int size)
7c76fa91 10707{
183e98be 10708 const char *note_name = "CORE";
47d9a591 10709 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
10710 note_name, NT_FPREGSET, fpregs, size);
10711}
10712
10713char *
217aa764
AM
10714elfcore_write_prxfpreg (bfd *abfd,
10715 char *buf,
10716 int *bufsiz,
10717 const void *xfpregs,
10718 int size)
7c76fa91
MS
10719{
10720 char *note_name = "LINUX";
47d9a591 10721 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
10722 note_name, NT_PRXFPREG, xfpregs, size);
10723}
10724
4339cae0
L
10725char *
10726elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
10727 const void *xfpregs, int size)
10728{
97de3545
JB
10729 char *note_name;
10730 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
10731 note_name = "FreeBSD";
10732 else
10733 note_name = "LINUX";
4339cae0
L
10734 return elfcore_write_note (abfd, buf, bufsiz,
10735 note_name, NT_X86_XSTATE, xfpregs, size);
10736}
10737
97753bd5
AM
10738char *
10739elfcore_write_ppc_vmx (bfd *abfd,
10740 char *buf,
10741 int *bufsiz,
10742 const void *ppc_vmx,
10743 int size)
10744{
10745 char *note_name = "LINUX";
10746 return elfcore_write_note (abfd, buf, bufsiz,
10747 note_name, NT_PPC_VMX, ppc_vmx, size);
10748}
10749
89eeb0bc
LM
10750char *
10751elfcore_write_ppc_vsx (bfd *abfd,
07d6d2b8
AM
10752 char *buf,
10753 int *bufsiz,
10754 const void *ppc_vsx,
10755 int size)
89eeb0bc
LM
10756{
10757 char *note_name = "LINUX";
10758 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 10759 note_name, NT_PPC_VSX, ppc_vsx, size);
89eeb0bc
LM
10760}
10761
0675e188
UW
10762static char *
10763elfcore_write_s390_high_gprs (bfd *abfd,
10764 char *buf,
10765 int *bufsiz,
10766 const void *s390_high_gprs,
10767 int size)
10768{
10769 char *note_name = "LINUX";
10770 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 10771 note_name, NT_S390_HIGH_GPRS,
0675e188
UW
10772 s390_high_gprs, size);
10773}
10774
d7eeb400
MS
10775char *
10776elfcore_write_s390_timer (bfd *abfd,
07d6d2b8
AM
10777 char *buf,
10778 int *bufsiz,
10779 const void *s390_timer,
10780 int size)
d7eeb400
MS
10781{
10782 char *note_name = "LINUX";
10783 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 10784 note_name, NT_S390_TIMER, s390_timer, size);
d7eeb400
MS
10785}
10786
10787char *
10788elfcore_write_s390_todcmp (bfd *abfd,
07d6d2b8
AM
10789 char *buf,
10790 int *bufsiz,
10791 const void *s390_todcmp,
10792 int size)
d7eeb400
MS
10793{
10794 char *note_name = "LINUX";
10795 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 10796 note_name, NT_S390_TODCMP, s390_todcmp, size);
d7eeb400
MS
10797}
10798
10799char *
10800elfcore_write_s390_todpreg (bfd *abfd,
07d6d2b8
AM
10801 char *buf,
10802 int *bufsiz,
10803 const void *s390_todpreg,
10804 int size)
d7eeb400
MS
10805{
10806 char *note_name = "LINUX";
10807 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 10808 note_name, NT_S390_TODPREG, s390_todpreg, size);
d7eeb400
MS
10809}
10810
10811char *
10812elfcore_write_s390_ctrs (bfd *abfd,
07d6d2b8
AM
10813 char *buf,
10814 int *bufsiz,
10815 const void *s390_ctrs,
10816 int size)
d7eeb400
MS
10817{
10818 char *note_name = "LINUX";
10819 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 10820 note_name, NT_S390_CTRS, s390_ctrs, size);
d7eeb400
MS
10821}
10822
10823char *
10824elfcore_write_s390_prefix (bfd *abfd,
07d6d2b8
AM
10825 char *buf,
10826 int *bufsiz,
