Re: bfd_cleanup for object_p
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91 2
b3adc24a 3 Copyright (C) 1993-2020 Free Software Foundation, Inc.
252b5132 4
5e8d7549 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
5e8d7549
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
5e8d7549 10 (at your option) any later version.
252b5132 11
5e8d7549
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
5e8d7549 17 You should have received a copy of the GNU General Public License
b34976b6 18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132 22
1b74d094
BW
23/*
24SECTION
252b5132
RH
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
661a3fd4 33 haven't bothered yet. */
252b5132 34
7ee38065
MS
35/* For sparc64-cross-sparc32. */
36#define _SYSCALL32
252b5132 37#include "sysdep.h"
3a551c7a 38#include <limits.h>
3db64b00 39#include "bfd.h"
252b5132
RH
40#include "bfdlink.h"
41#include "libbfd.h"
42#define ARCH_SIZE 0
43#include "elf-bfd.h"
e0e8c97f 44#include "libiberty.h"
ff59fc36 45#include "safe-ctype.h"
de64ce13 46#include "elf-linux-core.h"
252b5132 47
8bc7f138
L
48#ifdef CORE_HEADER
49#include CORE_HEADER
50#endif
51
217aa764 52static int elf_sort_sections (const void *, const void *);
c84fca4d 53static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
ef10c3ac 54static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int) ;
718175fa 55static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
276da9b3 56 file_ptr offset, size_t align);
50b2bdb7 57
252b5132
RH
58/* Swap version information in and out. The version information is
59 currently size independent. If that ever changes, this code will
60 need to move into elfcode.h. */
61
62/* Swap in a Verdef structure. */
63
64void
217aa764
AM
65_bfd_elf_swap_verdef_in (bfd *abfd,
66 const Elf_External_Verdef *src,
67 Elf_Internal_Verdef *dst)
252b5132 68{
dc810e39
AM
69 dst->vd_version = H_GET_16 (abfd, src->vd_version);
70 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
71 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
72 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
73 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
74 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
75 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
76}
77
78/* Swap out a Verdef structure. */
79
80void
217aa764
AM
81_bfd_elf_swap_verdef_out (bfd *abfd,
82 const Elf_Internal_Verdef *src,
83 Elf_External_Verdef *dst)
252b5132 84{
dc810e39
AM
85 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
86 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
87 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
88 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
89 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
90 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
91 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
92}
93
94/* Swap in a Verdaux structure. */
95
96void
217aa764
AM
97_bfd_elf_swap_verdaux_in (bfd *abfd,
98 const Elf_External_Verdaux *src,
99 Elf_Internal_Verdaux *dst)
252b5132 100{
dc810e39
AM
101 dst->vda_name = H_GET_32 (abfd, src->vda_name);
102 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
103}
104
105/* Swap out a Verdaux structure. */
106
107void
217aa764
AM
108_bfd_elf_swap_verdaux_out (bfd *abfd,
109 const Elf_Internal_Verdaux *src,
110 Elf_External_Verdaux *dst)
252b5132 111{
dc810e39
AM
112 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
113 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
114}
115
116/* Swap in a Verneed structure. */
117
118void
217aa764
AM
119_bfd_elf_swap_verneed_in (bfd *abfd,
120 const Elf_External_Verneed *src,
121 Elf_Internal_Verneed *dst)
252b5132 122{
dc810e39
AM
123 dst->vn_version = H_GET_16 (abfd, src->vn_version);
124 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
125 dst->vn_file = H_GET_32 (abfd, src->vn_file);
126 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
127 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
128}
129
130/* Swap out a Verneed structure. */
131
132void
217aa764
AM
133_bfd_elf_swap_verneed_out (bfd *abfd,
134 const Elf_Internal_Verneed *src,
135 Elf_External_Verneed *dst)
252b5132 136{
dc810e39
AM
137 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
138 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
139 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
140 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
141 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
142}
143
144/* Swap in a Vernaux structure. */
145
146void
217aa764
AM
147_bfd_elf_swap_vernaux_in (bfd *abfd,
148 const Elf_External_Vernaux *src,
149 Elf_Internal_Vernaux *dst)
252b5132 150{
dc810e39
AM
151 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
152 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
153 dst->vna_other = H_GET_16 (abfd, src->vna_other);
154 dst->vna_name = H_GET_32 (abfd, src->vna_name);
155 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
156}
157
158/* Swap out a Vernaux structure. */
159
160void
217aa764
AM
161_bfd_elf_swap_vernaux_out (bfd *abfd,
162 const Elf_Internal_Vernaux *src,
163 Elf_External_Vernaux *dst)
252b5132 164{
dc810e39
AM
165 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
166 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
167 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
168 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
169 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
170}
171
172/* Swap in a Versym structure. */
173
174void
217aa764
AM
175_bfd_elf_swap_versym_in (bfd *abfd,
176 const Elf_External_Versym *src,
177 Elf_Internal_Versym *dst)
252b5132 178{
dc810e39 179 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
180}
181
182/* Swap out a Versym structure. */
183
184void
217aa764
AM
185_bfd_elf_swap_versym_out (bfd *abfd,
186 const Elf_Internal_Versym *src,
187 Elf_External_Versym *dst)
252b5132 188{
dc810e39 189 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
190}
191
192/* Standard ELF hash function. Do not change this function; you will
193 cause invalid hash tables to be generated. */
3a99b017 194
252b5132 195unsigned long
217aa764 196bfd_elf_hash (const char *namearg)
252b5132 197{
3a99b017 198 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
199 unsigned long h = 0;
200 unsigned long g;
201 int ch;
202
203 while ((ch = *name++) != '\0')
204 {
205 h = (h << 4) + ch;
206 if ((g = (h & 0xf0000000)) != 0)
207 {
208 h ^= g >> 24;
209 /* The ELF ABI says `h &= ~g', but this is equivalent in
210 this case and on some machines one insn instead of two. */
211 h ^= g;
212 }
213 }
32dfa85d 214 return h & 0xffffffff;
252b5132
RH
215}
216
fdc90cb4
JJ
217/* DT_GNU_HASH hash function. Do not change this function; you will
218 cause invalid hash tables to be generated. */
219
220unsigned long
221bfd_elf_gnu_hash (const char *namearg)
222{
223 const unsigned char *name = (const unsigned char *) namearg;
224 unsigned long h = 5381;
225 unsigned char ch;
226
227 while ((ch = *name++) != '\0')
228 h = (h << 5) + h + ch;
229 return h & 0xffffffff;
230}
231
0c8d6e5c
AM
232/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
233 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 234bfd_boolean
0c8d6e5c 235bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 236 size_t object_size,
4dfe6ac6 237 enum elf_target_id object_id)
252b5132 238{
0ffa91dd
NC
239 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
240 abfd->tdata.any = bfd_zalloc (abfd, object_size);
241 if (abfd->tdata.any == NULL)
242 return FALSE;
252b5132 243
0ffa91dd 244 elf_object_id (abfd) = object_id;
c0355132
AM
245 if (abfd->direction != read_direction)
246 {
247 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
248 if (o == NULL)
249 return FALSE;
250 elf_tdata (abfd)->o = o;
251 elf_program_header_size (abfd) = (bfd_size_type) -1;
252 }
b34976b6 253 return TRUE;
252b5132
RH
254}
255
0ffa91dd
NC
256
257bfd_boolean
ae95ffa6 258bfd_elf_make_object (bfd *abfd)
0ffa91dd 259{
ae95ffa6 260 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 261 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 262 bed->target_id);
0ffa91dd
NC
263}
264
b34976b6 265bfd_boolean
217aa764 266bfd_elf_mkcorefile (bfd *abfd)
252b5132 267{
c044fabd 268 /* I think this can be done just like an object file. */
228e534f
AM
269 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
270 return FALSE;
271 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
272 return elf_tdata (abfd)->core != NULL;
252b5132
RH
273}
274
6d5944fc 275char *
217aa764 276bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
277{
278 Elf_Internal_Shdr **i_shdrp;
f075ee0c 279 bfd_byte *shstrtab = NULL;
dc810e39
AM
280 file_ptr offset;
281 bfd_size_type shstrtabsize;
252b5132
RH
282
283 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
284 if (i_shdrp == 0
285 || shindex >= elf_numsections (abfd)
286 || i_shdrp[shindex] == 0)
f075ee0c 287 return NULL;
252b5132 288
f075ee0c 289 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
290 if (shstrtab == NULL)
291 {
c044fabd 292 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
293 offset = i_shdrp[shindex]->sh_offset;
294 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
295
296 /* Allocate and clear an extra byte at the end, to prevent crashes
297 in case the string table is not terminated. */
3471d59d 298 if (shstrtabsize + 1 <= 1
06614111 299 || bfd_seek (abfd, offset, SEEK_SET) != 0
2bb3687b
AM
300 || (shstrtab = _bfd_alloc_and_read (abfd, shstrtabsize + 1,
301 shstrtabsize)) == NULL)
302 {
3471d59d
CC
303 /* Once we've failed to read it, make sure we don't keep
304 trying. Otherwise, we'll keep allocating space for
305 the string table over and over. */
306 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
307 }
308 else
309 shstrtab[shstrtabsize] = '\0';
217aa764 310 i_shdrp[shindex]->contents = shstrtab;
252b5132 311 }
f075ee0c 312 return (char *) shstrtab;
252b5132
RH
313}
314
315char *
217aa764
AM
316bfd_elf_string_from_elf_section (bfd *abfd,
317 unsigned int shindex,
318 unsigned int strindex)
252b5132
RH
319{
320 Elf_Internal_Shdr *hdr;
321
322 if (strindex == 0)
323 return "";
324
74f2e02b
AM
325 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
326 return NULL;
327
252b5132
RH
328 hdr = elf_elfsections (abfd)[shindex];
329
06614111
NC
330 if (hdr->contents == NULL)
331 {
332 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
333 {
334 /* PR 17512: file: f057ec89. */
695344c0 335 /* xgettext:c-format */
871b3ab2 336 _bfd_error_handler (_("%pB: attempt to load strings from"
63a5468a 337 " a non-string section (number %d)"),
06614111
NC
338 abfd, shindex);
339 return NULL;
340 }
b1fa9dd6 341
06614111
NC
342 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
343 return NULL;
344 }
eed5def8
NC
345 else
346 {
347 /* PR 24273: The string section's contents may have already
348 been loaded elsewhere, eg because a corrupt file has the
349 string section index in the ELF header pointing at a group
350 section. So be paranoid, and test that the last byte of
351 the section is zero. */
352 if (hdr->sh_size == 0 || hdr->contents[hdr->sh_size - 1] != 0)
353 return NULL;
354 }
252b5132
RH
355
356 if (strindex >= hdr->sh_size)
357 {
1b3a8575 358 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
4eca0228 359 _bfd_error_handler
695344c0 360 /* xgettext:c-format */
2dcf00ce
AM
361 (_("%pB: invalid string offset %u >= %" PRIu64 " for section `%s'"),
362 abfd, strindex, (uint64_t) hdr->sh_size,
1b3a8575 363 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 364 ? ".shstrtab"
1b3a8575 365 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 366 return NULL;
252b5132
RH
367 }
368
369 return ((char *) hdr->contents) + strindex;
370}
371
6cdc0ccc
AM
372/* Read and convert symbols to internal format.
373 SYMCOUNT specifies the number of symbols to read, starting from
374 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
375 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
376 symbols, and symbol section index extensions, respectively.
377 Returns a pointer to the internal symbol buffer (malloced if necessary)
378 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
379
380Elf_Internal_Sym *
217aa764
AM
381bfd_elf_get_elf_syms (bfd *ibfd,
382 Elf_Internal_Shdr *symtab_hdr,
383 size_t symcount,
384 size_t symoffset,
385 Elf_Internal_Sym *intsym_buf,
386 void *extsym_buf,
387 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
388{
389 Elf_Internal_Shdr *shndx_hdr;
217aa764 390 void *alloc_ext;
df622259 391 const bfd_byte *esym;
6cdc0ccc
AM
392 Elf_External_Sym_Shndx *alloc_extshndx;
393 Elf_External_Sym_Shndx *shndx;
4dd07732 394 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
395 Elf_Internal_Sym *isym;
396 Elf_Internal_Sym *isymend;
9c5bfbb7 397 const struct elf_backend_data *bed;
6cdc0ccc 398 size_t extsym_size;
1f4361a7 399 size_t amt;
6cdc0ccc
AM
400 file_ptr pos;
401
e44a2c9c
AM
402 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
403 abort ();
404
6cdc0ccc
AM
405 if (symcount == 0)
406 return intsym_buf;
407
408 /* Normal syms might have section extension entries. */
409 shndx_hdr = NULL;
6a40cf0c
NC
410 if (elf_symtab_shndx_list (ibfd) != NULL)
411 {
412 elf_section_list * entry;
413 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
414
415 /* Find an index section that is linked to this symtab section. */
416 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
315350be
NC
417 {
418 /* PR 20063. */
419 if (entry->hdr.sh_link >= elf_numsections (ibfd))
420 continue;
421
422 if (sections[entry->hdr.sh_link] == symtab_hdr)
423 {
424 shndx_hdr = & entry->hdr;
425 break;
426 };
427 }
6a40cf0c
NC
428
429 if (shndx_hdr == NULL)
430 {
431 if (symtab_hdr == & elf_symtab_hdr (ibfd))
432 /* Not really accurate, but this was how the old code used to work. */
433 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
434 /* Otherwise we do nothing. The assumption is that
435 the index table will not be needed. */
436 }
437 }
6cdc0ccc
AM
438
439 /* Read the symbols. */
440 alloc_ext = NULL;
441 alloc_extshndx = NULL;
4dd07732 442 alloc_intsym = NULL;
6cdc0ccc
AM
443 bed = get_elf_backend_data (ibfd);
444 extsym_size = bed->s->sizeof_sym;
1f4361a7
AM
445 if (_bfd_mul_overflow (symcount, extsym_size, &amt))
446 {
447 bfd_set_error (bfd_error_file_too_big);
448 intsym_buf = NULL;
449 goto out;
450 }
6cdc0ccc
AM
451 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
452 if (extsym_buf == NULL)
453 {
1f4361a7 454 alloc_ext = bfd_malloc (amt);
6cdc0ccc
AM
455 extsym_buf = alloc_ext;
456 }
457 if (extsym_buf == NULL
458 || bfd_seek (ibfd, pos, SEEK_SET) != 0
459 || bfd_bread (extsym_buf, amt, ibfd) != amt)
460 {
461 intsym_buf = NULL;
462 goto out;
463 }
464
465 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
466 extshndx_buf = NULL;
467 else
468 {
1f4361a7
AM
469 if (_bfd_mul_overflow (symcount, sizeof (Elf_External_Sym_Shndx), &amt))
470 {
471 bfd_set_error (bfd_error_file_too_big);
472 intsym_buf = NULL;
473 goto out;
474 }
6cdc0ccc
AM
475 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
476 if (extshndx_buf == NULL)
477 {
1f4361a7 478 alloc_extshndx = (Elf_External_Sym_Shndx *) bfd_malloc (amt);
6cdc0ccc
AM
479 extshndx_buf = alloc_extshndx;
480 }
481 if (extshndx_buf == NULL
482 || bfd_seek (ibfd, pos, SEEK_SET) != 0
483 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
484 {
485 intsym_buf = NULL;
486 goto out;
487 }
488 }
489
490 if (intsym_buf == NULL)
491 {
1f4361a7
AM
492 if (_bfd_mul_overflow (symcount, sizeof (Elf_Internal_Sym), &amt))
493 {
494 bfd_set_error (bfd_error_file_too_big);
495 goto out;
496 }
497 alloc_intsym = (Elf_Internal_Sym *) bfd_malloc (amt);
4dd07732 498 intsym_buf = alloc_intsym;
6cdc0ccc
AM
499 if (intsym_buf == NULL)
500 goto out;
501 }
502
503 /* Convert the symbols to internal form. */
504 isymend = intsym_buf + symcount;
a50b1753 505 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
07d6d2b8 506 shndx = extshndx_buf;
6cdc0ccc
AM
507 isym < isymend;
508 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
509 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
510 {
511 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
695344c0 512 /* xgettext:c-format */
871b3ab2 513 _bfd_error_handler (_("%pB symbol number %lu references"
63a5468a 514 " nonexistent SHT_SYMTAB_SHNDX section"),
4eca0228 515 ibfd, (unsigned long) symoffset);
4dd07732
AM
516 if (alloc_intsym != NULL)
517 free (alloc_intsym);
8384fb8f
AM
518 intsym_buf = NULL;
519 goto out;
520 }
6cdc0ccc
AM
521
522 out:
523 if (alloc_ext != NULL)
524 free (alloc_ext);
525 if (alloc_extshndx != NULL)
526 free (alloc_extshndx);
527
528 return intsym_buf;
529}
530
5cab59f6
AM
531/* Look up a symbol name. */
532const char *
be8dd2ca
AM
533bfd_elf_sym_name (bfd *abfd,
534 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
535 Elf_Internal_Sym *isym,
536 asection *sym_sec)
5cab59f6 537{
26c61ae5 538 const char *name;
5cab59f6 539 unsigned int iname = isym->st_name;
be8dd2ca 540 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 541
138f35cc
JJ
542 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
543 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 544 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
545 {
546 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
547 shindex = elf_elfheader (abfd)->e_shstrndx;
548 }
549
26c61ae5
L
550 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
551 if (name == NULL)
552 name = "(null)";
553 else if (sym_sec && *name == '\0')
fd361982 554 name = bfd_section_name (sym_sec);
26c61ae5
L
555
556 return name;
5cab59f6
AM
557}
558
dbb410c3
AM
559/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
560 sections. The first element is the flags, the rest are section
561 pointers. */
562
563typedef union elf_internal_group {
564 Elf_Internal_Shdr *shdr;
565 unsigned int flags;
566} Elf_Internal_Group;
567
b885599b
AM
568/* Return the name of the group signature symbol. Why isn't the
569 signature just a string? */
570
571static const char *
217aa764 572group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 573{
9dce4196 574 Elf_Internal_Shdr *hdr;
9dce4196
AM
575 unsigned char esym[sizeof (Elf64_External_Sym)];
576 Elf_External_Sym_Shndx eshndx;
577 Elf_Internal_Sym isym;
b885599b 578
13792e9d
L
579 /* First we need to ensure the symbol table is available. Make sure
580 that it is a symbol table section. */
4fbb74a6
AM
581 if (ghdr->sh_link >= elf_numsections (abfd))
582 return NULL;
13792e9d
L
583 hdr = elf_elfsections (abfd) [ghdr->sh_link];
584 if (hdr->sh_type != SHT_SYMTAB
585 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
586 return NULL;
587
9dce4196
AM
588 /* Go read the symbol. */
589 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
590 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
591 &isym, esym, &eshndx) == NULL)
b885599b 592 return NULL;
9dce4196 593
26c61ae5 594 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
595}
596
dbb410c3
AM
597/* Set next_in_group list pointer, and group name for NEWSECT. */
598
b34976b6 599static bfd_boolean
217aa764 600setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
601{
602 unsigned int num_group = elf_tdata (abfd)->num_group;
603
604 /* If num_group is zero, read in all SHT_GROUP sections. The count
605 is set to -1 if there are no SHT_GROUP sections. */
606 if (num_group == 0)
607 {
608 unsigned int i, shnum;
609
610 /* First count the number of groups. If we have a SHT_GROUP
611 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 612 shnum = elf_numsections (abfd);
dbb410c3 613 num_group = 0;
08a40648 614
44534af3 615#define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
1783205a 616 ( (shdr)->sh_type == SHT_GROUP \
44534af3 617 && (shdr)->sh_size >= minsize \
1783205a
NC
618 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
619 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 620
dbb410c3
AM
621 for (i = 0; i < shnum; i++)
622 {
623 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 624
44534af3 625 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3
AM
626 num_group += 1;
627 }
628
629 if (num_group == 0)
20dbb49d
L
630 {
631 num_group = (unsigned) -1;
632 elf_tdata (abfd)->num_group = num_group;
ce497010 633 elf_tdata (abfd)->group_sect_ptr = NULL;
20dbb49d
L
634 }
635 else
dbb410c3
AM
636 {
637 /* We keep a list of elf section headers for group sections,
638 so we can find them quickly. */
1f4361a7 639 size_t amt;
d0fb9a8d 640
20dbb49d 641 elf_tdata (abfd)->num_group = num_group;
1f4361a7
AM
642 amt = num_group * sizeof (Elf_Internal_Shdr *);
643 elf_tdata (abfd)->group_sect_ptr
644 = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
dbb410c3 645 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 646 return FALSE;
dbb410c3 647 num_group = 0;
ce497010 648
dbb410c3
AM
649 for (i = 0; i < shnum; i++)
650 {
651 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 652
44534af3 653 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3 654 {
973ffd63 655 unsigned char *src;
dbb410c3
AM
656 Elf_Internal_Group *dest;
657
07d6d2b8
AM
658 /* Make sure the group section has a BFD section
659 attached to it. */
660 if (!bfd_section_from_shdr (abfd, i))
661 return FALSE;
662
dbb410c3
AM
663 /* Add to list of sections. */
664 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
665 num_group += 1;
666
667 /* Read the raw contents. */
1f4361a7
AM
668 BFD_ASSERT (sizeof (*dest) >= 4 && sizeof (*dest) % 4 == 0);
669 shdr->contents = NULL;
670 if (_bfd_mul_overflow (shdr->sh_size,
671 sizeof (*dest) / 4, &amt)
1f4361a7 672 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
2bb3687b
AM
673 || !(shdr->contents
674 = _bfd_alloc_and_read (abfd, amt, shdr->sh_size)))
493a3386
NC
675 {
676 _bfd_error_handler
695344c0 677 /* xgettext:c-format */
871b3ab2 678 (_("%pB: invalid size field in group section"
2dcf00ce
AM
679 " header: %#" PRIx64 ""),
680 abfd, (uint64_t) shdr->sh_size);
493a3386
NC
681 bfd_set_error (bfd_error_bad_value);
682 -- num_group;
493a3386
NC
683 continue;
684 }
708d7d0d 685
dbb410c3
AM
686 /* Translate raw contents, a flag word followed by an
687 array of elf section indices all in target byte order,
688 to the flag word followed by an array of elf section
689 pointers. */
690 src = shdr->contents + shdr->sh_size;
691 dest = (Elf_Internal_Group *) (shdr->contents + amt);
06614111 692
dbb410c3
AM
693 while (1)
694 {
695 unsigned int idx;
696
697 src -= 4;
698 --dest;
699 idx = H_GET_32 (abfd, src);
700 if (src == shdr->contents)
701 {
327301a4 702 dest->shdr = NULL;
dbb410c3 703 dest->flags = idx;
b885599b
AM
704 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
705 shdr->bfd_section->flags
706 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
707 break;
708 }
4bba0fb1 709 if (idx < shnum)
bae363f1
L
710 {
711 dest->shdr = elf_elfsections (abfd)[idx];
712 /* PR binutils/23199: All sections in a
713 section group should be marked with
714 SHF_GROUP. But some tools generate
715 broken objects without SHF_GROUP. Fix
716 them up here. */
717 dest->shdr->sh_flags |= SHF_GROUP;
718 }
4bba0fb1
AM
719 if (idx >= shnum
720 || dest->shdr->sh_type == SHT_GROUP)
dbb410c3 721 {
4eca0228 722 _bfd_error_handler
4bba0fb1
AM
723 (_("%pB: invalid entry in SHT_GROUP section [%u]"),
724 abfd, i);
725 dest->shdr = NULL;
dbb410c3 726 }
dbb410c3
AM
727 }
728 }
729 }
493a3386
NC
730
731 /* PR 17510: Corrupt binaries might contain invalid groups. */
732 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
733 {
734 elf_tdata (abfd)->num_group = num_group;
735
736 /* If all groups are invalid then fail. */
737 if (num_group == 0)
738 {
739 elf_tdata (abfd)->group_sect_ptr = NULL;
740 elf_tdata (abfd)->num_group = num_group = -1;
4eca0228 741 _bfd_error_handler
871b3ab2 742 (_("%pB: no valid group sections found"), abfd);
493a3386
NC
743 bfd_set_error (bfd_error_bad_value);
744 }
745 }
dbb410c3
AM
746 }
747 }
748
749 if (num_group != (unsigned) -1)
750 {
564e11c9
JW
751 unsigned int search_offset = elf_tdata (abfd)->group_search_offset;
752 unsigned int j;
dbb410c3 753
564e11c9 754 for (j = 0; j < num_group; j++)
dbb410c3 755 {
564e11c9
JW
756 /* Begin search from previous found group. */
757 unsigned i = (j + search_offset) % num_group;
758
dbb410c3 759 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
ce497010 760 Elf_Internal_Group *idx;
0c54f692 761 bfd_size_type n_elt;
ce497010
NC
762
763 if (shdr == NULL)
764 continue;
765
766 idx = (Elf_Internal_Group *) shdr->contents;
0c54f692
NC
767 if (idx == NULL || shdr->sh_size < 4)
768 {
769 /* See PR 21957 for a reproducer. */
770 /* xgettext:c-format */
871b3ab2 771 _bfd_error_handler (_("%pB: group section '%pA' has no contents"),
0c54f692
NC
772 abfd, shdr->bfd_section);
773 elf_tdata (abfd)->group_sect_ptr[i] = NULL;
774 bfd_set_error (bfd_error_bad_value);
775 return FALSE;
776 }
ce497010 777 n_elt = shdr->sh_size / 4;
dbb410c3
AM
778
779 /* Look through this group's sections to see if current
780 section is a member. */
781 while (--n_elt != 0)
782 if ((++idx)->shdr == hdr)
783 {
e0e8c97f 784 asection *s = NULL;
dbb410c3
AM
785
786 /* We are a member of this group. Go looking through
787 other members to see if any others are linked via
788 next_in_group. */
789 idx = (Elf_Internal_Group *) shdr->contents;
790 n_elt = shdr->sh_size / 4;
791 while (--n_elt != 0)
4bba0fb1
AM
792 if ((++idx)->shdr != NULL
793 && (s = idx->shdr->bfd_section) != NULL
945906ff 794 && elf_next_in_group (s) != NULL)
dbb410c3
AM
795 break;
796 if (n_elt != 0)
797 {
dbb410c3
AM
798 /* Snarf the group name from other member, and
799 insert current section in circular list. */
945906ff
AM
800 elf_group_name (newsect) = elf_group_name (s);
801 elf_next_in_group (newsect) = elf_next_in_group (s);
802 elf_next_in_group (s) = newsect;
dbb410c3
AM
803 }
804 else
805 {
dbb410c3
AM
806 const char *gname;
807
b885599b
AM
808 gname = group_signature (abfd, shdr);
809 if (gname == NULL)
b34976b6 810 return FALSE;
945906ff 811 elf_group_name (newsect) = gname;
dbb410c3
AM
812
813 /* Start a circular list with one element. */
945906ff 814 elf_next_in_group (newsect) = newsect;
dbb410c3 815 }
b885599b 816
9dce4196
AM
817 /* If the group section has been created, point to the
818 new member. */
dbb410c3 819 if (shdr->bfd_section != NULL)
945906ff 820 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 821
564e11c9
JW
822 elf_tdata (abfd)->group_search_offset = i;
823 j = num_group - 1;
dbb410c3
AM
824 break;
825 }
826 }
827 }
828
945906ff 829 if (elf_group_name (newsect) == NULL)
dbb410c3 830 {
695344c0 831 /* xgettext:c-format */
871b3ab2 832 _bfd_error_handler (_("%pB: no group info for section '%pA'"),
4eca0228 833 abfd, newsect);
493a3386 834 return FALSE;
dbb410c3 835 }
b34976b6 836 return TRUE;
dbb410c3
AM
837}
838
3d7f7666 839bfd_boolean
dd863624 840_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
841{
842 unsigned int i;
843 unsigned int num_group = elf_tdata (abfd)->num_group;
844 bfd_boolean result = TRUE;
dd863624
L
845 asection *s;
846
847 /* Process SHF_LINK_ORDER. */
848 for (s = abfd->sections; s != NULL; s = s->next)
849 {
850 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
851 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
852 {
853 unsigned int elfsec = this_hdr->sh_link;
854 /* FIXME: The old Intel compiler and old strip/objcopy may
855 not set the sh_link or sh_info fields. Hence we could
856 get the situation where elfsec is 0. */
857 if (elfsec == 0)
858 {
4fbb74a6 859 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
860 if (bed->link_order_error_handler)
861 bed->link_order_error_handler
695344c0 862 /* xgettext:c-format */
871b3ab2 863 (_("%pB: warning: sh_link not set for section `%pA'"),
dd863624
L
864 abfd, s);
865 }
866 else
867 {
91d6fa6a 868 asection *linksec = NULL;
25bbc984 869
4fbb74a6
AM
870 if (elfsec < elf_numsections (abfd))
871 {
872 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 873 linksec = this_hdr->bfd_section;
4fbb74a6 874 }
25bbc984
L
875
876 /* PR 1991, 2008:
877 Some strip/objcopy may leave an incorrect value in
878 sh_link. We don't want to proceed. */
91d6fa6a 879 if (linksec == NULL)
25bbc984 880 {
4eca0228 881 _bfd_error_handler
695344c0 882 /* xgettext:c-format */
871b3ab2 883 (_("%pB: sh_link [%d] in section `%pA' is incorrect"),
c08bb8dd 884 s->owner, elfsec, s);
25bbc984
L
885 result = FALSE;
886 }
887
91d6fa6a 888 elf_linked_to_section (s) = linksec;
dd863624
L
889 }
890 }
53720c49
AM
891 else if (this_hdr->sh_type == SHT_GROUP
892 && elf_next_in_group (s) == NULL)
893 {
4eca0228 894 _bfd_error_handler
695344c0 895 /* xgettext:c-format */
871b3ab2 896 (_("%pB: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
53720c49
AM
897 abfd, elf_section_data (s)->this_idx);
898 result = FALSE;
899 }
dd863624 900 }
3d7f7666 901
dd863624 902 /* Process section groups. */
3d7f7666
L
903 if (num_group == (unsigned) -1)
904 return result;
905
906 for (i = 0; i < num_group; i++)
907 {
908 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
4b0e8a5f
NC
909 Elf_Internal_Group *idx;
910 unsigned int n_elt;
3d7f7666 911
4b0e8a5f
NC
912 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
913 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
914 {
4eca0228 915 _bfd_error_handler
695344c0 916 /* xgettext:c-format */
871b3ab2 917 (_("%pB: section group entry number %u is corrupt"),
4b0e8a5f
NC
918 abfd, i);
919 result = FALSE;
920 continue;
921 }
922
923 idx = (Elf_Internal_Group *) shdr->contents;
924 n_elt = shdr->sh_size / 4;
1b786873 925
3d7f7666 926 while (--n_elt != 0)
24d3e51b
NC
927 {
928 ++ idx;
929
930 if (idx->shdr == NULL)
931 continue;
932 else if (idx->shdr->bfd_section)
933 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
db4677b8
AM
934 else if (idx->shdr->sh_type != SHT_RELA
935 && idx->shdr->sh_type != SHT_REL)
24d3e51b
NC
936 {
937 /* There are some unknown sections in the group. */
938 _bfd_error_handler
939 /* xgettext:c-format */
871b3ab2 940 (_("%pB: unknown type [%#x] section `%s' in group [%pA]"),
24d3e51b
NC
941 abfd,
942 idx->shdr->sh_type,
943 bfd_elf_string_from_elf_section (abfd,
944 (elf_elfheader (abfd)
945 ->e_shstrndx),
946 idx->shdr->sh_name),
947 shdr->bfd_section);
948 result = FALSE;
949 }
950 }
3d7f7666 951 }
24d3e51b 952
3d7f7666
L
953 return result;
954}
955
72adc230
AM
956bfd_boolean
957bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
958{
959 return elf_next_in_group (sec) != NULL;
960}
961
cb7f4b29
AM
962const char *
963bfd_elf_group_name (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
964{
965 if (elf_sec_group (sec) != NULL)
966 return elf_group_name (sec);
967 return NULL;
968}
969
f6fe1ccd
L
970static char *
971convert_debug_to_zdebug (bfd *abfd, const char *name)
972{
973 unsigned int len = strlen (name);
974 char *new_name = bfd_alloc (abfd, len + 2);
975 if (new_name == NULL)
976 return NULL;
977 new_name[0] = '.';
978 new_name[1] = 'z';
979 memcpy (new_name + 2, name + 1, len);
980 return new_name;
981}
982
983static char *
984convert_zdebug_to_debug (bfd *abfd, const char *name)
985{
986 unsigned int len = strlen (name);
987 char *new_name = bfd_alloc (abfd, len);
988 if (new_name == NULL)
989 return NULL;
990 new_name[0] = '.';
991 memcpy (new_name + 1, name + 2, len - 1);
992 return new_name;
993}
994
cc5277b1
ML
995/* This a copy of lto_section defined in GCC (lto-streamer.h). */
996
997struct lto_section
998{
999 int16_t major_version;
1000 int16_t minor_version;
1001 unsigned char slim_object;
1002
1003 /* Flags is a private field that is not defined publicly. */
1004 uint16_t flags;
1005};
1006
252b5132
RH
1007/* Make a BFD section from an ELF section. We store a pointer to the
1008 BFD section in the bfd_section field of the header. */
1009
b34976b6 1010bfd_boolean
217aa764
AM
1011_bfd_elf_make_section_from_shdr (bfd *abfd,
1012 Elf_Internal_Shdr *hdr,
6dc132d9
L
1013 const char *name,
1014 int shindex)
252b5132
RH
1015{
1016 asection *newsect;
1017 flagword flags;
9c5bfbb7 1018 const struct elf_backend_data *bed;
252b5132
RH
1019
1020 if (hdr->bfd_section != NULL)
4e011fb5 1021 return TRUE;
252b5132
RH
1022
1023 newsect = bfd_make_section_anyway (abfd, name);
1024 if (newsect == NULL)
b34976b6 1025 return FALSE;
252b5132 1026
1829f4b2
AM
1027 hdr->bfd_section = newsect;
1028 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 1029 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 1030
2f89ff8d
L
1031 /* Always use the real type/flags. */
1032 elf_section_type (newsect) = hdr->sh_type;
1033 elf_section_flags (newsect) = hdr->sh_flags;
1034
252b5132
RH
1035 newsect->filepos = hdr->sh_offset;
1036
fd361982
AM
1037 if (!bfd_set_section_vma (newsect, hdr->sh_addr)
1038 || !bfd_set_section_size (newsect, hdr->sh_size)
1039 || !bfd_set_section_alignment (newsect, bfd_log2 (hdr->sh_addralign)))
b34976b6 1040 return FALSE;
252b5132
RH
1041
1042 flags = SEC_NO_FLAGS;
1043 if (hdr->sh_type != SHT_NOBITS)
1044 flags |= SEC_HAS_CONTENTS;
dbb410c3 1045 if (hdr->sh_type == SHT_GROUP)
7bdf4127 1046 flags |= SEC_GROUP;
252b5132
RH
1047 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1048 {
1049 flags |= SEC_ALLOC;
1050 if (hdr->sh_type != SHT_NOBITS)
1051 flags |= SEC_LOAD;
1052 }
1053 if ((hdr->sh_flags & SHF_WRITE) == 0)
1054 flags |= SEC_READONLY;
1055 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
1056 flags |= SEC_CODE;
1057 else if ((flags & SEC_LOAD) != 0)
1058 flags |= SEC_DATA;
f5fa8ca2
JJ
1059 if ((hdr->sh_flags & SHF_MERGE) != 0)
1060 {
1061 flags |= SEC_MERGE;
1062 newsect->entsize = hdr->sh_entsize;
f5fa8ca2 1063 }
84865015
NC
1064 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1065 flags |= SEC_STRINGS;
dbb410c3
AM
1066 if (hdr->sh_flags & SHF_GROUP)
1067 if (!setup_group (abfd, hdr, newsect))
b34976b6 1068 return FALSE;
13ae64f3
JJ
1069 if ((hdr->sh_flags & SHF_TLS) != 0)
1070 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
1071 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1072 flags |= SEC_EXCLUDE;
252b5132 1073
df3a023b
AM
1074 switch (elf_elfheader (abfd)->e_ident[EI_OSABI])
1075 {
1076 /* FIXME: We should not recognize SHF_GNU_MBIND for ELFOSABI_NONE,
1077 but binutils as of 2019-07-23 did not set the EI_OSABI header
1078 byte. */
1079 case ELFOSABI_NONE:
1080 case ELFOSABI_GNU:
1081 case ELFOSABI_FREEBSD:
1082 if ((hdr->sh_flags & SHF_GNU_MBIND) != 0)
1083 elf_tdata (abfd)->has_gnu_osabi |= elf_gnu_osabi_mbind;
1084 break;
1085 }
1086
3d2b39cf 1087 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 1088 {
3d2b39cf
L
1089 /* The debugging sections appear to be recognized only by name,
1090 not any sort of flag. Their SEC_ALLOC bits are cleared. */
3d2b39cf
L
1091 if (name [0] == '.')
1092 {
bb294208
AM
1093 if (strncmp (name, ".debug", 6) == 0
1094 || strncmp (name, ".gnu.linkonce.wi.", 17) == 0
1095 || strncmp (name, ".zdebug", 7) == 0)
1096 flags |= SEC_DEBUGGING | SEC_ELF_OCTETS;
1097 else if (strncmp (name, GNU_BUILD_ATTRS_SECTION_NAME, 21) == 0
1098 || strncmp (name, ".note.gnu", 9) == 0)
1099 flags |= SEC_ELF_OCTETS;
1100 else if (strncmp (name, ".line", 5) == 0
1101 || strncmp (name, ".stab", 5) == 0
1102 || strcmp (name, ".gdb_index") == 0)
3d2b39cf
L
1103 flags |= SEC_DEBUGGING;
1104 }
1105 }
252b5132
RH
1106
1107 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1108 only link a single copy of the section. This is used to support
1109 g++. g++ will emit each template expansion in its own section.
1110 The symbols will be defined as weak, so that multiple definitions
1111 are permitted. The GNU linker extension is to actually discard
1112 all but one of the sections. */
0112cd26 1113 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 1114 && elf_next_in_group (newsect) == NULL)
252b5132
RH
1115 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1116
8c803a2d
AM
1117 if (!bfd_set_section_flags (newsect, flags))
1118 return FALSE;
1119
fa152c49
JW
1120 bed = get_elf_backend_data (abfd);
1121 if (bed->elf_backend_section_flags)
8c803a2d 1122 if (!bed->elf_backend_section_flags (hdr))
b34976b6 1123 return FALSE;
fa152c49 1124
718175fa
JK
1125 /* We do not parse the PT_NOTE segments as we are interested even in the
1126 separate debug info files which may have the segments offsets corrupted.
1127 PT_NOTEs from the core files are currently not parsed using BFD. */
1128 if (hdr->sh_type == SHT_NOTE)
1129 {
baea7ef1 1130 bfd_byte *contents;
718175fa 1131
baea7ef1 1132 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
1133 return FALSE;
1134
276da9b3
L
1135 elf_parse_notes (abfd, (char *) contents, hdr->sh_size,
1136 hdr->sh_offset, hdr->sh_addralign);
718175fa
JK
1137 free (contents);
1138 }
1139
8c803a2d 1140 if ((newsect->flags & SEC_ALLOC) != 0)
252b5132
RH
1141 {
1142 Elf_Internal_Phdr *phdr;
6ffd7900
AM
1143 unsigned int i, nload;
1144
1145 /* Some ELF linkers produce binaries with all the program header
1146 p_paddr fields zero. If we have such a binary with more than
1147 one PT_LOAD header, then leave the section lma equal to vma
1148 so that we don't create sections with overlapping lma. */
1149 phdr = elf_tdata (abfd)->phdr;
1150 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1151 if (phdr->p_paddr != 0)
1152 break;
1153 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1154 ++nload;
1155 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1156 return TRUE;
252b5132 1157
252b5132
RH
1158 phdr = elf_tdata (abfd)->phdr;
1159 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1160 {
86b2281f
AM
1161 if (((phdr->p_type == PT_LOAD
1162 && (hdr->sh_flags & SHF_TLS) == 0)
1163 || phdr->p_type == PT_TLS)
9a83a553 1164 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 1165 {
8c803a2d 1166 if ((newsect->flags & SEC_LOAD) == 0)
88967714
AM
1167 newsect->lma = (phdr->p_paddr
1168 + hdr->sh_addr - phdr->p_vaddr);
1169 else
1170 /* We used to use the same adjustment for SEC_LOAD
1171 sections, but that doesn't work if the segment
1172 is packed with code from multiple VMAs.
1173 Instead we calculate the section LMA based on
1174 the segment LMA. It is assumed that the
1175 segment will contain sections with contiguous
1176 LMAs, even if the VMAs are not. */
1177 newsect->lma = (phdr->p_paddr
1178 + hdr->sh_offset - phdr->p_offset);
1179
1180 /* With contiguous segments, we can't tell from file
1181 offsets whether a section with zero size should
1182 be placed at the end of one segment or the
1183 beginning of the next. Decide based on vaddr. */
1184 if (hdr->sh_addr >= phdr->p_vaddr
1185 && (hdr->sh_addr + hdr->sh_size
1186 <= phdr->p_vaddr + phdr->p_memsz))
1187 break;
252b5132
RH
1188 }
1189 }
1190 }
1191
4a114e3e
L
1192 /* Compress/decompress DWARF debug sections with names: .debug_* and
1193 .zdebug_*, after the section flags is set. */
8c803a2d 1194 if ((newsect->flags & SEC_DEBUGGING)
4a114e3e
L
1195 && ((name[1] == 'd' && name[6] == '_')
1196 || (name[1] == 'z' && name[7] == '_')))
1197 {
1198 enum { nothing, compress, decompress } action = nothing;
151411f8 1199 int compression_header_size;
dab394de 1200 bfd_size_type uncompressed_size;
4207142d 1201 unsigned int uncompressed_align_power;
151411f8
L
1202 bfd_boolean compressed
1203 = bfd_is_section_compressed_with_header (abfd, newsect,
dab394de 1204 &compression_header_size,
4207142d
MW
1205 &uncompressed_size,
1206 &uncompressed_align_power);
151411f8 1207 if (compressed)
4a114e3e
L
1208 {
1209 /* Compressed section. Check if we should decompress. */
1210 if ((abfd->flags & BFD_DECOMPRESS))
1211 action = decompress;
1212 }
151411f8
L
1213
1214 /* Compress the uncompressed section or convert from/to .zdebug*
1215 section. Check if we should compress. */
1216 if (action == nothing)
4a114e3e 1217 {
151411f8
L
1218 if (newsect->size != 0
1219 && (abfd->flags & BFD_COMPRESS)
1220 && compression_header_size >= 0
dab394de 1221 && uncompressed_size > 0
151411f8
L
1222 && (!compressed
1223 || ((compression_header_size > 0)
1224 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
4a114e3e 1225 action = compress;
151411f8
L
1226 else
1227 return TRUE;
4a114e3e
L
1228 }
1229
151411f8 1230 if (action == compress)
4a114e3e 1231 {
4a114e3e
L
1232 if (!bfd_init_section_compress_status (abfd, newsect))
1233 {
4eca0228 1234 _bfd_error_handler
695344c0 1235 /* xgettext:c-format */
871b3ab2 1236 (_("%pB: unable to initialize compress status for section %s"),
4a114e3e
L
1237 abfd, name);
1238 return FALSE;
1239 }
151411f8
L
1240 }
1241 else
1242 {
4a114e3e
L
1243 if (!bfd_init_section_decompress_status (abfd, newsect))
1244 {
4eca0228 1245 _bfd_error_handler
695344c0 1246 /* xgettext:c-format */
871b3ab2 1247 (_("%pB: unable to initialize decompress status for section %s"),
4a114e3e
L
1248 abfd, name);
1249 return FALSE;
1250 }
151411f8
L
1251 }
1252
f6fe1ccd 1253 if (abfd->is_linker_input)
151411f8 1254 {
f6fe1ccd
L
1255 if (name[1] == 'z'
1256 && (action == decompress
1257 || (action == compress
1258 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
4e011fb5 1259 {
f6fe1ccd
L
1260 /* Convert section name from .zdebug_* to .debug_* so
1261 that linker will consider this section as a debug
1262 section. */
1263 char *new_name = convert_zdebug_to_debug (abfd, name);
151411f8
L
1264 if (new_name == NULL)
1265 return FALSE;
fd361982 1266 bfd_rename_section (newsect, new_name);
151411f8 1267 }
4a114e3e 1268 }
f6fe1ccd
L
1269 else
1270 /* For objdump, don't rename the section. For objcopy, delay
1271 section rename to elf_fake_sections. */
1272 newsect->flags |= SEC_ELF_RENAME;
4a114e3e
L
1273 }
1274
cc5277b1
ML
1275 /* GCC uses .gnu.lto_.lto.<some_hash> as a LTO bytecode information
1276 section. */
1277 const char *lto_section_name = ".gnu.lto_.lto.";
1278 if (strncmp (name, lto_section_name, strlen (lto_section_name)) == 0)
1279 {
1280 struct lto_section lsection;
1281 if (bfd_get_section_contents (abfd, newsect, &lsection, 0,
1282 sizeof (struct lto_section)))
1283 abfd->lto_slim_object = lsection.slim_object;
1284 }
1285
b34976b6 1286 return TRUE;
252b5132
RH
1287}
1288
84865015
NC
1289const char *const bfd_elf_section_type_names[] =
1290{
252b5132
RH
1291 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1292 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1293 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1294};
1295
1049f94e 1296/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1297 output, and the reloc is against an external symbol, and nothing
1298 has given us any additional addend, the resulting reloc will also
1299 be against the same symbol. In such a case, we don't want to
1300 change anything about the way the reloc is handled, since it will
1301 all be done at final link time. Rather than put special case code
1302 into bfd_perform_relocation, all the reloc types use this howto
1303 function. It just short circuits the reloc if producing
1049f94e 1304 relocatable output against an external symbol. */
252b5132 1305
252b5132 1306bfd_reloc_status_type
217aa764
AM
1307bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1308 arelent *reloc_entry,
1309 asymbol *symbol,
1310 void *data ATTRIBUTE_UNUSED,
1311 asection *input_section,
1312 bfd *output_bfd,
1313 char **error_message ATTRIBUTE_UNUSED)
1314{
1315 if (output_bfd != NULL
252b5132
RH
1316 && (symbol->flags & BSF_SECTION_SYM) == 0
1317 && (! reloc_entry->howto->partial_inplace
1318 || reloc_entry->addend == 0))
1319 {
1320 reloc_entry->address += input_section->output_offset;
1321 return bfd_reloc_ok;
1322 }
1323
1324 return bfd_reloc_continue;
1325}
1326\f
84865015
NC
1327/* Returns TRUE if section A matches section B.
1328 Names, addresses and links may be different, but everything else
1329 should be the same. */
1330
1331static bfd_boolean
5522f910
NC
1332section_match (const Elf_Internal_Shdr * a,
1333 const Elf_Internal_Shdr * b)
84865015 1334{
ac85e67c
AM
1335 if (a->sh_type != b->sh_type
1336 || ((a->sh_flags ^ b->sh_flags) & ~SHF_INFO_LINK) != 0
1337 || a->sh_addralign != b->sh_addralign
1338 || a->sh_entsize != b->sh_entsize)
1339 return FALSE;
1340 if (a->sh_type == SHT_SYMTAB
1341 || a->sh_type == SHT_STRTAB)
1342 return TRUE;
1343 return a->sh_size == b->sh_size;
84865015
NC
1344}
1345
1346/* Find a section in OBFD that has the same characteristics
1347 as IHEADER. Return the index of this section or SHN_UNDEF if
1348 none can be found. Check's section HINT first, as this is likely
1349 to be the correct section. */
1350
1351static unsigned int
5cc4ca83
ST
1352find_link (const bfd *obfd, const Elf_Internal_Shdr *iheader,
1353 const unsigned int hint)
84865015
NC
1354{
1355 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1356 unsigned int i;
1357
a55c9876
NC
1358 BFD_ASSERT (iheader != NULL);
1359
1360 /* See PR 20922 for a reproducer of the NULL test. */
5cc4ca83
ST
1361 if (hint < elf_numsections (obfd)
1362 && oheaders[hint] != NULL
a55c9876 1363 && section_match (oheaders[hint], iheader))
84865015
NC
1364 return hint;
1365
1366 for (i = 1; i < elf_numsections (obfd); i++)
1367 {
1368 Elf_Internal_Shdr * oheader = oheaders[i];
1369
a55c9876
NC
1370 if (oheader == NULL)
1371 continue;
84865015
NC
1372 if (section_match (oheader, iheader))
1373 /* FIXME: Do we care if there is a potential for
1374 multiple matches ? */
1375 return i;
1376 }
1377
1378 return SHN_UNDEF;
1379}
1380
5522f910
NC
1381/* PR 19938: Attempt to set the ELF section header fields of an OS or
1382 Processor specific section, based upon a matching input section.
1383 Returns TRUE upon success, FALSE otherwise. */
07d6d2b8 1384
5522f910
NC
1385static bfd_boolean
1386copy_special_section_fields (const bfd *ibfd,
1387 bfd *obfd,
1388 const Elf_Internal_Shdr *iheader,
1389 Elf_Internal_Shdr *oheader,
1390 const unsigned int secnum)
1391{
1392 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1393 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1394 bfd_boolean changed = FALSE;
1395 unsigned int sh_link;
1396
1397 if (oheader->sh_type == SHT_NOBITS)
1398 {
1399 /* This is a feature for objcopy --only-keep-debug:
1400 When a section's type is changed to NOBITS, we preserve
1401 the sh_link and sh_info fields so that they can be
1402 matched up with the original.
1403
1404 Note: Strictly speaking these assignments are wrong.
1405 The sh_link and sh_info fields should point to the
1406 relevent sections in the output BFD, which may not be in
1407 the same location as they were in the input BFD. But
1408 the whole point of this action is to preserve the
1409 original values of the sh_link and sh_info fields, so
1410 that they can be matched up with the section headers in
1411 the original file. So strictly speaking we may be
1412 creating an invalid ELF file, but it is only for a file
1413 that just contains debug info and only for sections
1414 without any contents. */
1415 if (oheader->sh_link == 0)
1416 oheader->sh_link = iheader->sh_link;
1417 if (oheader->sh_info == 0)
1418 oheader->sh_info = iheader->sh_info;
1419 return TRUE;
1420 }
1421
1422 /* Allow the target a chance to decide how these fields should be set. */
1423 if (bed->elf_backend_copy_special_section_fields != NULL
1424 && bed->elf_backend_copy_special_section_fields
1425 (ibfd, obfd, iheader, oheader))
1426 return TRUE;
1427
1428 /* We have an iheader which might match oheader, and which has non-zero
1429 sh_info and/or sh_link fields. Attempt to follow those links and find
1430 the section in the output bfd which corresponds to the linked section
1431 in the input bfd. */
1432 if (iheader->sh_link != SHN_UNDEF)
1433 {
4f3ca05b
NC
1434 /* See PR 20931 for a reproducer. */
1435 if (iheader->sh_link >= elf_numsections (ibfd))
1436 {
76cfced5 1437 _bfd_error_handler
4f3ca05b 1438 /* xgettext:c-format */
9793eb77 1439 (_("%pB: invalid sh_link field (%d) in section number %d"),
4f3ca05b
NC
1440 ibfd, iheader->sh_link, secnum);
1441 return FALSE;
1442 }
1443
5522f910
NC
1444 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1445 if (sh_link != SHN_UNDEF)
1446 {
1447 oheader->sh_link = sh_link;
1448 changed = TRUE;
1449 }
1450 else
1451 /* FIXME: Should we install iheader->sh_link
1452 if we could not find a match ? */
76cfced5 1453 _bfd_error_handler
695344c0 1454 /* xgettext:c-format */
9793eb77 1455 (_("%pB: failed to find link section for section %d"), obfd, secnum);
5522f910
NC
1456 }
1457
1458 if (iheader->sh_info)
1459 {
1460 /* The sh_info field can hold arbitrary information, but if the
1461 SHF_LINK_INFO flag is set then it should be interpreted as a
1462 section index. */
1463 if (iheader->sh_flags & SHF_INFO_LINK)
1464 {
1465 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1466 iheader->sh_info);
1467 if (sh_link != SHN_UNDEF)
1468 oheader->sh_flags |= SHF_INFO_LINK;
1469 }
1470 else
1471 /* No idea what it means - just copy it. */
1472 sh_link = iheader->sh_info;
1473
1474 if (sh_link != SHN_UNDEF)
1475 {
1476 oheader->sh_info = sh_link;
1477 changed = TRUE;
1478 }
1479 else
76cfced5 1480 _bfd_error_handler
695344c0 1481 /* xgettext:c-format */
9793eb77 1482 (_("%pB: failed to find info section for section %d"), obfd, secnum);
5522f910
NC
1483 }
1484
1485 return changed;
1486}
07d6d2b8 1487
0ac4564e
L
1488/* Copy the program header and other data from one object module to
1489 another. */
252b5132 1490
b34976b6 1491bfd_boolean
217aa764 1492_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050 1493{
5522f910
NC
1494 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1495 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1496 const struct elf_backend_data *bed;
84865015
NC
1497 unsigned int i;
1498
2d502050 1499 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
84865015 1500 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1501 return TRUE;
2d502050 1502
57b828ef
L
1503 if (!elf_flags_init (obfd))
1504 {
1505 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1506 elf_flags_init (obfd) = TRUE;
1507 }
2d502050 1508
0ac4564e 1509 elf_gp (obfd) = elf_gp (ibfd);
57b828ef
L
1510
1511 /* Also copy the EI_OSABI field. */
1512 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1513 elf_elfheader (ibfd)->e_ident[EI_OSABI];
104d59d1 1514
5522f910
NC
1515 /* If set, copy the EI_ABIVERSION field. */
1516 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1517 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1518 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
07d6d2b8 1519
104d59d1
JM
1520 /* Copy object attributes. */
1521 _bfd_elf_copy_obj_attributes (ibfd, obfd);
63b9bbb7 1522
84865015
NC
1523 if (iheaders == NULL || oheaders == NULL)
1524 return TRUE;
63b9bbb7 1525
5522f910
NC
1526 bed = get_elf_backend_data (obfd);
1527
1528 /* Possibly copy other fields in the section header. */
84865015 1529 for (i = 1; i < elf_numsections (obfd); i++)
63b9bbb7 1530 {
84865015
NC
1531 unsigned int j;
1532 Elf_Internal_Shdr * oheader = oheaders[i];
63b9bbb7 1533
5522f910
NC
1534 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1535 because of a special case need for generating separate debug info
1536 files. See below for more details. */
84865015
NC
1537 if (oheader == NULL
1538 || (oheader->sh_type != SHT_NOBITS
5522f910
NC
1539 && oheader->sh_type < SHT_LOOS))
1540 continue;
1541
1542 /* Ignore empty sections, and sections whose
1543 fields have already been initialised. */
1544 if (oheader->sh_size == 0
84865015
NC
1545 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1546 continue;
63b9bbb7 1547
84865015 1548 /* Scan for the matching section in the input bfd.
5522f910
NC
1549 First we try for a direct mapping between the input and output sections. */
1550 for (j = 1; j < elf_numsections (ibfd); j++)
1551 {
1552 const Elf_Internal_Shdr * iheader = iheaders[j];
1553
1554 if (iheader == NULL)
1555 continue;
1556
1557 if (oheader->bfd_section != NULL
1558 && iheader->bfd_section != NULL
1559 && iheader->bfd_section->output_section != NULL
1560 && iheader->bfd_section->output_section == oheader->bfd_section)
1561 {
1562 /* We have found a connection from the input section to the
1563 output section. Attempt to copy the header fields. If
1564 this fails then do not try any further sections - there
1565 should only be a one-to-one mapping between input and output. */
1566 if (! copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1567 j = elf_numsections (ibfd);
1568 break;
1569 }
1570 }
1571
1572 if (j < elf_numsections (ibfd))
1573 continue;
1574
1575 /* That failed. So try to deduce the corresponding input section.
84865015
NC
1576 Unfortunately we cannot compare names as the output string table
1577 is empty, so instead we check size, address and type. */
1578 for (j = 1; j < elf_numsections (ibfd); j++)
1579 {
5522f910 1580 const Elf_Internal_Shdr * iheader = iheaders[j];
84865015 1581
5522f910
NC
1582 if (iheader == NULL)
1583 continue;
1584
1585 /* Try matching fields in the input section's header.
1586 Since --only-keep-debug turns all non-debug sections into
84865015
NC
1587 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1588 input type. */
1589 if ((oheader->sh_type == SHT_NOBITS
1590 || iheader->sh_type == oheader->sh_type)
5522f910
NC
1591 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1592 == (oheader->sh_flags & ~ SHF_INFO_LINK)
84865015
NC
1593 && iheader->sh_addralign == oheader->sh_addralign
1594 && iheader->sh_entsize == oheader->sh_entsize
1595 && iheader->sh_size == oheader->sh_size
1596 && iheader->sh_addr == oheader->sh_addr
1597 && (iheader->sh_info != oheader->sh_info
1598 || iheader->sh_link != oheader->sh_link))
63b9bbb7 1599 {
5522f910
NC
1600 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1601 break;
63b9bbb7
NC
1602 }
1603 }
5522f910
NC
1604
1605 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1606 {
1607 /* Final attempt. Call the backend copy function
1608 with a NULL input section. */
1609 if (bed->elf_backend_copy_special_section_fields != NULL)
1610 bed->elf_backend_copy_special_section_fields (ibfd, obfd, NULL, oheader);
1611 }
63b9bbb7
NC
1612 }
1613
b34976b6 1614 return TRUE;
2d502050
L
1615}
1616
cedc298e
L
1617static const char *
1618get_segment_type (unsigned int p_type)
1619{
1620 const char *pt;
1621 switch (p_type)
1622 {
1623 case PT_NULL: pt = "NULL"; break;
1624 case PT_LOAD: pt = "LOAD"; break;
1625 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1626 case PT_INTERP: pt = "INTERP"; break;
1627 case PT_NOTE: pt = "NOTE"; break;
1628 case PT_SHLIB: pt = "SHLIB"; break;
1629 case PT_PHDR: pt = "PHDR"; break;
1630 case PT_TLS: pt = "TLS"; break;
1631 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1632 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1633 case PT_GNU_RELRO: pt = "RELRO"; break;
1634 default: pt = NULL; break;
1635 }
1636 return pt;
1637}
1638
f0b79d91
L
1639/* Print out the program headers. */
1640
b34976b6 1641bfd_boolean
217aa764 1642_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1643{
a50b1753 1644 FILE *f = (FILE *) farg;
252b5132
RH
1645 Elf_Internal_Phdr *p;
1646 asection *s;
1647 bfd_byte *dynbuf = NULL;
1648
1649 p = elf_tdata (abfd)->phdr;
1650 if (p != NULL)
1651 {
1652 unsigned int i, c;
1653
1654 fprintf (f, _("\nProgram Header:\n"));
1655 c = elf_elfheader (abfd)->e_phnum;
1656 for (i = 0; i < c; i++, p++)
1657 {
cedc298e 1658 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1659 char buf[20];
1660
cedc298e 1661 if (pt == NULL)
252b5132 1662 {
cedc298e
L
1663 sprintf (buf, "0x%lx", p->p_type);
1664 pt = buf;
252b5132 1665 }
dc810e39 1666 fprintf (f, "%8s off 0x", pt);
60b89a18 1667 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1668 fprintf (f, " vaddr 0x");
60b89a18 1669 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1670 fprintf (f, " paddr 0x");
60b89a18 1671 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1672 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1673 fprintf (f, " filesz 0x");
60b89a18 1674 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1675 fprintf (f, " memsz 0x");
60b89a18 1676 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1677 fprintf (f, " flags %c%c%c",
1678 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1679 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1680 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1681 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1682 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1683 fprintf (f, "\n");
1684 }
1685 }
1686
1687 s = bfd_get_section_by_name (abfd, ".dynamic");
1688 if (s != NULL)
1689 {
cb33740c 1690 unsigned int elfsec;
dc810e39 1691 unsigned long shlink;
252b5132
RH
1692 bfd_byte *extdyn, *extdynend;
1693 size_t extdynsize;
217aa764 1694 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1695
1696 fprintf (f, _("\nDynamic Section:\n"));
1697
eea6121a 1698 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1699 goto error_return;
1700
1701 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1702 if (elfsec == SHN_BAD)
252b5132 1703 goto error_return;
dc810e39 1704 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1705
1706 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1707 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1708
1709 extdyn = dynbuf;
06614111
NC
1710 /* PR 17512: file: 6f427532. */
1711 if (s->size < extdynsize)
1712 goto error_return;
eea6121a 1713 extdynend = extdyn + s->size;
1036838a 1714 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
07d6d2b8 1715 Fix range check. */
1036838a 1716 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
252b5132
RH
1717 {
1718 Elf_Internal_Dyn dyn;
ad9563d6 1719 const char *name = "";
252b5132 1720 char ab[20];
b34976b6 1721 bfd_boolean stringp;
ad9563d6 1722 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1723
217aa764 1724 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1725
1726 if (dyn.d_tag == DT_NULL)
1727 break;
1728
b34976b6 1729 stringp = FALSE;
252b5132
RH
1730 switch (dyn.d_tag)
1731 {
1732 default:
ad9563d6
CM
1733 if (bed->elf_backend_get_target_dtag)
1734 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1735
1736 if (!strcmp (name, ""))
1737 {
cd9af601 1738 sprintf (ab, "%#" BFD_VMA_FMT "x", dyn.d_tag);
ad9563d6
CM
1739 name = ab;
1740 }
252b5132
RH
1741 break;
1742
b34976b6 1743 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1744 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1745 case DT_PLTGOT: name = "PLTGOT"; break;
1746 case DT_HASH: name = "HASH"; break;
1747 case DT_STRTAB: name = "STRTAB"; break;
1748 case DT_SYMTAB: name = "SYMTAB"; break;
1749 case DT_RELA: name = "RELA"; break;
1750 case DT_RELASZ: name = "RELASZ"; break;
1751 case DT_RELAENT: name = "RELAENT"; break;
1752 case DT_STRSZ: name = "STRSZ"; break;
1753 case DT_SYMENT: name = "SYMENT"; break;
1754 case DT_INIT: name = "INIT"; break;
1755 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1756 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1757 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1758 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1759 case DT_REL: name = "REL"; break;
1760 case DT_RELSZ: name = "RELSZ"; break;
1761 case DT_RELENT: name = "RELENT"; break;
1762 case DT_PLTREL: name = "PLTREL"; break;
1763 case DT_DEBUG: name = "DEBUG"; break;
1764 case DT_TEXTREL: name = "TEXTREL"; break;
1765 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1766 case DT_BIND_NOW: name = "BIND_NOW"; break;
1767 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1768 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1769 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1770 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1771 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1772 case DT_FLAGS: name = "FLAGS"; break;
1773 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1774 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1775 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1776 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1777 case DT_MOVEENT: name = "MOVEENT"; break;
1778 case DT_MOVESZ: name = "MOVESZ"; break;
1779 case DT_FEATURE: name = "FEATURE"; break;
1780 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1781 case DT_SYMINSZ: name = "SYMINSZ"; break;
1782 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1783 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1784 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1785 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1786 case DT_PLTPAD: name = "PLTPAD"; break;
1787 case DT_MOVETAB: name = "MOVETAB"; break;
1788 case DT_SYMINFO: name = "SYMINFO"; break;
1789 case DT_RELACOUNT: name = "RELACOUNT"; break;
1790 case DT_RELCOUNT: name = "RELCOUNT"; break;
1791 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1792 case DT_VERSYM: name = "VERSYM"; break;
1793 case DT_VERDEF: name = "VERDEF"; break;
1794 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1795 case DT_VERNEED: name = "VERNEED"; break;
1796 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1797 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1798 case DT_USED: name = "USED"; break;
b34976b6 1799 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1800 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1801 }
1802
ad9563d6 1803 fprintf (f, " %-20s ", name);
252b5132 1804 if (! stringp)
a1f3c56e
AN
1805 {
1806 fprintf (f, "0x");
1807 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1808 }
252b5132
RH
1809 else
1810 {
1811 const char *string;
dc810e39 1812 unsigned int tagv = dyn.d_un.d_val;
252b5132 1813
dc810e39 1814 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1815 if (string == NULL)
1816 goto error_return;
1817 fprintf (f, "%s", string);
1818 }
1819 fprintf (f, "\n");
1820 }
1821
1822 free (dynbuf);
1823 dynbuf = NULL;
1824 }
1825
1826 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1827 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1828 {
fc0e6df6 1829 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1830 return FALSE;
252b5132
RH
1831 }
1832
1833 if (elf_dynverdef (abfd) != 0)
1834 {
1835 Elf_Internal_Verdef *t;
1836
1837 fprintf (f, _("\nVersion definitions:\n"));
1838 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1839 {
1840 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1841 t->vd_flags, t->vd_hash,
1842 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1843 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1844 {
1845 Elf_Internal_Verdaux *a;
1846
1847 fprintf (f, "\t");
1848 for (a = t->vd_auxptr->vda_nextptr;
1849 a != NULL;
1850 a = a->vda_nextptr)
d0fb9a8d
JJ
1851 fprintf (f, "%s ",
1852 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1853 fprintf (f, "\n");
1854 }
1855 }
1856 }
1857
1858 if (elf_dynverref (abfd) != 0)
1859 {
1860 Elf_Internal_Verneed *t;
1861
1862 fprintf (f, _("\nVersion References:\n"));
1863 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1864 {
1865 Elf_Internal_Vernaux *a;
1866
d0fb9a8d
JJ
1867 fprintf (f, _(" required from %s:\n"),
1868 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1869 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1870 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1871 a->vna_flags, a->vna_other,
1872 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1873 }
1874 }
1875
b34976b6 1876 return TRUE;
252b5132
RH
1877
1878 error_return:
1879 if (dynbuf != NULL)
1880 free (dynbuf);
b34976b6 1881 return FALSE;
252b5132
RH
1882}
1883
bb4d2ac2
L
1884/* Get version string. */
1885
1886const char *
60bb06bc
L
1887_bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1888 bfd_boolean *hidden)
bb4d2ac2
L
1889{
1890 const char *version_string = NULL;
1891 if (elf_dynversym (abfd) != 0
1892 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1893 {
1894 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1895
1896 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1897 vernum &= VERSYM_VERSION;
1898
1899 if (vernum == 0)
1900 version_string = "";
1f6f5dba
L
1901 else if (vernum == 1
1902 && (vernum > elf_tdata (abfd)->cverdefs
1903 || (elf_tdata (abfd)->verdef[0].vd_flags
1904 == VER_FLG_BASE)))
bb4d2ac2
L
1905 version_string = "Base";
1906 else if (vernum <= elf_tdata (abfd)->cverdefs)
1907 version_string =
1908 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1909 else
1910 {
1911 Elf_Internal_Verneed *t;
1912
7a815dd5 1913 version_string = _("<corrupt>");
bb4d2ac2
L
1914 for (t = elf_tdata (abfd)->verref;
1915 t != NULL;
1916 t = t->vn_nextref)
1917 {
1918 Elf_Internal_Vernaux *a;
1919
1920 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1921 {
1922 if (a->vna_other == vernum)
1923 {
1924 version_string = a->vna_nodename;
1925 break;
1926 }
1927 }
1928 }
1929 }
1930 }
1931 return version_string;
1932}
1933
252b5132
RH
1934/* Display ELF-specific fields of a symbol. */
1935
1936void
217aa764
AM
1937bfd_elf_print_symbol (bfd *abfd,
1938 void *filep,
1939 asymbol *symbol,
1940 bfd_print_symbol_type how)
252b5132 1941{
a50b1753 1942 FILE *file = (FILE *) filep;
252b5132
RH
1943 switch (how)
1944 {
1945 case bfd_print_symbol_name:
1946 fprintf (file, "%s", symbol->name);
1947 break;
1948 case bfd_print_symbol_more:
1949 fprintf (file, "elf ");
60b89a18 1950 bfd_fprintf_vma (abfd, file, symbol->value);
cd9af601 1951 fprintf (file, " %x", symbol->flags);
252b5132
RH
1952 break;
1953 case bfd_print_symbol_all:
1954 {
4e8a9624
AM
1955 const char *section_name;
1956 const char *name = NULL;
9c5bfbb7 1957 const struct elf_backend_data *bed;
7a13edea 1958 unsigned char st_other;
dbb410c3 1959 bfd_vma val;
bb4d2ac2
L
1960 const char *version_string;
1961 bfd_boolean hidden;
c044fabd 1962
252b5132 1963 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1964
1965 bed = get_elf_backend_data (abfd);
1966 if (bed->elf_backend_print_symbol_all)
c044fabd 1967 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1968
1969 if (name == NULL)
1970 {
7ee38065 1971 name = symbol->name;
217aa764 1972 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1973 }
1974
252b5132
RH
1975 fprintf (file, " %s\t", section_name);
1976 /* Print the "other" value for a symbol. For common symbols,
1977 we've already printed the size; now print the alignment.
1978 For other symbols, we have no specified alignment, and
1979 we've printed the address; now print the size. */
dcf6c779 1980 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1981 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1982 else
1983 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1984 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1985
1986 /* If we have version information, print it. */
60bb06bc
L
1987 version_string = _bfd_elf_get_symbol_version_string (abfd,
1988 symbol,
1989 &hidden);
bb4d2ac2 1990 if (version_string)
252b5132 1991 {
bb4d2ac2 1992 if (!hidden)
252b5132
RH
1993 fprintf (file, " %-11s", version_string);
1994 else
1995 {
1996 int i;
1997
1998 fprintf (file, " (%s)", version_string);
1999 for (i = 10 - strlen (version_string); i > 0; --i)
2000 putc (' ', file);
2001 }
2002 }
2003
2004 /* If the st_other field is not zero, print it. */
7a13edea 2005 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 2006
7a13edea
NC
2007 switch (st_other)
2008 {
2009 case 0: break;
2010 case STV_INTERNAL: fprintf (file, " .internal"); break;
2011 case STV_HIDDEN: fprintf (file, " .hidden"); break;
2012 case STV_PROTECTED: fprintf (file, " .protected"); break;
2013 default:
2014 /* Some other non-defined flags are also present, so print
2015 everything hex. */
2016 fprintf (file, " 0x%02x", (unsigned int) st_other);
2017 }
252b5132 2018
587ff49e 2019 fprintf (file, " %s", name);
252b5132
RH
2020 }
2021 break;
2022 }
2023}
252b5132
RH
2024\f
2025/* ELF .o/exec file reading */
2026
c044fabd 2027/* Create a new bfd section from an ELF section header. */
252b5132 2028
b34976b6 2029bfd_boolean
217aa764 2030bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 2031{
4fbb74a6
AM
2032 Elf_Internal_Shdr *hdr;
2033 Elf_Internal_Ehdr *ehdr;
2034 const struct elf_backend_data *bed;
90937f86 2035 const char *name;
bf67003b
NC
2036 bfd_boolean ret = TRUE;
2037 static bfd_boolean * sections_being_created = NULL;
5a4b0ccc 2038 static bfd * sections_being_created_abfd = NULL;
bf67003b 2039 static unsigned int nesting = 0;
252b5132 2040
4fbb74a6
AM
2041 if (shindex >= elf_numsections (abfd))
2042 return FALSE;
2043
bf67003b
NC
2044 if (++ nesting > 3)
2045 {
2046 /* PR17512: A corrupt ELF binary might contain a recursive group of
67ce483b 2047 sections, with each the string indices pointing to the next in the
bf67003b
NC
2048 loop. Detect this here, by refusing to load a section that we are
2049 already in the process of loading. We only trigger this test if
2050 we have nested at least three sections deep as normal ELF binaries
5a4b0ccc
NC
2051 can expect to recurse at least once.
2052
2053 FIXME: It would be better if this array was attached to the bfd,
2054 rather than being held in a static pointer. */
2055
2056 if (sections_being_created_abfd != abfd)
2057 sections_being_created = NULL;
bf67003b
NC
2058 if (sections_being_created == NULL)
2059 {
446f7ed5
AM
2060 size_t amt = elf_numsections (abfd) * sizeof (bfd_boolean);
2061 sections_being_created = (bfd_boolean *) bfd_zalloc (abfd, amt);
96d3b80f
AM
2062 if (sections_being_created == NULL)
2063 return FALSE;
5a4b0ccc 2064 sections_being_created_abfd = abfd;
bf67003b
NC
2065 }
2066 if (sections_being_created [shindex])
2067 {
4eca0228 2068 _bfd_error_handler
871b3ab2 2069 (_("%pB: warning: loop in section dependencies detected"), abfd);
bf67003b
NC
2070 return FALSE;
2071 }
2072 sections_being_created [shindex] = TRUE;
2073 }
2074
4fbb74a6
AM
2075 hdr = elf_elfsections (abfd)[shindex];
2076 ehdr = elf_elfheader (abfd);
2077 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 2078 hdr->sh_name);
933d961a 2079 if (name == NULL)
bf67003b 2080 goto fail;
252b5132 2081
4fbb74a6 2082 bed = get_elf_backend_data (abfd);
252b5132
RH
2083 switch (hdr->sh_type)
2084 {
2085 case SHT_NULL:
2086 /* Inactive section. Throw it away. */
bf67003b 2087 goto success;
252b5132 2088
bf67003b
NC
2089 case SHT_PROGBITS: /* Normal section with contents. */
2090 case SHT_NOBITS: /* .bss section. */
2091 case SHT_HASH: /* .hash section. */
2092 case SHT_NOTE: /* .note section. */
25e27870
L
2093 case SHT_INIT_ARRAY: /* .init_array section. */
2094 case SHT_FINI_ARRAY: /* .fini_array section. */
2095 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 2096 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 2097 case SHT_GNU_HASH: /* .gnu.hash section. */
bf67003b
NC
2098 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2099 goto success;
252b5132 2100
797fc050 2101 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 2102 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2103 goto fail;
2104
cfcac11d
NC
2105 if (hdr->sh_link > elf_numsections (abfd))
2106 {
caa83f8b 2107 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
2108 field set to SHN_BEFORE or SHN_AFTER. */
2109 switch (bfd_get_arch (abfd))
2110 {
caa83f8b 2111 case bfd_arch_i386:
cfcac11d
NC
2112 case bfd_arch_sparc:
2113 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
2114 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
2115 break;
2116 /* Otherwise fall through. */
2117 default:
bf67003b 2118 goto fail;
cfcac11d
NC
2119 }
2120 }
2121 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
bf67003b 2122 goto fail;
cfcac11d 2123 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
2124 {
2125 Elf_Internal_Shdr *dynsymhdr;
2126
2127 /* The shared libraries distributed with hpux11 have a bogus
2128 sh_link field for the ".dynamic" section. Find the
2129 string table for the ".dynsym" section instead. */
2130 if (elf_dynsymtab (abfd) != 0)
2131 {
2132 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2133 hdr->sh_link = dynsymhdr->sh_link;
2134 }
2135 else
2136 {
2137 unsigned int i, num_sec;
2138
2139 num_sec = elf_numsections (abfd);
2140 for (i = 1; i < num_sec; i++)
2141 {
2142 dynsymhdr = elf_elfsections (abfd)[i];
2143 if (dynsymhdr->sh_type == SHT_DYNSYM)
2144 {
2145 hdr->sh_link = dynsymhdr->sh_link;
2146 break;
2147 }
2148 }
2149 }
2150 }
bf67003b 2151 goto success;
797fc050 2152
bf67003b 2153 case SHT_SYMTAB: /* A symbol table. */
252b5132 2154 if (elf_onesymtab (abfd) == shindex)
bf67003b 2155 goto success;
252b5132 2156
a50b2160 2157 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2158 goto fail;
2159
3337c1e5 2160 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
eee3b786
AM
2161 {
2162 if (hdr->sh_size != 0)
bf67003b 2163 goto fail;
eee3b786
AM
2164 /* Some assemblers erroneously set sh_info to one with a
2165 zero sh_size. ld sees this as a global symbol count
2166 of (unsigned) -1. Fix it here. */
2167 hdr->sh_info = 0;
bf67003b 2168 goto success;
eee3b786 2169 }
bf67003b 2170
16ad13ec
NC
2171 /* PR 18854: A binary might contain more than one symbol table.
2172 Unusual, but possible. Warn, but continue. */
2173 if (elf_onesymtab (abfd) != 0)
2174 {
4eca0228 2175 _bfd_error_handler
695344c0 2176 /* xgettext:c-format */
871b3ab2 2177 (_("%pB: warning: multiple symbol tables detected"
63a5468a 2178 " - ignoring the table in section %u"),
16ad13ec
NC
2179 abfd, shindex);
2180 goto success;
2181 }
252b5132 2182 elf_onesymtab (abfd) = shindex;
6a40cf0c
NC
2183 elf_symtab_hdr (abfd) = *hdr;
2184 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
252b5132
RH
2185 abfd->flags |= HAS_SYMS;
2186
2187 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
2188 SHF_ALLOC is set, and this is a shared object, then we also
2189 treat this section as a BFD section. We can not base the
2190 decision purely on SHF_ALLOC, because that flag is sometimes
2191 set in a relocatable object file, which would confuse the
2192 linker. */
252b5132
RH
2193 if ((hdr->sh_flags & SHF_ALLOC) != 0
2194 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
2195 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2196 shindex))
bf67003b 2197 goto fail;
252b5132 2198
1b3a8575
AM
2199 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2200 can't read symbols without that section loaded as well. It
2201 is most likely specified by the next section header. */
6a40cf0c
NC
2202 {
2203 elf_section_list * entry;
2204 unsigned int i, num_sec;
1b3a8575 2205
6a40cf0c
NC
2206 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2207 if (entry->hdr.sh_link == shindex)
2208 goto success;
2209
2210 num_sec = elf_numsections (abfd);
2211 for (i = shindex + 1; i < num_sec; i++)
2212 {
2213 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2214
2215 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2216 && hdr2->sh_link == shindex)
2217 break;
2218 }
2219
2220 if (i == num_sec)
2221 for (i = 1; i < shindex; i++)
1b3a8575
AM
2222 {
2223 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
6a40cf0c 2224
1b3a8575
AM
2225 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2226 && hdr2->sh_link == shindex)
2227 break;
2228 }
6a40cf0c
NC
2229
2230 if (i != shindex)
2231 ret = bfd_section_from_shdr (abfd, i);
2232 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2233 goto success;
2234 }
252b5132 2235
bf67003b 2236 case SHT_DYNSYM: /* A dynamic symbol table. */
252b5132 2237 if (elf_dynsymtab (abfd) == shindex)
bf67003b 2238 goto success;
252b5132 2239
a50b2160 2240 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2241 goto fail;
2242
eee3b786
AM
2243 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2244 {
2245 if (hdr->sh_size != 0)
bf67003b
NC
2246 goto fail;
2247
eee3b786
AM
2248 /* Some linkers erroneously set sh_info to one with a
2249 zero sh_size. ld sees this as a global symbol count
2250 of (unsigned) -1. Fix it here. */
2251 hdr->sh_info = 0;
bf67003b 2252 goto success;
eee3b786 2253 }
bf67003b 2254
16ad13ec
NC
2255 /* PR 18854: A binary might contain more than one dynamic symbol table.
2256 Unusual, but possible. Warn, but continue. */
2257 if (elf_dynsymtab (abfd) != 0)
2258 {
4eca0228 2259 _bfd_error_handler
695344c0 2260 /* xgettext:c-format */
871b3ab2 2261 (_("%pB: warning: multiple dynamic symbol tables detected"
63a5468a 2262 " - ignoring the table in section %u"),
16ad13ec
NC
2263 abfd, shindex);
2264 goto success;
2265 }
252b5132
RH
2266 elf_dynsymtab (abfd) = shindex;
2267 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2268 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2269 abfd->flags |= HAS_SYMS;
2270
2271 /* Besides being a symbol table, we also treat this as a regular
2272 section, so that objcopy can handle it. */
bf67003b
NC
2273 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2274 goto success;
252b5132 2275
bf67003b 2276 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
6a40cf0c
NC
2277 {
2278 elf_section_list * entry;
9ad5cbcf 2279
6a40cf0c
NC
2280 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2281 if (entry->ndx == shindex)
2282 goto success;
07d6d2b8 2283
7a6e0d89 2284 entry = bfd_alloc (abfd, sizeof (*entry));
6a40cf0c
NC
2285 if (entry == NULL)
2286 goto fail;
2287 entry->ndx = shindex;
2288 entry->hdr = * hdr;
2289 entry->next = elf_symtab_shndx_list (abfd);
2290 elf_symtab_shndx_list (abfd) = entry;
2291 elf_elfsections (abfd)[shindex] = & entry->hdr;
2292 goto success;
2293 }
9ad5cbcf 2294
bf67003b 2295 case SHT_STRTAB: /* A string table. */
252b5132 2296 if (hdr->bfd_section != NULL)
bf67003b
NC
2297 goto success;
2298
252b5132
RH
2299 if (ehdr->e_shstrndx == shindex)
2300 {
2301 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2302 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
bf67003b 2303 goto success;
252b5132 2304 }
bf67003b 2305
1b3a8575
AM
2306 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2307 {
2308 symtab_strtab:
2309 elf_tdata (abfd)->strtab_hdr = *hdr;
2310 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
bf67003b 2311 goto success;
1b3a8575 2312 }
bf67003b 2313
1b3a8575
AM
2314 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2315 {
2316 dynsymtab_strtab:
2317 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2318 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2319 elf_elfsections (abfd)[shindex] = hdr;
2320 /* We also treat this as a regular section, so that objcopy
2321 can handle it. */
bf67003b
NC
2322 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2323 shindex);
2324 goto success;
1b3a8575 2325 }
252b5132 2326
1b3a8575
AM
2327 /* If the string table isn't one of the above, then treat it as a
2328 regular section. We need to scan all the headers to be sure,
2329 just in case this strtab section appeared before the above. */
2330 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2331 {
2332 unsigned int i, num_sec;
252b5132 2333
1b3a8575
AM
2334 num_sec = elf_numsections (abfd);
2335 for (i = 1; i < num_sec; i++)
2336 {
2337 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2338 if (hdr2->sh_link == shindex)
2339 {
933d961a
JJ
2340 /* Prevent endless recursion on broken objects. */
2341 if (i == shindex)
bf67003b 2342 goto fail;
1b3a8575 2343 if (! bfd_section_from_shdr (abfd, i))
bf67003b 2344 goto fail;
1b3a8575
AM
2345 if (elf_onesymtab (abfd) == i)
2346 goto symtab_strtab;
2347 if (elf_dynsymtab (abfd) == i)
2348 goto dynsymtab_strtab;
2349 }
2350 }
2351 }
bf67003b
NC
2352 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2353 goto success;
252b5132
RH
2354
2355 case SHT_REL:
2356 case SHT_RELA:
2357 /* *These* do a lot of work -- but build no sections! */
2358 {
2359 asection *target_sect;
d4730f92 2360 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 2361 unsigned int num_sec = elf_numsections (abfd);
d4730f92 2362 struct bfd_elf_section_data *esdt;
252b5132 2363
aa2ca951
JJ
2364 if (hdr->sh_entsize
2365 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160 2366 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
bf67003b 2367 goto fail;
a50b2160 2368
03ae5f59 2369 /* Check for a bogus link to avoid crashing. */
4fbb74a6 2370 if (hdr->sh_link >= num_sec)
03ae5f59 2371 {
4eca0228 2372 _bfd_error_handler
695344c0 2373 /* xgettext:c-format */
871b3ab2 2374 (_("%pB: invalid link %u for reloc section %s (index %u)"),
4eca0228 2375 abfd, hdr->sh_link, name, shindex);
bf67003b
NC
2376 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2377 shindex);
2378 goto success;
03ae5f59
ILT
2379 }
2380
252b5132
RH
2381 /* For some incomprehensible reason Oracle distributes
2382 libraries for Solaris in which some of the objects have
2383 bogus sh_link fields. It would be nice if we could just
2384 reject them, but, unfortunately, some people need to use
2385 them. We scan through the section headers; if we find only
2386 one suitable symbol table, we clobber the sh_link to point
83b89087
L
2387 to it. I hope this doesn't break anything.
2388
2389 Don't do it on executable nor shared library. */
2390 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2391 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
2392 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2393 {
9ad5cbcf 2394 unsigned int scan;
252b5132
RH
2395 int found;
2396
2397 found = 0;
9ad5cbcf 2398 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2399 {
2400 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2401 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2402 {
2403 if (found != 0)
2404 {
2405 found = 0;
2406 break;
2407 }
2408 found = scan;
2409 }
2410 }
2411 if (found != 0)
2412 hdr->sh_link = found;
2413 }
2414
2415 /* Get the symbol table. */
1b3a8575
AM
2416 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2417 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2418 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
bf67003b 2419 goto fail;
252b5132 2420
a4bcd733
AM
2421 /* If this is an alloc section in an executable or shared
2422 library, or the reloc section does not use the main symbol
2423 table we don't treat it as a reloc section. BFD can't
2424 adequately represent such a section, so at least for now,
2425 we don't try. We just present it as a normal section. We
2426 also can't use it as a reloc section if it points to the
2427 null section, an invalid section, another reloc section, or
2428 its sh_link points to the null section. */
2429 if (((abfd->flags & (DYNAMIC | EXEC_P)) != 0
2430 && (hdr->sh_flags & SHF_ALLOC) != 0)
83b89087 2431 || hdr->sh_link == SHN_UNDEF
a4bcd733 2432 || hdr->sh_link != elf_onesymtab (abfd)
185ef66d 2433 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
2434 || hdr->sh_info >= num_sec
2435 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2436 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
bf67003b
NC
2437 {
2438 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2439 shindex);
2440 goto success;
2441 }
252b5132
RH
2442
2443 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
bf67003b
NC
2444 goto fail;
2445
252b5132
RH
2446 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2447 if (target_sect == NULL)
bf67003b 2448 goto fail;
252b5132 2449
d4730f92
BS
2450 esdt = elf_section_data (target_sect);
2451 if (hdr->sh_type == SHT_RELA)
2452 p_hdr = &esdt->rela.hdr;
252b5132 2453 else
d4730f92
BS
2454 p_hdr = &esdt->rel.hdr;
2455
a7ba3896
NC
2456 /* PR 17512: file: 0b4f81b7.
2457 Also see PR 24456, for a file which deliberately has two reloc
2458 sections. */
06614111 2459 if (*p_hdr != NULL)
a7ba3896
NC
2460 {
2461 _bfd_error_handler
2462 /* xgettext:c-format */
2463 (_("%pB: warning: multiple relocation sections for section %pA \
2464found - ignoring all but the first"),
2465 abfd, target_sect);
2466 goto success;
2467 }
ef53be89 2468 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
d4730f92 2469 if (hdr2 == NULL)
bf67003b 2470 goto fail;
252b5132 2471 *hdr2 = *hdr;
d4730f92 2472 *p_hdr = hdr2;
252b5132 2473 elf_elfsections (abfd)[shindex] = hdr2;
056bafd4
MR
2474 target_sect->reloc_count += (NUM_SHDR_ENTRIES (hdr)
2475 * bed->s->int_rels_per_ext_rel);
252b5132
RH
2476 target_sect->flags |= SEC_RELOC;
2477 target_sect->relocation = NULL;
2478 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2479 /* In the section to which the relocations apply, mark whether
2480 its relocations are of the REL or RELA variety. */
72730e0c 2481 if (hdr->sh_size != 0)
d4730f92
BS
2482 {
2483 if (hdr->sh_type == SHT_RELA)
2484 target_sect->use_rela_p = 1;
2485 }
252b5132 2486 abfd->flags |= HAS_RELOC;
bf67003b 2487 goto success;
252b5132 2488 }
252b5132
RH
2489
2490 case SHT_GNU_verdef:
2491 elf_dynverdef (abfd) = shindex;
2492 elf_tdata (abfd)->dynverdef_hdr = *hdr;
bf67003b
NC
2493 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2494 goto success;
252b5132
RH
2495
2496 case SHT_GNU_versym:
a50b2160 2497 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
bf67003b
NC
2498 goto fail;
2499
252b5132
RH
2500 elf_dynversym (abfd) = shindex;
2501 elf_tdata (abfd)->dynversym_hdr = *hdr;
bf67003b
NC
2502 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2503 goto success;
252b5132
RH
2504
2505 case SHT_GNU_verneed:
2506 elf_dynverref (abfd) = shindex;
2507 elf_tdata (abfd)->dynverref_hdr = *hdr;
bf67003b
NC
2508 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2509 goto success;
252b5132
RH
2510
2511 case SHT_SHLIB:
bf67003b 2512 goto success;
252b5132 2513
dbb410c3 2514 case SHT_GROUP:
44534af3 2515 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
bf67003b
NC
2516 goto fail;
2517
6dc132d9 2518 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2519 goto fail;
2520
bf67003b 2521 goto success;
dbb410c3 2522
252b5132 2523 default:
104d59d1
JM
2524 /* Possibly an attributes section. */
2525 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2526 || hdr->sh_type == bed->obj_attrs_section_type)
2527 {
2528 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2529 goto fail;
104d59d1 2530 _bfd_elf_parse_attributes (abfd, hdr);
bf67003b 2531 goto success;
104d59d1
JM
2532 }
2533
252b5132 2534 /* Check for any processor-specific section types. */
3eb70a79 2535 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2536 goto success;
3eb70a79
L
2537
2538 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2539 {
2540 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2541 /* FIXME: How to properly handle allocated section reserved
2542 for applications? */
4eca0228 2543 _bfd_error_handler
695344c0 2544 /* xgettext:c-format */
871b3ab2 2545 (_("%pB: unknown type [%#x] section `%s'"),
76cfced5 2546 abfd, hdr->sh_type, name);
3eb70a79 2547 else
bf67003b
NC
2548 {
2549 /* Allow sections reserved for applications. */
2550 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2551 shindex);
2552 goto success;
2553 }
3eb70a79
L
2554 }
2555 else if (hdr->sh_type >= SHT_LOPROC
2556 && hdr->sh_type <= SHT_HIPROC)
2557 /* FIXME: We should handle this section. */
4eca0228 2558 _bfd_error_handler
695344c0 2559 /* xgettext:c-format */
871b3ab2 2560 (_("%pB: unknown type [%#x] section `%s'"),
76cfced5 2561 abfd, hdr->sh_type, name);
3eb70a79 2562 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
2563 {
2564 /* Unrecognised OS-specific sections. */
2565 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2566 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 2567 required to correctly process the section and the file should
ff15b240 2568 be rejected with an error message. */
4eca0228 2569 _bfd_error_handler
695344c0 2570 /* xgettext:c-format */
871b3ab2 2571 (_("%pB: unknown type [%#x] section `%s'"),
76cfced5 2572 abfd, hdr->sh_type, name);
ff15b240 2573 else
bf67003b
NC
2574 {
2575 /* Otherwise it should be processed. */
2576 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2577 goto success;
2578 }
ff15b240 2579 }
3eb70a79
L
2580 else
2581 /* FIXME: We should handle this section. */
4eca0228 2582 _bfd_error_handler
695344c0 2583 /* xgettext:c-format */
871b3ab2 2584 (_("%pB: unknown type [%#x] section `%s'"),
76cfced5 2585 abfd, hdr->sh_type, name);
3eb70a79 2586
bf67003b 2587 goto fail;
252b5132
RH
2588 }
2589
bf67003b
NC
2590 fail:
2591 ret = FALSE;
2592 success:
e5b470e2 2593 if (sections_being_created && sections_being_created_abfd == abfd)
bf67003b
NC
2594 sections_being_created [shindex] = FALSE;
2595 if (-- nesting == 0)
5a4b0ccc
NC
2596 {
2597 sections_being_created = NULL;
2598 sections_being_created_abfd = abfd;
2599 }
bf67003b 2600 return ret;
252b5132
RH
2601}
2602
87d72d41 2603/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2604
87d72d41
AM
2605Elf_Internal_Sym *
2606bfd_sym_from_r_symndx (struct sym_cache *cache,
2607 bfd *abfd,
2608 unsigned long r_symndx)
ec338859 2609{
ec338859
AM
2610 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2611
a5d1b3b5
AM
2612 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2613 {
2614 Elf_Internal_Shdr *symtab_hdr;
2615 unsigned char esym[sizeof (Elf64_External_Sym)];
2616 Elf_External_Sym_Shndx eshndx;
ec338859 2617
a5d1b3b5
AM
2618 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2619 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2620 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2621 return NULL;
9ad5cbcf 2622
a5d1b3b5
AM
2623 if (cache->abfd != abfd)
2624 {
2625 memset (cache->indx, -1, sizeof (cache->indx));
2626 cache->abfd = abfd;
2627 }
2628 cache->indx[ent] = r_symndx;
ec338859 2629 }
a5d1b3b5 2630
87d72d41 2631 return &cache->sym[ent];
ec338859
AM
2632}
2633
252b5132
RH
2634/* Given an ELF section number, retrieve the corresponding BFD
2635 section. */
2636
2637asection *
91d6fa6a 2638bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2639{
91d6fa6a 2640 if (sec_index >= elf_numsections (abfd))
252b5132 2641 return NULL;
91d6fa6a 2642 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2643}
2644
b35d266b 2645static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2646{
0112cd26 2647 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 2648 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2649};
2650
b35d266b 2651static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2652{
0112cd26 2653 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
1ff6de03 2654 { STRING_COMMA_LEN (".ctf"), 0, SHT_PROGBITS, 0 },
07d6d2b8 2655 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2656};
2657
b35d266b 2658static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2659{
07d6d2b8
AM
2660 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2661 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
a9a72a65
DE
2662 /* There are more DWARF sections than these, but they needn't be added here
2663 unless you have to cope with broken compilers that don't emit section
2664 attributes or you want to help the user writing assembler. */
07d6d2b8
AM
2665 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2666 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2667 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2668 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
0112cd26 2669 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
07d6d2b8
AM
2670 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2671 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2672 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2673 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2674};
2675
b35d266b 2676static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2677{
07d6d2b8 2678 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
6f9dbcd4 2679 { STRING_COMMA_LEN (".fini_array"), -2, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
07d6d2b8 2680 { NULL, 0 , 0, 0, 0 }
7f4d3958
L
2681};
2682
b35d266b 2683static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2684{
0112cd26 2685 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
2686 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
2687 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2688 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
0112cd26
NC
2689 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2690 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
07d6d2b8
AM
2691 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2692 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2693 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2694 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2695};
2696
b35d266b 2697static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2698{
07d6d2b8
AM
2699 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2700 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2701};
2702
b35d266b 2703static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2704{
07d6d2b8 2705 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
6f9dbcd4 2706 { STRING_COMMA_LEN (".init_array"), -2, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
2707 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2708 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2709};
2710
b35d266b 2711static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2712{
0112cd26 2713 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
07d6d2b8 2714 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2715};
2716
b35d266b 2717static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2718{
0112cd26 2719 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
07d6d2b8
AM
2720 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2721 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2722};
2723
b35d266b 2724static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2725{
6f9dbcd4 2726 { STRING_COMMA_LEN (".preinit_array"), -2, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
2727 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2728 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2729};
2730
b35d266b 2731static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2732{
0112cd26
NC
2733 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2734 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
07d6d2b8
AM
2735 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2736 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2737 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2738};
2739
b35d266b 2740static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2741{
0112cd26
NC
2742 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2743 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2744 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2745 /* See struct bfd_elf_special_section declaration for the semantics of
2746 this special case where .prefix_length != strlen (.prefix). */
2747 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
07d6d2b8 2748 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2749};
2750
b35d266b 2751static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2752{
07d6d2b8
AM
2753 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2754 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
0112cd26 2755 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
07d6d2b8 2756 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2757};
2758
1b315056
CS
2759static const struct bfd_elf_special_section special_sections_z[] =
2760{
07d6d2b8
AM
2761 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2762 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
1b315056
CS
2763 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2764 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
07d6d2b8 2765 { NULL, 0, 0, 0, 0 }
1b315056
CS
2766};
2767
e4c93b56 2768static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2769{
7f4d3958 2770 special_sections_b, /* 'b' */
98ece1b3 2771 special_sections_c, /* 'c' */
7f4d3958
L
2772 special_sections_d, /* 'd' */
2773 NULL, /* 'e' */
2774 special_sections_f, /* 'f' */
2775 special_sections_g, /* 'g' */
2776 special_sections_h, /* 'h' */
2777 special_sections_i, /* 'i' */
2778 NULL, /* 'j' */
2779 NULL, /* 'k' */
2780 special_sections_l, /* 'l' */
2781 NULL, /* 'm' */
2782 special_sections_n, /* 'n' */
2783 NULL, /* 'o' */
2784 special_sections_p, /* 'p' */
2785 NULL, /* 'q' */
2786 special_sections_r, /* 'r' */
2787 special_sections_s, /* 's' */
2788 special_sections_t, /* 't' */
1b315056
CS
2789 NULL, /* 'u' */
2790 NULL, /* 'v' */
2791 NULL, /* 'w' */
2792 NULL, /* 'x' */
2793 NULL, /* 'y' */
2794 special_sections_z /* 'z' */
7f4d3958
L
2795};
2796
551b43fd
AM
2797const struct bfd_elf_special_section *
2798_bfd_elf_get_special_section (const char *name,
2799 const struct bfd_elf_special_section *spec,
2800 unsigned int rela)
2f89ff8d
L
2801{
2802 int i;
7f4d3958 2803 int len;
7f4d3958 2804
551b43fd 2805 len = strlen (name);
7f4d3958 2806
551b43fd 2807 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2808 {
2809 int suffix_len;
551b43fd 2810 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2811
2812 if (len < prefix_len)
2813 continue;
551b43fd 2814 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2815 continue;
2816
551b43fd 2817 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2818 if (suffix_len <= 0)
2819 {
2820 if (name[prefix_len] != 0)
2821 {
2822 if (suffix_len == 0)
2823 continue;
2824 if (name[prefix_len] != '.'
2825 && (suffix_len == -2
551b43fd 2826 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2827 continue;
2828 }
2829 }
2830 else
2831 {
2832 if (len < prefix_len + suffix_len)
2833 continue;
2834 if (memcmp (name + len - suffix_len,
551b43fd 2835 spec[i].prefix + prefix_len,
7dcb9820
AM
2836 suffix_len) != 0)
2837 continue;
2838 }
551b43fd 2839 return &spec[i];
7dcb9820 2840 }
2f89ff8d
L
2841
2842 return NULL;
2843}
2844
7dcb9820 2845const struct bfd_elf_special_section *
29ef7005 2846_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2847{
551b43fd
AM
2848 int i;
2849 const struct bfd_elf_special_section *spec;
29ef7005 2850 const struct elf_backend_data *bed;
2f89ff8d
L
2851
2852 /* See if this is one of the special sections. */
551b43fd
AM
2853 if (sec->name == NULL)
2854 return NULL;
2f89ff8d 2855
29ef7005
L
2856 bed = get_elf_backend_data (abfd);
2857 spec = bed->special_sections;
2858 if (spec)
2859 {
2860 spec = _bfd_elf_get_special_section (sec->name,
2861 bed->special_sections,
2862 sec->use_rela_p);
2863 if (spec != NULL)
2864 return spec;
2865 }
2866
551b43fd
AM
2867 if (sec->name[0] != '.')
2868 return NULL;
2f89ff8d 2869
551b43fd 2870 i = sec->name[1] - 'b';
1b315056 2871 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2872 return NULL;
2873
2874 spec = special_sections[i];
2f89ff8d 2875
551b43fd
AM
2876 if (spec == NULL)
2877 return NULL;
2878
2879 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2880}
2881
b34976b6 2882bfd_boolean
217aa764 2883_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2884{
2885 struct bfd_elf_section_data *sdata;
551b43fd 2886 const struct elf_backend_data *bed;
7dcb9820 2887 const struct bfd_elf_special_section *ssect;
252b5132 2888
f0abc2a1
AM
2889 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2890 if (sdata == NULL)
2891 {
a50b1753 2892 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
07d6d2b8 2893 sizeof (*sdata));
f0abc2a1
AM
2894 if (sdata == NULL)
2895 return FALSE;
217aa764 2896 sec->used_by_bfd = sdata;
f0abc2a1 2897 }
bf572ba0 2898
551b43fd
AM
2899 /* Indicate whether or not this section should use RELA relocations. */
2900 bed = get_elf_backend_data (abfd);
2901 sec->use_rela_p = bed->default_use_rela_p;
2902
8c803a2d
AM
2903 /* Set up ELF section type and flags for newly created sections, if
2904 there is an ABI mandated section. */
2905 ssect = (*bed->get_sec_type_attr) (abfd, sec);
2906 if (ssect != NULL)
2f89ff8d 2907 {
8c803a2d
AM
2908 elf_section_type (sec) = ssect->type;
2909 elf_section_flags (sec) = ssect->attr;
2f89ff8d
L
2910 }
2911
f592407e 2912 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2913}
2914
2915/* Create a new bfd section from an ELF program header.
2916
2917 Since program segments have no names, we generate a synthetic name
2918 of the form segment<NUM>, where NUM is generally the index in the
2919 program header table. For segments that are split (see below) we
2920 generate the names segment<NUM>a and segment<NUM>b.
2921
2922 Note that some program segments may have a file size that is different than
2923 (less than) the memory size. All this means is that at execution the
2924 system must allocate the amount of memory specified by the memory size,
2925 but only initialize it with the first "file size" bytes read from the
2926 file. This would occur for example, with program segments consisting
2927 of combined data+bss.
2928
2929 To handle the above situation, this routine generates TWO bfd sections
2930 for the single program segment. The first has the length specified by
2931 the file size of the segment, and the second has the length specified
2932 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2933 into its initialized and uninitialized parts.