10827 const void *s390_prefix,
10828 int size)
d7eeb400
MS
10829{
10830 char *note_name = "LINUX";
10831 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 10832 note_name, NT_S390_PREFIX, s390_prefix, size);
d7eeb400
MS
10833}
10834
355b81d9
UW
10835char *
10836elfcore_write_s390_last_break (bfd *abfd,
10837 char *buf,
10838 int *bufsiz,
10839 const void *s390_last_break,
10840 int size)
10841{
10842 char *note_name = "LINUX";
10843 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 10844 note_name, NT_S390_LAST_BREAK,
355b81d9
UW
10845 s390_last_break, size);
10846}
10847
10848char *
10849elfcore_write_s390_system_call (bfd *abfd,
10850 char *buf,
10851 int *bufsiz,
10852 const void *s390_system_call,
10853 int size)
10854{
10855 char *note_name = "LINUX";
10856 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 10857 note_name, NT_S390_SYSTEM_CALL,
355b81d9
UW
10858 s390_system_call, size);
10859}
10860
abb3f6cc
NC
10861char *
10862elfcore_write_s390_tdb (bfd *abfd,
10863 char *buf,
10864 int *bufsiz,
10865 const void *s390_tdb,
10866 int size)
10867{
10868 char *note_name = "LINUX";
10869 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 10870 note_name, NT_S390_TDB, s390_tdb, size);
abb3f6cc
NC
10871}
10872
4ef9f41a
AA
10873char *
10874elfcore_write_s390_vxrs_low (bfd *abfd,
10875 char *buf,
10876 int *bufsiz,
10877 const void *s390_vxrs_low,
10878 int size)
10879{
10880 char *note_name = "LINUX";
10881 return elfcore_write_note (abfd, buf, bufsiz,
10882 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
10883}
10884
10885char *
10886elfcore_write_s390_vxrs_high (bfd *abfd,
10887 char *buf,
10888 int *bufsiz,
10889 const void *s390_vxrs_high,
10890 int size)
10891{
10892 char *note_name = "LINUX";
10893 return elfcore_write_note (abfd, buf, bufsiz,
10894 note_name, NT_S390_VXRS_HIGH,
10895 s390_vxrs_high, size);
10896}
10897
88ab90e8
AA
10898char *
10899elfcore_write_s390_gs_cb (bfd *abfd,
10900 char *buf,
10901 int *bufsiz,
10902 const void *s390_gs_cb,
10903 int size)
10904{
10905 char *note_name = "LINUX";
10906 return elfcore_write_note (abfd, buf, bufsiz,
10907 note_name, NT_S390_GS_CB,
10908 s390_gs_cb, size);
10909}
10910
10911char *
10912elfcore_write_s390_gs_bc (bfd *abfd,
10913 char *buf,
10914 int *bufsiz,
10915 const void *s390_gs_bc,
10916 int size)
10917{
10918 char *note_name = "LINUX";
10919 return elfcore_write_note (abfd, buf, bufsiz,
10920 note_name, NT_S390_GS_BC,
10921 s390_gs_bc, size);
10922}
10923
faa9a424
UW
10924char *
10925elfcore_write_arm_vfp (bfd *abfd,
10926 char *buf,
10927 int *bufsiz,
10928 const void *arm_vfp,
10929 int size)
10930{
10931 char *note_name = "LINUX";
10932 return elfcore_write_note (abfd, buf, bufsiz,
10933 note_name, NT_ARM_VFP, arm_vfp, size);
10934}
10935
652451f8
YZ
10936char *
10937elfcore_write_aarch_tls (bfd *abfd,
10938 char *buf,
10939 int *bufsiz,
10940 const void *aarch_tls,
10941 int size)
10942{
10943 char *note_name = "LINUX";
10944 return elfcore_write_note (abfd, buf, bufsiz,
10945 note_name, NT_ARM_TLS, aarch_tls, size);
10946}
10947
10948char *
10949elfcore_write_aarch_hw_break (bfd *abfd,
10950 char *buf,
10951 int *bufsiz,
10952 const void *aarch_hw_break,
10953 int size)
10954{
10955 char *note_name = "LINUX";
10956 return elfcore_write_note (abfd, buf, bufsiz,
10957 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