252b5132
RH
2934
2935 */
2936
b34976b6 2937bfd_boolean
217aa764
AM
2938_bfd_elf_make_section_from_phdr (bfd *abfd,
2939 Elf_Internal_Phdr *hdr,
91d6fa6a 2940 int hdr_index,
a50b1753 2941 const char *type_name)
252b5132
RH
2942{
2943 asection *newsect;
2944 char *name;
2945 char namebuf[64];
d4c88bbb 2946 size_t len;
252b5132
RH
2947 int split;
2948
2949 split = ((hdr->p_memsz > 0)
2950 && (hdr->p_filesz > 0)
2951 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2952
2953 if (hdr->p_filesz > 0)
252b5132 2954 {
91d6fa6a 2955 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2956 len = strlen (namebuf) + 1;
a50b1753 2957 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2958 if (!name)
2959 return FALSE;
2960 memcpy (name, namebuf, len);
2961 newsect = bfd_make_section (abfd, name);
2962 if (newsect == NULL)
2963 return FALSE;
2964 newsect->vma = hdr->p_vaddr;
2965 newsect->lma = hdr->p_paddr;
2966 newsect->size = hdr->p_filesz;
2967 newsect->filepos = hdr->p_offset;
2968 newsect->flags |= SEC_HAS_CONTENTS;
2969 newsect->alignment_power = bfd_log2 (hdr->p_align);
2970 if (hdr->p_type == PT_LOAD)
252b5132 2971 {
d5191d0c
AM
2972 newsect->flags |= SEC_ALLOC;
2973 newsect->flags |= SEC_LOAD;
2974 if (hdr->p_flags & PF_X)
2975 {
2976 /* FIXME: all we known is that it has execute PERMISSION,
2977 may be data. */
2978 newsect->flags |= SEC_CODE;
2979 }
2980 }
2981 if (!(hdr->p_flags & PF_W))
2982 {
2983 newsect->flags |= SEC_READONLY;
252b5132 2984 }
252b5132
RH
2985 }
2986
d5191d0c 2987 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2988 {
d5191d0c
AM
2989 bfd_vma align;
2990
91d6fa6a 2991 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2992 len = strlen (namebuf) + 1;
a50b1753 2993 name = (char *) bfd_alloc (abfd, len);
252b5132 2994 if (!name)
b34976b6 2995 return FALSE;
d4c88bbb 2996 memcpy (name, namebuf, len);
252b5132
RH
2997 newsect = bfd_make_section (abfd, name);
2998 if (newsect == NULL)
b34976b6 2999 return FALSE;
252b5132
RH
3000 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
3001 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 3002 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
3003 newsect->filepos = hdr->p_offset + hdr->p_filesz;
3004 align = newsect->vma & -newsect->vma;
3005 if (align == 0 || align > hdr->p_align)
3006 align = hdr->p_align;
3007 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
3008 if (hdr->p_type == PT_LOAD)
3009 {
d5191d0c
AM
3010 /* Hack for gdb. Segments that have not been modified do
3011 not have their contents written to a core file, on the
3012 assumption that a debugger can find the contents in the
3013 executable. We flag this case by setting the fake
3014 section size to zero. Note that "real" bss sections will
3015 always have their contents dumped to the core file. */
3016 if (bfd_get_format (abfd) == bfd_core)
3017 newsect->size = 0;
252b5132
RH
3018 newsect->flags |= SEC_ALLOC;
3019 if (hdr->p_flags & PF_X)
3020 newsect->flags |= SEC_CODE;
3021 }
3022 if (!(hdr->p_flags & PF_W))
3023 newsect->flags |= SEC_READONLY;
3024 }
3025
b34976b6 3026 return TRUE;
252b5132
RH
3027}
3028
864619bb
KS
3029static bfd_boolean
3030_bfd_elf_core_find_build_id (bfd *templ, bfd_vma offset)
3031{
3032 /* The return value is ignored. Build-ids are considered optional. */
3033 if (templ->xvec->flavour == bfd_target_elf_flavour)
3034 return (*get_elf_backend_data (templ)->elf_backend_core_find_build_id)
3035 (templ, offset);
3036 return FALSE;
3037}
3038
b34976b6 3039bfd_boolean
91d6fa6a 3040bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 3041{
9c5bfbb7 3042 const struct elf_backend_data *bed;
20cfcaae
NC
3043
3044 switch (hdr->p_type)
3045 {
3046 case PT_NULL:
91d6fa6a 3047 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
3048
3049 case PT_LOAD:
864619bb
KS
3050 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load"))
3051 return FALSE;
3052 if (bfd_get_format (abfd) == bfd_core && abfd->build_id == NULL)
3053 _bfd_elf_core_find_build_id (abfd, hdr->p_offset);
3054 return TRUE;
20cfcaae
NC
3055
3056 case PT_DYNAMIC:
91d6fa6a 3057 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
3058
3059 case PT_INTERP:
91d6fa6a 3060 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
3061
3062 case PT_NOTE:
91d6fa6a 3063 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 3064 return FALSE;
276da9b3
L
3065 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz,
3066 hdr->p_align))
b34976b6
AM
3067 return FALSE;
3068 return TRUE;
20cfcaae
NC
3069
3070 case PT_SHLIB:
91d6fa6a 3071 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
3072
3073 case PT_PHDR:
91d6fa6a 3074 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 3075
811072d8 3076 case PT_GNU_EH_FRAME:
91d6fa6a 3077 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
3078 "eh_frame_hdr");
3079
2b05f1b7 3080 case PT_GNU_STACK:
91d6fa6a 3081 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 3082
8c37241b 3083 case PT_GNU_RELRO:
91d6fa6a 3084 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 3085
20cfcaae 3086 default:
8c1acd09 3087 /* Check for any processor-specific program segment types. */
20cfcaae 3088 bed = get_elf_backend_data (abfd);
91d6fa6a 3089 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
3090 }
3091}
3092
d4730f92
BS
3093/* Return the REL_HDR for SEC, assuming there is only a single one, either
3094 REL or RELA. */
3095
3096Elf_Internal_Shdr *
3097_bfd_elf_single_rel_hdr (asection *sec)
3098{
3099 if (elf_section_data (sec)->rel.hdr)
3100 {
3101 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3102 return elf_section_data (sec)->rel.hdr;
3103 }
3104 else
3105 return elf_section_data (sec)->rela.hdr;
3106}
3107
3e19fb8f
L
3108static bfd_boolean
3109_bfd_elf_set_reloc_sh_name (bfd *abfd,
3110 Elf_Internal_Shdr *rel_hdr,
3111 const char *sec_name,
3112 bfd_boolean use_rela_p)
3113{
3114 char *name = (char *) bfd_alloc (abfd,
3115 sizeof ".rela" + strlen (sec_name));
3116 if (name == NULL)
3117 return FALSE;
3118
3119 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3120 rel_hdr->sh_name =
3121 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3122 FALSE);
3123 if (rel_hdr->sh_name == (unsigned int) -1)
3124 return FALSE;
3125
3126 return TRUE;
3127}
3128
d4730f92
BS
3129/* Allocate and initialize a section-header for a new reloc section,
3130 containing relocations against ASECT. It is stored in RELDATA. If
3131 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3132 relocations. */
23bc299b 3133
5d13b3b3 3134static bfd_boolean
217aa764 3135_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 3136 struct bfd_elf_section_reloc_data *reldata,
f6fe1ccd 3137 const char *sec_name,
3e19fb8f
L
3138 bfd_boolean use_rela_p,
3139 bfd_boolean delay_st_name_p)
23bc299b 3140{
d4730f92 3141 Elf_Internal_Shdr *rel_hdr;
9c5bfbb7 3142 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3143
d4730f92 3144 BFD_ASSERT (reldata->hdr == NULL);
ef53be89 3145 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
d4730f92 3146 reldata->hdr = rel_hdr;
23bc299b 3147
3e19fb8f
L
3148 if (delay_st_name_p)
3149 rel_hdr->sh_name = (unsigned int) -1;
3150 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3151 use_rela_p))
b34976b6 3152 return FALSE;
23bc299b
MM
3153 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3154 rel_hdr->sh_entsize = (use_rela_p
3155 ? bed->s->sizeof_rela
3156 : bed->s->sizeof_rel);
72de5009 3157 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
28e07a05 3158 rel_hdr->sh_flags = 0;
23bc299b
MM
3159 rel_hdr->sh_addr = 0;
3160 rel_hdr->sh_size = 0;
3161 rel_hdr->sh_offset = 0;
3162
b34976b6 3163 return TRUE;
23bc299b
MM
3164}
3165
94be91de
JB
3166/* Return the default section type based on the passed in section flags. */
3167
3168int
3169bfd_elf_get_default_section_type (flagword flags)
3170{
0e41bebb 3171 if ((flags & (SEC_ALLOC | SEC_IS_COMMON)) != 0
2e76e85a 3172 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
3173 return SHT_NOBITS;
3174 return SHT_PROGBITS;
3175}
3176
d4730f92
BS
3177struct fake_section_arg
3178{
3179 struct bfd_link_info *link_info;
3180 bfd_boolean failed;
3181};
3182
252b5132
RH
3183/* Set up an ELF internal section header for a section. */
3184
252b5132 3185static void
d4730f92 3186elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 3187{
d4730f92 3188 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 3189 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3190 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 3191 Elf_Internal_Shdr *this_hdr;
0414f35b 3192 unsigned int sh_type;
0ce398f1 3193 const char *name = asect->name;
3e19fb8f 3194 bfd_boolean delay_st_name_p = FALSE;
252b5132 3195
d4730f92 3196 if (arg->failed)
252b5132
RH
3197 {
3198 /* We already failed; just get out of the bfd_map_over_sections
08a40648 3199 loop. */
252b5132
RH
3200 return;
3201 }
3202
d4730f92 3203 this_hdr = &esd->this_hdr;
252b5132 3204
f6fe1ccd 3205 if (arg->link_info)
0ce398f1 3206 {
f6fe1ccd
L
3207 /* ld: compress DWARF debug sections with names: .debug_*. */
3208 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
3209 && (asect->flags & SEC_DEBUGGING)
3210 && name[1] == 'd'
3211 && name[6] == '_')
3212 {
3213 /* Set SEC_ELF_COMPRESS to indicate this section should be
3214 compressed. */
3215 asect->flags |= SEC_ELF_COMPRESS;
0ce398f1 3216
dd905818 3217 /* If this section will be compressed, delay adding section
3e19fb8f
L
3218 name to section name section after it is compressed in
3219 _bfd_elf_assign_file_positions_for_non_load. */
3220 delay_st_name_p = TRUE;
f6fe1ccd
L
3221 }
3222 }
3223 else if ((asect->flags & SEC_ELF_RENAME))
3224 {
3225 /* objcopy: rename output DWARF debug section. */
3226 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
3227 {
3228 /* When we decompress or compress with SHF_COMPRESSED,
3229 convert section name from .zdebug_* to .debug_* if
3230 needed. */
3231 if (name[1] == 'z')
3232 {
3233 char *new_name = convert_zdebug_to_debug (abfd, name);
3234 if (new_name == NULL)
3235 {
3236 arg->failed = TRUE;
3237 return;
3238 }
3239 name = new_name;
3240 }
3241 }
3242 else if (asect->compress_status == COMPRESS_SECTION_DONE)
0ce398f1 3243 {
f6fe1ccd
L
3244 /* PR binutils/18087: Compression does not always make a
3245 section smaller. So only rename the section when
3246 compression has actually taken place. If input section
3247 name is .zdebug_*, we should never compress it again. */
3248 char *new_name = convert_debug_to_zdebug (abfd, name);
0ce398f1
L
3249 if (new_name == NULL)
3250 {
3251 arg->failed = TRUE;
3252 return;
3253 }
f6fe1ccd
L
3254 BFD_ASSERT (name[1] != 'z');
3255 name = new_name;
0ce398f1
L
3256 }
3257 }
3258
3e19fb8f
L
3259 if (delay_st_name_p)
3260 this_hdr->sh_name = (unsigned int) -1;
3261 else
252b5132 3262 {
3e19fb8f
L
3263 this_hdr->sh_name
3264 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3265 name, FALSE);
3266 if (this_hdr->sh_name == (unsigned int) -1)
3267 {
3268 arg->failed = TRUE;
3269 return;
3270 }
252b5132
RH
3271 }
3272
a4d8e49b 3273 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
3274
3275 if ((asect->flags & SEC_ALLOC) != 0
3276 || asect->user_set_vma)
3277 this_hdr->sh_addr = asect->vma;
3278 else
3279 this_hdr->sh_addr = 0;
3280
3281 this_hdr->sh_offset = 0;
eea6121a 3282 this_hdr->sh_size = asect->size;
252b5132 3283 this_hdr->sh_link = 0;
c86934ce
NC
3284 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3285 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3286 {
4eca0228 3287 _bfd_error_handler
695344c0 3288 /* xgettext:c-format */
9793eb77 3289 (_("%pB: error: alignment power %d of section `%pA' is too big"),
c08bb8dd 3290 abfd, asect->alignment_power, asect);
c86934ce
NC
3291 arg->failed = TRUE;
3292 return;
3293 }
72de5009 3294 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
3295 /* The sh_entsize and sh_info fields may have been set already by
3296 copy_private_section_data. */
3297
3298 this_hdr->bfd_section = asect;
3299 this_hdr->contents = NULL;
3300
3cddba1e
L
3301 /* If the section type is unspecified, we set it based on
3302 asect->flags. */
98ece1b3
AM
3303 if ((asect->flags & SEC_GROUP) != 0)
3304 sh_type = SHT_GROUP;
98ece1b3 3305 else
94be91de 3306 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 3307
3cddba1e 3308 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
3309 this_hdr->sh_type = sh_type;
3310 else if (this_hdr->sh_type == SHT_NOBITS
3311 && sh_type == SHT_PROGBITS
3312 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 3313 {
98ece1b3
AM
3314 /* Warn if we are changing a NOBITS section to PROGBITS, but
3315 allow the link to proceed. This can happen when users link
3316 non-bss input sections to bss output sections, or emit data
3317 to a bss output section via a linker script. */
4eca0228 3318 _bfd_error_handler
871b3ab2 3319 (_("warning: section `%pA' type changed to PROGBITS"), asect);
98ece1b3 3320 this_hdr->sh_type = sh_type;
3cddba1e
L
3321 }
3322
2f89ff8d 3323 switch (this_hdr->sh_type)
252b5132 3324 {
2f89ff8d 3325 default:
2f89ff8d
L
3326 break;
3327
3328 case SHT_STRTAB:
2f89ff8d
L
3329 case SHT_NOTE:
3330 case SHT_NOBITS:
3331 case SHT_PROGBITS:
3332 break;
606851fb
AM
3333
3334 case SHT_INIT_ARRAY:
3335 case SHT_FINI_ARRAY:
3336 case SHT_PREINIT_ARRAY:
3337 this_hdr->sh_entsize = bed->s->arch_size / 8;
3338 break;
2f89ff8d
L
3339
3340 case SHT_HASH:
c7ac6ff8 3341 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 3342 break;
5de3bf90 3343
2f89ff8d 3344 case SHT_DYNSYM:
252b5132 3345 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
3346 break;
3347
3348 case SHT_DYNAMIC:
252b5132 3349 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
3350 break;
3351
3352 case SHT_RELA:
3353 if (get_elf_backend_data (abfd)->may_use_rela_p)
3354 this_hdr->sh_entsize = bed->s->sizeof_rela;
3355 break;
3356
3357 case SHT_REL:
3358 if (get_elf_backend_data (abfd)->may_use_rel_p)
3359 this_hdr->sh_entsize = bed->s->sizeof_rel;
3360 break;
3361
3362 case SHT_GNU_versym:
252b5132 3363 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
3364 break;
3365
3366 case SHT_GNU_verdef:
252b5132
RH
3367 this_hdr->sh_entsize = 0;
3368 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3369 cverdefs. The linker will set cverdefs, but sh_info will be
3370 zero. */
252b5132
RH
3371 if (this_hdr->sh_info == 0)
3372 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3373 else
3374 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3375 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
3376 break;
3377
3378 case SHT_GNU_verneed:
252b5132
RH
3379 this_hdr->sh_entsize = 0;
3380 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3381 cverrefs. The linker will set cverrefs, but sh_info will be
3382 zero. */
252b5132
RH
3383 if (this_hdr->sh_info == 0)
3384 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3385 else
3386 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3387 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
3388 break;
3389
3390 case SHT_GROUP:
1783205a 3391 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 3392 break;
fdc90cb4
JJ
3393
3394 case SHT_GNU_HASH:
3395 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3396 break;
dbb410c3 3397 }
252b5132
RH
3398
3399 if ((asect->flags & SEC_ALLOC) != 0)
3400 this_hdr->sh_flags |= SHF_ALLOC;
3401 if ((asect->flags & SEC_READONLY) == 0)
3402 this_hdr->sh_flags |= SHF_WRITE;
3403 if ((asect->flags & SEC_CODE) != 0)
3404 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
3405 if ((asect->flags & SEC_MERGE) != 0)
3406 {
3407 this_hdr->sh_flags |= SHF_MERGE;
3408 this_hdr->sh_entsize = asect->entsize;
f5fa8ca2 3409 }
84865015
NC
3410 if ((asect->flags & SEC_STRINGS) != 0)
3411 this_hdr->sh_flags |= SHF_STRINGS;
1126897b 3412 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 3413 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 3414 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
3415 {
3416 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
3417 if (asect->size == 0
3418 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 3419 {
3a800eb9 3420 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 3421
704afa60 3422 this_hdr->sh_size = 0;
3a800eb9
AM
3423 if (o != NULL)
3424 {
704afa60 3425 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
3426 if (this_hdr->sh_size != 0)
3427 this_hdr->sh_type = SHT_NOBITS;
3428 }
704afa60
JJ
3429 }
3430 }
18ae9cc1
L
3431 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3432 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 3433
d4730f92
BS
3434 /* If the section has relocs, set up a section header for the
3435 SHT_REL[A] section. If two relocation sections are required for
3436 this section, it is up to the processor-specific back-end to
3437 create the other. */
3438 if ((asect->flags & SEC_RELOC) != 0)
3439 {
3440 /* When doing a relocatable link, create both REL and RELA sections if
3441 needed. */
3442 if (arg->link_info
3443 /* Do the normal setup if we wouldn't create any sections here. */
3444 && esd->rel.count + esd->rela.count > 0
0e1862bb
L
3445 && (bfd_link_relocatable (arg->link_info)
3446 || arg->link_info->emitrelocations))
d4730f92
BS
3447 {
3448 if (esd->rel.count && esd->rel.hdr == NULL
28e07a05 3449 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name,
db4677b8 3450 FALSE, delay_st_name_p))
d4730f92
BS
3451 {
3452 arg->failed = TRUE;
3453 return;
3454 }
3455 if (esd->rela.count && esd->rela.hdr == NULL
28e07a05 3456 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name,
db4677b8 3457 TRUE, delay_st_name_p))
d4730f92
BS
3458 {
3459 arg->failed = TRUE;
3460 return;
3461 }
3462 }
3463 else if (!_bfd_elf_init_reloc_shdr (abfd,
3464 (asect->use_rela_p
3465 ? &esd->rela : &esd->rel),
f6fe1ccd 3466 name,
3e19fb8f
L
3467 asect->use_rela_p,
3468 delay_st_name_p))
db4677b8 3469 {
d4730f92 3470 arg->failed = TRUE;
db4677b8
AM
3471 return;
3472 }
d4730f92
BS
3473 }
3474
252b5132 3475 /* Check for processor-specific section types. */
0414f35b 3476 sh_type = this_hdr->sh_type;
e1fddb6b
AO
3477 if (bed->elf_backend_fake_sections
3478 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
db4677b8
AM
3479 {
3480 arg->failed = TRUE;
3481 return;
3482 }
252b5132 3483
42bb2e33 3484 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
3485 {
3486 /* Don't change the header type from NOBITS if we are being
42bb2e33 3487 called for objcopy --only-keep-debug. */
0414f35b
AM
3488 this_hdr->sh_type = sh_type;
3489 }
252b5132
RH
3490}
3491
bcacc0f5
AM
3492/* Fill in the contents of a SHT_GROUP section. Called from
3493 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3494 when ELF targets use the generic linker, ld. Called for ld -r
3495 from bfd_elf_final_link. */
dbb410c3 3496
1126897b 3497void
217aa764 3498bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 3499{
a50b1753 3500 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 3501 asection *elt, *first;
dbb410c3 3502 unsigned char *loc;
b34976b6 3503 bfd_boolean gas;
dbb410c3 3504
7e4111ad
L
3505 /* Ignore linker created group section. See elfNN_ia64_object_p in
3506 elfxx-ia64.c. */
ce5aecf8
AM
3507 if ((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP
3508 || sec->size == 0
dbb410c3
AM
3509 || *failedptr)
3510 return;
3511
bcacc0f5
AM
3512 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3513 {
3514 unsigned long symindx = 0;
3515
3516 /* elf_group_id will have been set up by objcopy and the
3517 generic linker. */
3518 if (elf_group_id (sec) != NULL)
3519 symindx = elf_group_id (sec)->udata.i;
1126897b 3520
bcacc0f5
AM
3521 if (symindx == 0)
3522 {
3523 /* If called from the assembler, swap_out_syms will have set up
3524 elf_section_syms. */
3525 BFD_ASSERT (elf_section_syms (abfd) != NULL);
3526 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3527 }
3528 elf_section_data (sec)->this_hdr.sh_info = symindx;
3529 }
3530 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 3531 {
bcacc0f5
AM
3532 /* The ELF backend linker sets sh_info to -2 when the group
3533 signature symbol is global, and thus the index can't be
3534 set until all local symbols are output. */
53720c49
AM
3535 asection *igroup;
3536 struct bfd_elf_section_data *sec_data;
3537 unsigned long symndx;
3538 unsigned long extsymoff;
bcacc0f5
AM
3539 struct elf_link_hash_entry *h;
3540
53720c49
AM
3541 /* The point of this little dance to the first SHF_GROUP section
3542 then back to the SHT_GROUP section is that this gets us to
3543 the SHT_GROUP in the input object. */
3544 igroup = elf_sec_group (elf_next_in_group (sec));
3545 sec_data = elf_section_data (igroup);
3546 symndx = sec_data->this_hdr.sh_info;
3547 extsymoff = 0;
bcacc0f5
AM
3548 if (!elf_bad_symtab (igroup->owner))
3549 {
3550 Elf_Internal_Shdr *symtab_hdr;
3551
3552 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3553 extsymoff = symtab_hdr->sh_info;
3554 }
3555 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3556 while (h->root.type == bfd_link_hash_indirect
3557 || h->root.type == bfd_link_hash_warning)
3558 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3559
3560 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 3561 }
dbb410c3 3562
1126897b 3563 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 3564 gas = TRUE;
dbb410c3
AM
3565 if (sec->contents == NULL)
3566 {
b34976b6 3567 gas = FALSE;
a50b1753 3568 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
3569
3570 /* Arrange for the section to be written out. */
3571 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
3572 if (sec->contents == NULL)
3573 {
b34976b6 3574 *failedptr = TRUE;
dbb410c3
AM
3575 return;
3576 }
3577 }
3578
eea6121a 3579 loc = sec->contents + sec->size;
dbb410c3 3580
9dce4196
AM
3581 /* Get the pointer to the first section in the group that gas
3582 squirreled away here. objcopy arranges for this to be set to the
3583 start of the input section group. */
3584 first = elt = elf_next_in_group (sec);
dbb410c3
AM
3585
3586 /* First element is a flag word. Rest of section is elf section
3587 indices for all the sections of the group. Write them backwards
3588 just to keep the group in the same order as given in .section
3589 directives, not that it matters. */
3590 while (elt != NULL)
3591 {
9dce4196 3592 asection *s;
9dce4196 3593
9dce4196 3594 s = elt;
415f38a6
AM
3595 if (!gas)
3596 s = s->output_section;
3597 if (s != NULL
3598 && !bfd_is_abs_section (s))
01e1a5bc 3599 {
db4677b8 3600 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
28e07a05
AM
3601 struct bfd_elf_section_data *input_elf_sec = elf_section_data (elt);
3602
3603 if (elf_sec->rel.hdr != NULL
3604 && (gas
3605 || (input_elf_sec->rel.hdr != NULL
3606 && input_elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0))
db4677b8 3607 {
28e07a05 3608 elf_sec->rel.hdr->sh_flags |= SHF_GROUP;
db4677b8
AM
3609 loc -= 4;
3610 H_PUT_32 (abfd, elf_sec->rel.idx, loc);
3611 }
28e07a05
AM
3612 if (elf_sec->rela.hdr != NULL
3613 && (gas
3614 || (input_elf_sec->rela.hdr != NULL
3615 && input_elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0))
db4677b8 3616 {
28e07a05 3617 elf_sec->rela.hdr->sh_flags |= SHF_GROUP;
db4677b8
AM
3618 loc -= 4;
3619 H_PUT_32 (abfd, elf_sec->rela.idx, loc);
3620 }
01e1a5bc 3621 loc -= 4;
db4677b8 3622 H_PUT_32 (abfd, elf_sec->this_idx, loc);
01e1a5bc 3623 }
945906ff 3624 elt = elf_next_in_group (elt);
9dce4196
AM
3625 if (elt == first)
3626 break;
dbb410c3
AM
3627 }
3628
7bdf4127
AB
3629 loc -= 4;
3630 BFD_ASSERT (loc == sec->contents);
dbb410c3 3631
9dce4196 3632 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
3633}
3634
bce964aa
AM
3635/* Given NAME, the name of a relocation section stripped of its
3636 .rel/.rela prefix, return the section in ABFD to which the
3637 relocations apply. */
bd53a53a
L
3638
3639asection *
bce964aa
AM
3640_bfd_elf_plt_get_reloc_section (bfd *abfd, const char *name)
3641{
3642 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3643 section likely apply to .got.plt or .got section. */
3644 if (get_elf_backend_data (abfd)->want_got_plt
3645 && strcmp (name, ".plt") == 0)
3646 {
3647 asection *sec;
3648
3649 name = ".got.plt";
3650 sec = bfd_get_section_by_name (abfd, name);
3651 if (sec != NULL)
3652 return sec;
3653 name = ".got";
3654 }
3655
3656 return bfd_get_section_by_name (abfd, name);
3657}
3658
3659/* Return the section to which RELOC_SEC applies. */
3660
3661static asection *
3662elf_get_reloc_section (asection *reloc_sec)
bd53a53a
L
3663{
3664 const char *name;
3665 unsigned int type;
3666 bfd *abfd;
bce964aa 3667 const struct elf_backend_data *bed;
bd53a53a
L
3668
3669 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3670 if (type != SHT_REL && type != SHT_RELA)
3671 return NULL;
3672
3673 /* We look up the section the relocs apply to by name. */
3674 name = reloc_sec->name;
bce964aa
AM
3675 if (strncmp (name, ".rel", 4) != 0)
3676 return NULL;
3677 name += 4;
3678 if (type == SHT_RELA && *name++ != 'a')
3679 return NULL;
bd53a53a 3680
bd53a53a 3681 abfd = reloc_sec->owner;
bce964aa
AM
3682 bed = get_elf_backend_data (abfd);
3683 return bed->get_reloc_section (abfd, name);
bd53a53a
L
3684}
3685
252b5132
RH
3686/* Assign all ELF section numbers. The dummy first section is handled here
3687 too. The link/info pointers for the standard section types are filled
3688 in here too, while we're at it. */
3689
b34976b6 3690static bfd_boolean
da9f89d4 3691assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
3692{
3693 struct elf_obj_tdata *t = elf_tdata (abfd);
3694 asection *sec;
3e19fb8f 3695 unsigned int section_number;
252b5132 3696 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 3697 struct bfd_elf_section_data *d;
3516e984 3698 bfd_boolean need_symtab;
446f7ed5 3699 size_t amt;
252b5132
RH
3700
3701 section_number = 1;
3702
2b0f7ef9
JJ
3703 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3704
da9f89d4 3705 /* SHT_GROUP sections are in relocatable files only. */
7bdf4127 3706 if (link_info == NULL || !link_info->resolve_section_groups)
252b5132 3707 {
ef53be89 3708 size_t reloc_count = 0;
14f2c699 3709
da9f89d4 3710 /* Put SHT_GROUP sections first. */
04dd1667 3711 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 3712 {
5daa8fe7 3713 d = elf_section_data (sec);
da9f89d4
L
3714
3715 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 3716 {
5daa8fe7 3717 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
3718 {
3719 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 3720 bfd_section_list_remove (abfd, sec);
da9f89d4 3721 abfd->section_count--;
da9f89d4 3722 }
08a40648 3723 else
4fbb74a6 3724 d->this_idx = section_number++;
da9f89d4 3725 }
14f2c699
L
3726
3727 /* Count relocations. */
3728 reloc_count += sec->reloc_count;
47cc2cf5 3729 }
14f2c699
L
3730
3731 /* Clear HAS_RELOC if there are no relocations. */
3732 if (reloc_count == 0)
3733 abfd->flags &= ~HAS_RELOC;
47cc2cf5
PB
3734 }
3735
3736 for (sec = abfd->sections; sec; sec = sec->next)
3737 {
3738 d = elf_section_data (sec);
3739
3740 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 3741 d->this_idx = section_number++;
3e19fb8f
L
3742 if (d->this_hdr.sh_name != (unsigned int) -1)
3743 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 3744 if (d->rel.hdr)
2b0f7ef9 3745 {
d4730f92 3746 d->rel.idx = section_number++;
3e19fb8f
L
3747 if (d->rel.hdr->sh_name != (unsigned int) -1)
3748 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 3749 }
d4730f92
BS
3750 else
3751 d->rel.idx = 0;
23bc299b 3752
d4730f92 3753 if (d->rela.hdr)
2b0f7ef9 3754 {
d4730f92 3755 d->rela.idx = section_number++;
3e19fb8f
L
3756 if (d->rela.hdr->sh_name != (unsigned int) -1)
3757 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 3758 }
23bc299b 3759 else
d4730f92 3760 d->rela.idx = 0;
252b5132
RH
3761 }
3762
3516e984
L
3763 need_symtab = (bfd_get_symcount (abfd) > 0
3764 || (link_info == NULL
3765 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3766 == HAS_RELOC)));
3767 if (need_symtab)
252b5132 3768 {
12bd6957 3769 elf_onesymtab (abfd) = section_number++;
2b0f7ef9 3770 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 3771 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 3772 {
7a6e0d89 3773 elf_section_list *entry;
6a40cf0c
NC
3774
3775 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3776
7a6e0d89 3777 entry = bfd_zalloc (abfd, sizeof (*entry));
6a40cf0c
NC
3778 entry->ndx = section_number++;
3779 elf_symtab_shndx_list (abfd) = entry;
3780 entry->hdr.sh_name
9ad5cbcf 3781 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3782 ".symtab_shndx", FALSE);
6a40cf0c 3783 if (entry->hdr.sh_name == (unsigned int) -1)
b34976b6 3784 return FALSE;
9ad5cbcf 3785 }
12bd6957 3786 elf_strtab_sec (abfd) = section_number++;
2b0f7ef9 3787 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3788 }
3789
dd905818
NC
3790 elf_shstrtab_sec (abfd) = section_number++;
3791 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3792 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3793
1c52a645
L
3794 if (section_number >= SHN_LORESERVE)
3795 {
695344c0 3796 /* xgettext:c-format */
871b3ab2 3797 _bfd_error_handler (_("%pB: too many sections: %u"),
1c52a645
L
3798 abfd, section_number);
3799 return FALSE;
3800 }
3801
9ad5cbcf 3802 elf_numsections (abfd) = section_number;
252b5132
RH
3803 elf_elfheader (abfd)->e_shnum = section_number;
3804
3805 /* Set up the list of section header pointers, in agreement with the
3806 indices. */
446f7ed5
AM
3807 amt = section_number * sizeof (Elf_Internal_Shdr *);
3808 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
252b5132 3809 if (i_shdrp == NULL)
b34976b6 3810 return FALSE;
252b5132 3811
a50b1753 3812 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
07d6d2b8 3813 sizeof (Elf_Internal_Shdr));
252b5132
RH
3814 if (i_shdrp[0] == NULL)
3815 {
3816 bfd_release (abfd, i_shdrp);
b34976b6 3817 return FALSE;
252b5132 3818 }
252b5132
RH
3819
3820 elf_elfsections (abfd) = i_shdrp;
3821
12bd6957 3822 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3516e984 3823 if (need_symtab)
252b5132 3824 {
12bd6957 3825 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
4fbb74a6 3826 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf 3827 {
6a40cf0c
NC
3828 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3829 BFD_ASSERT (entry != NULL);
3830 i_shdrp[entry->ndx] = & entry->hdr;
3831 entry->hdr.sh_link = elf_onesymtab (abfd);
9ad5cbcf 3832 }
12bd6957
AM
3833 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3834 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
252b5132 3835 }
38ce5b11 3836
252b5132
RH
3837 for (sec = abfd->sections; sec; sec = sec->next)
3838 {
252b5132 3839 asection *s;
252b5132 3840
91d6fa6a
NC
3841 d = elf_section_data (sec);
3842
252b5132 3843 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3844 if (d->rel.idx != 0)
3845 i_shdrp[d->rel.idx] = d->rel.hdr;
3846 if (d->rela.idx != 0)
3847 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3848
3849 /* Fill in the sh_link and sh_info fields while we're at it. */
3850
3851 /* sh_link of a reloc section is the section index of the symbol
3852 table. sh_info is the section index of the section to which
3853 the relocation entries apply. */
d4730f92 3854 if (d->rel.idx != 0)
252b5132 3855 {
12bd6957 3856 d->rel.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3857 d->rel.hdr->sh_info = d->this_idx;
9ef5d938 3858 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
252b5132 3859 }
d4730f92 3860 if (d->rela.idx != 0)
23bc299b 3861 {
12bd6957 3862 d->rela.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3863 d->rela.hdr->sh_info = d->this_idx;
9ef5d938 3864 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
23bc299b 3865 }
252b5132 3866
38ce5b11
L
3867 /* We need to set up sh_link for SHF_LINK_ORDER. */
3868 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3869 {
3870 s = elf_linked_to_section (sec);
3871 if (s)
38ce5b11 3872 {
f2876037 3873 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3874 if (link_info != NULL)
38ce5b11 3875 {
f2876037 3876 /* Check discarded linkonce section. */
dbaa2011 3877 if (discarded_section (s))
38ce5b11 3878 {
ccd2ec6a 3879 asection *kept;
4eca0228 3880 _bfd_error_handler
695344c0 3881 /* xgettext:c-format */
871b3ab2
AM
3882 (_("%pB: sh_link of section `%pA' points to"
3883 " discarded section `%pA' of `%pB'"),
ccd2ec6a
L
3884 abfd, d->this_hdr.bfd_section,
3885 s, s->owner);
3886 /* Point to the kept section if it has the same
3887 size as the discarded one. */
c0f00686 3888 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3889 if (kept == NULL)
185d09ad 3890 {
ccd2ec6a
L
3891 bfd_set_error (bfd_error_bad_value);
3892 return FALSE;
185d09ad 3893 }
ccd2ec6a 3894 s = kept;
38ce5b11 3895 }
e424ecc8 3896
ccd2ec6a
L
3897 s = s->output_section;
3898 BFD_ASSERT (s != NULL);
38ce5b11 3899 }
f2876037
L
3900 else
3901 {
3902 /* Handle objcopy. */
3903 if (s->output_section == NULL)
3904 {
4eca0228 3905 _bfd_error_handler
695344c0 3906 /* xgettext:c-format */
871b3ab2
AM
3907 (_("%pB: sh_link of section `%pA' points to"
3908 " removed section `%pA' of `%pB'"),
f2876037
L
3909 abfd, d->this_hdr.bfd_section, s, s->owner);
3910 bfd_set_error (bfd_error_bad_value);
3911 return FALSE;
3912 }
3913 s = s->output_section;
3914 }
ccd2ec6a
L
3915 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3916 }
3917 else
3918 {
3919 /* PR 290:
3920 The Intel C compiler generates SHT_IA_64_UNWIND with
3921 SHF_LINK_ORDER. But it doesn't set the sh_link or
3922 sh_info fields. Hence we could get the situation
08a40648 3923 where s is NULL. */
ccd2ec6a
L
3924 const struct elf_backend_data *bed
3925 = get_elf_backend_data (abfd);
3926 if (bed->link_order_error_handler)
3927 bed->link_order_error_handler
695344c0 3928 /* xgettext:c-format */
871b3ab2 3929 (_("%pB: warning: sh_link not set for section `%pA'"),
ccd2ec6a 3930 abfd, sec);
38ce5b11
L
3931 }
3932 }
3933
252b5132
RH
3934 switch (d->this_hdr.sh_type)
3935 {
3936 case SHT_REL:
3937 case SHT_RELA:
3938 /* A reloc section which we are treating as a normal BFD
3939 section. sh_link is the section index of the symbol
3940 table. sh_info is the section index of the section to
3941 which the relocation entries apply. We assume that an
3942 allocated reloc section uses the dynamic symbol table.
3943 FIXME: How can we be sure? */
3944 s = bfd_get_section_by_name (abfd, ".dynsym");
3945 if (s != NULL)
3946 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3947
bce964aa 3948 s = elf_get_reloc_section (sec);
252b5132 3949 if (s != NULL)
9ef5d938
L
3950 {
3951 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3952 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3953 }
252b5132
RH
3954 break;
3955
3956 case SHT_STRTAB:
3957 /* We assume that a section named .stab*str is a stabs
3958 string section. We look for a section with the same name
3959 but without the trailing ``str'', and set its sh_link
3960 field to point to this section. */
0112cd26 3961 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3962 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3963 {
3964 size_t len;
3965 char *alc;
3966
3967 len = strlen (sec->name);
a50b1753 3968 alc = (char *) bfd_malloc (len - 2);
252b5132 3969 if (alc == NULL)
b34976b6 3970 return FALSE;
d4c88bbb 3971 memcpy (alc, sec->name, len - 3);
252b5132
RH
3972 alc[len - 3] = '\0';
3973 s = bfd_get_section_by_name (abfd, alc);
3974 free (alc);
3975 if (s != NULL)
3976 {
3977 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3978
3979 /* This is a .stab section. */
0594c12d
AM
3980 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3981 elf_section_data (s)->this_hdr.sh_entsize
3982 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3983 }
3984 }
3985 break;
3986
3987 case SHT_DYNAMIC:
3988 case SHT_DYNSYM:
3989 case SHT_GNU_verneed:
3990 case SHT_GNU_verdef:
3991 /* sh_link is the section header index of the string table
3992 used for the dynamic entries, or the symbol table, or the
3993 version strings. */
3994 s = bfd_get_section_by_name (abfd, ".dynstr");
3995 if (s != NULL)
3996 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3997 break;
3998
7f1204bb
JJ
3999 case SHT_GNU_LIBLIST:
4000 /* sh_link is the section header index of the prelink library
08a40648
AM
4001 list used for the dynamic entries, or the symbol table, or
4002 the version strings. */
7f1204bb
JJ
4003 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
4004 ? ".dynstr" : ".gnu.libstr");
4005 if (s != NULL)
4006 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4007 break;
4008
252b5132 4009 case SHT_HASH:
fdc90cb4 4010 case SHT_GNU_HASH:
252b5132
RH
4011 case SHT_GNU_versym:
4012 /* sh_link is the section header index of the symbol table
4013 this hash table or version table is for. */
4014 s = bfd_get_section_by_name (abfd, ".dynsym");
4015 if (s != NULL)
4016 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4017 break;
dbb410c3
AM
4018
4019 case SHT_GROUP:
12bd6957 4020 d->this_hdr.sh_link = elf_onesymtab (abfd);
252b5132
RH
4021 }
4022 }
4023
3e19fb8f
L
4024 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
4025 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
4026 debug section name from .debug_* to .zdebug_* if needed. */
4027
b34976b6 4028 return TRUE;
252b5132
RH
4029}
4030
5372391b 4031static bfd_boolean
217aa764 4032sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
4033{
4034 /* If the backend has a special mapping, use it. */
9c5bfbb7 4035 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
4036 if (bed->elf_backend_sym_is_global)
4037 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 4038
e47bf690 4039 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
e6f7f6d1
AM
4040 || bfd_is_und_section (bfd_asymbol_section (sym))
4041 || bfd_is_com_section (bfd_asymbol_section (sym)));
252b5132
RH
4042}
4043
76359541
TP
4044/* Filter global symbols of ABFD to include in the import library. All
4045 SYMCOUNT symbols of ABFD can be examined from their pointers in
4046 SYMS. Pointers of symbols to keep should be stored contiguously at
4047 the beginning of that array.
4048
4049 Returns the number of symbols to keep. */
4050
4051unsigned int
4052_bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
4053 asymbol **syms, long symcount)
4054{
4055 long src_count, dst_count = 0;
4056
4057 for (src_count = 0; src_count < symcount; src_count++)
4058 {
4059 asymbol *sym = syms[src_count];
4060 char *name = (char *) bfd_asymbol_name (sym);
4061 struct bfd_link_hash_entry *h;
4062
4063 if (!sym_is_global (abfd, sym))
4064 continue;
4065
4066 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, FALSE);
5df1bc57
AM
4067 if (h == NULL)
4068 continue;
76359541
TP
4069 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
4070 continue;
76359541
TP
4071 if (h->linker_def || h->ldscript_def)
4072 continue;
4073
4074 syms[dst_count++] = sym;
4075 }
4076
4077 syms[dst_count] = NULL;
4078
4079 return dst_count;
4080}
4081
5372391b 4082/* Don't output section symbols for sections that are not going to be
c6d8cab4 4083 output, that are duplicates or there is no BFD section. */
5372391b
AM
4084
4085static bfd_boolean
4086ignore_section_sym (bfd *abfd, asymbol *sym)
4087{
c6d8cab4
L
4088 elf_symbol_type *type_ptr;
4089
db0c309f
NC
4090 if (sym == NULL)
4091 return FALSE;
4092
c6d8cab4
L
4093 if ((sym->flags & BSF_SECTION_SYM) == 0)
4094 return FALSE;
4095
db0c309f
NC
4096 if (sym->section == NULL)
4097 return TRUE;
4098
c6d8cab4
L
4099 type_ptr = elf_symbol_from (abfd, sym);
4100 return ((type_ptr != NULL
4101 && type_ptr->internal_elf_sym.st_shndx != 0
4102 && bfd_is_abs_section (sym->section))
4103 || !(sym->section->owner == abfd
db0c309f
NC
4104 || (sym->section->output_section != NULL
4105 && sym->section->output_section->owner == abfd
2633a79c
AM
4106 && sym->section->output_offset == 0)
4107 || bfd_is_abs_section (sym->section)));
5372391b
AM
4108}
4109
2633a79c
AM
4110/* Map symbol from it's internal number to the external number, moving
4111 all local symbols to be at the head of the list. */
4112
b34976b6 4113static bfd_boolean
12bd6957 4114elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
252b5132 4115{
dc810e39 4116 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
4117 asymbol **syms = bfd_get_outsymbols (abfd);
4118 asymbol **sect_syms;
dc810e39
AM
4119 unsigned int num_locals = 0;
4120 unsigned int num_globals = 0;
4121 unsigned int num_locals2 = 0;
4122 unsigned int num_globals2 = 0;
7292b3ac 4123 unsigned int max_index = 0;
dc810e39 4124 unsigned int idx;
252b5132
RH
4125 asection *asect;
4126 asymbol **new_syms;
446f7ed5 4127 size_t amt;
252b5132
RH
4128
4129#ifdef DEBUG
4130 fprintf (stderr, "elf_map_symbols\n");
4131 fflush (stderr);
4132#endif
4133
252b5132
RH
4134 for (asect = abfd->sections; asect; asect = asect->next)
4135 {
4136 if (max_index < asect->index)
4137 max_index = asect->index;
4138 }
4139
4140 max_index++;
446f7ed5
AM
4141 amt = max_index * sizeof (asymbol *);
4142 sect_syms = (asymbol **) bfd_zalloc (abfd, amt);
252b5132 4143 if (sect_syms == NULL)
b34976b6 4144 return FALSE;
252b5132 4145 elf_section_syms (abfd) = sect_syms;
4e89ac30 4146 elf_num_section_syms (abfd) = max_index;
252b5132 4147
079e9a2f
AM
4148 /* Init sect_syms entries for any section symbols we have already
4149 decided to output. */
252b5132
RH
4150 for (idx = 0; idx < symcount; idx++)
4151 {
dc810e39 4152 asymbol *sym = syms[idx];
c044fabd 4153
252b5132 4154 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 4155 && sym->value == 0
2633a79c
AM
4156 && !ignore_section_sym (abfd, sym)
4157 && !bfd_is_abs_section (sym->section))
252b5132 4158 {
5372391b 4159 asection *sec = sym->section;
252b5132 4160
5372391b
AM
4161 if (sec->owner != abfd)
4162 sec = sec->output_section;
252b5132 4163
5372391b 4164 sect_syms[sec->index] = syms[idx];
252b5132
RH
4165 }
4166 }
4167
252b5132
RH
4168 /* Classify all of the symbols. */
4169 for (idx = 0; idx < symcount; idx++)
4170 {
2633a79c 4171 if (sym_is_global (abfd, syms[idx]))
252b5132 4172 num_globals++;
2633a79c
AM
4173 else if (!ignore_section_sym (abfd, syms[idx]))
4174 num_locals++;
252b5132 4175 }
079e9a2f 4176
5372391b 4177 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
4178 sections will already have a section symbol in outsymbols, but
4179 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4180 at least in that case. */
252b5132
RH
4181 for (asect = abfd->sections; asect; asect = asect->next)
4182 {
079e9a2f 4183 if (sect_syms[asect->index] == NULL)
252b5132 4184 {
079e9a2f 4185 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
4186 num_locals++;
4187 else
4188 num_globals++;
252b5132
RH
4189 }
4190 }
4191
4192 /* Now sort the symbols so the local symbols are first. */
446f7ed5
AM
4193 amt = (num_locals + num_globals) * sizeof (asymbol *);
4194 new_syms = (asymbol **) bfd_alloc (abfd, amt);
252b5132 4195 if (new_syms == NULL)
b34976b6 4196 return FALSE;
252b5132
RH
4197
4198 for (idx = 0; idx < symcount; idx++)
4199 {
4200 asymbol *sym = syms[idx];
dc810e39 4201 unsigned int i;
252b5132 4202
2633a79c
AM
4203 if (sym_is_global (abfd, sym))
4204 i = num_locals + num_globals2++;
4205 else if (!ignore_section_sym (abfd, sym))
252b5132
RH
4206 i = num_locals2++;
4207 else
2633a79c 4208 continue;
252b5132
RH
4209 new_syms[i] = sym;
4210 sym->udata.i = i + 1;
4211 }
4212 for (asect = abfd->sections; asect; asect = asect->next)
4213 {
079e9a2f 4214 if (sect_syms[asect->index] == NULL)
252b5132 4215 {
079e9a2f 4216 asymbol *sym = asect->symbol;
dc810e39 4217 unsigned int i;
252b5132 4218
079e9a2f 4219 sect_syms[asect->index] = sym;
252b5132
RH
4220 if (!sym_is_global (abfd, sym))
4221 i = num_locals2++;
4222 else
4223 i = num_locals + num_globals2++;
4224 new_syms[i] = sym;
4225 sym->udata.i = i + 1;
4226 }
4227 }
4228
4229 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4230
12bd6957 4231 *pnum_locals = num_locals;
b34976b6 4232 return TRUE;
252b5132
RH
4233}
4234
4235/* Align to the maximum file alignment that could be required for any
4236 ELF data structure. */
4237
268b6b39 4238static inline file_ptr
217aa764 4239align_file_position (file_ptr off, int align)
252b5132
RH
4240{
4241 return (off + align - 1) & ~(align - 1);
4242}
4243
4244/* Assign a file position to a section, optionally aligning to the
4245 required section alignment. */
4246
217aa764
AM
4247file_ptr
4248_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4249 file_ptr offset,
4250 bfd_boolean align)
252b5132 4251{
72de5009
AM
4252 if (align && i_shdrp->sh_addralign > 1)
4253 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
4254 i_shdrp->sh_offset = offset;
4255 if (i_shdrp->bfd_section != NULL)
4256 i_shdrp->bfd_section->filepos = offset;
4257 if (i_shdrp->sh_type != SHT_NOBITS)
4258 offset += i_shdrp->sh_size;
4259 return offset;
4260}
4261
4262/* Compute the file positions we are going to put the sections at, and
4263 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4264 is not NULL, this is being called by the ELF backend linker. */
4265
b34976b6 4266bfd_boolean
217aa764
AM
4267_bfd_elf_compute_section_file_positions (bfd *abfd,
4268 struct bfd_link_info *link_info)
252b5132 4269{
9c5bfbb7 4270 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 4271 struct fake_section_arg fsargs;
b34976b6 4272 bfd_boolean failed;
ef10c3ac 4273 struct elf_strtab_hash *strtab = NULL;
252b5132 4274 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 4275 bfd_boolean need_symtab;
252b5132
RH
4276
4277 if (abfd->output_has_begun)
b34976b6 4278 return TRUE;
252b5132
RH
4279
4280 /* Do any elf backend specific processing first. */
4281 if (bed->elf_backend_begin_write_processing)
4282 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4283
ed7e9d0b 4284 if (!(*bed->elf_backend_init_file_header) (abfd, link_info))
b34976b6 4285 return FALSE;
252b5132 4286
d4730f92
BS
4287 fsargs.failed = FALSE;
4288 fsargs.link_info = link_info;
4289 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4290 if (fsargs.failed)
b34976b6 4291 return FALSE;
252b5132 4292
da9f89d4 4293 if (!assign_section_numbers (abfd, link_info))
b34976b6 4294 return FALSE;
252b5132
RH
4295
4296 /* The backend linker builds symbol table information itself. */
3516e984
L
4297 need_symtab = (link_info == NULL
4298 && (bfd_get_symcount (abfd) > 0
4299 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4300 == HAS_RELOC)));
4301 if (need_symtab)
252b5132
RH
4302 {
4303 /* Non-zero if doing a relocatable link. */
4304 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4305
4306 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 4307 return FALSE;
252b5132
RH
4308 }
4309
d4730f92 4310 failed = FALSE;
1126897b 4311 if (link_info == NULL)
dbb410c3 4312 {
1126897b 4313 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 4314 if (failed)
b34976b6 4315 return FALSE;
dbb410c3
AM
4316 }
4317
252b5132 4318 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
ed7e9d0b 4319 /* sh_name was set in init_file_header. */
252b5132 4320 shstrtab_hdr->sh_type = SHT_STRTAB;
84865015 4321 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
252b5132 4322 shstrtab_hdr->sh_addr = 0;
946748d5 4323 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4324 shstrtab_hdr->sh_entsize = 0;
4325 shstrtab_hdr->sh_link = 0;
4326 shstrtab_hdr->sh_info = 0;
3e19fb8f 4327 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4328 shstrtab_hdr->sh_addralign = 1;
4329
c84fca4d 4330 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 4331 return FALSE;
252b5132 4332
3516e984 4333 if (need_symtab)
252b5132
RH
4334 {
4335 file_ptr off;
4336 Elf_Internal_Shdr *hdr;
4337
12bd6957 4338 off = elf_next_file_pos (abfd);
252b5132 4339
6a40cf0c 4340 hdr = & elf_symtab_hdr (abfd);
b34976b6 4341 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4342
6a40cf0c
NC
4343 if (elf_symtab_shndx_list (abfd) != NULL)
4344 {
4345 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4346 if (hdr->sh_size != 0)
4347 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4348 /* FIXME: What about other symtab_shndx sections in the list ? */
4349 }
9ad5cbcf 4350
252b5132 4351 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 4352 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4353
12bd6957 4354 elf_next_file_pos (abfd) = off;
252b5132
RH
4355
4356 /* Now that we know where the .strtab section goes, write it
08a40648 4357 out. */
252b5132 4358 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
ef10c3ac 4359 || ! _bfd_elf_strtab_emit (abfd, strtab))
b34976b6 4360 return FALSE;
ef10c3ac 4361 _bfd_elf_strtab_free (strtab);
252b5132
RH
4362 }
4363
b34976b6 4364 abfd->output_has_begun = TRUE;
252b5132 4365
b34976b6 4366 return TRUE;
252b5132
RH
4367}
4368
8ded5a0f
AM
4369/* Make an initial estimate of the size of the program header. If we
4370 get the number wrong here, we'll redo section placement. */
4371
4372static bfd_size_type
4373get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4374{
4375 size_t segs;
4376 asection *s;
2b05f1b7 4377 const struct elf_backend_data *bed;
8ded5a0f
AM
4378
4379 /* Assume we will need exactly two PT_LOAD segments: one for text
4380 and one for data. */
4381 segs = 2;
4382
4383 s = bfd_get_section_by_name (abfd, ".interp");
1b9e270b 4384 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
8ded5a0f
AM
4385 {
4386 /* If we have a loadable interpreter section, we need a
4387 PT_INTERP segment. In this case, assume we also need a
4388 PT_PHDR segment, although that may not be true for all
4389 targets. */
e9a38e0f 4390 segs += 2;
8ded5a0f
AM
4391 }
4392
4393 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4394 {
4395 /* We need a PT_DYNAMIC segment. */
4396 ++segs;
f210dcff 4397 }
08a40648 4398
ceae84aa 4399 if (info != NULL && info->relro)
f210dcff
L
4400 {
4401 /* We need a PT_GNU_RELRO segment. */
4402 ++segs;
8ded5a0f
AM
4403 }
4404
12bd6957 4405 if (elf_eh_frame_hdr (abfd))
8ded5a0f
AM
4406 {
4407 /* We need a PT_GNU_EH_FRAME segment. */
4408 ++segs;
4409 }
4410
12bd6957 4411 if (elf_stack_flags (abfd))
8ded5a0f 4412 {
2b05f1b7
L
4413 /* We need a PT_GNU_STACK segment. */
4414 ++segs;
4415 }
94b11780 4416
0a59decb
L
4417 s = bfd_get_section_by_name (abfd,
4418 NOTE_GNU_PROPERTY_SECTION_NAME);
4419 if (s != NULL && s->size != 0)
4420 {
4421 /* We need a PT_GNU_PROPERTY segment. */
4422 ++segs;
4423 }
4424
2b05f1b7
L
4425 for (s = abfd->sections; s != NULL; s = s->next)
4426 {
8ded5a0f 4427 if ((s->flags & SEC_LOAD) != 0
23e463ed 4428 && elf_section_type (s) == SHT_NOTE)
8ded5a0f 4429 {
23e463ed 4430 unsigned int alignment_power;
8ded5a0f
AM
4431 /* We need a PT_NOTE segment. */
4432 ++segs;
23e463ed
L
4433 /* Try to create just one PT_NOTE segment for all adjacent
4434 loadable SHT_NOTE sections. gABI requires that within a
4435 PT_NOTE segment (and also inside of each SHT_NOTE section)
4436 each note should have the same alignment. So we check
4437 whether the sections are correctly aligned. */
4438 alignment_power = s->alignment_power;
4439 while (s->next != NULL
4440 && s->next->alignment_power == alignment_power
4441 && (s->next->flags & SEC_LOAD) != 0
4442 && elf_section_type (s->next) == SHT_NOTE)
4443 s = s->next;
8ded5a0f
AM
4444 }
4445 }
4446
4447 for (s = abfd->sections; s != NULL; s = s->next)
4448 {
4449 if (s->flags & SEC_THREAD_LOCAL)
4450 {
4451 /* We need a PT_TLS segment. */
4452 ++segs;
4453 break;
4454 }
4455 }
4456
2b05f1b7 4457 bed = get_elf_backend_data (abfd);
a91e1603 4458
df3a023b
AM
4459 if ((abfd->flags & D_PAGED) != 0
4460 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
4461 {
4462 /* Add a PT_GNU_MBIND segment for each mbind section. */
4463 unsigned int page_align_power = bfd_log2 (bed->commonpagesize);
4464 for (s = abfd->sections; s != NULL; s = s->next)
4465 if (elf_section_flags (s) & SHF_GNU_MBIND)
4466 {
4467 if (elf_section_data (s)->this_hdr.sh_info > PT_GNU_MBIND_NUM)
4468 {
4469 _bfd_error_handler
4470 /* xgettext:c-format */
4471 (_("%pB: GNU_MBIND section `%pA' has invalid "
4472 "sh_info field: %d"),
4473 abfd, s, elf_section_data (s)->this_hdr.sh_info);
4474 continue;
4475 }
4476 /* Align mbind section to page size. */
4477 if (s->alignment_power < page_align_power)
4478 s->alignment_power = page_align_power;
4479 segs ++;
4480 }
4481 }
4482
4483 /* Let the backend count up any program headers it might need. */
4484 if (bed->elf_backend_additional_program_headers)
8ded5a0f
AM
4485 {
4486 int a;
4487
4488 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4489 if (a == -1)
4490 abort ();
4491 segs += a;
4492 }
4493
4494 return segs * bed->s->sizeof_phdr;
4495}
4496
2ea37f1c
NC
4497/* Find the segment that contains the output_section of section. */
4498
4499Elf_Internal_Phdr *
4500_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4501{
4502 struct elf_segment_map *m;
4503 Elf_Internal_Phdr *p;
4504
12bd6957 4505 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
2ea37f1c
NC
4506 m != NULL;
4507 m = m->next, p++)
4508 {
4509 int i;
4510
4511 for (i = m->count - 1; i >= 0; i--)
4512 if (m->sections[i] == section)
4513 return p;
4514 }
4515
4516 return NULL;
4517}
4518
252b5132
RH
4519/* Create a mapping from a set of sections to a program segment. */
4520
217aa764
AM
4521static struct elf_segment_map *
4522make_mapping (bfd *abfd,
4523 asection **sections,
4524 unsigned int from,
4525 unsigned int to,
4526 bfd_boolean phdr)
252b5132
RH
4527{
4528 struct elf_segment_map *m;
4529 unsigned int i;
4530 asection **hdrpp;
986f0783 4531 size_t amt;
252b5132 4532
00bee008
AM
4533 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
4534 amt += (to - from) * sizeof (asection *);
a50b1753 4535 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4536 if (m == NULL)
4537 return NULL;
4538 m->next = NULL;
4539 m->p_type = PT_LOAD;
4540 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4541 m->sections[i - from] = *hdrpp;
4542 m->count = to - from;
4543
4544 if (from == 0 && phdr)
4545 {
4546 /* Include the headers in the first PT_LOAD segment. */
4547 m->includes_filehdr = 1;
4548 m->includes_phdrs = 1;
4549 }
4550
4551 return m;
4552}
4553
229fcec5
MM
4554/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4555 on failure. */
4556
4557struct elf_segment_map *
4558_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4559{
4560 struct elf_segment_map *m;
4561
a50b1753 4562 m = (struct elf_segment_map *) bfd_zalloc (abfd,
07d6d2b8 4563 sizeof (struct elf_segment_map));
229fcec5
MM
4564 if (m == NULL)
4565 return NULL;
4566 m->next = NULL;
4567 m->p_type = PT_DYNAMIC;
4568 m->count = 1;
4569 m->sections[0] = dynsec;
08a40648 4570
229fcec5
MM
4571 return m;
4572}
4573
8ded5a0f 4574/* Possibly add or remove segments from the segment map. */
252b5132 4575
b34976b6 4576static bfd_boolean
3dea8fca
AM
4577elf_modify_segment_map (bfd *abfd,
4578 struct bfd_link_info *info,
4579 bfd_boolean remove_empty_load)
252b5132 4580{
252e386e 4581 struct elf_segment_map **m;
8ded5a0f 4582 const struct elf_backend_data *bed;
252b5132 4583
8ded5a0f
AM
4584 /* The placement algorithm assumes that non allocated sections are
4585 not in PT_LOAD segments. We ensure this here by removing such
4586 sections from the segment map. We also remove excluded
252e386e
AM
4587 sections. Finally, any PT_LOAD segment without sections is
4588 removed. */
12bd6957 4589 m = &elf_seg_map (abfd);
252e386e 4590 while (*m)
8ded5a0f
AM
4591 {
4592 unsigned int i, new_count;
252b5132 4593
252e386e 4594 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 4595 {
252e386e
AM
4596 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4597 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4598 || (*m)->p_type != PT_LOAD))
8ded5a0f 4599 {
252e386e
AM
4600 (*m)->sections[new_count] = (*m)->sections[i];
4601 new_count++;
8ded5a0f
AM
4602 }
4603 }
252e386e 4604 (*m)->count = new_count;
252b5132 4605
1a9ccd70
NC
4606 if (remove_empty_load
4607 && (*m)->p_type == PT_LOAD
4608 && (*m)->count == 0
4609 && !(*m)->includes_phdrs)
252e386e
AM
4610 *m = (*m)->next;
4611 else
4612 m = &(*m)->next;
8ded5a0f 4613 }
252b5132 4614
8ded5a0f
AM
4615 bed = get_elf_backend_data (abfd);
4616 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 4617 {
252e386e 4618 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 4619 return FALSE;
252b5132 4620 }
252b5132 4621
8ded5a0f
AM
4622 return TRUE;
4623}
252b5132 4624
dbc88fc1
AM
4625#define IS_TBSS(s) \
4626 ((s->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) == SEC_THREAD_LOCAL)
4627
8ded5a0f 4628/* Set up a mapping from BFD sections to program segments. */
252b5132 4629
8ded5a0f
AM
4630bfd_boolean
4631_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4632{
4633 unsigned int count;
4634 struct elf_segment_map *m;
4635 asection **sections = NULL;
4636 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 4637 bfd_boolean no_user_phdrs;
252b5132 4638
12bd6957 4639 no_user_phdrs = elf_seg_map (abfd) == NULL;
d324f6d6
RM
4640
4641 if (info != NULL)
4642 info->user_phdrs = !no_user_phdrs;
4643
3dea8fca 4644 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 4645 {
8ded5a0f
AM
4646 asection *s;
4647 unsigned int i;
4648 struct elf_segment_map *mfirst;
4649 struct elf_segment_map **pm;
4650 asection *last_hdr;
4651 bfd_vma last_size;
00bee008 4652 unsigned int hdr_index;
8ded5a0f
AM
4653 bfd_vma maxpagesize;
4654 asection **hdrpp;
64029e93 4655 bfd_boolean phdr_in_segment;
8ded5a0f 4656 bfd_boolean writable;
2888249f 4657 bfd_boolean executable;
446f7ed5 4658 unsigned int tls_count = 0;
8ded5a0f 4659 asection *first_tls = NULL;
a91e1603 4660 asection *first_mbind = NULL;
8ded5a0f 4661 asection *dynsec, *eh_frame_hdr;
446f7ed5 4662 size_t amt;
8d06853e 4663 bfd_vma addr_mask, wrap_to = 0;
64029e93 4664 bfd_size_type phdr_size;
252b5132 4665
8ded5a0f 4666 /* Select the allocated sections, and sort them. */
252b5132 4667
446f7ed5
AM
4668 amt = bfd_count_sections (abfd) * sizeof (asection *);
4669 sections = (asection **) bfd_malloc (amt);
8ded5a0f 4670 if (sections == NULL)
252b5132 4671 goto error_return;
252b5132 4672
8d06853e
AM
4673 /* Calculate top address, avoiding undefined behaviour of shift
4674 left operator when shift count is equal to size of type
4675 being shifted. */
4676 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4677 addr_mask = (addr_mask << 1) + 1;
4678
8ded5a0f
AM
4679 i = 0;
4680 for (s = abfd->sections; s != NULL; s = s->next)
4681 {
4682 if ((s->flags & SEC_ALLOC) != 0)
4683 {
48db3297
AM
4684 /* target_index is unused until bfd_elf_final_link
4685 starts output of section symbols. Use it to make
4686 qsort stable. */
4687 s->target_index = i;
8ded5a0f
AM
4688 sections[i] = s;
4689 ++i;
8d06853e
AM
4690 /* A wrapping section potentially clashes with header. */
4691 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
4692 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
4693 }
4694 }
4695 BFD_ASSERT (i <= bfd_count_sections (abfd));
4696 count = i;
252b5132 4697
8ded5a0f 4698 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 4699
64029e93
AM
4700 phdr_size = elf_program_header_size (abfd);
4701 if (phdr_size == (bfd_size_type) -1)
4702 phdr_size = get_program_header_size (abfd, info);
4703 phdr_size += bed->s->sizeof_ehdr;
4704 maxpagesize = bed->maxpagesize;
4705 if (maxpagesize == 0)
4706 maxpagesize = 1;
4707 phdr_in_segment = info != NULL && info->load_phdrs;
4708 if (count != 0
4709 && (((sections[0]->lma & addr_mask) & (maxpagesize - 1))
4710 >= (phdr_size & (maxpagesize - 1))))
4711 /* For compatibility with old scripts that may not be using
4712 SIZEOF_HEADERS, add headers when it looks like space has
4713 been left for them. */
4714 phdr_in_segment = TRUE;
252b5132 4715
64029e93 4716 /* Build the mapping. */
8ded5a0f
AM
4717 mfirst = NULL;
4718 pm = &mfirst;
252b5132 4719
8ded5a0f
AM
4720 /* If we have a .interp section, then create a PT_PHDR segment for
4721 the program headers and a PT_INTERP segment for the .interp
4722 section. */
4723 s = bfd_get_section_by_name (abfd, ".interp");
1b9e270b 4724 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
8ded5a0f
AM
4725 {
4726 amt = sizeof (struct elf_segment_map);
a50b1753 4727 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4728 if (m == NULL)
4729 goto error_return;
4730 m->next = NULL;
4731 m->p_type = PT_PHDR;
f882209d 4732 m->p_flags = PF_R;
8ded5a0f
AM
4733 m->p_flags_valid = 1;
4734 m->includes_phdrs = 1;
64029e93 4735 phdr_in_segment = TRUE;
8ded5a0f
AM
4736 *pm = m;
4737 pm = &m->next;
252b5132 4738
8ded5a0f 4739 amt = sizeof (struct elf_segment_map);
a50b1753 4740 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4741 if (m == NULL)
4742 goto error_return;
4743 m->next = NULL;
4744 m->p_type = PT_INTERP;
4745 m->count = 1;
4746 m->sections[0] = s;
4747
4748 *pm = m;
4749 pm = &m->next;
252b5132 4750 }
8ded5a0f
AM
4751
4752 /* Look through the sections. We put sections in the same program
4753 segment when the start of the second section can be placed within
4754 a few bytes of the end of the first section. */
4755 last_hdr = NULL;
4756 last_size = 0;
00bee008 4757 hdr_index = 0;
8ded5a0f 4758 writable = FALSE;
2888249f 4759 executable = FALSE;
8ded5a0f
AM
4760 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4761 if (dynsec != NULL
4762 && (dynsec->flags & SEC_LOAD) == 0)
4763 dynsec = NULL;
4764
64029e93
AM
4765 if ((abfd->flags & D_PAGED) == 0)
4766 phdr_in_segment = FALSE;
4767
8ded5a0f
AM
4768 /* Deal with -Ttext or something similar such that the first section
4769 is not adjacent to the program headers. This is an
4770 approximation, since at this point we don't know exactly how many
4771 program headers we will need. */
64029e93 4772 if (phdr_in_segment && count > 0)
252b5132 4773 {
64029e93
AM
4774 bfd_vma phdr_lma;
4775 bfd_boolean separate_phdr = FALSE;
4776
4777 phdr_lma = (sections[0]->lma - phdr_size) & addr_mask & -maxpagesize;
4778 if (info != NULL
4779 && info->separate_code
4780 && (sections[0]->flags & SEC_CODE) != 0)
1a9ccd70 4781 {
64029e93
AM
4782 /* If data sections should be separate from code and
4783 thus not executable, and the first section is
4784 executable then put the file and program headers in
4785 their own PT_LOAD. */
4786 separate_phdr = TRUE;
4787 if ((((phdr_lma + phdr_size - 1) & addr_mask & -maxpagesize)
4788 == (sections[0]->lma & addr_mask & -maxpagesize)))
4789 {
4790 /* The file and program headers are currently on the
4791 same page as the first section. Put them on the
4792 previous page if we can. */
4793 if (phdr_lma >= maxpagesize)
4794 phdr_lma -= maxpagesize;
4795 else
4796 separate_phdr = FALSE;
4797 }
4798 }
4799 if ((sections[0]->lma & addr_mask) < phdr_lma
4800 || (sections[0]->lma & addr_mask) < phdr_size)
4801 /* If file and program headers would be placed at the end
4802 of memory then it's probably better to omit them. */
4803 phdr_in_segment = FALSE;
4804 else if (phdr_lma < wrap_to)
4805 /* If a section wraps around to where we'll be placing
4806 file and program headers, then the headers will be
4807 overwritten. */
4808 phdr_in_segment = FALSE;
4809 else if (separate_phdr)
4810 {
4811 m = make_mapping (abfd, sections, 0, 0, phdr_in_segment);
4812 if (m == NULL)
4813 goto error_return;
4814 m->p_paddr = phdr_lma;
4815 m->p_vaddr_offset
4816 = (sections[0]->vma - phdr_size) & addr_mask & -maxpagesize;
4817 m->p_paddr_valid = 1;
4818 *pm = m;
4819 pm = &m->next;
4820 phdr_in_segment = FALSE;
1a9ccd70 4821 }
252b5132
RH
4822 }
4823
8ded5a0f 4824 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 4825 {
8ded5a0f
AM
4826 asection *hdr;
4827 bfd_boolean new_segment;
4828
4829 hdr = *hdrpp;
4830
4831 /* See if this section and the last one will fit in the same
4832 segment. */
4833
4834 if (last_hdr == NULL)
4835 {
4836 /* If we don't have a segment yet, then we don't need a new
4837 one (we build the last one after this loop). */
4838 new_segment = FALSE;
4839 }
4840 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4841 {
4842 /* If this section has a different relation between the
4843 virtual address and the load address, then we need a new
4844 segment. */
4845 new_segment = TRUE;
4846 }
b5599592
AM
4847 else if (hdr->lma < last_hdr->lma + last_size
4848 || last_hdr->lma + last_size < last_hdr->lma)
4849 {
4850 /* If this section has a load address that makes it overlap
4851 the previous section, then we need a new segment. */
4852 new_segment = TRUE;
4853 }
76cb3a89
AM
4854 else if ((abfd->flags & D_PAGED) != 0
4855 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4856 == (hdr->lma & -maxpagesize)))
4857 {
4858 /* If we are demand paged then we can't map two disk
4859 pages onto the same memory page. */
4860 new_segment = FALSE;
4861 }
39948a60
NC
4862 /* In the next test we have to be careful when last_hdr->lma is close
4863 to the end of the address space. If the aligned address wraps
4864 around to the start of the address space, then there are no more
4865 pages left in memory and it is OK to assume that the current
4866 section can be included in the current segment. */
76cb3a89
AM
4867 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4868 + maxpagesize > last_hdr->lma)
4869 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4870 + maxpagesize <= hdr->lma))
8ded5a0f
AM
4871 {
4872 /* If putting this section in this segment would force us to
4873 skip a page in the segment, then we need a new segment. */
4874 new_segment = TRUE;
4875 }
4876 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
76cb3a89 4877 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
8ded5a0f 4878 {
e5654c0f
AM
4879 /* We don't want to put a loaded section after a
4880 nonloaded (ie. bss style) section in the same segment
4881 as that will force the non-loaded section to be loaded.
76cb3a89 4882 Consider .tbss sections as loaded for this purpose. */
8ded5a0f
AM
4883 new_segment = TRUE;
4884 }
4885 else if ((abfd->flags & D_PAGED) == 0)
4886 {
4887 /* If the file is not demand paged, which means that we
4888 don't require the sections to be correctly aligned in the
4889 file, then there is no other reason for a new segment. */
4890 new_segment = FALSE;
4891 }
2888249f
L
4892 else if (info != NULL
4893 && info->separate_code
4894 && executable != ((hdr->flags & SEC_CODE) != 0))
4895 {
4896 new_segment = TRUE;
4897 }
8ded5a0f 4898 else if (! writable
76cb3a89 4899 && (hdr->flags & SEC_READONLY) == 0)
8ded5a0f
AM
4900 {
4901 /* We don't want to put a writable section in a read only
76cb3a89 4902 segment. */
8ded5a0f
AM
4903 new_segment = TRUE;
4904 }
4905 else
4906 {
4907 /* Otherwise, we can use the same segment. */
4908 new_segment = FALSE;
4909 }
4910
2889e75b 4911 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
4912 if (last_hdr != NULL
4913 && info != NULL
4914 && info->callbacks->override_segment_assignment != NULL)
4915 new_segment
4916 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4917 last_hdr,
4918 new_segment);
2889e75b 4919
8ded5a0f
AM
4920 if (! new_segment)
4921 {
4922 if ((hdr->flags & SEC_READONLY) == 0)
4923 writable = TRUE;
2888249f
L
4924 if ((hdr->flags & SEC_CODE) != 0)
4925 executable = TRUE;
8ded5a0f
AM
4926 last_hdr = hdr;
4927 /* .tbss sections effectively have zero size. */
dbc88fc1 4928 last_size = !IS_TBSS (hdr) ? hdr->size : 0;
8ded5a0f
AM
4929 continue;
4930 }
4931
4932 /* We need a new program segment. We must create a new program
00bee008 4933 header holding all the sections from hdr_index until hdr. */
8ded5a0f 4934
00bee008 4935 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
8ded5a0f
AM
4936 if (m == NULL)
4937 goto error_return;
4938
4939 *pm = m;
4940 pm = &m->next;
4941
252b5132 4942 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 4943 writable = TRUE;
8ded5a0f
AM
4944 else
4945 writable = FALSE;
4946
2888249f
L
4947 if ((hdr->flags & SEC_CODE) == 0)
4948 executable = FALSE;
4949 else
4950 executable = TRUE;
4951
baaff79e
JJ
4952 last_hdr = hdr;
4953 /* .tbss sections effectively have zero size. */
dbc88fc1 4954 last_size = !IS_TBSS (hdr) ? hdr->size : 0;
00bee008 4955 hdr_index = i;
8ded5a0f 4956 phdr_in_segment = FALSE;
252b5132
RH
4957 }
4958
86b2281f
AM
4959 /* Create a final PT_LOAD program segment, but not if it's just
4960 for .tbss. */
4961 if (last_hdr != NULL
00bee008 4962 && (i - hdr_index != 1
dbc88fc1 4963 || !IS_TBSS (last_hdr)))
8ded5a0f 4964 {
00bee008 4965 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
8ded5a0f
AM
4966 if (m == NULL)
4967 goto error_return;
252b5132 4968
8ded5a0f
AM
4969 *pm = m;
4970 pm = &m->next;
4971 }
252b5132 4972
8ded5a0f
AM
4973 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4974 if (dynsec != NULL)
4975 {
4976 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4977 if (m == NULL)
4978 goto error_return;
4979 *pm = m;
4980 pm = &m->next;
4981 }
252b5132 4982
23e463ed 4983 /* For each batch of consecutive loadable SHT_NOTE sections,
1c5265b5
JJ
4984 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4985 because if we link together nonloadable .note sections and
4986 loadable .note sections, we will generate two .note sections
23e463ed 4987 in the output file. */
8ded5a0f
AM
4988 for (s = abfd->sections; s != NULL; s = s->next)
4989 {
4990 if ((s->flags & SEC_LOAD) != 0
23e463ed 4991 && elf_section_type (s) == SHT_NOTE)
8ded5a0f 4992 {
1c5265b5 4993 asection *s2;
23e463ed 4994 unsigned int alignment_power = s->alignment_power;
91d6fa6a
NC
4995
4996 count = 1;
23e463ed
L
4997 for (s2 = s; s2->next != NULL; s2 = s2->next)
4998 {
4999 if (s2->next->alignment_power == alignment_power
5000 && (s2->next->flags & SEC_LOAD) != 0
5001 && elf_section_type (s2->next) == SHT_NOTE
5002 && align_power (s2->lma + s2->size,
5003 alignment_power)
5004 == s2->next->lma)
5005 count++;
5006 else
5007 break;
5008 }
00bee008
AM
5009 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5010 amt += count * sizeof (asection *);
a50b1753 5011 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
5012 if (m == NULL)
5013 goto error_return;
5014 m->next = NULL;
5015 m->p_type = PT_NOTE;
1c5265b5
JJ
5016 m->count = count;
5017 while (count > 1)
5018 {
5019 m->sections[m->count - count--] = s;
5020 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5021 s = s->next;
5022 }
5023 m->sections[m->count - 1] = s;
5024 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
5025 *pm = m;
5026 pm = &m->next;
5027 }
5028 if (s->flags & SEC_THREAD_LOCAL)
5029 {
5030 if (! tls_count)
5031 first_tls = s;
5032 tls_count++;
5033 }
a91e1603
L
5034 if (first_mbind == NULL
5035 && (elf_section_flags (s) & SHF_GNU_MBIND) != 0)
5036 first_mbind = s;
8ded5a0f 5037 }
252b5132 5038
8ded5a0f
AM
5039 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
5040 if (tls_count > 0)
5041 {
00bee008
AM
5042 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5043 amt += tls_count * sizeof (asection *);
a50b1753 5044 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
5045 if (m == NULL)
5046 goto error_return;
5047 m->next = NULL;
5048 m->p_type = PT_TLS;
5049 m->count = tls_count;
5050 /* Mandated PF_R. */
5051 m->p_flags = PF_R;
5052 m->p_flags_valid = 1;
d923cae0 5053 s = first_tls;
446f7ed5 5054 for (i = 0; i < tls_count; ++i)
8ded5a0f 5055 {
d923cae0
L
5056 if ((s->flags & SEC_THREAD_LOCAL) == 0)
5057 {
5058 _bfd_error_handler
871b3ab2 5059 (_("%pB: TLS sections are not adjacent:"), abfd);
d923cae0
L
5060 s = first_tls;
5061 i = 0;
446f7ed5 5062 while (i < tls_count)
d923cae0
L
5063 {
5064 if ((s->flags & SEC_THREAD_LOCAL) != 0)
5065 {
871b3ab2 5066 _bfd_error_handler (_(" TLS: %pA"), s);
d923cae0
L
5067 i++;
5068 }
5069 else
871b3ab2 5070 _bfd_error_handler (_(" non-TLS: %pA"), s);
d923cae0
L
5071 s = s->next;
5072 }
5073 bfd_set_error (bfd_error_bad_value);
5074 goto error_return;
5075 }
5076 m->sections[i] = s;
5077 s = s->next;
8ded5a0f 5078 }
252b5132 5079
8ded5a0f
AM
5080 *pm = m;
5081 pm = &m->next;
5082 }
252b5132 5083
df3a023b
AM
5084 if (first_mbind
5085 && (abfd->flags & D_PAGED) != 0
5086 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
a91e1603
L
5087 for (s = first_mbind; s != NULL; s = s->next)
5088 if ((elf_section_flags (s) & SHF_GNU_MBIND) != 0
df3a023b 5089 && elf_section_data (s)->this_hdr.sh_info <= PT_GNU_MBIND_NUM)
a91e1603
L
5090 {
5091 /* Mandated PF_R. */
5092 unsigned long p_flags = PF_R;
5093 if ((s->flags & SEC_READONLY) == 0)
5094 p_flags |= PF_W;
5095 if ((s->flags & SEC_CODE) != 0)
5096 p_flags |= PF_X;
5097
5098 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5099 m = bfd_zalloc (abfd, amt);
5100 if (m == NULL)
5101 goto error_return;
5102 m->next = NULL;
5103 m->p_type = (PT_GNU_MBIND_LO
5104 + elf_section_data (s)->this_hdr.sh_info);
5105 m->count = 1;
5106 m->p_flags_valid = 1;
5107 m->sections[0] = s;
5108 m->p_flags = p_flags;
5109
5110 *pm = m;
5111 pm = &m->next;
5112 }
5113
0a59decb
L
5114 s = bfd_get_section_by_name (abfd,
5115 NOTE_GNU_PROPERTY_SECTION_NAME);
5116 if (s != NULL && s->size != 0)
5117 {
5118 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5119 m = bfd_zalloc (abfd, amt);
5120 if (m == NULL)
5121 goto error_return;
5122 m->next = NULL;
5123 m->p_type = PT_GNU_PROPERTY;
5124 m->count = 1;
5125 m->p_flags_valid = 1;
5126 m->sections[0] = s;
5127 m->p_flags = PF_R;
5128 *pm = m;
5129 pm = &m->next;
5130 }
5131
8ded5a0f
AM
5132 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
5133 segment. */
12bd6957 5134 eh_frame_hdr = elf_eh_frame_hdr (abfd);
8ded5a0f
AM
5135 if (eh_frame_hdr != NULL
5136 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 5137 {
dc810e39 5138 amt = sizeof (struct elf_segment_map);
a50b1753 5139 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
5140 if (m == NULL)
5141 goto error_return;
5142 m->next = NULL;
8ded5a0f 5143 m->p_type = PT_GNU_EH_FRAME;
252b5132 5144 m->count = 1;
8ded5a0f 5145 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
5146
5147 *pm = m;
5148 pm = &m->next;
5149 }
13ae64f3 5150
12bd6957 5151 if (elf_stack_flags (abfd))
13ae64f3 5152 {
8ded5a0f 5153 amt = sizeof (struct elf_segment_map);
a50b1753 5154 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
5155 if (m == NULL)
5156 goto error_return;
5157 m->next = NULL;
2b05f1b7 5158 m->p_type = PT_GNU_STACK;
12bd6957 5159 m->p_flags = elf_stack_flags (abfd);
04c3a755 5160 m->p_align = bed->stack_align;
8ded5a0f 5161 m->p_flags_valid = 1;
04c3a755
NS
5162 m->p_align_valid = m->p_align != 0;
5163 if (info->stacksize > 0)
5164 {
5165 m->p_size = info->stacksize;
5166 m->p_size_valid = 1;
5167 }
252b5132 5168
8ded5a0f
AM
5169 *pm = m;
5170 pm = &m->next;
5171 }
65765700 5172
ceae84aa 5173 if (info != NULL && info->relro)
8ded5a0f 5174 {
f210dcff
L
5175 for (m = mfirst; m != NULL; m = m->next)
5176 {
3832a4d8
AM
5177 if (m->p_type == PT_LOAD
5178 && m->count != 0
5179 && m->sections[0]->vma >= info->relro_start
5180 && m->sections[0]->vma < info->relro_end)
f210dcff 5181 {
3832a4d8
AM
5182 i = m->count;
5183 while (--i != (unsigned) -1)
5184 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
5185 == (SEC_LOAD | SEC_HAS_CONTENTS))
5186 break;
5187
43a8475c 5188 if (i != (unsigned) -1)
f210dcff
L
5189 break;
5190 }
be01b344 5191 }
f210dcff
L
5192
5193 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
5194 if (m != NULL)
5195 {
5196 amt = sizeof (struct elf_segment_map);
a50b1753 5197 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
5198 if (m == NULL)
5199 goto error_return;
5200 m->next = NULL;
5201 m->p_type = PT_GNU_RELRO;
f210dcff
L
5202 *pm = m;
5203 pm = &m->next;
5204 }
8ded5a0f 5205 }
9ee5e499 5206
8ded5a0f 5207 free (sections);
12bd6957 5208 elf_seg_map (abfd) = mfirst;
9ee5e499
JJ
5209 }
5210
3dea8fca 5211 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 5212 return FALSE;
8c37241b 5213
12bd6957 5214 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
8ded5a0f 5215 ++count;
12bd6957 5216 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
252b5132 5217
b34976b6 5218 return TRUE;
252b5132
RH
5219
5220 error_return:
5221 if (sections != NULL)
5222 free (sections);
b34976b6 5223 return FALSE;
252b5132
RH
5224}
5225
5226/* Sort sections by address. */
5227
5228static int
217aa764 5229elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
5230{
5231 const asection *sec1 = *(const asection **) arg1;
5232 const asection *sec2 = *(const asection **) arg2;
eecdbe52 5233 bfd_size_type size1, size2;
252b5132
RH
5234
5235 /* Sort by LMA first, since this is the address used to
5236 place the section into a segment. */
5237 if (sec1->lma < sec2->lma)
5238 return -1;
5239 else if (sec1->lma > sec2->lma)
5240 return 1;
5241
5242 /* Then sort by VMA. Normally the LMA and the VMA will be
5243 the same, and this will do nothing. */
5244 if (sec1->vma < sec2->vma)
5245 return -1;
5246 else if (sec1->vma > sec2->vma)
5247 return 1;
5248
5249 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
5250
07c6e936 5251#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
5252
5253 if (TOEND (sec1))
5254 {
48db3297 5255 if (!TOEND (sec2))
252b5132
RH
5256 return 1;
5257 }
00a7cdc5 5258 else if (TOEND (sec2))
252b5132
RH
5259 return -1;
5260
5261#undef TOEND
5262
00a7cdc5
NC
5263 /* Sort by size, to put zero sized sections
5264 before others at the same address. */
252b5132 5265
eea6121a
AM
5266 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
5267 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
5268
5269 if (size1 < size2)
252b5132 5270 return -1;
eecdbe52 5271 if (size1 > size2)
252b5132
RH
5272 return 1;
5273
5274 return sec1->target_index - sec2->target_index;
5275}
5276
30fe1832
AM
5277/* This qsort comparison functions sorts PT_LOAD segments first and
5278 by p_paddr, for assign_file_positions_for_load_sections. */
5279
5280static int
5281elf_sort_segments (const void *arg1, const void *arg2)
5282{
5283 const struct elf_segment_map *m1 = *(const struct elf_segment_map **) arg1;
5284 const struct elf_segment_map *m2 = *(const struct elf_segment_map **) arg2;
5285
5286 if (m1->p_type != m2->p_type)
5287 {
5288 if (m1->p_type == PT_NULL)
5289 return 1;
5290 if (m2->p_type == PT_NULL)
5291 return -1;
5292 return m1->p_type < m2->p_type ? -1 : 1;
5293 }
5294 if (m1->includes_filehdr != m2->includes_filehdr)
5295 return m1->includes_filehdr ? -1 : 1;
5296 if (m1->no_sort_lma != m2->no_sort_lma)
5297 return m1->no_sort_lma ? -1 : 1;
5298 if (m1->p_type == PT_LOAD && !m1->no_sort_lma)
5299 {
5300 bfd_vma lma1, lma2;
5301 lma1 = 0;
5302 if (m1->p_paddr_valid)
5303 lma1 = m1->p_paddr;
5304 else if (m1->count != 0)
5305 lma1 = m1->sections[0]->lma + m1->p_vaddr_offset;
5306 lma2 = 0;
5307 if (m2->p_paddr_valid)
5308 lma2 = m2->p_paddr;
5309 else if (m2->count != 0)
5310 lma2 = m2->sections[0]->lma + m2->p_vaddr_offset;
5311 if (lma1 != lma2)
5312 return lma1 < lma2 ? -1 : 1;
5313 }
5314 if (m1->idx != m2->idx)
5315 return m1->idx < m2->idx ? -1 : 1;
5316 return 0;
5317}
5318
340b6d91
AC
5319/* Ian Lance Taylor writes:
5320
5321 We shouldn't be using % with a negative signed number. That's just
5322 not good. We have to make sure either that the number is not
5323 negative, or that the number has an unsigned type. When the types
5324 are all the same size they wind up as unsigned. When file_ptr is a
5325 larger signed type, the arithmetic winds up as signed long long,
5326 which is wrong.
5327
5328 What we're trying to say here is something like ``increase OFF by
5329 the least amount that will cause it to be equal to the VMA modulo
5330 the page size.'' */
5331/* In other words, something like:
5332
5333 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5334 off_offset = off % bed->maxpagesize;
5335 if (vma_offset < off_offset)
5336 adjustment = vma_offset + bed->maxpagesize - off_offset;
5337 else
5338 adjustment = vma_offset - off_offset;
08a40648 5339
de194d85 5340 which can be collapsed into the expression below. */
340b6d91
AC
5341
5342static file_ptr
5343vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5344{
dc9155b2
NC
5345 /* PR binutils/16199: Handle an alignment of zero. */
5346 if (maxpagesize == 0)
5347 maxpagesize = 1;
340b6d91
AC
5348 return ((vma - off) % maxpagesize);
5349}
5350
6d33f217
L
5351static void
5352print_segment_map (const struct elf_segment_map *m)
5353{
5354 unsigned int j;
5355 const char *pt = get_segment_type (m->p_type);
5356 char buf[32];
5357
5358 if (pt == NULL)
5359 {
5360 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5361 sprintf (buf, "LOPROC+%7.7x",
5362 (unsigned int) (m->p_type - PT_LOPROC));
5363 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5364 sprintf (buf, "LOOS+%7.7x",
5365 (unsigned int) (m->p_type - PT_LOOS));
5366 else
5367 snprintf (buf, sizeof (buf), "%8.8x",
5368 (unsigned int) m->p_type);
5369 pt = buf;
5370 }
4a97a0e5 5371 fflush (stdout);
6d33f217
L
5372 fprintf (stderr, "%s:", pt);
5373 for (j = 0; j < m->count; j++)
5374 fprintf (stderr, " %s", m->sections [j]->name);
5375 putc ('\n',stderr);
4a97a0e5 5376 fflush (stderr);
6d33f217
L
5377}
5378
32812159
AM
5379static bfd_boolean
5380write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5381{
5382 void *buf;
5383 bfd_boolean ret;
5384
5385 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5386 return FALSE;
5387 buf = bfd_zmalloc (len);
5388 if (buf == NULL)
5389 return FALSE;
5390 ret = bfd_bwrite (buf, len, abfd) == len;
5391 free (buf);
5392 return ret;
5393}
5394
252b5132
RH
5395/* Assign file positions to the sections based on the mapping from
5396 sections to segments. This function also sets up some fields in
f3520d2f 5397 the file header. */
252b5132 5398
b34976b6 5399static bfd_boolean
f3520d2f
AM
5400assign_file_positions_for_load_sections (bfd *abfd,
5401 struct bfd_link_info *link_info)
252b5132
RH
5402{
5403 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5404 struct elf_segment_map *m;
30fe1832 5405 struct elf_segment_map *phdr_load_seg;
252b5132 5406 Elf_Internal_Phdr *phdrs;
252b5132 5407 Elf_Internal_Phdr *p;
02bf8d82 5408 file_ptr off;
3f570048 5409 bfd_size_type maxpagesize;
30fe1832 5410 unsigned int alloc, actual;
0920dee7 5411 unsigned int i, j;
30fe1832 5412 struct elf_segment_map **sorted_seg_map;
252b5132 5413
e36284ab 5414 if (link_info == NULL
ceae84aa 5415 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 5416 return FALSE;
252b5132 5417
8ded5a0f 5418 alloc = 0;
12bd6957 5419 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
30fe1832 5420 m->idx = alloc++;
252b5132 5421
82f2dbf7
NC
5422 if (alloc)
5423 {
5424 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5425 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5426 }
5427 else
5428 {
5429 /* PR binutils/12467. */
5430 elf_elfheader (abfd)->e_phoff = 0;
5431 elf_elfheader (abfd)->e_phentsize = 0;
5432 }
d324f6d6 5433
8ded5a0f 5434 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 5435
12bd6957 5436 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
30fe1832
AM
5437 {
5438 actual = alloc;
5439 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
5440 }
8ded5a0f 5441 else
30fe1832
AM
5442 {
5443 actual = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
5444 BFD_ASSERT (elf_program_header_size (abfd)
5445 == actual * bed->s->sizeof_phdr);
5446 BFD_ASSERT (actual >= alloc);
5447 }
252b5132
RH
5448
5449 if (alloc == 0)
f3520d2f 5450 {
12bd6957 5451 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
8ded5a0f 5452 return TRUE;
f3520d2f 5453 }
252b5132 5454
12bd6957 5455 /* We're writing the size in elf_program_header_size (abfd),
57268894
HPN
5456 see assign_file_positions_except_relocs, so make sure we have
5457 that amount allocated, with trailing space cleared.
12bd6957
AM
5458 The variable alloc contains the computed need, while
5459 elf_program_header_size (abfd) contains the size used for the
57268894
HPN
5460 layout.
5461 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5462 where the layout is forced to according to a larger size in the
5463 last iterations for the testcase ld-elf/header. */
30fe1832
AM
5464 phdrs = bfd_zalloc (abfd, (actual * sizeof (*phdrs)
5465 + alloc * sizeof (*sorted_seg_map)));
5466 sorted_seg_map = (struct elf_segment_map **) (phdrs + actual);
f3520d2f 5467 elf_tdata (abfd)->phdr = phdrs;
252b5132 5468 if (phdrs == NULL)
b34976b6 5469 return FALSE;
252b5132 5470
30fe1832 5471 for (m = elf_seg_map (abfd), j = 0; m != NULL; m = m->next, j++)
252b5132 5472 {
30fe1832 5473 sorted_seg_map[j] = m;
252b5132 5474 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 5475 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
5476 not be done to the PT_NOTE section of a corefile, which may
5477 contain several pseudo-sections artificially created by bfd.
5478 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
5479 if (m->count > 1
5480 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 5481 && m->p_type == PT_NOTE))
48db3297
AM
5482 {
5483 for (i = 0; i < m->count; i++)
5484 m->sections[i]->target_index = i;
5485 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5486 elf_sort_sections);
5487 }
30fe1832
AM
5488 }
5489 if (alloc > 1)
5490 qsort (sorted_seg_map, alloc, sizeof (*sorted_seg_map),
5491 elf_sort_segments);
5492
5493 maxpagesize = 1;
5494 if ((abfd->flags & D_PAGED) != 0)
5495 maxpagesize = bed->maxpagesize;
5496
5497 /* Sections must map to file offsets past the ELF file header. */
5498 off = bed->s->sizeof_ehdr;
5499 /* And if one of the PT_LOAD headers doesn't include the program
5500 headers then we'll be mapping program headers in the usual
5501 position after the ELF file header. */
5502 phdr_load_seg = NULL;
5503 for (j = 0; j < alloc; j++)
5504 {
5505 m = sorted_seg_map[j];
5506 if (m->p_type != PT_LOAD)
5507 break;
5508 if (m->includes_phdrs)
5509 {
5510 phdr_load_seg = m;
5511 break;
5512 }
5513 }
5514 if (phdr_load_seg == NULL)
5515 off += actual * bed->s->sizeof_phdr;
5516
5517 for (j = 0; j < alloc; j++)
5518 {
5519 asection **secpp;
5520 bfd_vma off_adjust;
5521 bfd_boolean no_contents;
252b5132 5522
b301b248
AM
5523 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5524 number of sections with contents contributing to both p_filesz
5525 and p_memsz, followed by a number of sections with no contents
5526 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 5527 available file offset for PT_LOAD and PT_NOTE segments. */
30fe1832
AM
5528 m = sorted_seg_map[j];
5529 p = phdrs + m->idx;
252b5132 5530 p->p_type = m->p_type;
28a7f3e7 5531 p->p_flags = m->p_flags;
252b5132 5532
3f570048 5533 if (m->count == 0)
5d695627 5534 p->p_vaddr = m->p_vaddr_offset;
3f570048 5535 else
5d695627 5536 p->p_vaddr = m->sections[0]->vma + m->p_vaddr_offset;
3f570048
AM
5537
5538 if (m->p_paddr_valid)
5539 p->p_paddr = m->p_paddr;
5540 else if (m->count == 0)
5541 p->p_paddr = 0;
5542 else
5d695627 5543 p->p_paddr = m->sections[0]->lma + m->p_vaddr_offset;
3f570048
AM
5544
5545 if (p->p_type == PT_LOAD
5546 && (abfd->flags & D_PAGED) != 0)
5547 {
5548 /* p_align in demand paged PT_LOAD segments effectively stores
5549 the maximum page size. When copying an executable with
5550 objcopy, we set m->p_align from the input file. Use this
5551 value for maxpagesize rather than bed->maxpagesize, which
5552 may be different. Note that we use maxpagesize for PT_TLS
5553 segment alignment later in this function, so we are relying
5554 on at least one PT_LOAD segment appearing before a PT_TLS
5555 segment. */
5556 if (m->p_align_valid)
5557 maxpagesize = m->p_align;
5558
5559 p->p_align = maxpagesize;
5560 }
3271a814
NS
5561 else if (m->p_align_valid)
5562 p->p_align = m->p_align;
e970b90a
DJ
5563 else if (m->count == 0)
5564 p->p_align = 1 << bed->s->log_file_align;
30fe1832
AM
5565
5566 if (m == phdr_load_seg)
5567 {
5568 if (!m->includes_filehdr)
5569 p->p_offset = off;
5570 off += actual * bed->s->sizeof_phdr;
5571 }
3f570048 5572
bf988460
AM
5573 no_contents = FALSE;
5574 off_adjust = 0;
252b5132 5575 if (p->p_type == PT_LOAD
b301b248 5576 && m->count > 0)
252b5132 5577 {
b301b248 5578 bfd_size_type align;
a49e53ed 5579 unsigned int align_power = 0;
b301b248 5580
3271a814
NS
5581 if (m->p_align_valid)
5582 align = p->p_align;
5583 else
252b5132 5584 {
3271a814
NS
5585 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5586 {
5587 unsigned int secalign;
08a40648 5588
fd361982 5589 secalign = bfd_section_alignment (*secpp);
3271a814
NS
5590 if (secalign > align_power)
5591 align_power = secalign;
5592 }
5593 align = (bfd_size_type) 1 << align_power;
5594 if (align < maxpagesize)
5595 align = maxpagesize;
b301b248 5596 }
252b5132 5597
02bf8d82
AM
5598 for (i = 0; i < m->count; i++)
5599 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5600 /* If we aren't making room for this section, then
5601 it must be SHT_NOBITS regardless of what we've
5602 set via struct bfd_elf_special_section. */
5603 elf_section_type (m->sections[i]) = SHT_NOBITS;
5604
bf988460 5605 /* Find out whether this segment contains any loadable
aea274d3
AM
5606 sections. */
5607 no_contents = TRUE;
5608 for (i = 0; i < m->count; i++)
5609 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5610 {
5611 no_contents = FALSE;
5612 break;
5613 }
bf988460 5614
85cfcbfb 5615 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
a8c75b76
AM
5616
5617 /* Broken hardware and/or kernel require that files do not
5618 map the same page with different permissions on some hppa
5619 processors. */
30fe1832
AM
5620 if (j != 0
5621 && (abfd->flags & D_PAGED) != 0
a8c75b76
AM
5622 && bed->no_page_alias
5623 && (off & (maxpagesize - 1)) != 0
5624 && (off & -maxpagesize) == ((off + off_adjust) & -maxpagesize))
5625 off_adjust += maxpagesize;
bf988460
AM
5626 off += off_adjust;
5627 if (no_contents)
5628 {
5629 /* We shouldn't need to align the segment on disk since
5630 the segment doesn't need file space, but the gABI
5631 arguably requires the alignment and glibc ld.so
5632 checks it. So to comply with the alignment
5633 requirement but not waste file space, we adjust
5634 p_offset for just this segment. (OFF_ADJUST is
5635 subtracted from OFF later.) This may put p_offset
5636 past the end of file, but that shouldn't matter. */
5637 }
5638 else
5639 off_adjust = 0;
252b5132 5640 }
b1a6d0b1
NC
5641 /* Make sure the .dynamic section is the first section in the
5642 PT_DYNAMIC segment. */
5643 else if (p->p_type == PT_DYNAMIC
5644 && m->count > 1
5645 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5646 {
5647 _bfd_error_handler
871b3ab2 5648 (_("%pB: The first section in the PT_DYNAMIC segment"
63a5468a 5649 " is not the .dynamic section"),
b301b248 5650 abfd);
b1a6d0b1
NC
5651 bfd_set_error (bfd_error_bad_value);
5652 return FALSE;
5653 }
3f001e84
JK
5654 /* Set the note section type to SHT_NOTE. */
5655 else if (p->p_type == PT_NOTE)
5656 for (i = 0; i < m->count; i++)
5657 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 5658
252b5132
RH
5659 if (m->includes_filehdr)
5660 {
bf988460 5661 if (!m->p_flags_valid)
252b5132 5662 p->p_flags |= PF_R;
252b5132
RH
5663 p->p_filesz = bed->s->sizeof_ehdr;
5664 p->p_memsz = bed->s->sizeof_ehdr;
30fe1832 5665 if (p->p_type == PT_LOAD)
252b5132 5666 {
30fe1832 5667 if (m->count > 0)
252b5132 5668 {
30fe1832
AM
5669 if (p->p_vaddr < (bfd_vma) off
5670 || (!m->p_paddr_valid
5671 && p->p_paddr < (bfd_vma) off))
5672 {
5673 _bfd_error_handler
5674 (_("%pB: not enough room for program headers,"
5675 " try linking with -N"),
5676 abfd);
5677 bfd_set_error (bfd_error_bad_value);
5678 return FALSE;
5679 }
5680 p->p_vaddr -= off;
5681 if (!m->p_paddr_valid)
5682 p->p_paddr -= off;
252b5132 5683 }
30fe1832
AM
5684 }
5685 else if (sorted_seg_map[0]->includes_filehdr)
5686 {
5687 Elf_Internal_Phdr *filehdr = phdrs + sorted_seg_map[0]->idx;
5688 p->p_vaddr = filehdr->p_vaddr;
bf988460 5689 if (!m->p_paddr_valid)
30fe1832 5690 p->p_paddr = filehdr->p_paddr;
252b5132 5691 }
252b5132
RH
5692 }
5693
5694 if (m->includes_phdrs)
5695 {
bf988460 5696 if (!m->p_flags_valid)
252b5132 5697 p->p_flags |= PF_R;
30fe1832
AM
5698 p->p_filesz += actual * bed->s->sizeof_phdr;
5699 p->p_memsz += actual * bed->s->sizeof_phdr;
f3520d2f 5700 if (!m->includes_filehdr)
252b5132 5701 {
30fe1832 5702 if (p->p_type == PT_LOAD)
252b5132 5703 {
30fe1832
AM
5704 elf_elfheader (abfd)->e_phoff = p->p_offset;
5705 if (m->count > 0)
5706 {
5707 p->p_vaddr -= off - p->p_offset;
5708 if (!m->p_paddr_valid)
5709 p->p_paddr -= off - p->p_offset;
5710 }
5711 }
5712 else if (phdr_load_seg != NULL)
5713 {
5714 Elf_Internal_Phdr *phdr = phdrs + phdr_load_seg->idx;
5715 bfd_vma phdr_off = 0;
5716 if (phdr_load_seg->includes_filehdr)
5717 phdr_off = bed->s->sizeof_ehdr;
5718 p->p_vaddr = phdr->p_vaddr + phdr_off;
bf988460 5719 if (!m->p_paddr_valid)
30fe1832
AM
5720 p->p_paddr = phdr->p_paddr + phdr_off;
5721 p->p_offset = phdr->p_offset + phdr_off;
252b5132 5722 }
30fe1832
AM
5723 else
5724 p->p_offset = bed->s->sizeof_ehdr;
2b0bc088 5725 }
252b5132
RH
5726 }
5727
5728 if (p->p_type == PT_LOAD
5729 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5730 {
bf988460 5731 if (!m->includes_filehdr && !m->includes_phdrs)
0bc3450e
AM
5732 {
5733 p->p_offset = off;
5734 if (no_contents)
67641dd3
AM
5735 {
5736 /* Put meaningless p_offset for PT_LOAD segments
5737 without file contents somewhere within the first
5738 page, in an attempt to not point past EOF. */
5739 bfd_size_type align = maxpagesize;
5740 if (align < p->p_align)
5741 align = p->p_align;
5742 if (align < 1)
5743 align = 1;
5744 p->p_offset = off % align;
5745 }
0bc3450e 5746 }
252b5132
RH
5747 else
5748 {
5749 file_ptr adjust;
5750
5751 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
5752 if (!no_contents)
5753 p->p_filesz += adjust;
252b5132
RH
5754 p->p_memsz += adjust;
5755 }
5756 }
5757
1ea63fd2
AM
5758 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5759 maps. Set filepos for sections in PT_LOAD segments, and in
5760 core files, for sections in PT_NOTE segments.