10958}
10959
10960char *
10961elfcore_write_aarch_hw_watch (bfd *abfd,
10962 char *buf,
10963 int *bufsiz,
10964 const void *aarch_hw_watch,
10965 int size)
10966{
10967 char *note_name = "LINUX";
10968 return elfcore_write_note (abfd, buf, bufsiz,
10969 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
10970}
10971
bb864ac1
CES
10972char *
10973elfcore_write_register_note (bfd *abfd,
10974 char *buf,
10975 int *bufsiz,
10976 const char *section,
10977 const void *data,
10978 int size)
10979{
10980 if (strcmp (section, ".reg2") == 0)
10981 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
10982 if (strcmp (section, ".reg-xfp") == 0)
10983 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
10984 if (strcmp (section, ".reg-xstate") == 0)
10985 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
10986 if (strcmp (section, ".reg-ppc-vmx") == 0)
10987 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
10988 if (strcmp (section, ".reg-ppc-vsx") == 0)
10989 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
10990 if (strcmp (section, ".reg-s390-high-gprs") == 0)
10991 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
10992 if (strcmp (section, ".reg-s390-timer") == 0)
10993 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
10994 if (strcmp (section, ".reg-s390-todcmp") == 0)
10995 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
10996 if (strcmp (section, ".reg-s390-todpreg") == 0)
10997 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
10998 if (strcmp (section, ".reg-s390-ctrs") == 0)
10999 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
11000 if (strcmp (section, ".reg-s390-prefix") == 0)
11001 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
355b81d9
UW
11002 if (strcmp (section, ".reg-s390-last-break") == 0)
11003 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
11004 if (strcmp (section, ".reg-s390-system-call") == 0)
11005 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
abb3f6cc
NC
11006 if (strcmp (section, ".reg-s390-tdb") == 0)
11007 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
4ef9f41a
AA
11008 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
11009 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
11010 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
11011 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
88ab90e8
AA
11012 if (strcmp (section, ".reg-s390-gs-cb") == 0)
11013 return elfcore_write_s390_gs_cb (abfd, buf, bufsiz, data, size);
11014 if (strcmp (section, ".reg-s390-gs-bc") == 0)
11015 return elfcore_write_s390_gs_bc (abfd, buf, bufsiz, data, size);
faa9a424
UW
11016 if (strcmp (section, ".reg-arm-vfp") == 0)
11017 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
652451f8
YZ
11018 if (strcmp (section, ".reg-aarch-tls") == 0)
11019 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
11020 if (strcmp (section, ".reg-aarch-hw-break") == 0)
11021 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
11022 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
11023 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
bb864ac1
CES
11024 return NULL;
11025}
11026
b34976b6 11027static bfd_boolean
276da9b3
L
11028elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset,
11029 size_t align)
252b5132 11030{
c044fabd 11031 char *p;
252b5132 11032
276da9b3
L
11033 /* NB: CORE PT_NOTE segments may have p_align values of 0 or 1.
11034 gABI specifies that PT_NOTE alignment should be aligned to 4
11035 bytes for 32-bit objects and to 8 bytes for 64-bit objects. If
11036 align is less than 4, we use 4 byte alignment. */
11037 if (align < 4)
11038 align = 4;
ef135d43
NC
11039 if (align != 4 && align != 8)
11040 return FALSE;
276da9b3 11041
252b5132
RH
11042 p = buf;
11043 while (p < buf + size)
11044 {
c044fabd 11045 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
11046 Elf_Internal_Note in;
11047
baea7ef1
AM
11048 if (offsetof (Elf_External_Note, name) > buf - p + size)
11049 return FALSE;
11050
dc810e39 11051 in.type = H_GET_32 (abfd, xnp->type);
252b5132 11052
dc810e39 11053 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 11054 in.namedata = xnp->name;
baea7ef1
AM
11055 if (in.namesz > buf - in.namedata + size)
11056 return FALSE;
252b5132 11057
dc810e39 11058 in.descsz = H_GET_32 (abfd, xnp->descsz);
276da9b3 11059 in.descdata = p + ELF_NOTE_DESC_OFFSET (in.namesz, align);
252b5132 11060 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
11061 if (in.descsz != 0
11062 && (in.descdata >= buf + size
11063 || in.descsz > buf - in.descdata + size))
11064 return FALSE;
252b5132 11065
718175fa 11066 switch (bfd_get_format (abfd))
07d6d2b8 11067 {
718175fa
JK
11068 default:
11069 return TRUE;
11070
11071 case bfd_core:
f64e188b 11072 {
8acbedd6 11073#define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
f64e188b 11074 struct
718175fa 11075 {
f64e188b 11076 const char * string;
8acbedd6 11077 size_t len;
f64e188b 11078 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
718175fa 11079 }
f64e188b 11080 grokers[] =
b15fa79e 11081 {
8acbedd6 11082 GROKER_ELEMENT ("", elfcore_grok_note),
aa1ed4a9 11083 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
8acbedd6
KS
11084 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
11085 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
11086 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
11087 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note)
f64e188b 11088 };
8acbedd6 11089#undef GROKER_ELEMENT
f64e188b
NC
11090 int i;
11091
11092 for (i = ARRAY_SIZE (grokers); i--;)
8acbedd6
KS
11093 {
11094 if (in.namesz >= grokers[i].len
11095 && strncmp (in.namedata, grokers[i].string,
11096 grokers[i].len) == 0)
11097 {
11098 if (! grokers[i].func (abfd, & in))
11099 return FALSE;
11100 break;
11101 }
11102 }
f64e188b
NC
11103 break;
11104 }
718175fa
JK
11105
11106 case bfd_object:
11107 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
11108 {
11109 if (! elfobj_grok_gnu_note (abfd, &in))
11110 return FALSE;
11111 }
e21e5835
NC
11112 else if (in.namesz == sizeof "stapsdt"
11113 && strcmp (in.namedata, "stapsdt") == 0)
11114 {
11115 if (! elfobj_grok_stapsdt_note (abfd, &in))
11116 return FALSE;
11117 }
718175fa 11118 break;
08a40648 11119 }
252b5132 11120
276da9b3 11121 p += ELF_NOTE_NEXT_OFFSET (in.namesz, in.descsz, align);
252b5132
RH
11122 }
11123
718175fa
JK
11124 return TRUE;
11125}
11126
11127static bfd_boolean
276da9b3
L
11128elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size,
11129 size_t align)
718175fa
JK
11130{
11131 char *buf;
11132
957e1fc1 11133 if (size == 0 || (size + 1) == 0)
718175fa
JK
11134 return TRUE;
11135
11136 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
11137 return FALSE;
11138
f64e188b 11139 buf = (char *) bfd_malloc (size + 1);
718175fa
JK
11140 if (buf == NULL)
11141 return FALSE;
11142
f64e188b
NC
11143 /* PR 17512: file: ec08f814
11144 0-termintate the buffer so that string searches will not overflow. */
11145 buf[size] = 0;
11146
718175fa 11147 if (bfd_bread (buf, size, abfd) != size
276da9b3 11148 || !elf_parse_notes (abfd, buf, size, offset, align))
718175fa
JK
11149 {
11150 free (buf);
11151 return FALSE;
11152 }
11153
252b5132 11154 free (buf);
b34976b6 11155 return TRUE;
252b5132 11156}
98d8431c
JB
11157\f
11158/* Providing external access to the ELF program header table. */