5761 assign_file_positions_for_non_load_sections will set filepos
5762 for other sections and update p_filesz for other segments. */
252b5132
RH
5763 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5764 {
5765 asection *sec;
252b5132 5766 bfd_size_type align;
627b32bc 5767 Elf_Internal_Shdr *this_hdr;
252b5132
RH
5768
5769 sec = *secpp;
02bf8d82 5770 this_hdr = &elf_section_data (sec)->this_hdr;
fd361982 5771 align = (bfd_size_type) 1 << bfd_section_alignment (sec);
252b5132 5772
88967714
AM
5773 if ((p->p_type == PT_LOAD
5774 || p->p_type == PT_TLS)
5775 && (this_hdr->sh_type != SHT_NOBITS
5776 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5777 && ((this_hdr->sh_flags & SHF_TLS) == 0
5778 || p->p_type == PT_TLS))))
252b5132 5779 {
b5599592
AM
5780 bfd_vma p_start = p->p_paddr;
5781 bfd_vma p_end = p_start + p->p_memsz;
5782 bfd_vma s_start = sec->lma;
5783 bfd_vma adjust = s_start - p_end;
252b5132 5784
a2d1e028
L
5785 if (adjust != 0
5786 && (s_start < p_end
5787 || p_end < p_start))
252b5132 5788 {
4eca0228 5789 _bfd_error_handler
695344c0 5790 /* xgettext:c-format */
2dcf00ce
AM
5791 (_("%pB: section %pA lma %#" PRIx64 " adjusted to %#" PRIx64),
5792 abfd, sec, (uint64_t) s_start, (uint64_t) p_end);
88967714 5793 adjust = 0;
b5599592 5794 sec->lma = p_end;
1cfb7d1e 5795 }
3ac9b6c9 5796 p->p_memsz += adjust;
1cfb7d1e 5797
88967714
AM
5798 if (this_hdr->sh_type != SHT_NOBITS)
5799 {
30fe1832 5800 if (p->p_type == PT_LOAD)
32812159 5801 {
30fe1832
AM
5802 if (p->p_filesz + adjust < p->p_memsz)
5803 {
5804 /* We have a PROGBITS section following NOBITS ones.
5805 Allocate file space for the NOBITS section(s) and
5806 zero it. */
5807 adjust = p->p_memsz - p->p_filesz;
5808 if (!write_zeros (abfd, off, adjust))
5809 return FALSE;
5810 }
5811 off += adjust;
32812159 5812 }
88967714 5813 p->p_filesz += adjust;
252b5132 5814 }
252b5132
RH
5815 }
5816
5817 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5818 {
b301b248
AM
5819 /* The section at i == 0 is the one that actually contains
5820 everything. */
4a938328
MS
5821 if (i == 0)
5822 {
627b32bc 5823 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
5824 off += this_hdr->sh_size;
5825 p->p_filesz = this_hdr->sh_size;
b301b248
AM
5826 p->p_memsz = 0;
5827 p->p_align = 1;
252b5132 5828 }
4a938328 5829 else
252b5132 5830 {
b301b248 5831 /* The rest are fake sections that shouldn't be written. */
252b5132 5832 sec->filepos = 0;
eea6121a 5833 sec->size = 0;
b301b248
AM
5834 sec->flags = 0;
5835 continue;
252b5132 5836 }
252b5132
RH
5837 }
5838 else
5839 {
1e951488 5840 if (p->p_type == PT_LOAD)
b301b248 5841 {
1e951488
AM
5842 this_hdr->sh_offset = sec->filepos = off;
5843 if (this_hdr->sh_type != SHT_NOBITS)
5844 off += this_hdr->sh_size;
5845 }
5846 else if (this_hdr->sh_type == SHT_NOBITS
5847 && (this_hdr->sh_flags & SHF_TLS) != 0
5848 && this_hdr->sh_offset == 0)
5849 {
5850 /* This is a .tbss section that didn't get a PT_LOAD.
5851 (See _bfd_elf_map_sections_to_segments "Create a
5852 final PT_LOAD".) Set sh_offset to the value it
5853 would have if we had created a zero p_filesz and
5854 p_memsz PT_LOAD header for the section. This
5855 also makes the PT_TLS header have the same
5856 p_offset value. */
5857 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5858 off, align);
5859 this_hdr->sh_offset = sec->filepos = off + adjust;
b301b248 5860 }
252b5132 5861
02bf8d82 5862 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 5863 {
6a3cd2b4 5864 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
5865 /* A load section without SHF_ALLOC is something like
5866 a note section in a PT_NOTE segment. These take
5867 file space but are not loaded into memory. */
5868 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 5869 p->p_memsz += this_hdr->sh_size;
b301b248 5870 }
6a3cd2b4 5871 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 5872 {
6a3cd2b4
AM
5873 if (p->p_type == PT_TLS)
5874 p->p_memsz += this_hdr->sh_size;
5875
5876 /* .tbss is special. It doesn't contribute to p_memsz of
5877 normal segments. */
5878 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5879 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
5880 }
5881
b10a8ae0
L
5882 if (align > p->p_align
5883 && !m->p_align_valid
5884 && (p->p_type != PT_LOAD
5885 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
5886 p->p_align = align;
5887 }
5888
bf988460 5889 if (!m->p_flags_valid)
252b5132
RH
5890 {
5891 p->p_flags |= PF_R;
02bf8d82 5892 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 5893 p->p_flags |= PF_X;
02bf8d82 5894 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
5895 p->p_flags |= PF_W;
5896 }
5897 }
43a8475c 5898
bf988460 5899 off -= off_adjust;
0920dee7 5900
30fe1832
AM
5901 /* PR ld/20815 - Check that the program header segment, if
5902 present, will be loaded into memory. */
5903 if (p->p_type == PT_PHDR
5904 && phdr_load_seg == NULL
5905 && !(bed->elf_backend_allow_non_load_phdr != NULL
5906 && bed->elf_backend_allow_non_load_phdr (abfd, phdrs, alloc)))
5907 {
5908 /* The fix for this error is usually to edit the linker script being
5909 used and set up the program headers manually. Either that or
5910 leave room for the headers at the start of the SECTIONS. */
5911 _bfd_error_handler (_("%pB: error: PHDR segment not covered"
5912 " by LOAD segment"),
5913 abfd);
7b3c2715
AM
5914 if (link_info == NULL)
5915 return FALSE;
5916 /* Arrange for the linker to exit with an error, deleting
5917 the output file unless --noinhibit-exec is given. */
5918 link_info->callbacks->info ("%X");
30fe1832
AM
5919 }
5920
7c928300
AM
5921 /* Check that all sections are in a PT_LOAD segment.
5922 Don't check funky gdb generated core files. */
5923 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
5924 {
5925 bfd_boolean check_vma = TRUE;
5926
5927 for (i = 1; i < m->count; i++)
5928 if (m->sections[i]->vma == m->sections[i - 1]->vma
5929 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5930 ->this_hdr), p) != 0
5931 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5932 ->this_hdr), p) != 0)
0920dee7 5933 {
9a83a553
AM
5934 /* Looks like we have overlays packed into the segment. */
5935 check_vma = FALSE;
5936 break;
0920dee7 5937 }
9a83a553
AM
5938
5939 for (i = 0; i < m->count; i++)
5940 {
5941 Elf_Internal_Shdr *this_hdr;
5942 asection *sec;
5943
5944 sec = m->sections[i];
5945 this_hdr = &(elf_section_data(sec)->this_hdr);
86b2281f
AM
5946 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5947 && !ELF_TBSS_SPECIAL (this_hdr, p))
9a83a553 5948 {
4eca0228 5949 _bfd_error_handler
695344c0 5950 /* xgettext:c-format */
871b3ab2 5951 (_("%pB: section `%pA' can't be allocated in segment %d"),
9a83a553
AM
5952 abfd, sec, j);
5953 print_segment_map (m);
5954 }
5955 }
5956 }
252b5132
RH
5957 }
5958
12bd6957 5959 elf_next_file_pos (abfd) = off;
30fe1832
AM
5960
5961 if (link_info != NULL
5962 && phdr_load_seg != NULL
5963 && phdr_load_seg->includes_filehdr)
5964 {
5965 /* There is a segment that contains both the file headers and the
5966 program headers, so provide a symbol __ehdr_start pointing there.
5967 A program can use this to examine itself robustly. */
5968
5969 struct elf_link_hash_entry *hash
5970 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5971 FALSE, FALSE, TRUE);
5972 /* If the symbol was referenced and not defined, define it. */
5973 if (hash != NULL
5974 && (hash->root.type == bfd_link_hash_new
5975 || hash->root.type == bfd_link_hash_undefined
5976 || hash->root.type == bfd_link_hash_undefweak
5977 || hash->root.type == bfd_link_hash_common))
5978 {
5979 asection *s = NULL;
5980 bfd_vma filehdr_vaddr = phdrs[phdr_load_seg->idx].p_vaddr;
5981
5982 if (phdr_load_seg->count != 0)
5983 /* The segment contains sections, so use the first one. */
5984 s = phdr_load_seg->sections[0];
5985 else
5986 /* Use the first (i.e. lowest-addressed) section in any segment. */
5987 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
5988 if (m->p_type == PT_LOAD && m->count != 0)
5989 {
5990 s = m->sections[0];
5991 break;
5992 }
5993
5994 if (s != NULL)
5995 {
5996 hash->root.u.def.value = filehdr_vaddr - s->vma;
5997 hash->root.u.def.section = s;
5998 }
5999 else
6000 {
6001 hash->root.u.def.value = filehdr_vaddr;
6002 hash->root.u.def.section = bfd_abs_section_ptr;
6003 }
6004
6005 hash->root.type = bfd_link_hash_defined;
6006 hash->def_regular = 1;
6007 hash->non_elf = 0;
6008 }
6009 }
6010
f3520d2f
AM
6011 return TRUE;
6012}
6013
1faa385f
NC
6014/* Determine if a bfd is a debuginfo file. Unfortunately there
6015 is no defined method for detecting such files, so we have to
6016 use heuristics instead. */
6017
6018bfd_boolean
6019is_debuginfo_file (bfd *abfd)
6020{
6021 if (abfd == NULL || bfd_get_flavour (abfd) != bfd_target_elf_flavour)
6022 return FALSE;
6023
6024 Elf_Internal_Shdr **start_headers = elf_elfsections (abfd);
6025 Elf_Internal_Shdr **end_headers = start_headers + elf_numsections (abfd);
6026 Elf_Internal_Shdr **headerp;
6027
6028 for (headerp = start_headers; headerp < end_headers; headerp ++)
6029 {
6030 Elf_Internal_Shdr *header = * headerp;
6031
6032 /* Debuginfo files do not have any allocated SHT_PROGBITS sections.
6033 The only allocated sections are SHT_NOBITS or SHT_NOTES. */
6034 if ((header->sh_flags & SHF_ALLOC) == SHF_ALLOC
6035 && header->sh_type != SHT_NOBITS
6036 && header->sh_type != SHT_NOTE)
6037 return FALSE;
6038 }
6039
6040 return TRUE;
6041}
6042
1ff6de03
NA
6043/* Assign file positions for the other sections, except for compressed debugging
6044 and other sections assigned in _bfd_elf_assign_file_positions_for_non_load(). */
f3520d2f
AM
6045
6046static bfd_boolean
6047assign_file_positions_for_non_load_sections (bfd *abfd,
6048 struct bfd_link_info *link_info)
6049{
6050 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6051 Elf_Internal_Shdr **i_shdrpp;
e06efbf1 6052 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
f3520d2f
AM
6053 Elf_Internal_Phdr *phdrs;
6054 Elf_Internal_Phdr *p;
6055 struct elf_segment_map *m;
f3520d2f 6056 file_ptr off;
f3520d2f 6057
5c182d5f 6058 i_shdrpp = elf_elfsections (abfd);
e06efbf1 6059 end_hdrpp = i_shdrpp + elf_numsections (abfd);
12bd6957 6060 off = elf_next_file_pos (abfd);
e06efbf1 6061 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
5c182d5f 6062 {
5c182d5f
AM
6063 Elf_Internal_Shdr *hdr;
6064
6065 hdr = *hdrpp;
6066 if (hdr->bfd_section != NULL
252e386e
AM
6067 && (hdr->bfd_section->filepos != 0
6068 || (hdr->sh_type == SHT_NOBITS
6069 && hdr->contents == NULL)))
627b32bc 6070 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
6071 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
6072 {
1faa385f
NC
6073 if (hdr->sh_size != 0
6074 /* PR 24717 - debuginfo files are known to be not strictly
6075 compliant with the ELF standard. In particular they often
6076 have .note.gnu.property sections that are outside of any
6077 loadable segment. This is not a problem for such files,
6078 so do not warn about them. */
6079 && ! is_debuginfo_file (abfd))
4eca0228 6080 _bfd_error_handler
695344c0 6081 /* xgettext:c-format */
871b3ab2 6082 (_("%pB: warning: allocated section `%s' not in segment"),
e8d2ba53
AM
6083 abfd,
6084 (hdr->bfd_section == NULL
6085 ? "*unknown*"
6086 : hdr->bfd_section->name));
3ba71138
L
6087 /* We don't need to page align empty sections. */
6088 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
6089 off += vma_page_aligned_bias (hdr->sh_addr, off,
6090 bed->maxpagesize);
6091 else
6092 off += vma_page_aligned_bias (hdr->sh_addr, off,
6093 hdr->sh_addralign);
6094 off = _bfd_elf_assign_file_position_for_section (hdr, off,
6095 FALSE);
6096 }
6097 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6098 && hdr->bfd_section == NULL)
1ff6de03
NA
6099 /* We don't know the offset of these sections yet: their size has
6100 not been decided. */
0ce398f1 6101 || (hdr->bfd_section != NULL
1ff6de03
NA
6102 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6103 || (bfd_section_is_ctf (hdr->bfd_section)
6104 && abfd->is_linker_output)))
12bd6957 6105 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6a40cf0c
NC
6106 || (elf_symtab_shndx_list (abfd) != NULL
6107 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
6108 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
6109 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
5c182d5f
AM
6110 hdr->sh_offset = -1;
6111 else
6112 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f 6113 }
30fe1832 6114 elf_next_file_pos (abfd) = off;
5c182d5f 6115
252b5132
RH
6116 /* Now that we have set the section file positions, we can set up
6117 the file positions for the non PT_LOAD segments. */
f3520d2f 6118 phdrs = elf_tdata (abfd)->phdr;
12bd6957 6119 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
252b5132 6120 {
129af99f 6121 if (p->p_type == PT_GNU_RELRO)
252b5132 6122 {
f2731e0c 6123 bfd_vma start, end;
01f7e10c 6124 bfd_boolean ok;
1ea63fd2 6125
129af99f 6126 if (link_info != NULL)
8c37241b 6127 {
129af99f 6128 /* During linking the range of the RELRO segment is passed
f2731e0c
AM
6129 in link_info. Note that there may be padding between
6130 relro_start and the first RELRO section. */
6131 start = link_info->relro_start;
6132 end = link_info->relro_end;
6133 }
6134 else if (m->count != 0)
6135 {
6136 if (!m->p_size_valid)
6137 abort ();
6138 start = m->sections[0]->vma;
6139 end = start + m->p_size;
6140 }
6141 else
6142 {
6143 start = 0;
6144 end = 0;
6145 }
6146
01f7e10c 6147 ok = FALSE;
f2731e0c
AM
6148 if (start < end)
6149 {
6150 struct elf_segment_map *lm;
6151 const Elf_Internal_Phdr *lp;
6152 unsigned int i;
6153
6154 /* Find a LOAD segment containing a section in the RELRO
6155 segment. */
12bd6957 6156 for (lm = elf_seg_map (abfd), lp = phdrs;
3146fac4
AM
6157 lm != NULL;
6158 lm = lm->next, lp++)
8c37241b
JJ
6159 {
6160 if (lp->p_type == PT_LOAD
3146fac4 6161 && lm->count != 0
dbc88fc1
AM
6162 && (lm->sections[lm->count - 1]->vma
6163 + (!IS_TBSS (lm->sections[lm->count - 1])
6164 ? lm->sections[lm->count - 1]->size
6165 : 0)) > start
f2731e0c 6166 && lm->sections[0]->vma < end)
8c37241b
JJ
6167 break;
6168 }
f2731e0c 6169
01f7e10c 6170 if (lm != NULL)
129af99f 6171 {
01f7e10c
AM
6172 /* Find the section starting the RELRO segment. */
6173 for (i = 0; i < lm->count; i++)
6174 {
6175 asection *s = lm->sections[i];
6176 if (s->vma >= start
6177 && s->vma < end
6178 && s->size != 0)
6179 break;
6180 }
6181
6182 if (i < lm->count)
6183 {
6184 p->p_vaddr = lm->sections[i]->vma;
6185 p->p_paddr = lm->sections[i]->lma;
6186 p->p_offset = lm->sections[i]->filepos;
6187 p->p_memsz = end - p->p_vaddr;
6188 p->p_filesz = p->p_memsz;
6189
6190 /* The RELRO segment typically ends a few bytes
6191 into .got.plt but other layouts are possible.
6192 In cases where the end does not match any
6193 loaded section (for instance is in file
6194 padding), trim p_filesz back to correspond to
6195 the end of loaded section contents. */
6196 if (p->p_filesz > lp->p_vaddr + lp->p_filesz - p->p_vaddr)
6197 p->p_filesz = lp->p_vaddr + lp->p_filesz - p->p_vaddr;
6198
6199 /* Preserve the alignment and flags if they are
6200 valid. The gold linker generates RW/4 for
6201 the PT_GNU_RELRO section. It is better for
6202 objcopy/strip to honor these attributes
6203 otherwise gdb will choke when using separate
6204 debug files. */
6205 if (!m->p_align_valid)
6206 p->p_align = 1;
6207 if (!m->p_flags_valid)
6208 p->p_flags = PF_R;
6209 ok = TRUE;
6210 }
129af99f 6211 }
b84a33b5 6212 }
01f7e10c
AM
6213 if (link_info != NULL)
6214 BFD_ASSERT (ok);
6215 if (!ok)
6216 memset (p, 0, sizeof *p);
129af99f 6217 }
04c3a755
NS
6218 else if (p->p_type == PT_GNU_STACK)
6219 {
6220 if (m->p_size_valid)
6221 p->p_memsz = m->p_size;
6222 }
129af99f
AS
6223 else if (m->count != 0)
6224 {
e06efbf1 6225 unsigned int i;
1a9ccd70 6226
129af99f
AS
6227 if (p->p_type != PT_LOAD
6228 && (p->p_type != PT_NOTE
6229 || bfd_get_format (abfd) != bfd_core))
6230 {
1a9ccd70
NC
6231 /* A user specified segment layout may include a PHDR
6232 segment that overlaps with a LOAD segment... */
6233 if (p->p_type == PT_PHDR)
6234 {
6235 m->count = 0;
6236 continue;
6237 }
6238
c86934ce
NC
6239 if (m->includes_filehdr || m->includes_phdrs)
6240 {
b1fa9dd6 6241 /* PR 17512: file: 2195325e. */
4eca0228 6242 _bfd_error_handler
871b3ab2 6243 (_("%pB: error: non-load segment %d includes file header "
76cfced5
AM
6244 "and/or program header"),
6245 abfd, (int) (p - phdrs));
c86934ce
NC
6246 return FALSE;
6247 }
129af99f 6248
86b2281f 6249 p->p_filesz = 0;
129af99f 6250 p->p_offset = m->sections[0]->filepos;
86b2281f
AM
6251 for (i = m->count; i-- != 0;)
6252 {
6253 asection *sect = m->sections[i];
6254 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
6255 if (hdr->sh_type != SHT_NOBITS)
6256 {
6257 p->p_filesz = (sect->filepos - m->sections[0]->filepos
6258 + hdr->sh_size);
6259 break;
6260 }
6261 }
129af99f
AS
6262 }
6263 }
252b5132
RH
6264 }
6265
b34976b6 6266 return TRUE;
252b5132
RH
6267}
6268
6a40cf0c
NC
6269static elf_section_list *
6270find_section_in_list (unsigned int i, elf_section_list * list)
6271{
6272 for (;list != NULL; list = list->next)
6273 if (list->ndx == i)
6274 break;
6275 return list;
6276}
6277
252b5132
RH
6278/* Work out the file positions of all the sections. This is called by
6279 _bfd_elf_compute_section_file_positions. All the section sizes and
6280 VMAs must be known before this is called.
6281
e0638f70 6282 Reloc sections come in two flavours: Those processed specially as
1ff6de03
NA
6283 "side-channel" data attached to a section to which they apply, and those that
6284 bfd doesn't process as relocations. The latter sort are stored in a normal
6285 bfd section by bfd_section_from_shdr. We don't consider the former sort
6286 here, unless they form part of the loadable image. Reloc sections not
6287 assigned here (and compressed debugging sections and CTF sections which
6288 nothing else in the file can rely upon) will be handled later by
e0638f70 6289 assign_file_positions_for_relocs.
252b5132
RH
6290
6291 We also don't set the positions of the .symtab and .strtab here. */
6292
b34976b6 6293static bfd_boolean
c84fca4d
AO
6294assign_file_positions_except_relocs (bfd *abfd,
6295 struct bfd_link_info *link_info)
252b5132 6296{
5c182d5f
AM
6297 struct elf_obj_tdata *tdata = elf_tdata (abfd);
6298 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
9c5bfbb7 6299 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6d6c25c8 6300 unsigned int alloc;
252b5132
RH
6301
6302 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
6303 && bfd_get_format (abfd) != bfd_core)
6304 {
5c182d5f
AM
6305 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
6306 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
6307 Elf_Internal_Shdr **hdrpp;
6308 unsigned int i;
a485e98e 6309 file_ptr off;
252b5132
RH
6310
6311 /* Start after the ELF header. */
6312 off = i_ehdrp->e_ehsize;
6313
6314 /* We are not creating an executable, which means that we are
6315 not creating a program header, and that the actual order of
6316 the sections in the file is unimportant. */
9ad5cbcf 6317 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
6318 {
6319 Elf_Internal_Shdr *hdr;
6320
6321 hdr = *hdrpp;
e0638f70
AM
6322 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6323 && hdr->bfd_section == NULL)
1ff6de03
NA
6324 /* Do not assign offsets for these sections yet: we don't know
6325 their sizes. */
0ce398f1 6326 || (hdr->bfd_section != NULL
1ff6de03
NA
6327 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6328 || (bfd_section_is_ctf (hdr->bfd_section)
6329 && abfd->is_linker_output)))
12bd6957 6330 || i == elf_onesymtab (abfd)
6a40cf0c
NC
6331 || (elf_symtab_shndx_list (abfd) != NULL
6332 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
6333 || i == elf_strtab_sec (abfd)
6334 || i == elf_shstrtab_sec (abfd))
252b5132
RH
6335 {
6336 hdr->sh_offset = -1;
252b5132 6337 }
9ad5cbcf 6338 else
b34976b6 6339 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 6340 }
a485e98e
AM
6341
6342 elf_next_file_pos (abfd) = off;
6d6c25c8 6343 elf_program_header_size (abfd) = 0;
252b5132
RH
6344 }
6345 else
6346 {
252b5132 6347 /* Assign file positions for the loaded sections based on the
08a40648 6348 assignment of sections to segments. */
f3520d2f
AM
6349 if (!assign_file_positions_for_load_sections (abfd, link_info))
6350 return FALSE;
6351
6352 /* And for non-load sections. */
6353 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
6354 return FALSE;
6d6c25c8 6355 }
f3520d2f 6356
6d6c25c8
AM
6357 if (!(*bed->elf_backend_modify_headers) (abfd, link_info))
6358 return FALSE;
1a9ccd70 6359
6d6c25c8
AM
6360 /* Write out the program headers. */
6361 alloc = i_ehdrp->e_phnum;
6362 if (alloc != 0)
6363 {
30fe1832 6364 if (bfd_seek (abfd, i_ehdrp->e_phoff, SEEK_SET) != 0
cd584857
NC
6365 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
6366 return FALSE;
252b5132
RH
6367 }
6368
b34976b6 6369 return TRUE;
252b5132
RH
6370}
6371
ed7e9d0b
AM
6372bfd_boolean
6373_bfd_elf_init_file_header (bfd *abfd,
6374 struct bfd_link_info *info ATTRIBUTE_UNUSED)
252b5132 6375{
3d540e93 6376 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 6377 struct elf_strtab_hash *shstrtab;
9c5bfbb7 6378 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
6379
6380 i_ehdrp = elf_elfheader (abfd);
252b5132 6381
2b0f7ef9 6382 shstrtab = _bfd_elf_strtab_init ();
252b5132 6383 if (shstrtab == NULL)
b34976b6 6384 return FALSE;
252b5132
RH
6385
6386 elf_shstrtab (abfd) = shstrtab;
6387
6388 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
6389 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
6390 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
6391 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
6392
6393 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
6394 i_ehdrp->e_ident[EI_DATA] =
6395 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
6396 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
6397
252b5132
RH
6398 if ((abfd->flags & DYNAMIC) != 0)
6399 i_ehdrp->e_type = ET_DYN;
6400 else if ((abfd->flags & EXEC_P) != 0)
6401 i_ehdrp->e_type = ET_EXEC;
6402 else if (bfd_get_format (abfd) == bfd_core)
6403 i_ehdrp->e_type = ET_CORE;
6404 else
6405 i_ehdrp->e_type = ET_REL;
6406
6407 switch (bfd_get_arch (abfd))
6408 {
6409 case bfd_arch_unknown:
6410 i_ehdrp->e_machine = EM_NONE;
6411 break;
aa4f99bb
AO
6412
6413 /* There used to be a long list of cases here, each one setting
6414 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6415 in the corresponding bfd definition. To avoid duplication,
6416 the switch was removed. Machines that need special handling
6417 can generally do it in elf_backend_final_write_processing(),
6418 unless they need the information earlier than the final write.
6419 Such need can generally be supplied by replacing the tests for
6420 e_machine with the conditions used to determine it. */
252b5132 6421 default:
9c5bfbb7
AM
6422 i_ehdrp->e_machine = bed->elf_machine_code;
6423 }
aa4f99bb 6424
252b5132
RH
6425 i_ehdrp->e_version = bed->s->ev_current;
6426 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
6427
c044fabd 6428 /* No program header, for now. */
252b5132
RH
6429 i_ehdrp->e_phoff = 0;
6430 i_ehdrp->e_phentsize = 0;
6431 i_ehdrp->e_phnum = 0;
6432
c044fabd 6433 /* Each bfd section is section header entry. */
252b5132
RH
6434 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6435 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6436
252b5132 6437 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 6438 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 6439 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 6440 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 6441 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 6442 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132 6443 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
17ca87fc 6444 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
252b5132 6445 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 6446 return FALSE;
252b5132 6447
b34976b6 6448 return TRUE;
252b5132
RH
6449}
6450
6d6c25c8
AM
6451/* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=.
6452
6453 FIXME: We used to have code here to sort the PT_LOAD segments into
6454 ascending order, as per the ELF spec. But this breaks some programs,
6455 including the Linux kernel. But really either the spec should be
6456 changed or the programs updated. */
6457
6458bfd_boolean
6459_bfd_elf_modify_headers (bfd *obfd, struct bfd_link_info *link_info)
6460{
6461 if (link_info != NULL && bfd_link_pie (link_info))
6462 {
6463 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (obfd);
6464 unsigned int num_segments = i_ehdrp->e_phnum;
6465 struct elf_obj_tdata *tdata = elf_tdata (obfd);
6466 Elf_Internal_Phdr *segment = tdata->phdr;
6467 Elf_Internal_Phdr *end_segment = &segment[num_segments];
6468
6469 /* Find the lowest p_vaddr in PT_LOAD segments. */
6470 bfd_vma p_vaddr = (bfd_vma) -1;
6471 for (; segment < end_segment; segment++)
6472 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
6473 p_vaddr = segment->p_vaddr;
6474
6475 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
6476 segments is non-zero. */
6477 if (p_vaddr)
6478 i_ehdrp->e_type = ET_EXEC;
6479 }
6480 return TRUE;
6481}
6482
252b5132 6483/* Assign file positions for all the reloc sections which are not part
a485e98e 6484 of the loadable file image, and the file position of section headers. */
252b5132 6485
0ce398f1
L
6486static bfd_boolean
6487_bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
252b5132
RH
6488{
6489 file_ptr off;
e06efbf1 6490 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
3e19fb8f 6491 Elf_Internal_Shdr *shdrp;
a485e98e
AM
6492 Elf_Internal_Ehdr *i_ehdrp;
6493 const struct elf_backend_data *bed;
252b5132 6494
12bd6957 6495 off = elf_next_file_pos (abfd);
252b5132 6496
e06efbf1
L
6497 shdrpp = elf_elfsections (abfd);
6498 end_shdrpp = shdrpp + elf_numsections (abfd);
6499 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
252b5132 6500 {
252b5132 6501 shdrp = *shdrpp;
0ce398f1
L
6502 if (shdrp->sh_offset == -1)
6503 {
3e19fb8f 6504 asection *sec = shdrp->bfd_section;
0ce398f1
L
6505 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
6506 || shdrp->sh_type == SHT_RELA);
1ff6de03 6507 bfd_boolean is_ctf = sec && bfd_section_is_ctf (sec);
0ce398f1 6508 if (is_rel
1ff6de03 6509 || is_ctf
3e19fb8f 6510 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
0ce398f1 6511 {
1ff6de03 6512 if (!is_rel && !is_ctf)
0ce398f1 6513 {
3e19fb8f
L
6514 const char *name = sec->name;
6515 struct bfd_elf_section_data *d;
6516
0ce398f1 6517 /* Compress DWARF debug sections. */
3e19fb8f 6518 if (!bfd_compress_section (abfd, sec,
0ce398f1
L
6519 shdrp->contents))
6520 return FALSE;
3e19fb8f
L
6521
6522 if (sec->compress_status == COMPRESS_SECTION_DONE
6523 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
6524 {
6525 /* If section is compressed with zlib-gnu, convert
6526 section name from .debug_* to .zdebug_*. */
6527 char *new_name
6528 = convert_debug_to_zdebug (abfd, name);
6529 if (new_name == NULL)
6530 return FALSE;
6531 name = new_name;
6532 }
dd905818 6533 /* Add section name to section name section. */
3e19fb8f
L
6534 if (shdrp->sh_name != (unsigned int) -1)
6535 abort ();
6536 shdrp->sh_name
6537 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6538 name, FALSE);
6539 d = elf_section_data (sec);
6540
dd905818 6541 /* Add reloc section name to section name section. */
3e19fb8f
L
6542 if (d->rel.hdr
6543 && !_bfd_elf_set_reloc_sh_name (abfd,
6544 d->rel.hdr,
6545 name, FALSE))
6546 return FALSE;
6547 if (d->rela.hdr
6548 && !_bfd_elf_set_reloc_sh_name (abfd,
6549 d->rela.hdr,
91cb26da 6550 name, TRUE))
3e19fb8f
L
6551 return FALSE;
6552
0ce398f1 6553 /* Update section size and contents. */
3e19fb8f
L
6554 shdrp->sh_size = sec->size;
6555 shdrp->contents = sec->contents;
0ce398f1
L
6556 shdrp->bfd_section->contents = NULL;
6557 }
1ff6de03
NA
6558 else if (is_ctf)
6559 {
6560 /* Update section size and contents. */
6561 shdrp->sh_size = sec->size;
6562 shdrp->contents = sec->contents;
6563 }
6564
0ce398f1
L
6565 off = _bfd_elf_assign_file_position_for_section (shdrp,
6566 off,
6567 TRUE);
6568 }
6569 }
252b5132
RH
6570 }
6571
3e19fb8f
L
6572 /* Place section name section after DWARF debug sections have been
6573 compressed. */
6574 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6575 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6576 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6577 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
6578
6579 /* Place the section headers. */
a485e98e
AM
6580 i_ehdrp = elf_elfheader (abfd);
6581 bed = get_elf_backend_data (abfd);
6582 off = align_file_position (off, 1 << bed->s->log_file_align);
6583 i_ehdrp->e_shoff = off;
6584 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
12bd6957 6585 elf_next_file_pos (abfd) = off;
0ce398f1
L
6586
6587 return TRUE;
252b5132
RH
6588}
6589
b34976b6 6590bfd_boolean
217aa764 6591_bfd_elf_write_object_contents (bfd *abfd)
252b5132 6592{
9c5bfbb7 6593 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6594 Elf_Internal_Shdr **i_shdrp;
b34976b6 6595 bfd_boolean failed;
9ad5cbcf 6596 unsigned int count, num_sec;
30e8ee25 6597 struct elf_obj_tdata *t;
252b5132
RH
6598
6599 if (! abfd->output_has_begun
217aa764 6600 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6601 return FALSE;
db727370
JL
6602 /* Do not rewrite ELF data when the BFD has been opened for update.
6603 abfd->output_has_begun was set to TRUE on opening, so creation of new
6604 sections, and modification of existing section sizes was restricted.
6605 This means the ELF header, program headers and section headers can't have
6606 changed.
6607 If the contents of any sections has been modified, then those changes have
6608 already been written to the BFD. */
6609 else if (abfd->direction == both_direction)
6610 {
6611 BFD_ASSERT (abfd->output_has_begun);
6612 return TRUE;
6613 }
252b5132
RH
6614
6615 i_shdrp = elf_elfsections (abfd);
252b5132 6616
b34976b6 6617 failed = FALSE;
252b5132
RH
6618 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6619 if (failed)
b34976b6 6620 return FALSE;
252b5132 6621
0ce398f1
L
6622 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6623 return FALSE;
252b5132 6624
c044fabd 6625 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
6626 num_sec = elf_numsections (abfd);
6627 for (count = 1; count < num_sec; count++)
252b5132 6628 {
3e19fb8f
L
6629 i_shdrp[count]->sh_name
6630 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6631 i_shdrp[count]->sh_name);
252b5132 6632 if (bed->elf_backend_section_processing)
75506100
MR
6633 if (!(*bed->elf_backend_section_processing) (abfd, i_shdrp[count]))
6634 return FALSE;
252b5132
RH
6635 if (i_shdrp[count]->contents)
6636 {
dc810e39
AM
6637 bfd_size_type amt = i_shdrp[count]->sh_size;
6638
252b5132 6639 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 6640 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 6641 return FALSE;
252b5132
RH
6642 }
6643 }
6644
6645 /* Write out the section header names. */
30e8ee25 6646 t = elf_tdata (abfd);
26ae6d5e 6647 if (elf_shstrtab (abfd) != NULL
30e8ee25 6648 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 6649 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 6650 return FALSE;
252b5132 6651
cc364be6
AM
6652 if (!(*bed->elf_backend_final_write_processing) (abfd))
6653 return FALSE;
252b5132 6654
ff59fc36
RM
6655 if (!bed->s->write_shdrs_and_ehdr (abfd))
6656 return FALSE;
6657
6658 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
c0355132
AM
6659 if (t->o->build_id.after_write_object_contents != NULL)
6660 return (*t->o->build_id.after_write_object_contents) (abfd);
ff59fc36
RM
6661
6662 return TRUE;
252b5132
RH
6663}
6664
b34976b6 6665bfd_boolean
217aa764 6666_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 6667{
c044fabd 6668 /* Hopefully this can be done just like an object file. */
252b5132
RH
6669 return _bfd_elf_write_object_contents (abfd);
6670}
c044fabd
KH
6671
6672/* Given a section, search the header to find them. */
6673
cb33740c 6674unsigned int
198beae2 6675_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 6676{
9c5bfbb7 6677 const struct elf_backend_data *bed;
91d6fa6a 6678 unsigned int sec_index;
252b5132 6679
9ad5cbcf
AM
6680 if (elf_section_data (asect) != NULL
6681 && elf_section_data (asect)->this_idx != 0)
6682 return elf_section_data (asect)->this_idx;
6683
6684 if (bfd_is_abs_section (asect))
91d6fa6a 6685 sec_index = SHN_ABS;
af746e92 6686 else if (bfd_is_com_section (asect))
91d6fa6a 6687 sec_index = SHN_COMMON;
af746e92 6688 else if (bfd_is_und_section (asect))
91d6fa6a 6689 sec_index = SHN_UNDEF;
af746e92 6690 else
91d6fa6a 6691 sec_index = SHN_BAD;
252b5132 6692
af746e92 6693 bed = get_elf_backend_data (abfd);
252b5132
RH
6694 if (bed->elf_backend_section_from_bfd_section)
6695 {
91d6fa6a 6696 int retval = sec_index;
9ad5cbcf 6697
af746e92
AM
6698 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6699 return retval;
252b5132
RH
6700 }
6701
91d6fa6a 6702 if (sec_index == SHN_BAD)
af746e92 6703 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 6704
91d6fa6a 6705 return sec_index;
252b5132
RH
6706}
6707
6708/* Given a BFD symbol, return the index in the ELF symbol table, or -1
6709 on error. */
6710
6711int
217aa764 6712_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
6713{
6714 asymbol *asym_ptr = *asym_ptr_ptr;
6715 int idx;
6716 flagword flags = asym_ptr->flags;
6717
6718 /* When gas creates relocations against local labels, it creates its
6719 own symbol for the section, but does put the symbol into the
6720 symbol chain, so udata is 0. When the linker is generating
6721 relocatable output, this section symbol may be for one of the
6722 input sections rather than the output section. */
6723 if (asym_ptr->udata.i == 0
6724 && (flags & BSF_SECTION_SYM)
6725 && asym_ptr->section)
6726 {
5372391b 6727 asection *sec;
252b5132
RH
6728 int indx;
6729
5372391b
AM
6730 sec = asym_ptr->section;
6731 if (sec->owner != abfd && sec->output_section != NULL)
6732 sec = sec->output_section;
6733 if (sec->owner == abfd
6734 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 6735 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
6736 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
6737 }
6738
6739 idx = asym_ptr->udata.i;
6740
6741 if (idx == 0)
6742 {
6743 /* This case can occur when using --strip-symbol on a symbol
08a40648 6744 which is used in a relocation entry. */
4eca0228 6745 _bfd_error_handler
695344c0 6746 /* xgettext:c-format */
871b3ab2 6747 (_("%pB: symbol `%s' required but not present"),
d003868e 6748 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
6749 bfd_set_error (bfd_error_no_symbols);
6750 return -1;
6751 }
6752
6753#if DEBUG & 4
6754 {
6755 fprintf (stderr,
cd9af601
AM
6756 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8x\n",
6757 (long) asym_ptr, asym_ptr->name, idx, flags);
252b5132
RH
6758 fflush (stderr);
6759 }
6760#endif
6761
6762 return idx;
6763}
6764
84d1d650 6765/* Rewrite program header information. */
252b5132 6766
b34976b6 6767static bfd_boolean
84d1d650 6768rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 6769{
b34976b6
AM
6770 Elf_Internal_Ehdr *iehdr;
6771 struct elf_segment_map *map;
6772 struct elf_segment_map *map_first;
6773 struct elf_segment_map **pointer_to_map;
6774 Elf_Internal_Phdr *segment;
6775 asection *section;
6776 unsigned int i;
6777 unsigned int num_segments;
6778 bfd_boolean phdr_included = FALSE;
5c44b38e 6779 bfd_boolean p_paddr_valid;
b34976b6
AM
6780 bfd_vma maxpagesize;
6781 struct elf_segment_map *phdr_adjust_seg = NULL;
6782 unsigned int phdr_adjust_num = 0;
9c5bfbb7 6783 const struct elf_backend_data *bed;
bc67d8a6 6784
caf47ea6 6785 bed = get_elf_backend_data (ibfd);
252b5132
RH
6786 iehdr = elf_elfheader (ibfd);
6787
bc67d8a6 6788 map_first = NULL;
c044fabd 6789 pointer_to_map = &map_first;
252b5132
RH
6790
6791 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
6792 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6793
6794 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
6795#define SEGMENT_END(segment, start) \
6796 (start + (segment->p_memsz > segment->p_filesz \
6797 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 6798
eecdbe52
JJ
6799#define SECTION_SIZE(section, segment) \
6800 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6801 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 6802 ? section->size : 0)
eecdbe52 6803
b34976b6 6804 /* Returns TRUE if the given section is contained within
bc67d8a6 6805 the given segment. VMA addresses are compared. */
aecc8f8a
AM
6806#define IS_CONTAINED_BY_VMA(section, segment) \
6807 (section->vma >= segment->p_vaddr \
eecdbe52 6808 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 6809 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 6810
b34976b6 6811 /* Returns TRUE if the given section is contained within
bc67d8a6 6812 the given segment. LMA addresses are compared. */
aecc8f8a
AM
6813#define IS_CONTAINED_BY_LMA(section, segment, base) \
6814 (section->lma >= base \
beab4532 6815 && (section->lma + SECTION_SIZE (section, segment) >= section->lma) \
eecdbe52 6816 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 6817 <= SEGMENT_END (segment, base)))
252b5132 6818
0efc80c8
L
6819 /* Handle PT_NOTE segment. */
6820#define IS_NOTE(p, s) \
aecc8f8a 6821 (p->p_type == PT_NOTE \
0efc80c8 6822 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 6823 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6824 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6825 <= p->p_offset + p->p_filesz))
252b5132 6826
0efc80c8
L
6827 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6828 etc. */
6829#define IS_COREFILE_NOTE(p, s) \
6830 (IS_NOTE (p, s) \
6831 && bfd_get_format (ibfd) == bfd_core \
6832 && s->vma == 0 \
6833 && s->lma == 0)
6834
252b5132
RH
6835 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6836 linker, which generates a PT_INTERP section with p_vaddr and
6837 p_memsz set to 0. */
aecc8f8a
AM
6838#define IS_SOLARIS_PT_INTERP(p, s) \
6839 (p->p_vaddr == 0 \
6840 && p->p_paddr == 0 \
6841 && p->p_memsz == 0 \
6842 && p->p_filesz > 0 \
6843 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 6844 && s->size > 0 \
aecc8f8a 6845 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6846 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6847 <= p->p_offset + p->p_filesz))
5c440b1e 6848
bc67d8a6
NC
6849 /* Decide if the given section should be included in the given segment.
6850 A section will be included if:
f5ffc919 6851 1. It is within the address space of the segment -- we use the LMA
08a40648 6852 if that is set for the segment and the VMA otherwise,
0efc80c8 6853 2. It is an allocated section or a NOTE section in a PT_NOTE
d324f6d6 6854 segment.
bc67d8a6 6855 3. There is an output section associated with it,
eecdbe52 6856 4. The section has not already been allocated to a previous segment.
2b05f1b7 6857 5. PT_GNU_STACK segments do not include any sections.
03394ac9 6858 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
6859 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6860 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 6861 (with the possible exception of .dynamic). */
9f17e2a6 6862#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
6863 ((((segment->p_paddr \
6864 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
6865 : IS_CONTAINED_BY_VMA (section, segment)) \
6866 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 6867 || IS_NOTE (segment, section)) \
2b05f1b7
L
6868 && segment->p_type != PT_GNU_STACK \
6869 && (segment->p_type != PT_TLS \
6870 || (section->flags & SEC_THREAD_LOCAL)) \
6871 && (segment->p_type == PT_LOAD \
6872 || segment->p_type == PT_TLS \
6873 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6874 && (segment->p_type != PT_DYNAMIC \
6875 || SECTION_SIZE (section, segment) > 0 \
6876 || (segment->p_paddr \
6877 ? segment->p_paddr != section->lma \
6878 : segment->p_vaddr != section->vma) \
fd361982 6879 || (strcmp (bfd_section_name (section), ".dynamic") == 0)) \
9933dc52 6880 && (segment->p_type != PT_LOAD || !section->segment_mark))
bc67d8a6 6881
9f17e2a6
L
6882/* If the output section of a section in the input segment is NULL,
6883 it is removed from the corresponding output segment. */
6884#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
6885 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
6886 && section->output_section != NULL)
6887
b34976b6 6888 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
6889#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6890 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6891
6892 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6893 their VMA address ranges and their LMA address ranges overlap.
6894 It is possible to have overlapping VMA ranges without overlapping LMA
6895 ranges. RedBoot images for example can have both .data and .bss mapped
6896 to the same VMA range, but with the .data section mapped to a different
6897 LMA. */
aecc8f8a 6898#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 6899 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 6900 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 6901 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 6902 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
6903
6904 /* Initialise the segment mark field. */
6905 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 6906 section->segment_mark = FALSE;
bc67d8a6 6907
5c44b38e
AM
6908 /* The Solaris linker creates program headers in which all the
6909 p_paddr fields are zero. When we try to objcopy or strip such a
6910 file, we get confused. Check for this case, and if we find it
6911 don't set the p_paddr_valid fields. */
6912 p_paddr_valid = FALSE;
6913 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6914 i < num_segments;
6915 i++, segment++)
6916 if (segment->p_paddr != 0)
6917 {
6918 p_paddr_valid = TRUE;
6919 break;
6920 }
6921
252b5132 6922 /* Scan through the segments specified in the program header
bc67d8a6 6923 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 6924 in the loadable segments. These can be created by weird
aecc8f8a 6925 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
6926 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6927 i < num_segments;
c044fabd 6928 i++, segment++)
252b5132 6929 {
252b5132 6930 unsigned int j;
c044fabd 6931 Elf_Internal_Phdr *segment2;
252b5132 6932
aecc8f8a
AM
6933 if (segment->p_type == PT_INTERP)
6934 for (section = ibfd->sections; section; section = section->next)
6935 if (IS_SOLARIS_PT_INTERP (segment, section))
6936 {
6937 /* Mininal change so that the normal section to segment
4cc11e76 6938 assignment code will work. */
aecc8f8a
AM
6939 segment->p_vaddr = section->vma;
6940 break;
6941 }
6942
bc67d8a6 6943 if (segment->p_type != PT_LOAD)
b10a8ae0
L
6944 {
6945 /* Remove PT_GNU_RELRO segment. */
6946 if (segment->p_type == PT_GNU_RELRO)
6947 segment->p_type = PT_NULL;
6948 continue;
6949 }
c044fabd 6950
bc67d8a6 6951 /* Determine if this segment overlaps any previous segments. */
0067a569 6952 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
6953 {
6954 bfd_signed_vma extra_length;
c044fabd 6955
bc67d8a6 6956 if (segment2->p_type != PT_LOAD
0067a569 6957 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 6958 continue;
c044fabd 6959
bc67d8a6
NC
6960 /* Merge the two segments together. */
6961 if (segment2->p_vaddr < segment->p_vaddr)
6962 {
c044fabd 6963 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 6964 SEGMENT. */
0067a569
AM
6965 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
6966 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 6967
bc67d8a6
NC
6968 if (extra_length > 0)
6969 {
0067a569 6970 segment2->p_memsz += extra_length;
bc67d8a6
NC
6971 segment2->p_filesz += extra_length;
6972 }
c044fabd 6973
bc67d8a6 6974 segment->p_type = PT_NULL;
c044fabd 6975
bc67d8a6
NC
6976 /* Since we have deleted P we must restart the outer loop. */
6977 i = 0;
6978 segment = elf_tdata (ibfd)->phdr;
6979 break;
6980 }
6981 else
6982 {
c044fabd 6983 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 6984 SEGMENT2. */
0067a569
AM
6985 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
6986 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 6987
bc67d8a6
NC
6988 if (extra_length > 0)
6989 {
0067a569 6990 segment->p_memsz += extra_length;
bc67d8a6
NC
6991 segment->p_filesz += extra_length;
6992 }
c044fabd 6993
bc67d8a6
NC
6994 segment2->p_type = PT_NULL;
6995 }
6996 }
6997 }
c044fabd 6998
bc67d8a6
NC
6999 /* The second scan attempts to assign sections to segments. */
7000 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7001 i < num_segments;
0067a569 7002 i++, segment++)
bc67d8a6 7003 {
0067a569
AM
7004 unsigned int section_count;
7005 asection **sections;
7006 asection *output_section;
7007 unsigned int isec;
9933dc52
AM
7008 asection *matching_lma;
7009 asection *suggested_lma;
0067a569 7010 unsigned int j;
446f7ed5 7011 size_t amt;
0067a569 7012 asection *first_section;
bc67d8a6
NC
7013
7014 if (segment->p_type == PT_NULL)
7015 continue;
c044fabd 7016
9f17e2a6 7017 first_section = NULL;
bc67d8a6 7018 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
7019 for (section = ibfd->sections, section_count = 0;
7020 section != NULL;
7021 section = section->next)
9f17e2a6
L
7022 {
7023 /* Find the first section in the input segment, which may be
7024 removed from the corresponding output segment. */
7025 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
7026 {
7027 if (first_section == NULL)
7028 first_section = section;
7029 if (section->output_section != NULL)
7030 ++section_count;
7031 }
7032 }
811072d8 7033
b5f852ea
NC
7034 /* Allocate a segment map big enough to contain
7035 all of the sections we have selected. */
00bee008 7036 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
446f7ed5 7037 amt += section_count * sizeof (asection *);
a50b1753 7038 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 7039 if (map == NULL)
b34976b6 7040 return FALSE;
252b5132
RH
7041
7042 /* Initialise the fields of the segment map. Default to
7043 using the physical address of the segment in the input BFD. */
0067a569
AM
7044 map->next = NULL;
7045 map->p_type = segment->p_type;
7046 map->p_flags = segment->p_flags;
bc67d8a6 7047 map->p_flags_valid = 1;
55d55ac7 7048
9f17e2a6
L
7049 /* If the first section in the input segment is removed, there is
7050 no need to preserve segment physical address in the corresponding
7051 output segment. */
945c025a 7052 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
7053 {
7054 map->p_paddr = segment->p_paddr;
5c44b38e 7055 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 7056 }
252b5132
RH
7057
7058 /* Determine if this segment contains the ELF file header
7059 and if it contains the program headers themselves. */
bc67d8a6
NC
7060 map->includes_filehdr = (segment->p_offset == 0
7061 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 7062 map->includes_phdrs = 0;
252b5132 7063
0067a569 7064 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 7065 {
bc67d8a6
NC
7066 map->includes_phdrs =
7067 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7068 && (segment->p_offset + segment->p_filesz
252b5132
RH
7069 >= ((bfd_vma) iehdr->e_phoff
7070 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 7071
bc67d8a6 7072 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 7073 phdr_included = TRUE;
252b5132
RH
7074 }
7075
bc67d8a6 7076 if (section_count == 0)
252b5132
RH
7077 {
7078 /* Special segments, such as the PT_PHDR segment, may contain
7079 no sections, but ordinary, loadable segments should contain
1ed89aa9 7080 something. They are allowed by the ELF spec however, so only
07d6d2b8 7081 a warning is produced.
f98450c6
NC
7082 There is however the valid use case of embedded systems which
7083 have segments with p_filesz of 0 and a p_memsz > 0 to initialize
7084 flash memory with zeros. No warning is shown for that case. */
7085 if (segment->p_type == PT_LOAD
7086 && (segment->p_filesz > 0 || segment->p_memsz == 0))
7087 /* xgettext:c-format */
9793eb77
AM
7088 _bfd_error_handler
7089 (_("%pB: warning: empty loadable segment detected"
7090 " at vaddr=%#" PRIx64 ", is this intentional?"),
7091 ibfd, (uint64_t) segment->p_vaddr);
252b5132 7092
5d695627 7093 map->p_vaddr_offset = segment->p_vaddr;
bc67d8a6 7094 map->count = 0;
c044fabd
KH
7095 *pointer_to_map = map;
7096 pointer_to_map = &map->next;
252b5132
RH
7097
7098 continue;
7099 }
7100
7101 /* Now scan the sections in the input BFD again and attempt
7102 to add their corresponding output sections to the segment map.