11159
11160/* Return an upper bound on the number of bytes required to store a
11161 copy of ABFD's program header table entries. Return -1 if an error
11162 occurs; bfd_get_error will return an appropriate code. */
c044fabd 11163
98d8431c 11164long
217aa764 11165bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
11166{
11167 if (abfd->xvec->flavour != bfd_target_elf_flavour)
11168 {
11169 bfd_set_error (bfd_error_wrong_format);
11170 return -1;
11171 }
11172
936e320b 11173 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
11174}
11175
98d8431c
JB
11176/* Copy ABFD's program header table entries to *PHDRS. The entries
11177 will be stored as an array of Elf_Internal_Phdr structures, as
11178 defined in include/elf/internal.h. To find out how large the
11179 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
11180
11181 Return the number of program header table entries read, or -1 if an
11182 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 11183
98d8431c 11184int
217aa764 11185bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
11186{
11187 int num_phdrs;
11188
11189 if (abfd->xvec->flavour != bfd_target_elf_flavour)
11190 {
11191 bfd_set_error (bfd_error_wrong_format);
11192 return -1;
11193 }
11194
11195 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 11196 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
11197 num_phdrs * sizeof (Elf_Internal_Phdr));
11198
11199 return num_phdrs;
11200}
ae4221d7 11201
db6751f2 11202enum elf_reloc_type_class
7e612e98
AM
11203_bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
11204 const asection *rel_sec ATTRIBUTE_UNUSED,
11205 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
11206{
11207 return reloc_class_normal;
11208}
f8df10f4 11209
47d9a591 11210/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
11211 relocation against a local symbol. */
11212
11213bfd_vma
217aa764
AM
11214_bfd_elf_rela_local_sym (bfd *abfd,
11215 Elf_Internal_Sym *sym,
8517fae7 11216 asection **psec,
217aa764 11217 Elf_Internal_Rela *rel)
f8df10f4 11218{
8517fae7 11219 asection *sec = *psec;
f8df10f4
JJ
11220 bfd_vma relocation;
11221
11222 relocation = (sec->output_section->vma
11223 + sec->output_offset
11224 + sym->st_value);
11225 if ((sec->flags & SEC_MERGE)
c629eae0 11226 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 11227 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
f8df10f4 11228 {
f8df10f4 11229 rel->r_addend =
8517fae7 11230 _bfd_merged_section_offset (abfd, psec,
65765700 11231 elf_section_data (sec)->sec_info,
753731ee
AM
11232 sym->st_value + rel->r_addend);
11233 if (sec != *psec)
11234 {
11235 /* If we have changed the section, and our original section is
11236 marked with SEC_EXCLUDE, it means that the original
11237 SEC_MERGE section has been completely subsumed in some
11238 other SEC_MERGE section. In this case, we need to leave
11239 some info around for --emit-relocs. */
11240 if ((sec->flags & SEC_EXCLUDE) != 0)
11241 sec->kept_section = *psec;
11242 sec = *psec;
11243 }
8517fae7
AM
11244 rel->r_addend -= relocation;
11245 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
11246 }
11247 return relocation;
11248}
c629eae0
JJ
11249
11250bfd_vma
217aa764
AM
11251_bfd_elf_rel_local_sym (bfd *abfd,
11252 Elf_Internal_Sym *sym,
11253 asection **psec,
11254 bfd_vma addend)
47d9a591 11255{
c629eae0
JJ
11256 asection *sec = *psec;
11257
dbaa2011 11258 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
c629eae0
JJ
11259 return sym->st_value + addend;
11260
11261 return _bfd_merged_section_offset (abfd, psec,
65765700 11262 elf_section_data (sec)->sec_info,
753731ee 11263 sym->st_value + addend);
c629eae0
JJ
11264}
11265
37b01f6a
DG
11266/* Adjust an address within a section. Given OFFSET within SEC, return
11267 the new offset within the section, based upon changes made to the
11268 section. Returns -1 if the offset is now invalid.
11269 The offset (in abnd out) is in target sized bytes, however big a
11270 byte may be. */
11271
c629eae0 11272bfd_vma
217aa764 11273_bfd_elf_section_offset (bfd *abfd,
92e4ec35 11274 struct bfd_link_info *info,
217aa764
AM
11275 asection *sec,
11276 bfd_vma offset)
c629eae0 11277{
68bfbfcc 11278 switch (sec->sec_info_type)
65765700 11279 {
dbaa2011 11280 case SEC_INFO_TYPE_STABS:
eea6121a
AM
11281 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
11282 offset);
dbaa2011 11283 case SEC_INFO_TYPE_EH_FRAME:
92e4ec35 11284 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
37b01f6a 11285
65765700 11286 default:
310fd250
L
11287 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
11288 {
37b01f6a 11289 /* Reverse the offset. */
310fd250
L
11290 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11291 bfd_size_type address_size = bed->s->arch_size / 8;
37b01f6a
DG
11292
11293 /* address_size and sec->size are in octets. Convert
11294 to bytes before subtracting the original offset. */
11295 offset = (sec->size - address_size) / bfd_octets_per_byte (abfd) - offset;
310fd250 11296 }
65765700
JJ
11297 return offset;
11298 }
c629eae0 11299}
3333a7c3
RM
11300\f
11301/* Create a new BFD as if by bfd_openr. Rather than opening a file,
11302 reconstruct an ELF file by reading the segments out of remote memory
11303 based on the ELF file header at EHDR_VMA and the ELF program headers it
11304 points to. If not null, *LOADBASEP is filled in with the difference
11305 between the VMAs from which the segments were read, and the VMAs the
11306 file headers (and hence BFD's idea of each section's VMA) put them at.
11307
11308 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
11309 remote memory at target address VMA into the local buffer at MYADDR; it
11310 should return zero on success or an `errno' code on failure. TEMPL must
11311 be a BFD for an ELF target with the word size and byte order found in
11312 the remote memory. */
11313
11314bfd *
217aa764
AM
11315bfd_elf_bfd_from_remote_memory
11316 (bfd *templ,
11317 bfd_vma ehdr_vma,
f0a5d95a 11318 bfd_size_type size,
217aa764 11319 bfd_vma *loadbasep,
fe78531d 11320 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
3333a7c3
RM
11321{
11322 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
5979d6b6 11323 (templ, ehdr_vma, size, loadbasep, target_read_memory);
3333a7c3 11324}
4c45e5c9
JJ
11325\f
11326long
c9727e01
AM
11327_bfd_elf_get_synthetic_symtab (bfd *abfd,
11328 long symcount ATTRIBUTE_UNUSED,
11329 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 11330 long dynsymcount,
c9727e01
AM
11331 asymbol **dynsyms,
11332 asymbol **ret)
4c45e5c9
JJ
11333{
11334 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11335 asection *relplt;
11336 asymbol *s;
11337 const char *relplt_name;
11338 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
11339 arelent *p;
11340 long count, i, n;
11341 size_t size;
11342 Elf_Internal_Shdr *hdr;
11343 char *names;
11344 asection *plt;
11345
8615f3f2
AM
11346 *ret = NULL;
11347
90e3cdf2
JJ
11348 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
11349 return 0;
11350
8615f3f2
AM
11351 if (dynsymcount <= 0)
11352 return 0;
11353
4c45e5c9
JJ
11354 if (!bed->plt_sym_val)
11355 return 0;
11356
11357 relplt_name = bed->relplt_name;
11358 if (relplt_name == NULL)
d35fd659 11359 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
11360 relplt = bfd_get_section_by_name (abfd, relplt_name);
11361 if (relplt == NULL)
11362 return 0;
11363
11364 hdr = &elf_section_data (relplt)->this_hdr;
11365 if (hdr->sh_link != elf_dynsymtab (abfd)
11366 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
11367 return 0;
11368
11369 plt = bfd_get_section_by_name (abfd, ".plt");
11370 if (plt == NULL)
11371 return 0;
11372
11373 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 11374 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
11375 return -1;
11376
eea6121a 11377 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
11378 size = count * sizeof (asymbol);
11379 p = relplt->relocation;
cb53bf42 11380 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
11381 {
11382 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
11383 if (p->addend != 0)
11384 {
11385#ifdef BFD64