7103 The problem here is how to handle an output section which has
7104 been moved (ie had its LMA changed). There are four possibilities:
7105
7106 1. None of the sections have been moved.
7107 In this case we can continue to use the segment LMA from the
7108 input BFD.
7109
7110 2. All of the sections have been moved by the same amount.
7111 In this case we can change the segment's LMA to match the LMA
7112 of the first section.
7113
7114 3. Some of the sections have been moved, others have not.
7115 In this case those sections which have not been moved can be
7116 placed in the current segment which will have to have its size,
7117 and possibly its LMA changed, and a new segment or segments will
7118 have to be created to contain the other sections.
7119
b5f852ea 7120 4. The sections have been moved, but not by the same amount.
252b5132
RH
7121 In this case we can change the segment's LMA to match the LMA
7122 of the first section and we will have to create a new segment
7123 or segments to contain the other sections.
7124
7125 In order to save time, we allocate an array to hold the section
7126 pointers that we are interested in. As these sections get assigned
7127 to a segment, they are removed from this array. */
7128
446f7ed5
AM
7129 amt = section_count * sizeof (asection *);
7130 sections = (asection **) bfd_malloc (amt);
252b5132 7131 if (sections == NULL)
b34976b6 7132 return FALSE;
252b5132
RH
7133
7134 /* Step One: Scan for segment vs section LMA conflicts.
7135 Also add the sections to the section array allocated above.
7136 Also add the sections to the current segment. In the common
7137 case, where the sections have not been moved, this means that
7138 we have completely filled the segment, and there is nothing
7139 more to do. */
252b5132 7140 isec = 0;
9933dc52
AM
7141 matching_lma = NULL;
7142 suggested_lma = NULL;
252b5132 7143
461c4b2e 7144 for (section = first_section, j = 0;
bc67d8a6
NC
7145 section != NULL;
7146 section = section->next)
252b5132 7147 {
caf47ea6 7148 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 7149 {
bc67d8a6
NC
7150 output_section = section->output_section;
7151
0067a569 7152 sections[j++] = section;
252b5132
RH
7153
7154 /* The Solaris native linker always sets p_paddr to 0.
7155 We try to catch that case here, and set it to the
5e8d7549
NC
7156 correct value. Note - some backends require that
7157 p_paddr be left as zero. */
5c44b38e 7158 if (!p_paddr_valid
4455705d 7159 && segment->p_vaddr != 0
0067a569 7160 && !bed->want_p_paddr_set_to_zero
252b5132 7161 && isec == 0
bc67d8a6 7162 && output_section->lma != 0
9933dc52
AM
7163 && (align_power (segment->p_vaddr
7164 + (map->includes_filehdr
7165 ? iehdr->e_ehsize : 0)
7166 + (map->includes_phdrs
7167 ? iehdr->e_phnum * iehdr->e_phentsize
7168 : 0),
7169 output_section->alignment_power)
7170 == output_section->vma))
bc67d8a6 7171 map->p_paddr = segment->p_vaddr;
252b5132
RH
7172
7173 /* Match up the physical address of the segment with the
7174 LMA address of the output section. */
bc67d8a6 7175 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 7176 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
7177 || (bed->want_p_paddr_set_to_zero
7178 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 7179 {
9933dc52
AM
7180 if (matching_lma == NULL
7181 || output_section->lma < matching_lma->lma)
7182 matching_lma = output_section;
252b5132
RH
7183
7184 /* We assume that if the section fits within the segment
bc67d8a6 7185 then it does not overlap any other section within that
252b5132 7186 segment. */
0067a569
AM
7187 map->sections[isec++] = output_section;
7188 }
9933dc52
AM
7189 else if (suggested_lma == NULL)
7190 suggested_lma = output_section;
147d51c2
L
7191
7192 if (j == section_count)
7193 break;
252b5132
RH
7194 }
7195 }
7196
bc67d8a6 7197 BFD_ASSERT (j == section_count);
252b5132
RH
7198
7199 /* Step Two: Adjust the physical address of the current segment,
7200 if necessary. */
bc67d8a6 7201 if (isec == section_count)
252b5132
RH
7202 {
7203 /* All of the sections fitted within the segment as currently
7204 specified. This is the default case. Add the segment to
7205 the list of built segments and carry on to process the next
7206 program header in the input BFD. */
bc67d8a6 7207 map->count = section_count;
c044fabd
KH
7208 *pointer_to_map = map;
7209 pointer_to_map = &map->next;
08a40648 7210
5c44b38e 7211 if (p_paddr_valid
30fe1832
AM
7212 && !bed->want_p_paddr_set_to_zero)
7213 {
7214 bfd_vma hdr_size = 0;
7215 if (map->includes_filehdr)
7216 hdr_size = iehdr->e_ehsize;
7217 if (map->includes_phdrs)
7218 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7219
7220 /* Account for padding before the first section in the
7221 segment. */
7222 map->p_vaddr_offset = map->p_paddr + hdr_size - matching_lma->lma;
7223 }
08a40648 7224
252b5132
RH
7225 free (sections);
7226 continue;
7227 }
252b5132
RH
7228 else
7229 {
9933dc52
AM
7230 /* Change the current segment's physical address to match
7231 the LMA of the first section that fitted, or if no
7232 section fitted, the first section. */
7233 if (matching_lma == NULL)
7234 matching_lma = suggested_lma;
7235
7236 map->p_paddr = matching_lma->lma;
72730e0c 7237
bc67d8a6
NC
7238 /* Offset the segment physical address from the lma
7239 to allow for space taken up by elf headers. */
9933dc52 7240 if (map->includes_phdrs)
010c8431 7241 {
9933dc52
AM
7242 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
7243
7244 /* iehdr->e_phnum is just an estimate of the number
7245 of program headers that we will need. Make a note
7246 here of the number we used and the segment we chose
7247 to hold these headers, so that we can adjust the
7248 offset when we know the correct value. */
7249 phdr_adjust_num = iehdr->e_phnum;
7250 phdr_adjust_seg = map;
010c8431 7251 }
252b5132 7252
9933dc52 7253 if (map->includes_filehdr)
bc67d8a6 7254 {
9933dc52
AM
7255 bfd_vma align = (bfd_vma) 1 << matching_lma->alignment_power;
7256 map->p_paddr -= iehdr->e_ehsize;
7257 /* We've subtracted off the size of headers from the
7258 first section lma, but there may have been some
7259 alignment padding before that section too. Try to
7260 account for that by adjusting the segment lma down to
7261 the same alignment. */
7262 if (segment->p_align != 0 && segment->p_align < align)
7263 align = segment->p_align;
7264 map->p_paddr &= -align;
bc67d8a6 7265 }
252b5132
RH
7266 }
7267
7268 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 7269 those that fit to the current segment and removing them from the
252b5132
RH
7270 sections array; but making sure not to leave large gaps. Once all
7271 possible sections have been assigned to the current segment it is
7272 added to the list of built segments and if sections still remain
7273 to be assigned, a new segment is constructed before repeating
7274 the loop. */
7275 isec = 0;
7276 do
7277 {
bc67d8a6 7278 map->count = 0;
9933dc52 7279 suggested_lma = NULL;
252b5132
RH
7280
7281 /* Fill the current segment with sections that fit. */
bc67d8a6 7282 for (j = 0; j < section_count; j++)
252b5132 7283 {
bc67d8a6 7284 section = sections[j];
252b5132 7285
bc67d8a6 7286 if (section == NULL)
252b5132
RH
7287 continue;
7288
bc67d8a6 7289 output_section = section->output_section;
252b5132 7290
bc67d8a6 7291 BFD_ASSERT (output_section != NULL);
c044fabd 7292
bc67d8a6
NC
7293 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
7294 || IS_COREFILE_NOTE (segment, section))
252b5132 7295 {
bc67d8a6 7296 if (map->count == 0)
252b5132
RH
7297 {
7298 /* If the first section in a segment does not start at
bc67d8a6
NC
7299 the beginning of the segment, then something is
7300 wrong. */
9933dc52
AM
7301 if (align_power (map->p_paddr
7302 + (map->includes_filehdr
7303 ? iehdr->e_ehsize : 0)
7304 + (map->includes_phdrs
7305 ? iehdr->e_phnum * iehdr->e_phentsize
7306 : 0),
7307 output_section->alignment_power)
7308 != output_section->lma)
9aea1e31 7309 goto sorry;
252b5132
RH
7310 }
7311 else
7312 {
0067a569 7313 asection *prev_sec;
252b5132 7314
bc67d8a6 7315 prev_sec = map->sections[map->count - 1];
252b5132
RH
7316
7317 /* If the gap between the end of the previous section
bc67d8a6
NC
7318 and the start of this section is more than
7319 maxpagesize then we need to start a new segment. */
eea6121a 7320 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 7321 maxpagesize)
caf47ea6 7322 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 7323 || (prev_sec->lma + prev_sec->size
079e9a2f 7324 > output_section->lma))
252b5132 7325 {
9933dc52
AM
7326 if (suggested_lma == NULL)
7327 suggested_lma = output_section;
252b5132
RH
7328
7329 continue;
7330 }
7331 }
7332
bc67d8a6 7333 map->sections[map->count++] = output_section;
252b5132
RH
7334 ++isec;
7335 sections[j] = NULL;
9933dc52
AM
7336 if (segment->p_type == PT_LOAD)
7337 section->segment_mark = TRUE;
0067a569 7338 }
9933dc52
AM
7339 else if (suggested_lma == NULL)
7340 suggested_lma = output_section;
252b5132
RH
7341 }
7342
beab4532
NC
7343 /* PR 23932. A corrupt input file may contain sections that cannot
7344 be assigned to any segment - because for example they have a
9984857c
NC
7345 negative size - or segments that do not contain any sections.
7346 But there are also valid reasons why a segment can be empty.
7347 So allow a count of zero. */
252b5132
RH
7348
7349 /* Add the current segment to the list of built segments. */
c044fabd
KH
7350 *pointer_to_map = map;
7351 pointer_to_map = &map->next;
252b5132 7352
bc67d8a6 7353 if (isec < section_count)
252b5132
RH
7354 {
7355 /* We still have not allocated all of the sections to
7356 segments. Create a new segment here, initialise it
7357 and carry on looping. */
00bee008 7358 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
446f7ed5 7359 amt += section_count * sizeof (asection *);
5964fc3a 7360 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 7361 if (map == NULL)
5ed6aba4
NC
7362 {
7363 free (sections);
7364 return FALSE;
7365 }
252b5132
RH
7366
7367 /* Initialise the fields of the segment map. Set the physical
7368 physical address to the LMA of the first section that has
7369 not yet been assigned. */
0067a569
AM
7370 map->next = NULL;
7371 map->p_type = segment->p_type;
7372 map->p_flags = segment->p_flags;
7373 map->p_flags_valid = 1;
9933dc52 7374 map->p_paddr = suggested_lma->lma;
5c44b38e 7375 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 7376 map->includes_filehdr = 0;
0067a569 7377 map->includes_phdrs = 0;
252b5132 7378 }
9984857c
NC
7379
7380 continue;
7381 sorry:
7382 bfd_set_error (bfd_error_sorry);
7383 free (sections);
7384 return FALSE;
252b5132 7385 }
bc67d8a6 7386 while (isec < section_count);
252b5132
RH
7387
7388 free (sections);
7389 }
7390
12bd6957 7391 elf_seg_map (obfd) = map_first;
bc67d8a6
NC
7392
7393 /* If we had to estimate the number of program headers that were
9ad5cbcf 7394 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
7395 the offset if necessary. */
7396 if (phdr_adjust_seg != NULL)
7397 {
7398 unsigned int count;
c044fabd 7399
bc67d8a6 7400 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 7401 count++;
252b5132 7402
bc67d8a6
NC
7403 if (count > phdr_adjust_num)
7404 phdr_adjust_seg->p_paddr
7405 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
9933dc52
AM
7406
7407 for (map = map_first; map != NULL; map = map->next)
7408 if (map->p_type == PT_PHDR)
7409 {
7410 bfd_vma adjust
7411 = phdr_adjust_seg->includes_filehdr ? iehdr->e_ehsize : 0;
7412 map->p_paddr = phdr_adjust_seg->p_paddr + adjust;
7413 break;
7414 }
bc67d8a6 7415 }
c044fabd 7416
bc67d8a6 7417#undef SEGMENT_END
eecdbe52 7418#undef SECTION_SIZE
bc67d8a6
NC
7419#undef IS_CONTAINED_BY_VMA
7420#undef IS_CONTAINED_BY_LMA
0efc80c8 7421#undef IS_NOTE
252b5132 7422#undef IS_COREFILE_NOTE
bc67d8a6 7423#undef IS_SOLARIS_PT_INTERP
9f17e2a6 7424#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
7425#undef INCLUDE_SECTION_IN_SEGMENT
7426#undef SEGMENT_AFTER_SEGMENT
7427#undef SEGMENT_OVERLAPS
b34976b6 7428 return TRUE;
252b5132
RH
7429}
7430
84d1d650
L
7431/* Copy ELF program header information. */
7432
7433static bfd_boolean
7434copy_elf_program_header (bfd *ibfd, bfd *obfd)
7435{
7436 Elf_Internal_Ehdr *iehdr;
7437 struct elf_segment_map *map;
7438 struct elf_segment_map *map_first;
7439 struct elf_segment_map **pointer_to_map;
7440 Elf_Internal_Phdr *segment;
7441 unsigned int i;
7442 unsigned int num_segments;
7443 bfd_boolean phdr_included = FALSE;
88967714 7444 bfd_boolean p_paddr_valid;
84d1d650
L
7445
7446 iehdr = elf_elfheader (ibfd);
7447
7448 map_first = NULL;
7449 pointer_to_map = &map_first;
7450
88967714
AM
7451 /* If all the segment p_paddr fields are zero, don't set
7452 map->p_paddr_valid. */
7453 p_paddr_valid = FALSE;
84d1d650 7454 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
7455 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7456 i < num_segments;
7457 i++, segment++)
7458 if (segment->p_paddr != 0)
7459 {
7460 p_paddr_valid = TRUE;
7461 break;
7462 }
7463
84d1d650
L
7464 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7465 i < num_segments;
7466 i++, segment++)
7467 {
7468 asection *section;
7469 unsigned int section_count;
986f0783 7470 size_t amt;
84d1d650 7471 Elf_Internal_Shdr *this_hdr;
53020534 7472 asection *first_section = NULL;
a76e6f2f 7473 asection *lowest_section;
84d1d650 7474
84d1d650
L
7475 /* Compute how many sections are in this segment. */
7476 for (section = ibfd->sections, section_count = 0;
7477 section != NULL;
7478 section = section->next)
7479 {
7480 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7481 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 7482 {
a76e6f2f
AM
7483 if (first_section == NULL)
7484 first_section = section;
3271a814
NS
7485 section_count++;
7486 }
84d1d650
L
7487 }
7488
7489 /* Allocate a segment map big enough to contain
7490 all of the sections we have selected. */
00bee008 7491 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
986f0783 7492 amt += section_count * sizeof (asection *);
a50b1753 7493 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
7494 if (map == NULL)
7495 return FALSE;
7496
7497 /* Initialize the fields of the output segment map with the
7498 input segment. */
7499 map->next = NULL;
7500 map->p_type = segment->p_type;
7501 map->p_flags = segment->p_flags;
7502 map->p_flags_valid = 1;
7503 map->p_paddr = segment->p_paddr;
88967714 7504 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
7505 map->p_align = segment->p_align;
7506 map->p_align_valid = 1;
3271a814 7507 map->p_vaddr_offset = 0;
84d1d650 7508
04c3a755
NS
7509 if (map->p_type == PT_GNU_RELRO
7510 || map->p_type == PT_GNU_STACK)
b10a8ae0
L
7511 {
7512 /* The PT_GNU_RELRO segment may contain the first a few
7513 bytes in the .got.plt section even if the whole .got.plt
7514 section isn't in the PT_GNU_RELRO segment. We won't
04c3a755
NS
7515 change the size of the PT_GNU_RELRO segment.
7516 Similarly, PT_GNU_STACK size is significant on uclinux
7517 systems. */
9433b9b1 7518 map->p_size = segment->p_memsz;
b10a8ae0
L
7519 map->p_size_valid = 1;
7520 }
7521
84d1d650
L
7522 /* Determine if this segment contains the ELF file header
7523 and if it contains the program headers themselves. */
7524 map->includes_filehdr = (segment->p_offset == 0
7525 && segment->p_filesz >= iehdr->e_ehsize);
7526
7527 map->includes_phdrs = 0;
7528 if (! phdr_included || segment->p_type != PT_LOAD)
7529 {
7530 map->includes_phdrs =
7531 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7532 && (segment->p_offset + segment->p_filesz
7533 >= ((bfd_vma) iehdr->e_phoff
7534 + iehdr->e_phnum * iehdr->e_phentsize)));
7535
7536 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7537 phdr_included = TRUE;
7538 }
7539
bbefd0a9 7540 lowest_section = NULL;
84d1d650
L
7541 if (section_count != 0)
7542 {
7543 unsigned int isec = 0;
7544
53020534 7545 for (section = first_section;
84d1d650
L
7546 section != NULL;
7547 section = section->next)
7548 {
7549 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7550 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
7551 {
7552 map->sections[isec++] = section->output_section;
a76e6f2f
AM
7553 if ((section->flags & SEC_ALLOC) != 0)
7554 {
7555 bfd_vma seg_off;
7556
bbefd0a9
AM
7557 if (lowest_section == NULL
7558 || section->lma < lowest_section->lma)
fb8a5684
AM
7559 lowest_section = section;
7560
a76e6f2f
AM
7561 /* Section lmas are set up from PT_LOAD header
7562 p_paddr in _bfd_elf_make_section_from_shdr.
7563 If this header has a p_paddr that disagrees
7564 with the section lma, flag the p_paddr as
7565 invalid. */
7566 if ((section->flags & SEC_LOAD) != 0)
7567 seg_off = this_hdr->sh_offset - segment->p_offset;
7568 else
7569 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7570 if (section->lma - segment->p_paddr != seg_off)
7571 map->p_paddr_valid = FALSE;
7572 }
53020534
L
7573 if (isec == section_count)
7574 break;
7575 }
84d1d650
L
7576 }
7577 }
7578
5d695627
AM
7579 if (section_count == 0)
7580 map->p_vaddr_offset = segment->p_vaddr;
30fe1832
AM
7581 else if (map->p_paddr_valid)
7582 {
7583 /* Account for padding before the first section in the segment. */
7584 bfd_vma hdr_size = 0;
7585 if (map->includes_filehdr)
7586 hdr_size = iehdr->e_ehsize;
7587 if (map->includes_phdrs)
7588 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7589
7590 map->p_vaddr_offset = (map->p_paddr + hdr_size
7591 - (lowest_section ? lowest_section->lma : 0));
7592 }
a76e6f2f 7593
84d1d650
L
7594 map->count = section_count;
7595 *pointer_to_map = map;
7596 pointer_to_map = &map->next;
7597 }
7598
12bd6957 7599 elf_seg_map (obfd) = map_first;
84d1d650
L
7600 return TRUE;
7601}
7602
7603/* Copy private BFD data. This copies or rewrites ELF program header
7604 information. */
7605
7606static bfd_boolean
7607copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7608{
84d1d650
L
7609 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7610 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7611 return TRUE;
7612
7613 if (elf_tdata (ibfd)->phdr == NULL)
7614 return TRUE;
7615
7616 if (ibfd->xvec == obfd->xvec)
7617 {
cb3ff1e5
NC
7618 /* Check to see if any sections in the input BFD
7619 covered by ELF program header have changed. */
d55ce4e2 7620 Elf_Internal_Phdr *segment;
84d1d650
L
7621 asection *section, *osec;
7622 unsigned int i, num_segments;
7623 Elf_Internal_Shdr *this_hdr;
147d51c2
L
7624 const struct elf_backend_data *bed;
7625
7626 bed = get_elf_backend_data (ibfd);
7627
7628 /* Regenerate the segment map if p_paddr is set to 0. */
7629 if (bed->want_p_paddr_set_to_zero)
7630 goto rewrite;
84d1d650
L
7631
7632 /* Initialize the segment mark field. */
7633 for (section = obfd->sections; section != NULL;
7634 section = section->next)
7635 section->segment_mark = FALSE;
7636
7637 num_segments = elf_elfheader (ibfd)->e_phnum;
7638 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7639 i < num_segments;
7640 i++, segment++)
7641 {
5f6999aa
NC
7642 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7643 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7644 which severly confuses things, so always regenerate the segment
7645 map in this case. */
7646 if (segment->p_paddr == 0
7647 && segment->p_memsz == 0
7648 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 7649 goto rewrite;
5f6999aa 7650
84d1d650
L
7651 for (section = ibfd->sections;
7652 section != NULL; section = section->next)
7653 {
7654 /* We mark the output section so that we know it comes
7655 from the input BFD. */
7656 osec = section->output_section;
7657 if (osec)
7658 osec->segment_mark = TRUE;
7659
7660 /* Check if this section is covered by the segment. */
7661 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7662 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
7663 {
7664 /* FIXME: Check if its output section is changed or
7665 removed. What else do we need to check? */
7666 if (osec == NULL
7667 || section->flags != osec->flags
7668 || section->lma != osec->lma
7669 || section->vma != osec->vma
7670 || section->size != osec->size
7671 || section->rawsize != osec->rawsize
7672 || section->alignment_power != osec->alignment_power)
7673 goto rewrite;
7674 }
7675 }
7676 }
7677
cb3ff1e5 7678 /* Check to see if any output section do not come from the
84d1d650
L
7679 input BFD. */
7680 for (section = obfd->sections; section != NULL;
7681 section = section->next)
7682 {
535b785f 7683 if (!section->segment_mark)
84d1d650
L
7684 goto rewrite;
7685 else
7686 section->segment_mark = FALSE;
7687 }
7688
7689 return copy_elf_program_header (ibfd, obfd);
7690 }
7691
dc1e8a47 7692 rewrite:
f1d85785
L
7693 if (ibfd->xvec == obfd->xvec)
7694 {
7695 /* When rewriting program header, set the output maxpagesize to
7696 the maximum alignment of input PT_LOAD segments. */
7697 Elf_Internal_Phdr *segment;
7698 unsigned int i;
7699 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7700 bfd_vma maxpagesize = 0;
7701
7702 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7703 i < num_segments;
7704 i++, segment++)
7705 if (segment->p_type == PT_LOAD
7706 && maxpagesize < segment->p_align)
c86934ce
NC
7707 {
7708 /* PR 17512: file: f17299af. */
7709 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
695344c0 7710 /* xgettext:c-format */
2dcf00ce
AM
7711 _bfd_error_handler (_("%pB: warning: segment alignment of %#"
7712 PRIx64 " is too large"),
7713 ibfd, (uint64_t) segment->p_align);
c86934ce
NC
7714 else
7715 maxpagesize = segment->p_align;
7716 }
f1d85785
L
7717
7718 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
7719 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
7720 }
7721
84d1d650
L
7722 return rewrite_elf_program_header (ibfd, obfd);
7723}
7724
ccd2ec6a
L
7725/* Initialize private output section information from input section. */
7726
7727bfd_boolean
7728_bfd_elf_init_private_section_data (bfd *ibfd,
7729 asection *isec,
7730 bfd *obfd,
7731 asection *osec,
7732 struct bfd_link_info *link_info)
7733
7734{
7735 Elf_Internal_Shdr *ihdr, *ohdr;
0e1862bb
L
7736 bfd_boolean final_link = (link_info != NULL
7737 && !bfd_link_relocatable (link_info));
ccd2ec6a
L
7738
7739 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7740 || obfd->xvec->flavour != bfd_target_elf_flavour)
7741 return TRUE;
7742
ba85c43e
NC
7743 BFD_ASSERT (elf_section_data (osec) != NULL);
7744
8c803a2d
AM
7745 /* If this is a known ABI section, ELF section type and flags may
7746 have been set up when OSEC was created. For normal sections we
7747 allow the user to override the type and flags other than
7748 SHF_MASKOS and SHF_MASKPROC. */
7749 if (elf_section_type (osec) == SHT_PROGBITS
7750 || elf_section_type (osec) == SHT_NOTE
7751 || elf_section_type (osec) == SHT_NOBITS)
7752 elf_section_type (osec) = SHT_NULL;
7753 /* For objcopy and relocatable link, copy the ELF section type from
7754 the input file if the BFD section flags are the same. (If they
7755 are different the user may be doing something like
7756 "objcopy --set-section-flags .text=alloc,data".) For a final
7757 link allow some flags that the linker clears to differ. */
42bb2e33 7758 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
7759 && (osec->flags == isec->flags
7760 || (final_link
7761 && ((osec->flags ^ isec->flags)
0814be7d 7762 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 7763 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
7764
7765 /* FIXME: Is this correct for all OS/PROC specific flags? */
8c803a2d
AM
7766 elf_section_flags (osec) = (elf_section_flags (isec)
7767 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a 7768
a91e1603 7769 /* Copy sh_info from input for mbind section. */
df3a023b
AM
7770 if ((elf_tdata (ibfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0
7771 && elf_section_flags (isec) & SHF_GNU_MBIND)
a91e1603
L
7772 elf_section_data (osec)->this_hdr.sh_info
7773 = elf_section_data (isec)->this_hdr.sh_info;
7774
ccd2ec6a
L
7775 /* Set things up for objcopy and relocatable link. The output
7776 SHT_GROUP section will have its elf_next_in_group pointing back
7777 to the input group members. Ignore linker created group section.
7778 See elfNN_ia64_object_p in elfxx-ia64.c. */
7bdf4127
AB
7779 if ((link_info == NULL
7780 || !link_info->resolve_section_groups)
7781 && (elf_sec_group (isec) == NULL
7782 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0))
ccd2ec6a 7783 {
7bdf4127
AB
7784 if (elf_section_flags (isec) & SHF_GROUP)
7785 elf_section_flags (osec) |= SHF_GROUP;
7786 elf_next_in_group (osec) = elf_next_in_group (isec);
7787 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
7788 }
7789
7bdf4127
AB
7790 /* If not decompress, preserve SHF_COMPRESSED. */
7791 if (!final_link && (ibfd->flags & BFD_DECOMPRESS) == 0)
7792 elf_section_flags (osec) |= (elf_section_flags (isec)
7793 & SHF_COMPRESSED);
7794
ccd2ec6a
L
7795 ihdr = &elf_section_data (isec)->this_hdr;
7796
7797 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7798 don't use the output section of the linked-to section since it
7799 may be NULL at this point. */
7800 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7801 {
7802 ohdr = &elf_section_data (osec)->this_hdr;
7803 ohdr->sh_flags |= SHF_LINK_ORDER;
7804 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7805 }
7806
7807 osec->use_rela_p = isec->use_rela_p;
7808
7809 return TRUE;
7810}
7811
252b5132
RH
7812/* Copy private section information. This copies over the entsize
7813 field, and sometimes the info field. */
7814
b34976b6 7815bfd_boolean
217aa764
AM
7816_bfd_elf_copy_private_section_data (bfd *ibfd,
7817 asection *isec,
7818 bfd *obfd,
7819 asection *osec)
252b5132
RH
7820{
7821 Elf_Internal_Shdr *ihdr, *ohdr;
7822
7823 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7824 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 7825 return TRUE;
252b5132 7826
252b5132
RH
7827 ihdr = &elf_section_data (isec)->this_hdr;
7828 ohdr = &elf_section_data (osec)->this_hdr;
7829
7830 ohdr->sh_entsize = ihdr->sh_entsize;
7831
7832 if (ihdr->sh_type == SHT_SYMTAB
7833 || ihdr->sh_type == SHT_DYNSYM
7834 || ihdr->sh_type == SHT_GNU_verneed
7835 || ihdr->sh_type == SHT_GNU_verdef)
7836 ohdr->sh_info = ihdr->sh_info;
7837
ccd2ec6a
L
7838 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7839 NULL);
252b5132
RH
7840}
7841
d0bf826b
AM
7842/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7843 necessary if we are removing either the SHT_GROUP section or any of
7844 the group member sections. DISCARDED is the value that a section's
7845 output_section has if the section will be discarded, NULL when this
7846 function is called from objcopy, bfd_abs_section_ptr when called
7847 from the linker. */
80fccad2
BW
7848
7849bfd_boolean
d0bf826b 7850_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 7851{
30288845
AM
7852 asection *isec;
7853
30288845 7854 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 7855 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
7856 {
7857 asection *first = elf_next_in_group (isec);
7858 asection *s = first;
d0bf826b
AM
7859 bfd_size_type removed = 0;
7860
30288845
AM
7861 while (s != NULL)
7862 {
415f38a6
AM
7863 /* If this member section is being output but the
7864 SHT_GROUP section is not, then clear the group info
7865 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
7866 if (s->output_section != discarded
7867 && isec->output_section == discarded)
30288845
AM
7868 {
7869 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7870 elf_group_name (s->output_section) = NULL;
7871 }
415f38a6
AM
7872 /* Conversely, if the member section is not being output
7873 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
7874 else if (s->output_section == discarded
7875 && isec->output_section != discarded)
6e5e9d58
AM
7876 {
7877 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
7878 removed += 4;
7879 if (elf_sec->rel.hdr != NULL
7880 && (elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0)
7881 removed += 4;
7882 if (elf_sec->rela.hdr != NULL
7883 && (elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0)
7884 removed += 4;
7885 }
30288845
AM
7886 s = elf_next_in_group (s);
7887 if (s == first)
7888 break;
7889 }
d0bf826b
AM
7890 if (removed != 0)
7891 {
7892 if (discarded != NULL)
7893 {
7894 /* If we've been called for ld -r, then we need to
6e5e9d58 7895 adjust the input section size. */
d0bf826b
AM
7896 if (isec->rawsize == 0)
7897 isec->rawsize = isec->size;
7898 isec->size = isec->rawsize - removed;
6e5e9d58
AM
7899 if (isec->size <= 4)
7900 {
7901 isec->size = 0;
7902 isec->flags |= SEC_EXCLUDE;
7903 }
d0bf826b
AM
7904 }
7905 else
7906 {
7907 /* Adjust the output section size when called from
7908 objcopy. */
7909 isec->output_section->size -= removed;
6e5e9d58
AM
7910 if (isec->output_section->size <= 4)
7911 {
7912 isec->output_section->size = 0;
7913 isec->output_section->flags |= SEC_EXCLUDE;
7914 }
d0bf826b
AM
7915 }
7916 }
30288845
AM
7917 }
7918
80fccad2
BW
7919 return TRUE;
7920}
7921
d0bf826b
AM
7922/* Copy private header information. */
7923
7924bfd_boolean
7925_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
7926{
7927 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7928 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7929 return TRUE;
7930
7931 /* Copy over private BFD data if it has not already been copied.
7932 This must be done here, rather than in the copy_private_bfd_data
7933 entry point, because the latter is called after the section
7934 contents have been set, which means that the program headers have
7935 already been worked out. */
12bd6957 7936 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
d0bf826b
AM
7937 {
7938 if (! copy_private_bfd_data (ibfd, obfd))
7939 return FALSE;
7940 }
7941
7942 return _bfd_elf_fixup_group_sections (ibfd, NULL);
7943}
7944
252b5132
RH
7945/* Copy private symbol information. If this symbol is in a section
7946 which we did not map into a BFD section, try to map the section
7947 index correctly. We use special macro definitions for the mapped
7948 section indices; these definitions are interpreted by the
7949 swap_out_syms function. */
7950
9ad5cbcf
AM
7951#define MAP_ONESYMTAB (SHN_HIOS + 1)
7952#define MAP_DYNSYMTAB (SHN_HIOS + 2)
7953#define MAP_STRTAB (SHN_HIOS + 3)
7954#define MAP_SHSTRTAB (SHN_HIOS + 4)
7955#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 7956
b34976b6 7957bfd_boolean
217aa764
AM
7958_bfd_elf_copy_private_symbol_data (bfd *ibfd,
7959 asymbol *isymarg,
7960 bfd *obfd,
7961 asymbol *osymarg)
252b5132
RH
7962{
7963 elf_symbol_type *isym, *osym;
7964
7965 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7966 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 7967 return TRUE;
252b5132
RH
7968
7969 isym = elf_symbol_from (ibfd, isymarg);
7970 osym = elf_symbol_from (obfd, osymarg);
7971
7972 if (isym != NULL
8424d8f5 7973 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
7974 && osym != NULL
7975 && bfd_is_abs_section (isym->symbol.section))
7976 {
7977 unsigned int shndx;
7978
7979 shndx = isym->internal_elf_sym.st_shndx;
7980 if (shndx == elf_onesymtab (ibfd))
7981 shndx = MAP_ONESYMTAB;
7982 else if (shndx == elf_dynsymtab (ibfd))
7983 shndx = MAP_DYNSYMTAB;
12bd6957 7984 else if (shndx == elf_strtab_sec (ibfd))
252b5132 7985 shndx = MAP_STRTAB;
12bd6957 7986 else if (shndx == elf_shstrtab_sec (ibfd))
252b5132 7987 shndx = MAP_SHSTRTAB;
6a40cf0c 7988 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
9ad5cbcf 7989 shndx = MAP_SYM_SHNDX;
252b5132
RH
7990 osym->internal_elf_sym.st_shndx = shndx;
7991 }
7992
b34976b6 7993 return TRUE;
252b5132
RH
7994}
7995
7996/* Swap out the symbols. */
7997
b34976b6 7998static bfd_boolean
217aa764 7999swap_out_syms (bfd *abfd,
ef10c3ac 8000 struct elf_strtab_hash **sttp,
217aa764 8001 int relocatable_p)
252b5132 8002{
9c5bfbb7 8003 const struct elf_backend_data *bed;
1f4361a7 8004 unsigned int symcount;
079e9a2f 8005 asymbol **syms;
ef10c3ac 8006 struct elf_strtab_hash *stt;
079e9a2f 8007 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 8008 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 8009 Elf_Internal_Shdr *symstrtab_hdr;
ef10c3ac 8010 struct elf_sym_strtab *symstrtab;
f075ee0c
AM
8011 bfd_byte *outbound_syms;
8012 bfd_byte *outbound_shndx;
ef10c3ac
L
8013 unsigned long outbound_syms_index;
8014 unsigned long outbound_shndx_index;
1f4361a7 8015 unsigned int idx;
12bd6957 8016 unsigned int num_locals;
1f4361a7 8017 size_t amt;
174fd7f9 8018 bfd_boolean name_local_sections;
252b5132 8019
12bd6957 8020 if (!elf_map_symbols (abfd, &num_locals))
b34976b6 8021 return FALSE;
252b5132 8022
c044fabd 8023 /* Dump out the symtabs. */
ef10c3ac 8024 stt = _bfd_elf_strtab_init ();
079e9a2f 8025 if (stt == NULL)
b34976b6 8026 return FALSE;
252b5132 8027
079e9a2f
AM
8028 bed = get_elf_backend_data (abfd);
8029 symcount = bfd_get_symcount (abfd);
8030 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
8031 symtab_hdr->sh_type = SHT_SYMTAB;
8032 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
8033 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
12bd6957 8034 symtab_hdr->sh_info = num_locals + 1;
72de5009 8035 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
8036
8037 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
8038 symstrtab_hdr->sh_type = SHT_STRTAB;
8039
ef10c3ac 8040 /* Allocate buffer to swap out the .strtab section. */
1f4361a7
AM
8041 if (_bfd_mul_overflow (symcount + 1, sizeof (*symstrtab), &amt)
8042 || (symstrtab = (struct elf_sym_strtab *) bfd_malloc (amt)) == NULL)
ef10c3ac 8043 {
1f4361a7 8044 bfd_set_error (bfd_error_no_memory);
ef10c3ac
L
8045 _bfd_elf_strtab_free (stt);
8046 return FALSE;
8047 }
8048
1f4361a7
AM
8049 if (_bfd_mul_overflow (symcount + 1, bed->s->sizeof_sym, &amt)
8050 || (outbound_syms = (bfd_byte *) bfd_alloc (abfd, amt)) == NULL)
5ed6aba4 8051 {
1f4361a7
AM
8052 error_no_mem:
8053 bfd_set_error (bfd_error_no_memory);
8054 error_return:
ef10c3ac 8055 free (symstrtab);
1f4361a7 8056 _bfd_elf_strtab_free (stt);
5ed6aba4
NC
8057 return FALSE;
8058 }
217aa764 8059 symtab_hdr->contents = outbound_syms;
ef10c3ac 8060 outbound_syms_index = 0;
252b5132 8061
9ad5cbcf 8062 outbound_shndx = NULL;
ef10c3ac 8063 outbound_shndx_index = 0;
6a40cf0c
NC
8064
8065 if (elf_symtab_shndx_list (abfd))
9ad5cbcf 8066 {
6a40cf0c
NC
8067 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
8068 if (symtab_shndx_hdr->sh_name != 0)
8069 {
1f4361a7
AM
8070 if (_bfd_mul_overflow (symcount + 1,
8071 sizeof (Elf_External_Sym_Shndx), &amt))
8072 goto error_no_mem;
8073 outbound_shndx = (bfd_byte *) bfd_zalloc (abfd, amt);
6a40cf0c
NC
8074 if (outbound_shndx == NULL)
8075 goto error_return;
5ed6aba4 8076
6a40cf0c
NC
8077 symtab_shndx_hdr->contents = outbound_shndx;
8078 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
8079 symtab_shndx_hdr->sh_size = amt;
8080 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
8081 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
8082 }
8083 /* FIXME: What about any other headers in the list ? */
9ad5cbcf
AM
8084 }
8085
589e6347 8086 /* Now generate the data (for "contents"). */
079e9a2f
AM
8087 {
8088 /* Fill in zeroth symbol and swap it out. */
8089 Elf_Internal_Sym sym;
8090 sym.st_name = 0;
8091 sym.st_value = 0;
8092 sym.st_size = 0;
8093 sym.st_info = 0;
8094 sym.st_other = 0;
8095 sym.st_shndx = SHN_UNDEF;
35fc36a8 8096 sym.st_target_internal = 0;
ef10c3ac
L
8097 symstrtab[0].sym = sym;
8098 symstrtab[0].dest_index = outbound_syms_index;
8099 symstrtab[0].destshndx_index = outbound_shndx_index;
8100 outbound_syms_index++;
9ad5cbcf 8101 if (outbound_shndx != NULL)
ef10c3ac 8102 outbound_shndx_index++;
079e9a2f 8103 }
252b5132 8104
174fd7f9
RS
8105 name_local_sections
8106 = (bed->elf_backend_name_local_section_symbols
8107 && bed->elf_backend_name_local_section_symbols (abfd));
8108
079e9a2f 8109 syms = bfd_get_outsymbols (abfd);
ef10c3ac 8110 for (idx = 0; idx < symcount;)
252b5132 8111 {
252b5132 8112 Elf_Internal_Sym sym;
079e9a2f
AM
8113 bfd_vma value = syms[idx]->value;
8114 elf_symbol_type *type_ptr;
8115 flagword flags = syms[idx]->flags;
8116 int type;
252b5132 8117
174fd7f9
RS
8118 if (!name_local_sections
8119 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
8120 {
8121 /* Local section symbols have no name. */
ef10c3ac 8122 sym.st_name = (unsigned long) -1;
079e9a2f
AM
8123 }
8124 else
8125 {
ef10c3ac
L
8126 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
8127 to get the final offset for st_name. */
8128 sym.st_name
8129 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
8130 FALSE);
079e9a2f 8131 if (sym.st_name == (unsigned long) -1)
ef10c3ac 8132 goto error_return;
079e9a2f 8133 }
252b5132 8134
079e9a2f 8135 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 8136
079e9a2f
AM
8137 if ((flags & BSF_SECTION_SYM) == 0
8138 && bfd_is_com_section (syms[idx]->section))
8139 {
8140 /* ELF common symbols put the alignment into the `value' field,
8141 and the size into the `size' field. This is backwards from
8142 how BFD handles it, so reverse it here. */
8143 sym.st_size = value;
8144 if (type_ptr == NULL
8145 || type_ptr->internal_elf_sym.st_value == 0)
8146 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
8147 else
8148 sym.st_value = type_ptr->internal_elf_sym.st_value;
8149 sym.st_shndx = _bfd_elf_section_from_bfd_section
8150 (abfd, syms[idx]->section);
8151 }
8152 else
8153 {
8154 asection *sec = syms[idx]->section;
cb33740c 8155 unsigned int shndx;
252b5132 8156
079e9a2f
AM
8157 if (sec->output_section)
8158 {
8159 value += sec->output_offset;
8160 sec = sec->output_section;
8161 }
589e6347 8162
079e9a2f
AM
8163 /* Don't add in the section vma for relocatable output. */
8164 if (! relocatable_p)
8165 value += sec->vma;
8166 sym.st_value = value;
8167 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
8168
8169 if (bfd_is_abs_section (sec)
8170 && type_ptr != NULL
8171 && type_ptr->internal_elf_sym.st_shndx != 0)
8172 {
8173 /* This symbol is in a real ELF section which we did
8174 not create as a BFD section. Undo the mapping done
8175 by copy_private_symbol_data. */
8176 shndx = type_ptr->internal_elf_sym.st_shndx;
8177 switch (shndx)
8178 {
8179 case MAP_ONESYMTAB:
8180 shndx = elf_onesymtab (abfd);
8181 break;
8182 case MAP_DYNSYMTAB:
8183 shndx = elf_dynsymtab (abfd);
8184 break;
8185 case MAP_STRTAB:
12bd6957 8186 shndx = elf_strtab_sec (abfd);
079e9a2f
AM
8187 break;
8188 case MAP_SHSTRTAB:
12bd6957 8189 shndx = elf_shstrtab_sec (abfd);
079e9a2f 8190 break;
9ad5cbcf 8191 case MAP_SYM_SHNDX:
6a40cf0c
NC
8192 if (elf_symtab_shndx_list (abfd))
8193 shndx = elf_symtab_shndx_list (abfd)->ndx;
9ad5cbcf 8194 break;
00e49dff
NC
8195 case SHN_COMMON:
8196 case SHN_ABS:
15bc576a 8197 shndx = SHN_ABS;
079e9a2f 8198 break;
00e49dff
NC
8199 default:
8200 if (shndx >= SHN_LOPROC && shndx <= SHN_HIOS)
8201 {
8202 if (bed->symbol_section_index)
8203 shndx = bed->symbol_section_index (abfd, type_ptr);
8204 /* Otherwise just leave the index alone. */
8205 }
8206 else
8207 {
8208 if (shndx > SHN_HIOS && shndx < SHN_HIRESERVE)
8209 _bfd_error_handler (_("%pB: \
8210Unable to handle section index %x in ELF symbol. Using ABS instead."),
8211 abfd, shndx);
8212 shndx = SHN_ABS;
8213 }
8214 break;
079e9a2f
AM
8215 }
8216 }
8217 else
8218 {
8219 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 8220
cb33740c 8221 if (shndx == SHN_BAD)
079e9a2f
AM
8222 {
8223 asection *sec2;
8224
8225 /* Writing this would be a hell of a lot easier if
8226 we had some decent documentation on bfd, and
8227 knew what to expect of the library, and what to
8228 demand of applications. For example, it
8229 appears that `objcopy' might not set the
8230 section of a symbol to be a section that is
8231 actually in the output file. */
8232 sec2 = bfd_get_section_by_name (abfd, sec->name);
5df1bc57
AM
8233 if (sec2 != NULL)
8234 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
8235 if (shndx == SHN_BAD)
589e6347 8236 {
695344c0 8237 /* xgettext:c-format */
9793eb77
AM
8238 _bfd_error_handler
8239 (_("unable to find equivalent output section"
8240 " for symbol '%s' from section '%s'"),
8241 syms[idx]->name ? syms[idx]->name : "<Local sym>",
8242 sec->name);
811072d8 8243 bfd_set_error (bfd_error_invalid_operation);
ef10c3ac 8244 goto error_return;
589e6347 8245 }
079e9a2f
AM
8246 }
8247 }
252b5132 8248
079e9a2f
AM
8249 sym.st_shndx = shndx;
8250 }
252b5132 8251
13ae64f3
JJ
8252 if ((flags & BSF_THREAD_LOCAL) != 0)
8253 type = STT_TLS;
d8045f23
NC
8254 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
8255 type = STT_GNU_IFUNC;
13ae64f3 8256 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
8257 type = STT_FUNC;
8258 else if ((flags & BSF_OBJECT) != 0)
8259 type = STT_OBJECT;
d9352518
DB
8260 else if ((flags & BSF_RELC) != 0)
8261 type = STT_RELC;
8262 else if ((flags & BSF_SRELC) != 0)
8263 type = STT_SRELC;
079e9a2f
AM
8264 else
8265 type = STT_NOTYPE;
252b5132 8266
13ae64f3
JJ
8267 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
8268 type = STT_TLS;
8269
589e6347 8270 /* Processor-specific types. */
079e9a2f
AM
8271 if (type_ptr != NULL
8272 && bed->elf_backend_get_symbol_type)
8273 type = ((*bed->elf_backend_get_symbol_type)
8274 (&type_ptr->internal_elf_sym, type));
252b5132 8275
079e9a2f
AM
8276 if (flags & BSF_SECTION_SYM)
8277 {
8278 if (flags & BSF_GLOBAL)
8279 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
8280 else
8281 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8282 }
8283 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 8284 {
b8871f35
L
8285 if (type != STT_TLS)
8286 {
8287 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
8288 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
8289 ? STT_COMMON : STT_OBJECT);
8290 else
8291 type = ((flags & BSF_ELF_COMMON) != 0
8292 ? STT_COMMON : STT_OBJECT);
8293 }
8294 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 8295 }
079e9a2f
AM
8296 else if (bfd_is_und_section (syms[idx]->section))
8297 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
8298 ? STB_WEAK
8299 : STB_GLOBAL),
8300 type);
8301 else if (flags & BSF_FILE)
8302 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
8303 else
8304 {
8305 int bind = STB_LOCAL;
252b5132 8306
079e9a2f
AM
8307 if (flags & BSF_LOCAL)
8308 bind = STB_LOCAL;
3e7a7d11
NC
8309 else if (flags & BSF_GNU_UNIQUE)
8310 bind = STB_GNU_UNIQUE;
079e9a2f
AM
8311 else if (flags & BSF_WEAK)
8312 bind = STB_WEAK;
8313 else if (flags & BSF_GLOBAL)
8314 bind = STB_GLOBAL;
252b5132 8315
079e9a2f
AM
8316 sym.st_info = ELF_ST_INFO (bind, type);
8317 }
252b5132 8318
079e9a2f 8319 if (type_ptr != NULL)
35fc36a8
RS
8320 {
8321 sym.st_other = type_ptr->internal_elf_sym.st_other;
8322 sym.st_target_internal
8323 = type_ptr->internal_elf_sym.st_target_internal;
8324 }
079e9a2f 8325 else
35fc36a8
RS
8326 {
8327 sym.st_other = 0;
8328 sym.st_target_internal = 0;
8329 }
252b5132 8330
ef10c3ac
L
8331 idx++;
8332 symstrtab[idx].sym = sym;
8333 symstrtab[idx].dest_index = outbound_syms_index;
8334 symstrtab[idx].destshndx_index = outbound_shndx_index;
8335
8336 outbound_syms_index++;
9ad5cbcf 8337 if (outbound_shndx != NULL)
ef10c3ac
L
8338 outbound_shndx_index++;
8339 }
8340
8341 /* Finalize the .strtab section. */
8342 _bfd_elf_strtab_finalize (stt);
8343
8344 /* Swap out the .strtab section. */
8345 for (idx = 0; idx <= symcount; idx++)
8346 {
8347 struct elf_sym_strtab *elfsym = &symstrtab[idx];
8348 if (elfsym->sym.st_name == (unsigned long) -1)
8349 elfsym->sym.st_name = 0;
8350 else
8351 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
8352 elfsym->sym.st_name);
8353 bed->s->swap_symbol_out (abfd, &elfsym->sym,
8354 (outbound_syms
8355 + (elfsym->dest_index
8356 * bed->s->sizeof_sym)),
8357 (outbound_shndx
8358 + (elfsym->destshndx_index
8359 * sizeof (Elf_External_Sym_Shndx))));
079e9a2f 8360 }
ef10c3ac 8361 free (symstrtab);
252b5132 8362
079e9a2f 8363 *sttp = stt;
ef10c3ac 8364 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
079e9a2f 8365 symstrtab_hdr->sh_type = SHT_STRTAB;
84865015 8366 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
079e9a2f
AM
8367 symstrtab_hdr->sh_addr = 0;
8368 symstrtab_hdr->sh_entsize = 0;
8369 symstrtab_hdr->sh_link = 0;
8370 symstrtab_hdr->sh_info = 0;
8371 symstrtab_hdr->sh_addralign = 1;
252b5132 8372
b34976b6 8373 return TRUE;
252b5132
RH
8374}
8375
8376/* Return the number of bytes required to hold the symtab vector.