11386 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
11387#else
11388 size += sizeof ("+0x") - 1 + 8;
11389#endif
11390 }
11391 }
4c45e5c9 11392
a50b1753 11393 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
11394 if (s == NULL)
11395 return -1;
11396
11397 names = (char *) (s + count);
11398 p = relplt->relocation;
11399 n = 0;
cb53bf42 11400 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
11401 {
11402 size_t len;
11403 bfd_vma addr;
11404
11405 addr = bed->plt_sym_val (i, plt, p);
11406 if (addr == (bfd_vma) -1)
11407 continue;
11408
11409 *s = **p->sym_ptr_ptr;
65a7a66f
AM
11410 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
11411 we are defining a symbol, ensure one of them is set. */
11412 if ((s->flags & BSF_LOCAL) == 0)
11413 s->flags |= BSF_GLOBAL;
6ba2a415 11414 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
11415 s->section = plt;
11416 s->value = addr - plt->vma;
11417 s->name = names;
8f39ba8e 11418 s->udata.p = NULL;
4c45e5c9
JJ
11419 len = strlen ((*p->sym_ptr_ptr)->name);
11420 memcpy (names, (*p->sym_ptr_ptr)->name, len);
11421 names += len;
041de40d
AM
11422 if (p->addend != 0)
11423 {
1d770845 11424 char buf[30], *a;
d324f6d6 11425
041de40d
AM
11426 memcpy (names, "+0x", sizeof ("+0x") - 1);
11427 names += sizeof ("+0x") - 1;
1d770845
L
11428 bfd_sprintf_vma (abfd, buf, p->addend);
11429 for (a = buf; *a == '0'; ++a)
11430 ;
11431 len = strlen (a);
11432 memcpy (names, a, len);
11433 names += len;
041de40d 11434 }
4c45e5c9
JJ
11435 memcpy (names, "@plt", sizeof ("@plt"));
11436 names += sizeof ("@plt");
8f39ba8e 11437 ++s, ++n;
4c45e5c9
JJ
11438 }
11439
11440 return n;
11441}
3d7f7666 11442
821e6ff6
AM
11443/* It is only used by x86-64 so far.
11444 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
7eacd66b
AM
11445 but current usage would allow all of _bfd_std_section to be zero. */
11446static const asymbol lcomm_sym
11447 = GLOBAL_SYM_INIT ("LARGE_COMMON", &_bfd_elf_large_com_section);
3b22753a 11448asection _bfd_elf_large_com_section
7eacd66b 11449 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, &lcomm_sym,
821e6ff6 11450 "LARGE_COMMON", 0, SEC_IS_COMMON);
ecca9871 11451
d1036acb 11452void
78245035
L
11453_bfd_elf_post_process_headers (bfd * abfd,
11454 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
d1036acb
L
11455{
11456 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
11457
11458 i_ehdrp = elf_elfheader (abfd);
11459
11460 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
11461
11462 /* To make things simpler for the loader on Linux systems we set the
9c55345c 11463 osabi field to ELFOSABI_GNU if the binary contains symbols of
f64b2e8d 11464 the STT_GNU_IFUNC type or STB_GNU_UNIQUE binding. */
d8045f23 11465 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
f64b2e8d 11466 && elf_tdata (abfd)->has_gnu_symbols)
9c55345c 11467 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
d1036acb 11468}
fcb93ecf
PB
11469
11470
11471/* Return TRUE for ELF symbol types that represent functions.
11472 This is the default version of this function, which is sufficient for
d8045f23 11473 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
11474
11475bfd_boolean
11476_bfd_elf_is_function_type (unsigned int type)
11477{
d8045f23
NC
11478 return (type == STT_FUNC
11479 || type == STT_GNU_IFUNC);
fcb93ecf 11480}
9f296da3 11481
aef36ac1
AM
11482/* If the ELF symbol SYM might be a function in SEC, return the
11483 function size and set *CODE_OFF to the function's entry point,
11484 otherwise return zero. */
9f296da3 11485
aef36ac1
AM
11486bfd_size_type
11487_bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
11488 bfd_vma *code_off)
9f296da3 11489{
aef36ac1
AM
11490 bfd_size_type size;
11491
ff9e0f5b 11492 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
aef36ac1
AM
11493 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
11494 || sym->section != sec)
11495 return 0;
ff9e0f5b 11496
ff9e0f5b 11497 *code_off = sym->value;
aef36ac1
AM
11498 size = 0;
11499 if (!(sym->flags & BSF_SYNTHETIC))
11500 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
11501 if (size == 0)
11502 size = 1;
11503 return size;
9f296da3 11504}
This page took 1.986645 seconds and 4 git commands to generate.