8377
8378 Note that we base it on the count plus 1, since we will null terminate
8379 the vector allocated based on this size. However, the ELF symbol table
8380 always has a dummy entry as symbol #0, so it ends up even. */
8381
8382long
217aa764 8383_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132 8384{
3a551c7a 8385 bfd_size_type symcount;
252b5132
RH
8386 long symtab_size;
8387 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
8388
8389 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
3a551c7a
AM
8390 if (symcount >= LONG_MAX / sizeof (asymbol *))
8391 {
8392 bfd_set_error (bfd_error_file_too_big);
8393 return -1;
8394 }
b99d1833
AM
8395 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8396 if (symcount > 0)
8397 symtab_size -= sizeof (asymbol *);
252b5132
RH
8398
8399 return symtab_size;
8400}
8401
8402long
217aa764 8403_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132 8404{
3a551c7a 8405 bfd_size_type symcount;
252b5132
RH
8406 long symtab_size;
8407 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
8408
8409 if (elf_dynsymtab (abfd) == 0)
8410 {
8411 bfd_set_error (bfd_error_invalid_operation);
8412 return -1;
8413 }
8414
8415 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
3a551c7a
AM
8416 if (symcount >= LONG_MAX / sizeof (asymbol *))
8417 {
8418 bfd_set_error (bfd_error_file_too_big);
8419 return -1;
8420 }
b99d1833
AM
8421 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8422 if (symcount > 0)
8423 symtab_size -= sizeof (asymbol *);
252b5132
RH
8424
8425 return symtab_size;
8426}
8427
8428long
217aa764
AM
8429_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
8430 sec_ptr asect)
252b5132 8431{
242a1159 8432#if SIZEOF_LONG == SIZEOF_INT
7a6e0d89
AM
8433 if (asect->reloc_count >= LONG_MAX / sizeof (arelent *))
8434 {
8435 bfd_set_error (bfd_error_file_too_big);
8436 return -1;
8437 }
242a1159 8438#endif
252b5132
RH
8439 return (asect->reloc_count + 1) * sizeof (arelent *);
8440}
8441
8442/* Canonicalize the relocs. */
8443
8444long
217aa764
AM
8445_bfd_elf_canonicalize_reloc (bfd *abfd,
8446 sec_ptr section,
8447 arelent **relptr,
8448 asymbol **symbols)
252b5132
RH
8449{
8450 arelent *tblptr;
8451 unsigned int i;
9c5bfbb7 8452 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 8453
b34976b6 8454 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
8455 return -1;
8456
8457 tblptr = section->relocation;
8458 for (i = 0; i < section->reloc_count; i++)
8459 *relptr++ = tblptr++;
8460
8461 *relptr = NULL;
8462
8463 return section->reloc_count;
8464}
8465
8466long
6cee3f79 8467_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 8468{
9c5bfbb7 8469 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 8470 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
8471
8472 if (symcount >= 0)
ed48ec2e 8473 abfd->symcount = symcount;
252b5132
RH
8474 return symcount;
8475}
8476
8477long
217aa764
AM
8478_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
8479 asymbol **allocation)
252b5132 8480{
9c5bfbb7 8481 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 8482 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
8483
8484 if (symcount >= 0)
ed48ec2e 8485 abfd->dynsymcount = symcount;
1f70368c 8486 return symcount;
252b5132
RH
8487}
8488
8615f3f2
AM
8489/* Return the size required for the dynamic reloc entries. Any loadable
8490 section that was actually installed in the BFD, and has type SHT_REL
8491 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
8492 dynamic reloc section. */
252b5132
RH
8493
8494long
217aa764 8495_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132 8496{
3a551c7a 8497 bfd_size_type count;
252b5132
RH
8498 asection *s;
8499
8500 if (elf_dynsymtab (abfd) == 0)
8501 {
8502 bfd_set_error (bfd_error_invalid_operation);
8503 return -1;
8504 }
8505
3a551c7a 8506 count = 1;
252b5132 8507 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 8508 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
8509 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8510 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
3a551c7a
AM
8511 {
8512 count += s->size / elf_section_data (s)->this_hdr.sh_entsize;
8513 if (count > LONG_MAX / sizeof (arelent *))
8514 {
8515 bfd_set_error (bfd_error_file_too_big);
8516 return -1;
8517 }
8518 }
8519 return count * sizeof (arelent *);
252b5132
RH
8520}
8521
8615f3f2
AM
8522/* Canonicalize the dynamic relocation entries. Note that we return the
8523 dynamic relocations as a single block, although they are actually
8524 associated with particular sections; the interface, which was
8525 designed for SunOS style shared libraries, expects that there is only
8526 one set of dynamic relocs. Any loadable section that was actually
8527 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8528 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
8529
8530long
217aa764
AM
8531_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
8532 arelent **storage,
8533 asymbol **syms)
252b5132 8534{
217aa764 8535 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
8536 asection *s;
8537 long ret;
8538
8539 if (elf_dynsymtab (abfd) == 0)
8540 {
8541 bfd_set_error (bfd_error_invalid_operation);
8542 return -1;
8543 }
8544
8545 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
8546 ret = 0;
8547 for (s = abfd->sections; s != NULL; s = s->next)
8548 {
266b05cf 8549 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
8550 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8551 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8552 {
8553 arelent *p;
8554 long count, i;
8555
b34976b6 8556 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 8557 return -1;
eea6121a 8558 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
8559 p = s->relocation;
8560 for (i = 0; i < count; i++)
8561 *storage++ = p++;
8562 ret += count;
8563 }
8564 }
8565
8566 *storage = NULL;
8567
8568 return ret;
8569}
8570\f
8571/* Read in the version information. */
8572
b34976b6 8573bfd_boolean
fc0e6df6 8574_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
8575{
8576 bfd_byte *contents = NULL;
fc0e6df6 8577 unsigned int freeidx = 0;
1f4361a7 8578 size_t amt;
fc0e6df6
PB
8579
8580 if (elf_dynverref (abfd) != 0)
8581 {
8582 Elf_Internal_Shdr *hdr;
8583 Elf_External_Verneed *everneed;
8584 Elf_Internal_Verneed *iverneed;
8585 unsigned int i;
d0fb9a8d 8586 bfd_byte *contents_end;
fc0e6df6
PB
8587
8588 hdr = &elf_tdata (abfd)->dynverref_hdr;
8589
bd61e135
AM
8590 if (hdr->sh_info == 0
8591 || hdr->sh_info > hdr->sh_size / sizeof (Elf_External_Verneed))
d0fb9a8d 8592 {
dc1e8a47 8593 error_return_bad_verref:
4eca0228 8594 _bfd_error_handler
871b3ab2 8595 (_("%pB: .gnu.version_r invalid entry"), abfd);
601a03ba 8596 bfd_set_error (bfd_error_bad_value);
dc1e8a47 8597 error_return_verref:
d0fb9a8d
JJ
8598 elf_tdata (abfd)->verref = NULL;
8599 elf_tdata (abfd)->cverrefs = 0;
8600 goto error_return;
8601 }
601a03ba 8602
2bb3687b
AM
8603 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8604 goto error_return_verref;
8605 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8606 if (contents == NULL)
d0fb9a8d 8607 goto error_return_verref;
fc0e6df6 8608
1f4361a7
AM
8609 if (_bfd_mul_overflow (hdr->sh_info, sizeof (Elf_Internal_Verneed), &amt))
8610 {
8611 bfd_set_error (bfd_error_file_too_big);
8612 goto error_return_verref;
8613 }
8614 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *) bfd_alloc (abfd, amt);
601a03ba 8615 if (elf_tdata (abfd)->verref == NULL)
d0fb9a8d
JJ
8616 goto error_return_verref;
8617
8618 BFD_ASSERT (sizeof (Elf_External_Verneed)
8619 == sizeof (Elf_External_Vernaux));
8620 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
8621 everneed = (Elf_External_Verneed *) contents;
8622 iverneed = elf_tdata (abfd)->verref;
8623 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8624 {
8625 Elf_External_Vernaux *evernaux;
8626 Elf_Internal_Vernaux *ivernaux;
8627 unsigned int j;
8628
8629 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8630
8631 iverneed->vn_bfd = abfd;
8632
8633 iverneed->vn_filename =
8634 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8635 iverneed->vn_file);
8636 if (iverneed->vn_filename == NULL)
601a03ba 8637 goto error_return_bad_verref;
fc0e6df6 8638
d0fb9a8d
JJ
8639 if (iverneed->vn_cnt == 0)
8640 iverneed->vn_auxptr = NULL;
8641 else
8642 {
1f4361a7
AM
8643 if (_bfd_mul_overflow (iverneed->vn_cnt,
8644 sizeof (Elf_Internal_Vernaux), &amt))
8645 {
8646 bfd_set_error (bfd_error_file_too_big);
8647 goto error_return_verref;
8648 }
a50b1753 8649 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
1f4361a7 8650 bfd_alloc (abfd, amt);
d0fb9a8d
JJ
8651 if (iverneed->vn_auxptr == NULL)
8652 goto error_return_verref;
8653 }
8654
8655 if (iverneed->vn_aux
8656 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8657 goto error_return_bad_verref;
fc0e6df6
PB
8658
8659 evernaux = ((Elf_External_Vernaux *)
8660 ((bfd_byte *) everneed + iverneed->vn_aux));
8661 ivernaux = iverneed->vn_auxptr;
8662 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8663 {
8664 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8665
8666 ivernaux->vna_nodename =
8667 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8668 ivernaux->vna_name);
8669 if (ivernaux->vna_nodename == NULL)
601a03ba 8670 goto error_return_bad_verref;
fc0e6df6 8671
25ff461f
AM
8672 if (ivernaux->vna_other > freeidx)
8673 freeidx = ivernaux->vna_other;
8674
8675 ivernaux->vna_nextptr = NULL;
8676 if (ivernaux->vna_next == 0)
8677 {
8678 iverneed->vn_cnt = j + 1;
8679 break;
8680 }
fc0e6df6
PB
8681 if (j + 1 < iverneed->vn_cnt)
8682 ivernaux->vna_nextptr = ivernaux + 1;
fc0e6df6 8683
d0fb9a8d
JJ
8684 if (ivernaux->vna_next
8685 > (size_t) (contents_end - (bfd_byte *) evernaux))
601a03ba 8686 goto error_return_bad_verref;
d0fb9a8d 8687
fc0e6df6
PB
8688 evernaux = ((Elf_External_Vernaux *)
8689 ((bfd_byte *) evernaux + ivernaux->vna_next));
fc0e6df6
PB
8690 }
8691
25ff461f
AM
8692 iverneed->vn_nextref = NULL;
8693 if (iverneed->vn_next == 0)
8694 break;
fc0e6df6
PB
8695 if (i + 1 < hdr->sh_info)
8696 iverneed->vn_nextref = iverneed + 1;
fc0e6df6 8697
d0fb9a8d
JJ
8698 if (iverneed->vn_next
8699 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8700 goto error_return_bad_verref;
d0fb9a8d 8701
fc0e6df6
PB
8702 everneed = ((Elf_External_Verneed *)
8703 ((bfd_byte *) everneed + iverneed->vn_next));
8704 }
25ff461f 8705 elf_tdata (abfd)->cverrefs = i;
fc0e6df6
PB
8706
8707 free (contents);
8708 contents = NULL;
8709 }
252b5132
RH
8710
8711 if (elf_dynverdef (abfd) != 0)
8712 {
8713 Elf_Internal_Shdr *hdr;
8714 Elf_External_Verdef *everdef;
8715 Elf_Internal_Verdef *iverdef;
f631889e
UD
8716 Elf_Internal_Verdef *iverdefarr;
8717 Elf_Internal_Verdef iverdefmem;
252b5132 8718 unsigned int i;
062e2358 8719 unsigned int maxidx;
d0fb9a8d 8720 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
8721
8722 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8723
601a03ba
AM
8724 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
8725 {
8726 error_return_bad_verdef:
4eca0228 8727 _bfd_error_handler
871b3ab2 8728 (_("%pB: .gnu.version_d invalid entry"), abfd);
601a03ba
AM
8729 bfd_set_error (bfd_error_bad_value);
8730 error_return_verdef:
8731 elf_tdata (abfd)->verdef = NULL;
8732 elf_tdata (abfd)->cverdefs = 0;
8733 goto error_return;
8734 }
8735
2bb3687b 8736 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
601a03ba 8737 goto error_return_verdef;
2bb3687b
AM
8738 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8739 if (contents == NULL)
601a03ba 8740 goto error_return_verdef;
d0fb9a8d
JJ
8741
8742 BFD_ASSERT (sizeof (Elf_External_Verdef)
8743 >= sizeof (Elf_External_Verdaux));
8744 contents_end_def = contents + hdr->sh_size
8745 - sizeof (Elf_External_Verdef);
8746 contents_end_aux = contents + hdr->sh_size
8747 - sizeof (Elf_External_Verdaux);
8748
f631889e
UD
8749 /* We know the number of entries in the section but not the maximum
8750 index. Therefore we have to run through all entries and find
8751 the maximum. */
252b5132 8752 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
8753 maxidx = 0;
8754 for (i = 0; i < hdr->sh_info; ++i)
8755 {
8756 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8757
601a03ba
AM
8758 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
8759 goto error_return_bad_verdef;
062e2358
AM
8760 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
8761 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 8762
25ff461f
AM
8763 if (iverdefmem.vd_next == 0)
8764 break;
8765
d0fb9a8d
JJ
8766 if (iverdefmem.vd_next
8767 > (size_t) (contents_end_def - (bfd_byte *) everdef))
601a03ba 8768 goto error_return_bad_verdef;
d0fb9a8d 8769
f631889e
UD
8770 everdef = ((Elf_External_Verdef *)
8771 ((bfd_byte *) everdef + iverdefmem.vd_next));
8772 }
8773
fc0e6df6
PB
8774 if (default_imported_symver)
8775 {
8776 if (freeidx > maxidx)
8777 maxidx = ++freeidx;
8778 else
8779 freeidx = ++maxidx;
8780 }
1f4361a7
AM
8781 if (_bfd_mul_overflow (maxidx, sizeof (Elf_Internal_Verdef), &amt))
8782 {
8783 bfd_set_error (bfd_error_file_too_big);
8784 goto error_return_verdef;
8785 }
8786 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
f631889e 8787 if (elf_tdata (abfd)->verdef == NULL)
601a03ba 8788 goto error_return_verdef;
f631889e
UD
8789
8790 elf_tdata (abfd)->cverdefs = maxidx;
8791
8792 everdef = (Elf_External_Verdef *) contents;
8793 iverdefarr = elf_tdata (abfd)->verdef;
8794 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
8795 {
8796 Elf_External_Verdaux *everdaux;
8797 Elf_Internal_Verdaux *iverdaux;
8798 unsigned int j;
8799
f631889e
UD
8800 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8801
d0fb9a8d 8802 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
601a03ba 8803 goto error_return_bad_verdef;
d0fb9a8d 8804
f631889e 8805 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
595bce75 8806 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
252b5132
RH
8807
8808 iverdef->vd_bfd = abfd;
8809
d0fb9a8d
JJ
8810 if (iverdef->vd_cnt == 0)
8811 iverdef->vd_auxptr = NULL;
8812 else
8813 {
1f4361a7
AM
8814 if (_bfd_mul_overflow (iverdef->vd_cnt,
8815 sizeof (Elf_Internal_Verdaux), &amt))
8816 {
8817 bfd_set_error (bfd_error_file_too_big);
8818 goto error_return_verdef;
8819 }
a50b1753 8820 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
1f4361a7 8821 bfd_alloc (abfd, amt);
d0fb9a8d
JJ
8822 if (iverdef->vd_auxptr == NULL)
8823 goto error_return_verdef;
8824 }
8825
8826 if (iverdef->vd_aux
8827 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
601a03ba 8828 goto error_return_bad_verdef;
252b5132
RH
8829
8830 everdaux = ((Elf_External_Verdaux *)
8831 ((bfd_byte *) everdef + iverdef->vd_aux));
8832 iverdaux = iverdef->vd_auxptr;
8833 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
8834 {
8835 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
8836
8837 iverdaux->vda_nodename =
8838 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8839 iverdaux->vda_name);
8840 if (iverdaux->vda_nodename == NULL)
601a03ba 8841 goto error_return_bad_verdef;
252b5132 8842
25ff461f
AM
8843 iverdaux->vda_nextptr = NULL;
8844 if (iverdaux->vda_next == 0)
8845 {
8846 iverdef->vd_cnt = j + 1;
8847 break;
8848 }
252b5132
RH
8849 if (j + 1 < iverdef->vd_cnt)
8850 iverdaux->vda_nextptr = iverdaux + 1;
252b5132 8851
d0fb9a8d
JJ
8852 if (iverdaux->vda_next
8853 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
601a03ba 8854 goto error_return_bad_verdef;
d0fb9a8d 8855
252b5132
RH
8856 everdaux = ((Elf_External_Verdaux *)
8857 ((bfd_byte *) everdaux + iverdaux->vda_next));
8858 }
8859
595bce75 8860 iverdef->vd_nodename = NULL;
d0fb9a8d
JJ
8861 if (iverdef->vd_cnt)
8862 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 8863
25ff461f
AM
8864 iverdef->vd_nextdef = NULL;
8865 if (iverdef->vd_next == 0)
8866 break;
d0fb9a8d 8867 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132 8868 iverdef->vd_nextdef = iverdef + 1;
252b5132
RH
8869
8870 everdef = ((Elf_External_Verdef *)
8871 ((bfd_byte *) everdef + iverdef->vd_next));
8872 }
8873
8874 free (contents);
8875 contents = NULL;
8876 }
fc0e6df6 8877 else if (default_imported_symver)
252b5132 8878 {
fc0e6df6
PB
8879 if (freeidx < 3)
8880 freeidx = 3;
8881 else
8882 freeidx++;
252b5132 8883
1f4361a7
AM
8884 if (_bfd_mul_overflow (freeidx, sizeof (Elf_Internal_Verdef), &amt))
8885 {
8886 bfd_set_error (bfd_error_file_too_big);
8887 goto error_return;
8888 }
8889 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
fc0e6df6 8890 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
8891 goto error_return;
8892
fc0e6df6
PB
8893 elf_tdata (abfd)->cverdefs = freeidx;
8894 }
252b5132 8895
fc0e6df6
PB
8896 /* Create a default version based on the soname. */
8897 if (default_imported_symver)
8898 {
8899 Elf_Internal_Verdef *iverdef;
8900 Elf_Internal_Verdaux *iverdaux;
252b5132 8901
5bb3703f 8902 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
252b5132 8903
fc0e6df6
PB
8904 iverdef->vd_version = VER_DEF_CURRENT;
8905 iverdef->vd_flags = 0;
8906 iverdef->vd_ndx = freeidx;
8907 iverdef->vd_cnt = 1;
252b5132 8908
fc0e6df6 8909 iverdef->vd_bfd = abfd;
252b5132 8910
fc0e6df6
PB
8911 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
8912 if (iverdef->vd_nodename == NULL)
d0fb9a8d 8913 goto error_return_verdef;
fc0e6df6 8914 iverdef->vd_nextdef = NULL;
601a03ba
AM
8915 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
8916 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
d0fb9a8d
JJ
8917 if (iverdef->vd_auxptr == NULL)
8918 goto error_return_verdef;
252b5132 8919
fc0e6df6
PB
8920 iverdaux = iverdef->vd_auxptr;
8921 iverdaux->vda_nodename = iverdef->vd_nodename;
252b5132
RH
8922 }
8923
b34976b6 8924 return TRUE;
252b5132
RH
8925
8926 error_return:
5ed6aba4 8927 if (contents != NULL)
252b5132 8928 free (contents);
b34976b6 8929 return FALSE;
252b5132
RH
8930}
8931\f
8932asymbol *
217aa764 8933_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
8934{
8935 elf_symbol_type *newsym;
8936
7a6e0d89 8937 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof (*newsym));
252b5132
RH
8938 if (!newsym)
8939 return NULL;
201159ec
NC
8940 newsym->symbol.the_bfd = abfd;
8941 return &newsym->symbol;
252b5132
RH
8942}
8943
8944void
217aa764
AM
8945_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
8946 asymbol *symbol,
8947 symbol_info *ret)
252b5132
RH
8948{
8949 bfd_symbol_info (symbol, ret);
8950}
8951
8952/* Return whether a symbol name implies a local symbol. Most targets
8953 use this function for the is_local_label_name entry point, but some
8954 override it. */
8955
b34976b6 8956bfd_boolean
217aa764
AM
8957_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
8958 const char *name)
252b5132
RH
8959{
8960 /* Normal local symbols start with ``.L''. */
8961 if (name[0] == '.' && name[1] == 'L')
b34976b6 8962 return TRUE;
252b5132
RH
8963
8964 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
8965 DWARF debugging symbols starting with ``..''. */
8966 if (name[0] == '.' && name[1] == '.')
b34976b6 8967 return TRUE;
252b5132
RH
8968
8969 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
8970 emitting DWARF debugging output. I suspect this is actually a
8971 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
8972 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
8973 underscore to be emitted on some ELF targets). For ease of use,
8974 we treat such symbols as local. */
8975 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 8976 return TRUE;
252b5132 8977
b1fa9dd6
NC
8978 /* Treat assembler generated fake symbols, dollar local labels and
8979 forward-backward labels (aka local labels) as locals.
8980 These labels have the form:
8981
07d6d2b8 8982 L0^A.* (fake symbols)
b1fa9dd6
NC
8983
8984 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
8985
8986 Versions which start with .L will have already been matched above,
8987 so we only need to match the rest. */
8988 if (name[0] == 'L' && ISDIGIT (name[1]))
8989 {
8990 bfd_boolean ret = FALSE;
8991 const char * p;
8992 char c;
8993
8994 for (p = name + 2; (c = *p); p++)
8995 {
8996 if (c == 1 || c == 2)
8997 {
8998 if (c == 1 && p == name + 2)
8999 /* A fake symbol. */
9000 return TRUE;
9001
9002 /* FIXME: We are being paranoid here and treating symbols like
9003 L0^Bfoo as if there were non-local, on the grounds that the
9004 assembler will never generate them. But can any symbol
9005 containing an ASCII value in the range 1-31 ever be anything
9006 other than some kind of local ? */
9007 ret = TRUE;
9008 }
9009
9010 if (! ISDIGIT (c))
9011 {
9012 ret = FALSE;
9013 break;
9014 }
9015 }
9016 return ret;
9017 }
ffa54770 9018
b34976b6 9019 return FALSE;
252b5132
RH
9020}
9021
9022alent *
217aa764
AM
9023_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
9024 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
9025{
9026 abort ();
9027 return NULL;
9028}
9029
b34976b6 9030bfd_boolean
217aa764
AM
9031_bfd_elf_set_arch_mach (bfd *abfd,
9032 enum bfd_architecture arch,
9033 unsigned long machine)
252b5132
RH
9034{
9035 /* If this isn't the right architecture for this backend, and this
9036 isn't the generic backend, fail. */
9037 if (arch != get_elf_backend_data (abfd)->arch
9038 && arch != bfd_arch_unknown
9039 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 9040 return FALSE;
252b5132
RH
9041
9042 return bfd_default_set_arch_mach (abfd, arch, machine);
9043}
9044
d1fad7c6
NC
9045/* Find the nearest line to a particular section and offset,
9046 for error reporting. */
9047
b34976b6 9048bfd_boolean
217aa764 9049_bfd_elf_find_nearest_line (bfd *abfd,
217aa764 9050 asymbol **symbols,
fb167eb2 9051 asection *section,
217aa764
AM
9052 bfd_vma offset,
9053 const char **filename_ptr,
9054 const char **functionname_ptr,
fb167eb2
AM
9055 unsigned int *line_ptr,
9056 unsigned int *discriminator_ptr)
d1fad7c6 9057{
b34976b6 9058 bfd_boolean found;
d1fad7c6 9059
fb167eb2 9060 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
4e8a9624 9061 filename_ptr, functionname_ptr,
fb167eb2 9062 line_ptr, discriminator_ptr,
9defd221 9063 dwarf_debug_sections,
e7679060
AM
9064 &elf_tdata (abfd)->dwarf2_find_line_info))
9065 return TRUE;
9066
9067 if (_bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
9068 filename_ptr, functionname_ptr, line_ptr))
d1fad7c6
NC
9069 {
9070 if (!*functionname_ptr)
e00e8198
AM
9071 _bfd_elf_find_function (abfd, symbols, section, offset,
9072 *filename_ptr ? NULL : filename_ptr,
9073 functionname_ptr);
b34976b6 9074 return TRUE;
d1fad7c6
NC
9075 }
9076
9077 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
9078 &found, filename_ptr,
9079 functionname_ptr, line_ptr,
9080 &elf_tdata (abfd)->line_info))
b34976b6 9081 return FALSE;
dc43ada5 9082 if (found && (*functionname_ptr || *line_ptr))
b34976b6 9083 return TRUE;
d1fad7c6
NC
9084
9085 if (symbols == NULL)
b34976b6 9086 return FALSE;
d1fad7c6 9087
e00e8198
AM
9088 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
9089 filename_ptr, functionname_ptr))
b34976b6 9090 return FALSE;
d1fad7c6 9091
252b5132 9092 *line_ptr = 0;
b34976b6 9093 return TRUE;
252b5132
RH
9094}
9095
5420f73d
L
9096/* Find the line for a symbol. */
9097
9098bfd_boolean
9099_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
9100 const char **filename_ptr, unsigned int *line_ptr)
9b8d1a36 9101{
fb167eb2
AM
9102 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
9103 filename_ptr, NULL, line_ptr, NULL,
9defd221 9104 dwarf_debug_sections,
fb167eb2 9105 &elf_tdata (abfd)->dwarf2_find_line_info);
5420f73d
L
9106}
9107
4ab527b0
FF
9108/* After a call to bfd_find_nearest_line, successive calls to
9109 bfd_find_inliner_info can be used to get source information about
9110 each level of function inlining that terminated at the address
9111 passed to bfd_find_nearest_line. Currently this is only supported
9112 for DWARF2 with appropriate DWARF3 extensions. */
9113
9114bfd_boolean
9115_bfd_elf_find_inliner_info (bfd *abfd,
9116 const char **filename_ptr,
9117 const char **functionname_ptr,
9118 unsigned int *line_ptr)
9119{
9120 bfd_boolean found;
9121 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
9122 functionname_ptr, line_ptr,
9123 & elf_tdata (abfd)->dwarf2_find_line_info);
9124 return found;
9125}
9126
252b5132 9127int
a6b96beb 9128_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 9129{
8ded5a0f
AM
9130 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9131 int ret = bed->s->sizeof_ehdr;
252b5132 9132
0e1862bb 9133 if (!bfd_link_relocatable (info))
8ded5a0f 9134 {
12bd6957 9135 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 9136
62d7a5f6
AM
9137 if (phdr_size == (bfd_size_type) -1)
9138 {
9139 struct elf_segment_map *m;
9140
9141 phdr_size = 0;
12bd6957 9142 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62d7a5f6 9143 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 9144
62d7a5f6
AM
9145 if (phdr_size == 0)
9146 phdr_size = get_program_header_size (abfd, info);
9147 }
8ded5a0f 9148
12bd6957 9149 elf_program_header_size (abfd) = phdr_size;
8ded5a0f
AM
9150 ret += phdr_size;
9151 }
9152
252b5132
RH
9153 return ret;
9154}
9155
b34976b6 9156bfd_boolean
217aa764
AM
9157_bfd_elf_set_section_contents (bfd *abfd,
9158 sec_ptr section,
0f867abe 9159 const void *location,
217aa764
AM
9160 file_ptr offset,
9161 bfd_size_type count)
252b5132
RH
9162{
9163 Elf_Internal_Shdr *hdr;
1b6aeedb 9164 file_ptr pos;
252b5132
RH
9165
9166 if (! abfd->output_has_begun
217aa764 9167 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 9168 return FALSE;
252b5132 9169
0ce398f1
L
9170 if (!count)
9171 return TRUE;
9172
252b5132 9173 hdr = &elf_section_data (section)->this_hdr;
0ce398f1
L
9174 if (hdr->sh_offset == (file_ptr) -1)
9175 {
1ff6de03
NA
9176 if (bfd_section_is_ctf (section))
9177 /* Nothing to do with this section: the contents are generated
9178 later. */
9179 return TRUE;
9180
0ce398f1
L
9181 /* We must compress this section. Write output to the buffer. */
9182 unsigned char *contents = hdr->contents;
9183 if ((offset + count) > hdr->sh_size
9184 || (section->flags & SEC_ELF_COMPRESS) == 0
9185 || contents == NULL)
9186 abort ();
9187 memcpy (contents + offset, location, count);
9188 return TRUE;
9189 }
dc810e39
AM
9190 pos = hdr->sh_offset + offset;
9191 if (bfd_seek (abfd, pos, SEEK_SET) != 0
9192 || bfd_bwrite (location, count, abfd) != count)
b34976b6 9193 return FALSE;
252b5132 9194
b34976b6 9195 return TRUE;
252b5132
RH
9196}
9197
f3185997 9198bfd_boolean
217aa764
AM
9199_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
9200 arelent *cache_ptr ATTRIBUTE_UNUSED,
9201 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
9202{
9203 abort ();
f3185997 9204 return FALSE;
252b5132
RH
9205}
9206
252b5132
RH
9207/* Try to convert a non-ELF reloc into an ELF one. */
9208
b34976b6 9209bfd_boolean
217aa764 9210_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 9211{
c044fabd 9212 /* Check whether we really have an ELF howto. */
252b5132
RH
9213
9214 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
9215 {
9216 bfd_reloc_code_real_type code;
9217 reloc_howto_type *howto;
9218
9219 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 9220 equivalent ELF reloc. */
252b5132
RH
9221
9222 if (areloc->howto->pc_relative)
9223 {
9224 switch (areloc->howto->bitsize)
9225 {
9226 case 8:
9227 code = BFD_RELOC_8_PCREL;
9228 break;
9229 case 12:
9230 code = BFD_RELOC_12_PCREL;
9231 break;
9232 case 16:
9233 code = BFD_RELOC_16_PCREL;
9234 break;
9235 case 24:
9236 code = BFD_RELOC_24_PCREL;
9237 break;
9238 case 32:
9239 code = BFD_RELOC_32_PCREL;
9240 break;
9241 case 64:
9242 code = BFD_RELOC_64_PCREL;
9243 break;
9244 default:
9245 goto fail;
9246 }
9247
9248 howto = bfd_reloc_type_lookup (abfd, code);
9249
94698d01 9250 if (howto && areloc->howto->pcrel_offset != howto->pcrel_offset)
252b5132
RH
9251 {
9252 if (howto->pcrel_offset)
9253 areloc->addend += areloc->address;
9254 else
9255 areloc->addend -= areloc->address; /* addend is unsigned!! */
9256 }
9257 }
9258 else
9259 {
9260 switch (areloc->howto->bitsize)
9261 {
9262 case 8:
9263 code = BFD_RELOC_8;
9264 break;
9265 case 14:
9266 code = BFD_RELOC_14;
9267 break;
9268 case 16:
9269 code = BFD_RELOC_16;
9270 break;
9271 case 26:
9272 code = BFD_RELOC_26;
9273 break;
9274 case 32:
9275 code = BFD_RELOC_32;
9276 break;
9277 case 64:
9278 code = BFD_RELOC_64;
9279 break;
9280 default:
9281 goto fail;
9282 }
9283
9284 howto = bfd_reloc_type_lookup (abfd, code);
9285 }
9286
9287 if (howto)
9288 areloc->howto = howto;
9289 else
9290 goto fail;
9291 }
9292
b34976b6 9293 return TRUE;
252b5132
RH
9294
9295 fail:
0aa13fee
AM
9296 /* xgettext:c-format */
9297 _bfd_error_handler (_("%pB: %s unsupported"),
9298 abfd, areloc->howto->name);
9aea1e31 9299 bfd_set_error (bfd_error_sorry);
b34976b6 9300 return FALSE;
252b5132
RH
9301}
9302
b34976b6 9303bfd_boolean
217aa764 9304_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132 9305{
d9071b0c
TG
9306 struct elf_obj_tdata *tdata = elf_tdata (abfd);
9307 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
252b5132 9308 {
c0355132 9309 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 9310 _bfd_elf_strtab_free (elf_shstrtab (abfd));
d9071b0c 9311 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
252b5132
RH
9312 }
9313
9314 return _bfd_generic_close_and_cleanup (abfd);
9315}
9316
9317/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
9318 in the relocation's offset. Thus we cannot allow any sort of sanity
9319 range-checking to interfere. There is nothing else to do in processing
9320 this reloc. */
9321
9322bfd_reloc_status_type
217aa764
AM
9323_bfd_elf_rel_vtable_reloc_fn
9324 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 9325 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
9326 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
9327 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
9328{
9329 return bfd_reloc_ok;
9330}
252b5132
RH
9331\f
9332/* Elf core file support. Much of this only works on native
9333 toolchains, since we rely on knowing the
9334 machine-dependent procfs structure in order to pick
c044fabd 9335 out details about the corefile. */
252b5132
RH
9336
9337#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
9338/* Needed for new procfs interface on sparc-solaris. */
9339# define _STRUCTURED_PROC 1
252b5132
RH
9340# include <sys/procfs.h>
9341#endif
9342
261b8d08
PA
9343/* Return a PID that identifies a "thread" for threaded cores, or the
9344 PID of the main process for non-threaded cores. */
252b5132
RH
9345
9346static int
217aa764 9347elfcore_make_pid (bfd *abfd)
252b5132 9348{
261b8d08
PA
9349 int pid;
9350
228e534f 9351 pid = elf_tdata (abfd)->core->lwpid;
261b8d08 9352 if (pid == 0)
228e534f 9353 pid = elf_tdata (abfd)->core->pid;
261b8d08
PA
9354
9355 return pid;
252b5132
RH
9356}
9357
252b5132
RH
9358/* If there isn't a section called NAME, make one, using
9359 data from SECT. Note, this function will generate a
9360 reference to NAME, so you shouldn't deallocate or
c044fabd 9361 overwrite it. */
252b5132 9362
b34976b6 9363static bfd_boolean
217aa764 9364elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 9365{
c044fabd 9366 asection *sect2;
252b5132
RH
9367
9368 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 9369 return TRUE;
252b5132 9370
117ed4f8 9371 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 9372 if (sect2 == NULL)
b34976b6 9373 return FALSE;
252b5132 9374
eea6121a 9375 sect2->size = sect->size;
252b5132 9376 sect2->filepos = sect->filepos;
252b5132 9377 sect2->alignment_power = sect->alignment_power;
b34976b6 9378 return TRUE;
252b5132
RH
9379}
9380
bb0082d6
AM
9381/* Create a pseudosection containing SIZE bytes at FILEPOS. This
9382 actually creates up to two pseudosections:
9383 - For the single-threaded case, a section named NAME, unless
9384 such a section already exists.
9385 - For the multi-threaded case, a section named "NAME/PID", where
9386 PID is elfcore_make_pid (abfd).
24d3e51b 9387 Both pseudosections have identical contents. */
b34976b6 9388bfd_boolean
217aa764
AM
9389_bfd_elfcore_make_pseudosection (bfd *abfd,
9390 char *name,
9391 size_t size,
9392 ufile_ptr filepos)
bb0082d6
AM
9393{
9394 char buf[100];
9395 char *threaded_name;
d4c88bbb 9396 size_t len;
bb0082d6
AM
9397 asection *sect;
9398
9399 /* Build the section name. */
9400
9401 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 9402 len = strlen (buf) + 1;
a50b1753 9403 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 9404 if (threaded_name == NULL)
b34976b6 9405 return FALSE;
d4c88bbb 9406 memcpy (threaded_name, buf, len);
bb0082d6 9407
117ed4f8
AM
9408 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
9409 SEC_HAS_CONTENTS);
bb0082d6 9410 if (sect == NULL)
b34976b6 9411 return FALSE;
eea6121a 9412 sect->size = size;
bb0082d6 9413 sect->filepos = filepos;
bb0082d6
AM
9414 sect->alignment_power = 2;
9415
936e320b 9416 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
9417}
9418
58e07198
CZ
9419static bfd_boolean
9420elfcore_make_auxv_note_section (bfd *abfd, Elf_Internal_Note *note,
9421 size_t offs)
9422{
9423 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9424 SEC_HAS_CONTENTS);
9425
9426 if (sect == NULL)
9427 return FALSE;
9428
9429 sect->size = note->descsz - offs;
9430 sect->filepos = note->descpos + offs;
9431 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9432
9433 return TRUE;
9434}
9435
252b5132 9436/* prstatus_t exists on:
4a938328 9437 solaris 2.5+
252b5132
RH
9438 linux 2.[01] + glibc
9439 unixware 4.2
9440*/
9441
9442#if defined (HAVE_PRSTATUS_T)
a7b97311 9443
b34976b6 9444static bfd_boolean
217aa764 9445elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 9446{
eea6121a 9447 size_t size;
7ee38065 9448 int offset;
252b5132 9449
4a938328
MS
9450 if (note->descsz == sizeof (prstatus_t))
9451 {
9452 prstatus_t prstat;
252b5132 9453
eea6121a 9454 size = sizeof (prstat.pr_reg);
7ee38065 9455 offset = offsetof (prstatus_t, pr_reg);
4a938328 9456 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 9457
fa49d224
NC
9458 /* Do not overwrite the core signal if it
9459 has already been set by another thread. */
228e534f
AM
9460 if (elf_tdata (abfd)->core->signal == 0)
9461 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9462 if (elf_tdata (abfd)->core->pid == 0)
9463 elf_tdata (abfd)->core->pid = prstat.pr_pid;
252b5132 9464
4a938328
MS
9465 /* pr_who exists on:
9466 solaris 2.5+
9467 unixware 4.2
9468 pr_who doesn't exist on:
9469 linux 2.[01]
9470 */
252b5132 9471#if defined (HAVE_PRSTATUS_T_PR_WHO)
228e534f 9472 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 9473#else
228e534f 9474 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
252b5132 9475#endif
4a938328 9476 }
7ee38065 9477#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
9478 else if (note->descsz == sizeof (prstatus32_t))
9479 {
9480 /* 64-bit host, 32-bit corefile */
9481 prstatus32_t prstat;
9482
eea6121a 9483 size = sizeof (prstat.pr_reg);
7ee38065 9484 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
9485 memcpy (&prstat, note->descdata, sizeof (prstat));
9486
fa49d224
NC
9487 /* Do not overwrite the core signal if it
9488 has already been set by another thread. */
228e534f
AM
9489 if (elf_tdata (abfd)->core->signal == 0)
9490 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9491 if (elf_tdata (abfd)->core->pid == 0)
9492 elf_tdata (abfd)->core->pid = prstat.pr_pid;
4a938328
MS
9493
9494 /* pr_who exists on:
9495 solaris 2.5+
9496 unixware 4.2
9497 pr_who doesn't exist on:
9498 linux 2.[01]
9499 */
7ee38065 9500#if defined (HAVE_PRSTATUS32_T_PR_WHO)
228e534f 9501 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 9502#else
228e534f 9503 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
4a938328
MS
9504#endif
9505 }
7ee38065 9506#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
9507 else
9508 {
9509 /* Fail - we don't know how to handle any other
9510 note size (ie. data object type). */
b34976b6 9511 return TRUE;
4a938328 9512 }
252b5132 9513
bb0082d6 9514 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 9515 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 9516 size, note->descpos + offset);
252b5132
RH
9517}
9518#endif /* defined (HAVE_PRSTATUS_T) */
9519
bb0082d6 9520/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 9521static bfd_boolean
217aa764
AM
9522elfcore_make_note_pseudosection (bfd *abfd,
9523 char *name,
9524 Elf_Internal_Note *note)
252b5132 9525{
936e320b
AM
9526 return _bfd_elfcore_make_pseudosection (abfd, name,
9527 note->descsz, note->descpos);
252b5132
RH
9528}
9529
ff08c6bb
JB
9530/* There isn't a consistent prfpregset_t across platforms,
9531 but it doesn't matter, because we don't have to pick this
c044fabd
KH
9532 data structure apart. */
9533
b34976b6 9534static bfd_boolean
217aa764 9535elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
9536{
9537 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9538}
9539
ff08c6bb 9540/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 9541 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 9542 literally. */
c044fabd 9543
b34976b6 9544static bfd_boolean
217aa764 9545elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
9546{
9547 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9548}
9549
4339cae0
L
9550/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9551 with a note type of NT_X86_XSTATE. Just include the whole note's
9552 contents literally. */
9553
9554static bfd_boolean
9555elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
9556{
9557 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
9558}
9559
97753bd5
AM
9560static bfd_boolean
9561elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
9562{
9563 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
9564}
9565
89eeb0bc
LM
9566static bfd_boolean
9567elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
9568{
9569 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
9570}
97753bd5 9571
cb2366c1
EBM
9572static bfd_boolean
9573elfcore_grok_ppc_tar (bfd *abfd, Elf_Internal_Note *note)
9574{
9575 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tar", note);
9576}
9577
9578static bfd_boolean
9579elfcore_grok_ppc_ppr (bfd *abfd, Elf_Internal_Note *note)
9580{
9581 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ppr", note);
9582}
9583
9584static bfd_boolean
9585elfcore_grok_ppc_dscr (bfd *abfd, Elf_Internal_Note *note)
9586{
9587 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-dscr", note);
9588}
9589
9590static bfd_boolean
9591elfcore_grok_ppc_ebb (bfd *abfd, Elf_Internal_Note *note)
9592{
9593 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ebb", note);
9594}
9595
9596static bfd_boolean
9597elfcore_grok_ppc_pmu (bfd *abfd, Elf_Internal_Note *note)
9598{
9599 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-pmu", note);
9600}
9601
9602static bfd_boolean
9603elfcore_grok_ppc_tm_cgpr (bfd *abfd, Elf_Internal_Note *note)
9604{
9605 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cgpr", note);
9606}
9607
9608static bfd_boolean
9609elfcore_grok_ppc_tm_cfpr (bfd *abfd, Elf_Internal_Note *note)
9610{
9611 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cfpr", note);
9612}
9613
9614static bfd_boolean
9615elfcore_grok_ppc_tm_cvmx (bfd *abfd, Elf_Internal_Note *note)
9616{
9617 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvmx", note);
9618}
9619
9620static bfd_boolean
9621elfcore_grok_ppc_tm_cvsx (bfd *abfd, Elf_Internal_Note *note)
9622{
9623 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvsx", note);
9624}
9625
9626static bfd_boolean
9627elfcore_grok_ppc_tm_spr (bfd *abfd, Elf_Internal_Note *note)
9628{
9629 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-spr", note);
9630}
9631
9632static bfd_boolean
9633elfcore_grok_ppc_tm_ctar (bfd *abfd, Elf_Internal_Note *note)
9634{
9635 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-ctar", note);
9636}
9637
9638static bfd_boolean
9639elfcore_grok_ppc_tm_cppr (bfd *abfd, Elf_Internal_Note *note)
9640{
9641 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cppr", note);
9642}
9643
9644static bfd_boolean
9645elfcore_grok_ppc_tm_cdscr (bfd *abfd, Elf_Internal_Note *note)
9646{
9647 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cdscr", note);
9648}
9649
0675e188
UW
9650static bfd_boolean
9651elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
9652{
9653 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
9654}
9655
d7eeb400
MS
9656static bfd_boolean
9657elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
9658{
9659 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
9660}
9661
9662static bfd_boolean
9663elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
9664{
9665 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
9666}
9667
9668static bfd_boolean
9669elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
9670{
9671 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
9672}
9673
9674static bfd_boolean
9675elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
9676{
9677 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
9678}
9679
9680static bfd_boolean
9681elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9682{
9683 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9684}
9685
355b81d9
UW
9686static bfd_boolean
9687elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9688{
9689 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9690}
9691
9692static bfd_boolean
9693elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9694{
9695 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9696}
9697
abb3f6cc
NC
9698static bfd_boolean
9699elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9700{
9701 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9702}
9703
4ef9f41a
AA
9704static bfd_boolean
9705elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
9706{
9707 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
9708}
9709
9710static bfd_boolean
9711elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
9712{
9713 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
9714}
9715
88ab90e8
AA
9716static bfd_boolean
9717elfcore_grok_s390_gs_cb (bfd *abfd, Elf_Internal_Note *note)
9718{
9719 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-cb", note);
9720}
9721
9722static bfd_boolean
9723elfcore_grok_s390_gs_bc (bfd *abfd, Elf_Internal_Note *note)
9724{
9725 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-bc", note);
9726}
9727
faa9a424
UW
9728static bfd_boolean
9729elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
9730{
9731 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
9732}
9733
652451f8
YZ
9734static bfd_boolean
9735elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
9736{
9737 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
9738}
9739
9740static bfd_boolean
9741elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
9742{
9743 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
9744}
9745
9746static bfd_boolean
9747elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
9748{
9749 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
9750}
9751
ad1cc4e4
AH
9752static bfd_boolean
9753elfcore_grok_aarch_sve (bfd *abfd, Elf_Internal_Note *note)
9754{
9755 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-sve", note);
9756}
9757
e6c3b5bf
AH
9758static bfd_boolean
9759elfcore_grok_aarch_pauth (bfd *abfd, Elf_Internal_Note *note)
9760{
9761 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-pauth", note);
9762}
9763
252b5132 9764#if defined (HAVE_PRPSINFO_T)
4a938328 9765typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 9766#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9767typedef prpsinfo32_t elfcore_psinfo32_t;
9768#endif
252b5132
RH
9769#endif
9770
9771#if defined (HAVE_PSINFO_T)
4a938328 9772typedef psinfo_t elfcore_psinfo_t;
7ee38065 9773#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9774typedef psinfo32_t elfcore_psinfo32_t;
9775#endif
252b5132
RH
9776#endif
9777
252b5132
RH
9778/* return a malloc'ed copy of a string at START which is at
9779 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 9780 the copy will always have a terminating '\0'. */
252b5132 9781
936e320b 9782char *
217aa764 9783_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 9784{
dc810e39 9785 char *dups;
a50b1753 9786 char *end = (char *) memchr (start, '\0', max);
dc810e39 9787 size_t len;
252b5132
RH
9788
9789 if (end == NULL)
9790 len = max;
9791 else
9792 len = end - start;
9793
a50b1753 9794 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 9795 if (dups == NULL)
252b5132
RH
9796 return NULL;
9797
dc810e39
AM
9798 memcpy (dups, start, len);
9799 dups[len] = '\0';
252b5132 9800
dc810e39 9801 return dups;
252b5132
RH
9802}
9803
bb0082d6 9804#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 9805static bfd_boolean
217aa764 9806elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 9807{
4a938328
MS
9808 if (note->descsz == sizeof (elfcore_psinfo_t))
9809 {
9810 elfcore_psinfo_t psinfo;
252b5132 9811
7ee38065 9812 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9813
335e41d4 9814#if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
228e534f 9815 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9816#endif
228e534f 9817 elf_tdata (abfd)->core->program
936e320b
AM
9818 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9819 sizeof (psinfo.pr_fname));
252b5132 9820
228e534f 9821 elf_tdata (abfd)->core->command
936e320b
AM
9822 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9823 sizeof (psinfo.pr_psargs));
4a938328 9824 }
7ee38065 9825#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
9826 else if (note->descsz == sizeof (elfcore_psinfo32_t))
9827 {
9828 /* 64-bit host, 32-bit corefile */
9829 elfcore_psinfo32_t psinfo;
9830
7ee38065 9831 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9832
335e41d4 9833#if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
228e534f 9834 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9835#endif
228e534f 9836 elf_tdata (abfd)->core->program
936e320b
AM
9837 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9838 sizeof (psinfo.pr_fname));
4a938328 9839
228e534f 9840 elf_tdata (abfd)->core->command
936e320b
AM
9841 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9842 sizeof (psinfo.pr_psargs));
4a938328
MS
9843 }
9844#endif
9845
9846 else
9847 {
9848 /* Fail - we don't know how to handle any other
9849 note size (ie. data object type). */
b34976b6 9850 return TRUE;
4a938328 9851 }
252b5132
RH
9852
9853 /* Note that for some reason, a spurious space is tacked
9854 onto the end of the args in some (at least one anyway)
c044fabd 9855 implementations, so strip it off if it exists. */
252b5132
RH
9856
9857 {
228e534f 9858 char *command = elf_tdata (abfd)->core->command;
252b5132
RH
9859 int n = strlen (command);
9860
9861 if (0 < n && command[n - 1] == ' ')
9862 command[n - 1] = '\0';
9863 }
9864
b34976b6 9865 return TRUE;
252b5132
RH
9866}
9867#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
9868
252b5132 9869#if defined (HAVE_PSTATUS_T)
b34976b6 9870static bfd_boolean
217aa764 9871elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 9872{
f572a39d
AM
9873 if (note->descsz == sizeof (pstatus_t)
9874#if defined (HAVE_PXSTATUS_T)
9875 || note->descsz == sizeof (pxstatus_t)
9876#endif
9877 )
4a938328
MS
9878 {
9879 pstatus_t pstat;
252b5132 9880
4a938328 9881 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9882
228e534f 9883 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328 9884 }
7ee38065 9885#if defined (HAVE_PSTATUS32_T)
4a938328
MS
9886 else if (note->descsz == sizeof (pstatus32_t))
9887 {
9888 /* 64-bit host, 32-bit corefile */
9889 pstatus32_t pstat;
252b5132 9890
4a938328 9891 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9892
228e534f 9893 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328
MS
9894 }
9895#endif
252b5132
RH
9896 /* Could grab some more details from the "representative"
9897 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 9898 NT_LWPSTATUS note, presumably. */
252b5132 9899
b34976b6 9900 return TRUE;
252b5132
RH
9901}
9902#endif /* defined (HAVE_PSTATUS_T) */
9903
252b5132 9904#if defined (HAVE_LWPSTATUS_T)
b34976b6 9905static bfd_boolean
217aa764 9906elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
9907{
9908 lwpstatus_t lwpstat;
9909 char buf[100];
c044fabd 9910 char *name;
d4c88bbb 9911 size_t len;
c044fabd 9912 asection *sect;
252b5132 9913
f572a39d
AM
9914 if (note->descsz != sizeof (lwpstat)
9915#if defined (HAVE_LWPXSTATUS_T)
9916 && note->descsz != sizeof (lwpxstatus_t)
9917#endif
9918 )
b34976b6 9919 return TRUE;
252b5132
RH
9920
9921 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
9922
228e534f 9923 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
a1504221
JB
9924 /* Do not overwrite the core signal if it has already been set by
9925 another thread. */
228e534f
AM
9926 if (elf_tdata (abfd)->core->signal == 0)
9927 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
252b5132 9928
c044fabd 9929 /* Make a ".reg/999" section. */
252b5132
RH
9930
9931 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 9932 len = strlen (buf) + 1;
217aa764 9933 name = bfd_alloc (abfd, len);
252b5132 9934 if (name == NULL)
b34976b6 9935 return FALSE;
d4c88bbb 9936 memcpy (name, buf, len);
252b5132 9937
117ed4f8 9938 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9939 if (sect == NULL)
b34976b6 9940 return FALSE;
252b5132
RH
9941
9942#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9943 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
9944 sect->filepos = note->descpos
9945 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
9946#endif
9947
9948#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 9949 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
9950 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
9951#endif
9952
252b5132
RH
9953 sect->alignment_power = 2;
9954
9955 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9956 return FALSE;
252b5132
RH
9957
9958 /* Make a ".reg2/999" section */
9959
9960 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 9961 len = strlen (buf) + 1;
217aa764 9962 name = bfd_alloc (abfd, len);
252b5132 9963 if (name == NULL)
b34976b6 9964 return FALSE;
d4c88bbb 9965 memcpy (name, buf, len);
252b5132 9966
117ed4f8 9967 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9968 if (sect == NULL)
b34976b6 9969 return FALSE;
252b5132
RH
9970
9971#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9972 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
9973 sect->filepos = note->descpos
9974 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
9975#endif
9976
9977#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 9978 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
9979 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
9980#endif
9981
252b5132
RH
9982 sect->alignment_power = 2;
9983
936e320b 9984 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
9985}
9986#endif /* defined (HAVE_LWPSTATUS_T) */
9987
b34976b6 9988static bfd_boolean
217aa764 9989elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
9990{
9991 char buf[30];
c044fabd 9992 char *name;
d4c88bbb 9993 size_t len;
c044fabd 9994 asection *sect;
4a6636fb
PA
9995 int type;
9996 int is_active_thread;
9997 bfd_vma base_addr;
16e9c715 9998
4a6636fb 9999 if (note->descsz < 728)
b34976b6 10000 return TRUE;
16e9c715 10001
4a6636fb
PA
10002 if (! CONST_STRNEQ (note->namedata, "win32"))
10003 return TRUE;
10004
10005 type = bfd_get_32 (abfd, note->descdata);
c044fabd 10006
4a6636fb 10007 switch (type)
16e9c715 10008 {
4a6636fb 10009 case 1 /* NOTE_INFO_PROCESS */:
228e534f 10010 /* FIXME: need to add ->core->command. */
4a6636fb 10011 /* process_info.pid */
228e534f 10012 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
4a6636fb 10013 /* process_info.signal */
228e534f 10014 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 10015 break;
16e9c715 10016
4a6636fb 10017 case 2 /* NOTE_INFO_THREAD */:
16e9c715 10018 /* Make a ".reg/999" section. */
4a6636fb
PA
10019 /* thread_info.tid */
10020 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 10021
d4c88bbb 10022 len = strlen (buf) + 1;
a50b1753 10023 name = (char *) bfd_alloc (abfd, len);
16e9c715 10024 if (name == NULL)
b34976b6 10025 return FALSE;
c044fabd 10026
d4c88bbb 10027 memcpy (name, buf, len);
16e9c715 10028
117ed4f8 10029 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 10030 if (sect == NULL)
b34976b6 10031 return FALSE;
c044fabd 10032
4a6636fb
PA
10033 /* sizeof (thread_info.thread_context) */
10034 sect->size = 716;
10035 /* offsetof (thread_info.thread_context) */
10036 sect->filepos = note->descpos + 12;
16e9c715
NC
10037 sect->alignment_power = 2;
10038
4a6636fb
PA
10039 /* thread_info.is_active_thread */
10040 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
10041
10042 if (is_active_thread)
16e9c715 10043 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 10044 return FALSE;
16e9c715
NC
10045 break;
10046
4a6636fb 10047 case 3 /* NOTE_INFO_MODULE */:
16e9c715 10048 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
10049 /* module_info.base_address */
10050 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 10051 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 10052
d4c88bbb 10053 len = strlen (buf) + 1;
a50b1753 10054 name = (char *) bfd_alloc (abfd, len);
16e9c715 10055 if (name == NULL)
b34976b6 10056 return FALSE;
c044fabd 10057
d4c88bbb 10058 memcpy (name, buf, len);
252b5132 10059
117ed4f8 10060 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 10061
16e9c715 10062 if (sect == NULL)
b34976b6 10063 return FALSE;
c044fabd 10064
eea6121a 10065 sect->size = note->descsz;
16e9c715 10066 sect->filepos = note->descpos;
16e9c715
NC
10067 sect->alignment_power = 2;
10068 break;
10069
10070 default:
b34976b6 10071 return TRUE;
16e9c715
NC
10072 }
10073
b34976b6 10074 return TRUE;
16e9c715 10075}
252b5132 10076
b34976b6 10077static bfd_boolean
217aa764 10078elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 10079{
9c5bfbb7 10080 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 10081
252b5132
RH
10082 switch (note->type)
10083 {
10084 default:
b34976b6 10085 return TRUE;
252b5132 10086
252b5132 10087 case NT_PRSTATUS:
bb0082d6
AM
10088 if (bed->elf_backend_grok_prstatus)
10089 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 10090 return TRUE;
bb0082d6 10091#if defined (HAVE_PRSTATUS_T)
252b5132 10092 return elfcore_grok_prstatus (abfd, note);
bb0082d6 10093#else
b34976b6 10094 return TRUE;
252b5132
RH
10095#endif
10096
10097#if defined (HAVE_PSTATUS_T)
10098 case NT_PSTATUS:
10099 return elfcore_grok_pstatus (abfd, note);
10100#endif
10101
10102#if defined (HAVE_LWPSTATUS_T)
10103 case NT_LWPSTATUS:
10104 return elfcore_grok_lwpstatus (abfd, note);
10105#endif
10106
10107 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
10108 return elfcore_grok_prfpreg (abfd, note);
10109
c044fabd 10110 case NT_WIN32PSTATUS:
16e9c715 10111 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 10112
c044fabd 10113 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
10114 if (note->namesz == 6
10115 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
10116 return elfcore_grok_prxfpreg (abfd, note);
10117 else
b34976b6 10118 return TRUE;
ff08c6bb 10119
4339cae0
L
10120 case NT_X86_XSTATE: /* Linux XSAVE extension */
10121 if (note->namesz == 6
10122 && strcmp (note->namedata, "LINUX") == 0)
10123 return elfcore_grok_xstatereg (abfd, note);
10124 else
10125 return TRUE;
10126
97753bd5
AM
10127 case NT_PPC_VMX:
10128 if (note->namesz == 6
10129 && strcmp (note->namedata, "LINUX") == 0)
10130 return elfcore_grok_ppc_vmx (abfd, note);
10131 else
10132 return TRUE;
10133
89eeb0bc
LM
10134 case NT_PPC_VSX:
10135 if (note->namesz == 6
07d6d2b8
AM
10136 && strcmp (note->namedata, "LINUX") == 0)
10137 return elfcore_grok_ppc_vsx (abfd, note);
89eeb0bc 10138 else
07d6d2b8 10139 return TRUE;
89eeb0bc 10140
cb2366c1
EBM
10141 case NT_PPC_TAR:
10142 if (note->namesz == 6
4b24dd1a
AM
10143 && strcmp (note->namedata, "LINUX") == 0)
10144 return elfcore_grok_ppc_tar (abfd, note);
cb2366c1 10145 else
4b24dd1a 10146 return TRUE;
cb2366c1
EBM
10147
10148 case NT_PPC_PPR:
10149 if (note->namesz == 6
4b24dd1a
AM
10150 && strcmp (note->namedata, "LINUX") == 0)
10151 return elfcore_grok_ppc_ppr (abfd, note);
cb2366c1 10152 else
4b24dd1a 10153 return TRUE;
cb2366c1
EBM
10154
10155 case NT_PPC_DSCR:
10156 if (note->namesz == 6
4b24dd1a
AM
10157 && strcmp (note->namedata, "LINUX") == 0)
10158 return elfcore_grok_ppc_dscr (abfd, note);
cb2366c1 10159 else
4b24dd1a 10160 return TRUE;
cb2366c1
EBM
10161
10162 case NT_PPC_EBB:
10163 if (note->namesz == 6
4b24dd1a
AM
10164 && strcmp (note->namedata, "LINUX") == 0)
10165 return elfcore_grok_ppc_ebb (abfd, note);
cb2366c1 10166 else
4b24dd1a 10167 return TRUE;
cb2366c1
EBM
10168
10169 case NT_PPC_PMU:
10170 if (note->namesz == 6
4b24dd1a
AM
10171 && strcmp (note->namedata, "LINUX") == 0)
10172 return elfcore_grok_ppc_pmu (abfd, note);
cb2366c1 10173 else
4b24dd1a 10174 return TRUE;
cb2366c1
EBM
10175
10176 case NT_PPC_TM_CGPR:
10177 if (note->namesz == 6
4b24dd1a
AM
10178 && strcmp (note->namedata, "LINUX") == 0)
10179 return elfcore_grok_ppc_tm_cgpr (abfd, note);
cb2366c1 10180 else
4b24dd1a 10181 return TRUE;
cb2366c1
EBM
10182
10183 case NT_PPC_TM_CFPR:
10184 if (note->namesz == 6
4b24dd1a
AM
10185 && strcmp (note->namedata, "LINUX") == 0)
10186 return elfcore_grok_ppc_tm_cfpr (abfd, note);
cb2366c1 10187 else
4b24dd1a 10188 return TRUE;
cb2366c1
EBM
10189
10190 case NT_PPC_TM_CVMX:
10191 if (note->namesz == 6
4b24dd1a
AM
10192 && strcmp (note->namedata, "LINUX") == 0)
10193 return elfcore_grok_ppc_tm_cvmx (abfd, note);
cb2366c1 10194 else
4b24dd1a 10195 return TRUE;
cb2366c1
EBM
10196
10197 case NT_PPC_TM_CVSX:
10198 if (note->namesz == 6
4b24dd1a
AM
10199 && strcmp (note->namedata, "LINUX") == 0)
10200 return elfcore_grok_ppc_tm_cvsx (abfd, note);
cb2366c1 10201 else
4b24dd1a 10202 return TRUE;
cb2366c1
EBM
10203
10204 case NT_PPC_TM_SPR:
10205 if (note->namesz == 6
4b24dd1a
AM
10206 && strcmp (note->namedata, "LINUX") == 0)
10207 return elfcore_grok_ppc_tm_spr (abfd, note);
cb2366c1 10208 else
4b24dd1a 10209 return TRUE;
cb2366c1
EBM
10210
10211 case NT_PPC_TM_CTAR:
10212 if (note->namesz == 6
4b24dd1a
AM
10213 && strcmp (note->namedata, "LINUX") == 0)
10214 return elfcore_grok_ppc_tm_ctar (abfd, note);
cb2366c1 10215 else
4b24dd1a 10216 return TRUE;
cb2366c1
EBM
10217
10218 case NT_PPC_TM_CPPR:
10219 if (note->namesz == 6
4b24dd1a
AM
10220 && strcmp (note->namedata, "LINUX") == 0)
10221 return elfcore_grok_ppc_tm_cppr (abfd, note);
cb2366c1 10222 else
4b24dd1a 10223 return TRUE;
cb2366c1
EBM
10224
10225 case NT_PPC_TM_CDSCR:
10226 if (note->namesz == 6
4b24dd1a
AM
10227 && strcmp (note->namedata, "LINUX") == 0)
10228 return elfcore_grok_ppc_tm_cdscr (abfd, note);
cb2366c1 10229 else
4b24dd1a 10230 return TRUE;
cb2366c1 10231
0675e188
UW
10232 case NT_S390_HIGH_GPRS:
10233 if (note->namesz == 6
07d6d2b8
AM
10234 && strcmp (note->namedata, "LINUX") == 0)
10235 return elfcore_grok_s390_high_gprs (abfd, note);
0675e188 10236 else
07d6d2b8 10237 return TRUE;
0675e188 10238
d7eeb400
MS
10239 case NT_S390_TIMER:
10240 if (note->namesz == 6
07d6d2b8
AM
10241 && strcmp (note->namedata, "LINUX") == 0)
10242 return elfcore_grok_s390_timer (abfd, note);
d7eeb400 10243 else
07d6d2b8 10244 return TRUE;
d7eeb400
MS
10245
10246 case NT_S390_TODCMP:
10247 if (note->namesz == 6
07d6d2b8
AM
10248 && strcmp (note->namedata, "LINUX") == 0)
10249 return elfcore_grok_s390_todcmp (abfd, note);
d7eeb400 10250 else
07d6d2b8 10251 return TRUE;
d7eeb400
MS
10252
10253 case NT_S390_TODPREG:
10254 if (note->namesz == 6
07d6d2b8
AM
10255 && strcmp (note->namedata, "LINUX") == 0)
10256 return elfcore_grok_s390_todpreg (abfd, note);
d7eeb400 10257 else
07d6d2b8 10258 return TRUE;
d7eeb400
MS
10259
10260 case NT_S390_CTRS:
10261 if (note->namesz == 6
07d6d2b8
AM
10262 && strcmp (note->namedata, "LINUX") == 0)
10263 return elfcore_grok_s390_ctrs (abfd, note);
d7eeb400 10264 else
07d6d2b8 10265 return TRUE;
d7eeb400
MS
10266
10267 case NT_S390_PREFIX:
10268 if (note->namesz == 6
07d6d2b8
AM
10269 && strcmp (note->namedata, "LINUX") == 0)
10270 return elfcore_grok_s390_prefix (abfd, note);
d7eeb400 10271 else
07d6d2b8 10272 return TRUE;
d7eeb400 10273
355b81d9
UW
10274 case NT_S390_LAST_BREAK:
10275 if (note->namesz == 6
07d6d2b8
AM
10276 && strcmp (note->namedata, "LINUX") == 0)
10277 return elfcore_grok_s390_last_break (abfd, note);
355b81d9 10278 else
07d6d2b8 10279 return TRUE;
355b81d9
UW
10280
10281 case NT_S390_SYSTEM_CALL:
10282 if (note->namesz == 6
07d6d2b8
AM
10283 && strcmp (note->namedata, "LINUX") == 0)
10284 return elfcore_grok_s390_system_call (abfd, note);
355b81d9 10285 else
07d6d2b8 10286 return TRUE;
355b81d9 10287
abb3f6cc
NC
10288 case NT_S390_TDB:
10289 if (note->namesz == 6
07d6d2b8
AM
10290 && strcmp (note->namedata, "LINUX") == 0)
10291 return elfcore_grok_s390_tdb (abfd, note);
abb3f6cc 10292 else
07d6d2b8 10293 return TRUE;
abb3f6cc 10294
4ef9f41a
AA
10295 case NT_S390_VXRS_LOW:
10296 if (note->namesz == 6
10297 && strcmp (note->namedata, "LINUX") == 0)
10298 return elfcore_grok_s390_vxrs_low (abfd, note);
10299 else
10300 return TRUE;
10301
10302 case NT_S390_VXRS_HIGH:
10303 if (note->namesz == 6
10304 && strcmp (note->namedata, "LINUX") == 0)
10305 return elfcore_grok_s390_vxrs_high (abfd, note);
10306 else
10307 return TRUE;
10308
88ab90e8
AA
10309 case NT_S390_GS_CB:
10310 if (note->namesz == 6
10311 && strcmp (note->namedata, "LINUX") == 0)
8fe09d74 10312 return elfcore_grok_s390_gs_cb (abfd, note);
88ab90e8
AA
10313 else
10314 return TRUE;
10315
10316 case NT_S390_GS_BC:
10317 if (note->namesz == 6
10318 && strcmp (note->namedata, "LINUX") == 0)
8fe09d74 10319 return elfcore_grok_s390_gs_bc (abfd, note);
88ab90e8
AA
10320 else
10321 return TRUE;
10322
faa9a424
UW
10323 case NT_ARM_VFP:
10324 if (note->namesz == 6
10325 && strcmp (note->namedata, "LINUX") == 0)
10326 return elfcore_grok_arm_vfp (abfd, note);
10327 else
10328 return TRUE;
10329
652451f8
YZ
10330 case NT_ARM_TLS:
10331 if (note->namesz == 6
10332 && strcmp (note->namedata, "LINUX") == 0)
10333 return elfcore_grok_aarch_tls (abfd, note);
10334 else
10335 return TRUE;
10336
10337 case NT_ARM_HW_BREAK:
10338 if (note->namesz == 6
10339 && strcmp (note->namedata, "LINUX") == 0)
10340 return elfcore_grok_aarch_hw_break (abfd, note);
10341 else
10342 return TRUE;
10343
10344 case NT_ARM_HW_WATCH:
10345 if (note->namesz == 6
10346 && strcmp (note->namedata, "LINUX") == 0)
10347 return elfcore_grok_aarch_hw_watch (abfd, note);
10348 else
10349 return TRUE;
10350
ad1cc4e4
AH
10351 case NT_ARM_SVE:
10352 if (note->namesz == 6
10353 && strcmp (note->namedata, "LINUX") == 0)
10354 return elfcore_grok_aarch_sve (abfd, note);
10355 else
10356 return TRUE;
10357
e6c3b5bf
AH
10358 case NT_ARM_PAC_MASK:
10359 if (note->namesz == 6
10360 && strcmp (note->namedata, "LINUX") == 0)
10361 return elfcore_grok_aarch_pauth (abfd, note);
10362 else
10363 return TRUE;
10364
252b5132
RH
10365 case NT_PRPSINFO:
10366 case NT_PSINFO:
bb0082d6
AM
10367 if (bed->elf_backend_grok_psinfo)
10368 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 10369 return TRUE;
bb0082d6 10370#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 10371 return elfcore_grok_psinfo (abfd, note);
bb0082d6 10372#else
b34976b6 10373 return TRUE;
252b5132 10374#endif
3333a7c3
RM
10375
10376 case NT_AUXV:
58e07198 10377 return elfcore_make_auxv_note_section (abfd, note, 0);
9015683b 10378
451b7c33
TT
10379 case NT_FILE:
10380 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
10381 note);
10382
9015683b
TT
10383 case NT_SIGINFO:
10384 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
10385 note);
5b2c414d 10386
252b5132
RH
10387 }
10388}
10389
718175fa
JK
10390static bfd_boolean
10391elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
10392{
c74f7d1c 10393 struct bfd_build_id* build_id;
30e8ee25
AM
10394
10395 if (note->descsz == 0)
10396 return FALSE;
10397
c74f7d1c
JT
10398 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
10399 if (build_id == NULL)
718175fa
JK
10400 return FALSE;
10401
c74f7d1c
JT
10402 build_id->size = note->descsz;
10403 memcpy (build_id->data, note->descdata, note->descsz);
10404 abfd->build_id = build_id;
718175fa
JK
10405
10406 return TRUE;
10407}
10408
10409static bfd_boolean
10410elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
10411{
10412 switch (note->type)
10413 {
10414 default:
10415 return TRUE;
10416
46bed679
L
10417 case NT_GNU_PROPERTY_TYPE_0:
10418 return _bfd_elf_parse_gnu_properties (abfd, note);
10419
718175fa
JK
10420 case NT_GNU_BUILD_ID:
10421 return elfobj_grok_gnu_build_id (abfd, note);
10422 }
10423}
10424
e21e5835
NC
10425static bfd_boolean
10426elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
10427{
10428 struct sdt_note *cur =
7a6e0d89
AM
10429 (struct sdt_note *) bfd_alloc (abfd,
10430 sizeof (struct sdt_note) + note->descsz);
e21e5835
NC
10431
10432 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
10433 cur->size = (bfd_size_type) note->descsz;
10434 memcpy (cur->data, note->descdata, note->descsz);
10435
10436 elf_tdata (abfd)->sdt_note_head = cur;
10437
10438 return TRUE;
10439}
10440
10441static bfd_boolean
10442elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
10443{
10444 switch (note->type)
10445 {
10446 case NT_STAPSDT:
10447 return elfobj_grok_stapsdt_note_1 (abfd, note);
10448
10449 default:
10450 return TRUE;
10451 }
10452}
10453
aa1ed4a9
JB
10454static bfd_boolean
10455elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
10456{
10457 size_t offset;
10458
b5430a3c 10459 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
aa1ed4a9 10460 {
b5430a3c 10461 case ELFCLASS32:
0064d223
JB
10462 if (note->descsz < 108)
10463 return FALSE;
aa1ed4a9
JB
10464 break;
10465
b5430a3c 10466 case ELFCLASS64:
0064d223
JB
10467 if (note->descsz < 120)
10468 return FALSE;
aa1ed4a9
JB
10469 break;
10470
10471 default:
10472 return FALSE;
10473 }
10474
0064d223
JB
10475 /* Check for version 1 in pr_version. */
10476 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10477 return FALSE;
80a04378 10478
0064d223
JB
10479 offset = 4;
10480
10481 /* Skip over pr_psinfosz. */
b5430a3c 10482 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
0064d223
JB
10483 offset += 4;
10484 else
10485 {
10486 offset += 4; /* Padding before pr_psinfosz. */
10487 offset += 8;
10488 }
10489
aa1ed4a9
JB
10490 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
10491 elf_tdata (abfd)->core->program
10492 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
10493 offset += 17;
10494
10495 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
10496 elf_tdata (abfd)->core->command
10497 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
0064d223
JB
10498 offset += 81;
10499
10500 /* Padding before pr_pid. */
10501 offset += 2;
10502
10503 /* The pr_pid field was added in version "1a". */
10504 if (note->descsz < offset + 4)
10505 return TRUE;
10506
10507 elf_tdata (abfd)->core->pid
10508 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
aa1ed4a9
JB
10509
10510 return TRUE;
10511}
10512
10513static bfd_boolean
10514elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
10515{
10516 size_t offset;
10517 size_t size;
24d3e51b 10518 size_t min_size;
aa1ed4a9 10519
24d3e51b
NC
10520 /* Compute offset of pr_getregsz, skipping over pr_statussz.
10521 Also compute minimum size of this note. */
b5430a3c 10522 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
aa1ed4a9 10523 {
b5430a3c 10524 case ELFCLASS32:
24d3e51b
NC
10525 offset = 4 + 4;
10526 min_size = offset + (4 * 2) + 4 + 4 + 4;
aa1ed4a9
JB
10527 break;
10528
b5430a3c 10529 case ELFCLASS64:
24d3e51b
NC
10530 offset = 4 + 4 + 8; /* Includes padding before pr_statussz. */
10531 min_size = offset + (8 * 2) + 4 + 4 + 4 + 4;
aa1ed4a9
JB
10532 break;
10533
10534 default:
10535 return FALSE;
10536 }
10537
24d3e51b
NC
10538 if (note->descsz < min_size)
10539 return FALSE;
10540
10541 /* Check for version 1 in pr_version. */
10542 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10543 return FALSE;
aa1ed4a9 10544
24d3e51b
NC
10545 /* Extract size of pr_reg from pr_gregsetsz. */
10546 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
b5430a3c 10547 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
24d3e51b
NC
10548 {
10549 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10550 offset += 4 * 2;
10551 }
b5430a3c 10552 else
24d3e51b
NC
10553 {
10554 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
10555 offset += 8 * 2;
10556 }
aa1ed4a9 10557
24d3e51b 10558 /* Skip over pr_osreldate. */
aa1ed4a9
JB
10559 offset += 4;
10560
24d3e51b 10561 /* Read signal from pr_cursig. */
aa1ed4a9
JB
10562 if (elf_tdata (abfd)->core->signal == 0)
10563 elf_tdata (abfd)->core->signal
10564 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10565 offset += 4;
10566
24d3e51b 10567 /* Read TID from pr_pid. */
aa1ed4a9
JB
10568 elf_tdata (abfd)->core->lwpid
10569 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10570 offset += 4;
10571
24d3e51b 10572 /* Padding before pr_reg. */
b5430a3c 10573 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS64)
aa1ed4a9
JB
10574 offset += 4;
10575
24d3e51b
NC
10576 /* Make sure that there is enough data remaining in the note. */
10577 if ((note->descsz - offset) < size)
10578 return FALSE;
10579
aa1ed4a9
JB
10580 /* Make a ".reg/999" section and a ".reg" section. */
10581 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
10582 size, note->descpos + offset);
10583}
10584
10585static bfd_boolean
10586elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
10587{
544c67cd
JB
10588 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10589
aa1ed4a9
JB
10590 switch (note->type)
10591 {
10592 case NT_PRSTATUS:
544c67cd
JB
10593 if (bed->elf_backend_grok_freebsd_prstatus)
10594 if ((*bed->elf_backend_grok_freebsd_prstatus) (abfd, note))
10595 return TRUE;
aa1ed4a9
JB
10596 return elfcore_grok_freebsd_prstatus (abfd, note);
10597
10598 case NT_FPREGSET:
10599 return elfcore_grok_prfpreg (abfd, note);
10600
10601 case NT_PRPSINFO:
10602 return elfcore_grok_freebsd_psinfo (abfd, note);
10603
10604 case NT_FREEBSD_THRMISC:
10605 if (note->namesz == 8)
10606 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
10607 else
10608 return TRUE;
10609
ddb2bbcf
JB
10610 case NT_FREEBSD_PROCSTAT_PROC:
10611 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.proc",
10612 note);
10613
10614 case NT_FREEBSD_PROCSTAT_FILES:
10615 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.files",
10616 note);
10617
10618 case NT_FREEBSD_PROCSTAT_VMMAP:
10619 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.vmmap",
10620 note);
10621
3350c5f5 10622 case NT_FREEBSD_PROCSTAT_AUXV:
58e07198 10623 return elfcore_make_auxv_note_section (abfd, note, 4);
3350c5f5 10624
aa1ed4a9
JB
10625 case NT_X86_XSTATE:
10626 if (note->namesz == 8)
10627 return elfcore_grok_xstatereg (abfd, note);
10628 else
10629 return TRUE;
10630
e6f3b9c3
JB
10631 case NT_FREEBSD_PTLWPINFO:
10632 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.lwpinfo",
10633 note);
10634
6d5be5d6
JB
10635 case NT_ARM_VFP:
10636 return elfcore_grok_arm_vfp (abfd, note);
10637
aa1ed4a9
JB
10638 default:
10639 return TRUE;
10640 }
10641}
10642
b34976b6 10643static bfd_boolean
217aa764 10644elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
10645{
10646 char *cp;
10647
10648 cp = strchr (note->namedata, '@');
10649 if (cp != NULL)
10650 {
d2b64500 10651 *lwpidp = atoi(cp + 1);
b34976b6 10652 return TRUE;
50b2bdb7 10653 }
b34976b6 10654 return FALSE;
50b2bdb7
AM
10655}
10656
b34976b6 10657static bfd_boolean
217aa764 10658elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 10659{
80a04378
NC
10660 if (note->descsz <= 0x7c + 31)
10661 return FALSE;
10662
50b2bdb7 10663 /* Signal number at offset 0x08. */
228e534f 10664 elf_tdata (abfd)->core->signal
50b2bdb7
AM
10665 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10666
10667 /* Process ID at offset 0x50. */
228e534f 10668 elf_tdata (abfd)->core->pid
50b2bdb7
AM
10669 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
10670
10671 /* Command name at 0x7c (max 32 bytes, including nul). */
228e534f 10672 elf_tdata (abfd)->core->command
50b2bdb7
AM
10673 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
10674
7720ba9f
MK
10675 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
10676 note);
50b2bdb7
AM
10677}
10678
b34976b6 10679static bfd_boolean
217aa764 10680elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
10681{
10682 int lwp;
10683
10684 if (elfcore_netbsd_get_lwpid (note, &lwp))
228e534f 10685 elf_tdata (abfd)->core->lwpid = lwp;
50b2bdb7 10686
58e07198 10687 switch (note->type)
50b2bdb7 10688 {
58e07198 10689 case NT_NETBSDCORE_PROCINFO:
50b2bdb7 10690 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
10691 find this note before any of the others, which is fine,
10692 since the kernel writes this note out first when it
10693 creates a core file. */
50b2bdb7 10694 return elfcore_grok_netbsd_procinfo (abfd, note);
58e07198
CZ
10695#ifdef NT_NETBSDCORE_AUXV
10696 case NT_NETBSDCORE_AUXV:
10697 /* NetBSD-specific Elf Auxiliary Vector data. */
10698 return elfcore_make_auxv_note_section (abfd, note, 4);
10699#endif
10700 default:
10701 break;
50b2bdb7
AM
10702 }
10703
58e07198 10704 /* As of March 2017 there are no other machine-independent notes
b4db1224
JT
10705 defined for NetBSD core files. If the note type is less
10706 than the start of the machine-dependent note types, we don't
10707 understand it. */
47d9a591 10708
b4db1224 10709 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 10710 return TRUE;
50b2bdb7
AM
10711
10712
10713 switch (bfd_get_arch (abfd))
10714 {
08a40648
AM
10715 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
10716 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
10717
10718 case bfd_arch_alpha:
10719 case bfd_arch_sparc:
10720 switch (note->type)
08a40648
AM
10721 {
10722 case NT_NETBSDCORE_FIRSTMACH+0:
10723 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 10724
08a40648
AM
10725 case NT_NETBSDCORE_FIRSTMACH+2:
10726 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 10727
08a40648
AM
10728 default:
10729 return TRUE;
10730 }
50b2bdb7 10731
58e07198
CZ
10732 /* On SuperH, PT_GETREGS == mach+3 and PT_GETFPREGS == mach+5.
10733 There's also old PT___GETREGS40 == mach + 1 for old reg
10734 structure which lacks GBR. */
10735
10736 case bfd_arch_sh:
10737 switch (note->type)
10738 {
10739 case NT_NETBSDCORE_FIRSTMACH+3:
10740 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10741
10742 case NT_NETBSDCORE_FIRSTMACH+5:
10743 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10744
10745 default:
10746 return TRUE;
10747 }
10748
08a40648
AM
10749 /* On all other arch's, PT_GETREGS == mach+1 and
10750 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
10751
10752 default:
10753 switch (note->type)
08a40648
AM
10754 {
10755 case NT_NETBSDCORE_FIRSTMACH+1:
10756 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 10757
08a40648
AM
10758 case NT_NETBSDCORE_FIRSTMACH+3:
10759 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 10760
08a40648
AM
10761 default:
10762 return TRUE;
10763 }
50b2bdb7
AM
10764 }
10765 /* NOTREACHED */
10766}
10767
67cc5033
MK
10768static bfd_boolean
10769elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10770{
80a04378
NC
10771 if (note->descsz <= 0x48 + 31)
10772 return FALSE;
10773
67cc5033 10774 /* Signal number at offset 0x08. */
228e534f 10775 elf_tdata (abfd)->core->signal
67cc5033
MK
10776 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10777
10778 /* Process ID at offset 0x20. */
228e534f 10779 elf_tdata (abfd)->core->pid
67cc5033
MK
10780 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
10781
10782 /* Command name at 0x48 (max 32 bytes, including nul). */
228e534f 10783 elf_tdata (abfd)->core->command
67cc5033
MK
10784 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
10785
10786 return TRUE;
10787}
10788
10789static bfd_boolean
10790elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
10791{
10792 if (note->type == NT_OPENBSD_PROCINFO)
10793 return elfcore_grok_openbsd_procinfo (abfd, note);
10794
10795 if (note->type == NT_OPENBSD_REGS)
10796 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10797
10798 if (note->type == NT_OPENBSD_FPREGS)
10799 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10800
10801 if (note->type == NT_OPENBSD_XFPREGS)
10802 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
10803
10804 if (note->type == NT_OPENBSD_AUXV)
58e07198 10805 return elfcore_make_auxv_note_section (abfd, note, 0);
67cc5033
MK
10806
10807 if (note->type == NT_OPENBSD_WCOOKIE)
10808 {
10809 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
10810 SEC_HAS_CONTENTS);
10811
10812 if (sect == NULL)
10813 return FALSE;
10814 sect->size = note->descsz;
10815 sect->filepos = note->descpos;
10816 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10817
10818 return TRUE;
10819 }
10820
10821 return TRUE;
10822}
10823
07c6e936 10824static bfd_boolean
d3fd4074 10825elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
10826{
10827 void *ddata = note->descdata;
10828 char buf[100];
10829 char *name;
10830 asection *sect;
f8843e87
AM
10831 short sig;
10832 unsigned flags;
07c6e936 10833
80a04378
NC
10834 if (note->descsz < 16)
10835 return FALSE;
10836
07c6e936 10837 /* nto_procfs_status 'pid' field is at offset 0. */
228e534f 10838 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
07c6e936 10839
f8843e87
AM
10840 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
10841 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
10842
10843 /* nto_procfs_status 'flags' field is at offset 8. */
10844 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
10845
10846 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
10847 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
10848 {
228e534f
AM
10849 elf_tdata (abfd)->core->signal = sig;
10850 elf_tdata (abfd)->core->lwpid = *tid;
f8843e87 10851 }
07c6e936 10852
f8843e87
AM
10853 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
10854 do not come from signals so we make sure we set the current
10855 thread just in case. */
10856 if (flags & 0x00000080)
228e534f 10857 elf_tdata (abfd)->core->lwpid = *tid;
07c6e936
NC
10858
10859 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 10860 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 10861
a50b1753 10862 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10863 if (name == NULL)
10864 return FALSE;
10865 strcpy (name, buf);
10866
117ed4f8 10867 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10868 if (sect == NULL)
10869 return FALSE;
10870
07d6d2b8
AM
10871 sect->size = note->descsz;
10872 sect->filepos = note->descpos;
07c6e936
NC
10873 sect->alignment_power = 2;
10874
10875 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
10876}
10877
10878static bfd_boolean
d69f560c
KW
10879elfcore_grok_nto_regs (bfd *abfd,
10880 Elf_Internal_Note *note,
d3fd4074 10881 long tid,
d69f560c 10882 char *base)
07c6e936
NC
10883{
10884 char buf[100];
10885 char *name;
10886 asection *sect;
10887
d69f560c 10888 /* Make a "(base)/%d" section. */
d3fd4074 10889 sprintf (buf, "%s/%ld", base, tid);
07c6e936 10890
a50b1753 10891 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10892 if (name == NULL)
10893 return FALSE;
10894 strcpy (name, buf);
10895
117ed4f8 10896 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10897 if (sect == NULL)
10898 return FALSE;
10899
07d6d2b8
AM
10900 sect->size = note->descsz;
10901 sect->filepos = note->descpos;
07c6e936
NC
10902 sect->alignment_power = 2;
10903
f8843e87 10904 /* This is the current thread. */
228e534f 10905 if (elf_tdata (abfd)->core->lwpid == tid)
d69f560c 10906 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
10907
10908 return TRUE;
07c6e936
NC
10909}
10910
10911#define BFD_QNT_CORE_INFO 7
10912#define BFD_QNT_CORE_STATUS 8
10913#define BFD_QNT_CORE_GREG 9
10914#define BFD_QNT_CORE_FPREG 10
10915
10916static bfd_boolean
217aa764 10917elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
10918{
10919 /* Every GREG section has a STATUS section before it. Store the
811072d8 10920 tid from the previous call to pass down to the next gregs
07c6e936 10921 function. */
d3fd4074 10922 static long tid = 1;
07c6e936
NC
10923
10924 switch (note->type)
10925 {
d69f560c
KW
10926 case BFD_QNT_CORE_INFO:
10927 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
10928 case BFD_QNT_CORE_STATUS:
10929 return elfcore_grok_nto_status (abfd, note, &tid);
10930 case BFD_QNT_CORE_GREG:
10931 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
10932 case BFD_QNT_CORE_FPREG:
10933 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
10934 default:
10935 return TRUE;
07c6e936
NC
10936 }
10937}
10938
b15fa79e
AM
10939static bfd_boolean
10940elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
10941{
10942 char *name;
10943 asection *sect;
10944 size_t len;
10945
10946 /* Use note name as section name. */
10947 len = note->namesz;
a50b1753 10948 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
10949 if (name == NULL)
10950 return FALSE;
10951 memcpy (name, note->namedata, len);
10952 name[len - 1] = '\0';
10953
10954 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10955 if (sect == NULL)
10956 return FALSE;
10957
07d6d2b8
AM
10958 sect->size = note->descsz;
10959 sect->filepos = note->descpos;
b15fa79e
AM
10960 sect->alignment_power = 1;
10961
10962 return TRUE;
10963}
10964
7c76fa91
MS
10965/* Function: elfcore_write_note
10966
47d9a591 10967 Inputs:
a39f3346 10968 buffer to hold note, and current size of buffer
7c76fa91
MS
10969 name of note
10970 type of note
10971 data for note
10972 size of data for note
10973
a39f3346
AM
10974 Writes note to end of buffer. ELF64 notes are written exactly as
10975 for ELF32, despite the current (as of 2006) ELF gabi specifying
10976 that they ought to have 8-byte namesz and descsz field, and have
10977 8-byte alignment. Other writers, eg. Linux kernel, do the same.
10978
7c76fa91 10979 Return:
a39f3346 10980 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
10981
10982char *
a39f3346 10983elfcore_write_note (bfd *abfd,
217aa764 10984 char *buf,
a39f3346 10985 int *bufsiz,
217aa764 10986 const char *name,
a39f3346 10987 int type,
217aa764 10988 const void *input,
a39f3346 10989 int size)
7c76fa91
MS
10990{
10991 Elf_External_Note *xnp;
d4c88bbb 10992 size_t namesz;
d4c88bbb 10993 size_t newspace;
a39f3346 10994 char *dest;
7c76fa91 10995
d4c88bbb 10996 namesz = 0;
d4c88bbb 10997 if (name != NULL)
a39f3346 10998 namesz = strlen (name) + 1;
d4c88bbb 10999
a39f3346 11000 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 11001
a50b1753 11002 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
11003 if (buf == NULL)
11004 return buf;
a39f3346 11005 dest = buf + *bufsiz;
7c76fa91
MS
11006 *bufsiz += newspace;
11007 xnp = (Elf_External_Note *) dest;
11008 H_PUT_32 (abfd, namesz, xnp->namesz);
11009 H_PUT_32 (abfd, size, xnp->descsz);
11010 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
11011 dest = xnp->name;
11012 if (name != NULL)
11013 {
11014 memcpy (dest, name, namesz);
11015 dest += namesz;
a39f3346 11016 while (namesz & 3)
d4c88bbb
AM
11017 {
11018 *dest++ = '\0';
a39f3346 11019 ++namesz;
d4c88bbb
AM
11020 }
11021 }
11022 memcpy (dest, input, size);
a39f3346
AM
11023 dest += size;
11024 while (size & 3)
11025 {
11026 *dest++ = '\0';
11027 ++size;
11028 }
11029 return buf;
7c76fa91
MS
11030}
11031
602f1657
AM
11032/* gcc-8 warns (*) on all the strncpy calls in this function about
11033 possible string truncation. The "truncation" is not a bug. We
11034 have an external representation of structs with fields that are not
11035 necessarily NULL terminated and corresponding internal
11036 representation fields that are one larger so that they can always
11037 be NULL terminated.
11038 gcc versions between 4.2 and 4.6 do not allow pragma control of
11039 diagnostics inside functions, giving a hard error if you try to use
11040 the finer control available with later versions.
11041 gcc prior to 4.2 warns about diagnostic push and pop.
11042 gcc-5, gcc-6 and gcc-7 warn that -Wstringop-truncation is unknown,
11043 unless you also add #pragma GCC diagnostic ignored "-Wpragma".
11044 (*) Depending on your system header files! */
d99b4b92 11045#if GCC_VERSION >= 8000
602f1657
AM
11046# pragma GCC diagnostic push
11047# pragma GCC diagnostic ignored "-Wstringop-truncation"
d99b4b92 11048#endif
7c76fa91 11049char *
217aa764
AM
11050elfcore_write_prpsinfo (bfd *abfd,
11051 char *buf,
11052 int *bufsiz,
11053 const char *fname,
11054 const char *psargs)
7c76fa91 11055{
183e98be
AM
11056 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11057
11058 if (bed->elf_backend_write_core_note != NULL)
11059 {
11060 char *ret;
11061 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11062 NT_PRPSINFO, fname, psargs);
11063 if (ret != NULL)
11064 return ret;
11065 }
7c76fa91 11066
1f20dca5 11067#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
602f1657 11068# if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
183e98be
AM
11069 if (bed->s->elfclass == ELFCLASS32)
11070 {
602f1657 11071# if defined (HAVE_PSINFO32_T)
183e98be
AM
11072 psinfo32_t data;
11073 int note_type = NT_PSINFO;
602f1657 11074# else
183e98be
AM
11075 prpsinfo32_t data;
11076 int note_type = NT_PRPSINFO;
602f1657 11077# endif
183e98be
AM
11078
11079 memset (&data, 0, sizeof (data));
11080 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11081 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11082 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 11083 "CORE", note_type, &data, sizeof (data));
183e98be
AM
11084 }
11085 else
602f1657 11086# endif
183e98be 11087 {
602f1657 11088# if defined (HAVE_PSINFO_T)
183e98be
AM
11089 psinfo_t data;
11090 int note_type = NT_PSINFO;
602f1657 11091# else
183e98be
AM
11092 prpsinfo_t data;
11093 int note_type = NT_PRPSINFO;
602f1657 11094# endif
7c76fa91 11095
183e98be
AM
11096 memset (&data, 0, sizeof (data));
11097 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11098 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11099 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 11100 "CORE", note_type, &data, sizeof (data));
183e98be 11101 }
7c76fa91
MS
11102#endif /* PSINFO_T or PRPSINFO_T */
11103
1f20dca5
UW
11104 free (buf);
11105 return NULL;
11106}
d99b4b92 11107#if GCC_VERSION >= 8000
602f1657 11108# pragma GCC diagnostic pop
d99b4b92 11109#endif
1f20dca5 11110
70a38d42
SDJ
11111char *
11112elfcore_write_linux_prpsinfo32
11113 (bfd *abfd, char *buf, int *bufsiz,
11114 const struct elf_internal_linux_prpsinfo *prpsinfo)
11115{
a2f63b2e
MR
11116 if (get_elf_backend_data (abfd)->linux_prpsinfo32_ugid16)
11117 {
11118 struct elf_external_linux_prpsinfo32_ugid16 data;
11119
11120 swap_linux_prpsinfo32_ugid16_out (abfd, prpsinfo, &data);
11121 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11122 &data, sizeof (data));
11123 }
11124 else
11125 {
11126 struct elf_external_linux_prpsinfo32_ugid32 data;
70a38d42 11127
a2f63b2e
MR
11128 swap_linux_prpsinfo32_ugid32_out (abfd, prpsinfo, &data);
11129 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11130 &data, sizeof (data));
11131 }
70a38d42
SDJ
11132}
11133
11134char *
11135elfcore_write_linux_prpsinfo64
11136 (bfd *abfd, char *buf, int *bufsiz,
11137 const struct elf_internal_linux_prpsinfo *prpsinfo)
11138{
3c9a7b0d
MR
11139 if (get_elf_backend_data (abfd)->linux_prpsinfo64_ugid16)
11140 {
11141 struct elf_external_linux_prpsinfo64_ugid16 data;
11142
11143 swap_linux_prpsinfo64_ugid16_out (abfd, prpsinfo, &data);
11144 return elfcore_write_note (abfd, buf, bufsiz,
11145 "CORE", NT_PRPSINFO, &data, sizeof (data));
11146 }
11147 else
11148 {
11149 struct elf_external_linux_prpsinfo64_ugid32 data;
70a38d42 11150
3c9a7b0d
MR
11151 swap_linux_prpsinfo64_ugid32_out (abfd, prpsinfo, &data);
11152 return elfcore_write_note (abfd, buf, bufsiz,
11153 "CORE", NT_PRPSINFO, &data, sizeof (data));
11154 }
70a38d42
SDJ
11155}
11156
7c76fa91 11157char *
217aa764
AM
11158elfcore_write_prstatus (bfd *abfd,
11159 char *buf,
11160 int *bufsiz,
11161 long pid,
11162 int cursig,
11163 const void *gregs)
7c76fa91 11164{
183e98be 11165 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 11166
183e98be
AM
11167 if (bed->elf_backend_write_core_note != NULL)
11168 {
11169 char *ret;
11170 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11171 NT_PRSTATUS,
11172 pid, cursig, gregs);
11173 if (ret != NULL)
11174 return ret;
11175 }
11176
1f20dca5 11177#if defined (HAVE_PRSTATUS_T)
183e98be
AM
11178#if defined (HAVE_PRSTATUS32_T)
11179 if (bed->s->elfclass == ELFCLASS32)
11180 {
11181 prstatus32_t prstat;
11182
11183 memset (&prstat, 0, sizeof (prstat));
11184 prstat.pr_pid = pid;
11185 prstat.pr_cursig = cursig;
11186 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 11187 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
11188 NT_PRSTATUS, &prstat, sizeof (prstat));
11189 }
11190 else
11191#endif
11192 {
11193 prstatus_t prstat;
11194
11195 memset (&prstat, 0, sizeof (prstat));
11196 prstat.pr_pid = pid;
11197 prstat.pr_cursig = cursig;
11198 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 11199 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
11200 NT_PRSTATUS, &prstat, sizeof (prstat));
11201 }
7c76fa91
MS
11202#endif /* HAVE_PRSTATUS_T */
11203
1f20dca5
UW
11204 free (buf);
11205 return NULL;
11206}
11207
51316059
MS
11208#if defined (HAVE_LWPSTATUS_T)
11209char *
217aa764
AM
11210elfcore_write_lwpstatus (bfd *abfd,
11211 char *buf,
11212 int *bufsiz,
11213 long pid,
11214 int cursig,
11215 const void *gregs)
51316059
MS
11216{
11217 lwpstatus_t lwpstat;
183e98be 11218 const char *note_name = "CORE";
51316059
MS
11219
11220 memset (&lwpstat, 0, sizeof (lwpstat));
11221 lwpstat.pr_lwpid = pid >> 16;
11222 lwpstat.pr_cursig = cursig;
11223#if defined (HAVE_LWPSTATUS_T_PR_REG)
d1e8523e 11224 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
51316059
MS
11225#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
11226#if !defined(gregs)
11227 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
11228 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
11229#else
11230 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
11231 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
11232#endif
11233#endif
47d9a591 11234 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
11235 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
11236}
11237#endif /* HAVE_LWPSTATUS_T */
11238
7c76fa91
MS
11239#if defined (HAVE_PSTATUS_T)
11240char *
217aa764
AM
11241elfcore_write_pstatus (bfd *abfd,
11242 char *buf,
11243 int *bufsiz,
11244 long pid,
6c10990d
NC
11245 int cursig ATTRIBUTE_UNUSED,
11246 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 11247{
183e98be
AM
11248 const char *note_name = "CORE";
11249#if defined (HAVE_PSTATUS32_T)
11250 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 11251
183e98be
AM
11252 if (bed->s->elfclass == ELFCLASS32)
11253 {
11254 pstatus32_t pstat;
11255
11256 memset (&pstat, 0, sizeof (pstat));
11257 pstat.pr_pid = pid & 0xffff;
11258 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11259 NT_PSTATUS, &pstat, sizeof (pstat));
11260 return buf;
11261 }
11262 else
11263#endif
11264 {
11265 pstatus_t pstat;
11266
11267 memset (&pstat, 0, sizeof (pstat));
11268 pstat.pr_pid = pid & 0xffff;
11269 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11270 NT_PSTATUS, &pstat, sizeof (pstat));
11271 return buf;
11272 }
7c76fa91
MS
11273}
11274#endif /* HAVE_PSTATUS_T */
11275
11276char *
217aa764
AM
11277elfcore_write_prfpreg (bfd *abfd,
11278 char *buf,
11279 int *bufsiz,
11280 const void *fpregs,
11281 int size)
7c76fa91 11282{
183e98be 11283 const char *note_name = "CORE";
47d9a591 11284 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
11285 note_name, NT_FPREGSET, fpregs, size);
11286}
11287
11288char *
217aa764
AM
11289elfcore_write_prxfpreg (bfd *abfd,
11290 char *buf,
11291 int *bufsiz,
11292 const void *xfpregs,
11293 int size)
7c76fa91
MS
11294{
11295 char *note_name = "LINUX";
47d9a591 11296 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
11297 note_name, NT_PRXFPREG, xfpregs, size);
11298}
11299
4339cae0
L
11300char *
11301elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
11302 const void *xfpregs, int size)
11303{
97de3545
JB
11304 char *note_name;
11305 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
11306 note_name = "FreeBSD";
11307 else
11308 note_name = "LINUX";
4339cae0
L
11309 return elfcore_write_note (abfd, buf, bufsiz,
11310 note_name, NT_X86_XSTATE, xfpregs, size);
11311}
11312
97753bd5
AM
11313char *
11314elfcore_write_ppc_vmx (bfd *abfd,
11315 char *buf,
11316 int *bufsiz,
11317 const void *ppc_vmx,
11318 int size)
11319{
11320 char *note_name = "LINUX";
11321 return elfcore_write_note (abfd, buf, bufsiz,
11322 note_name, NT_PPC_VMX, ppc_vmx, size);
11323}
11324
89eeb0bc
LM
11325char *
11326elfcore_write_ppc_vsx (bfd *abfd,
07d6d2b8
AM
11327 char *buf,
11328 int *bufsiz,
11329 const void *ppc_vsx,
11330 int size)
89eeb0bc
LM
11331{
11332 char *note_name = "LINUX";
11333 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11334 note_name, NT_PPC_VSX, ppc_vsx, size);
89eeb0bc
LM
11335}
11336
cb2366c1
EBM
11337char *
11338elfcore_write_ppc_tar (bfd *abfd,
4b24dd1a
AM
11339 char *buf,
11340 int *bufsiz,
11341 const void *ppc_tar,
11342 int size)
cb2366c1
EBM
11343{
11344 char *note_name = "LINUX";
11345 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11346 note_name, NT_PPC_TAR, ppc_tar, size);
cb2366c1
EBM
11347}
11348
11349char *
11350elfcore_write_ppc_ppr (bfd *abfd,
4b24dd1a
AM
11351 char *buf,
11352 int *bufsiz,
11353 const void *ppc_ppr,
11354 int size)
cb2366c1
EBM
11355{
11356 char *note_name = "LINUX";
11357 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11358 note_name, NT_PPC_PPR, ppc_ppr, size);
cb2366c1
EBM
11359}
11360
11361char *
11362elfcore_write_ppc_dscr (bfd *abfd,
4b24dd1a
AM
11363 char *buf,
11364 int *bufsiz,
11365 const void *ppc_dscr,
11366 int size)
cb2366c1
EBM
11367{
11368 char *note_name = "LINUX";
11369 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11370 note_name, NT_PPC_DSCR, ppc_dscr, size);
cb2366c1
EBM
11371}
11372
11373char *
11374elfcore_write_ppc_ebb (bfd *abfd,
4b24dd1a
AM
11375 char *buf,
11376 int *bufsiz,
11377 const void *ppc_ebb,
11378 int size)
cb2366c1
EBM
11379{
11380 char *note_name = "LINUX";
11381 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11382 note_name, NT_PPC_EBB, ppc_ebb, size);
cb2366c1
EBM
11383}
11384
11385char *
11386elfcore_write_ppc_pmu (bfd *abfd,
4b24dd1a
AM
11387 char *buf,
11388 int *bufsiz,
11389 const void *ppc_pmu,
11390 int size)
cb2366c1
EBM
11391{
11392 char *note_name = "LINUX";
11393 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11394 note_name, NT_PPC_PMU, ppc_pmu, size);
cb2366c1
EBM
11395}
11396
11397char *
11398elfcore_write_ppc_tm_cgpr (bfd *abfd,
4b24dd1a
AM
11399 char *buf,
11400 int *bufsiz,
11401 const void *ppc_tm_cgpr,
11402 int size)
cb2366c1
EBM
11403{
11404 char *note_name = "LINUX";
11405 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11406 note_name, NT_PPC_TM_CGPR, ppc_tm_cgpr, size);
cb2366c1
EBM
11407}
11408
11409char *
11410elfcore_write_ppc_tm_cfpr (bfd *abfd,
4b24dd1a
AM
11411 char *buf,
11412 int *bufsiz,
11413 const void *ppc_tm_cfpr,
11414 int size)
cb2366c1
EBM
11415{
11416 char *note_name = "LINUX";
11417 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11418 note_name, NT_PPC_TM_CFPR, ppc_tm_cfpr, size);
cb2366c1
EBM
11419}
11420
11421char *
11422elfcore_write_ppc_tm_cvmx (bfd *abfd,
4b24dd1a
AM
11423 char *buf,
11424 int *bufsiz,
11425 const void *ppc_tm_cvmx,
11426 int size)
cb2366c1
EBM
11427{
11428 char *note_name = "LINUX";
11429 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11430 note_name, NT_PPC_TM_CVMX, ppc_tm_cvmx, size);
cb2366c1
EBM
11431}
11432
11433char *
11434elfcore_write_ppc_tm_cvsx (bfd *abfd,
4b24dd1a
AM
11435 char *buf,
11436 int *bufsiz,
11437 const void *ppc_tm_cvsx,
11438 int size)
cb2366c1
EBM
11439{
11440 char *note_name = "LINUX";
11441 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11442 note_name, NT_PPC_TM_CVSX, ppc_tm_cvsx, size);
cb2366c1
EBM
11443}
11444
11445char *
11446elfcore_write_ppc_tm_spr (bfd *abfd,
4b24dd1a
AM
11447 char *buf,
11448 int *bufsiz,
11449 const void *ppc_tm_spr,
11450 int size)
cb2366c1
EBM
11451{
11452 char *note_name = "LINUX";
11453 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11454 note_name, NT_PPC_TM_SPR, ppc_tm_spr, size);
cb2366c1
EBM
11455}
11456
11457char *
11458elfcore_write_ppc_tm_ctar (bfd *abfd,
4b24dd1a
AM
11459 char *buf,
11460 int *bufsiz,
11461 const void *ppc_tm_ctar,
11462 int size)
cb2366c1
EBM
11463{
11464 char *note_name = "LINUX";
11465 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11466 note_name, NT_PPC_TM_CTAR, ppc_tm_ctar, size);
cb2366c1
EBM
11467}
11468
11469char *
11470elfcore_write_ppc_tm_cppr (bfd *abfd,
4b24dd1a
AM
11471 char *buf,
11472 int *bufsiz,
11473 const void *ppc_tm_cppr,
11474 int size)
cb2366c1
EBM
11475{
11476 char *note_name = "LINUX";
11477 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11478 note_name, NT_PPC_TM_CPPR, ppc_tm_cppr, size);
cb2366c1
EBM
11479}
11480
11481char *
11482elfcore_write_ppc_tm_cdscr (bfd *abfd,
4b24dd1a
AM
11483 char *buf,
11484 int *bufsiz,
11485 const void *ppc_tm_cdscr,
11486 int size)
cb2366c1
EBM
11487{
11488 char *note_name = "LINUX";
11489 return elfcore_write_note (abfd, buf, bufsiz,
4b24dd1a 11490 note_name, NT_PPC_TM_CDSCR, ppc_tm_cdscr, size);
cb2366c1
EBM
11491}
11492
0675e188
UW
11493static char *
11494elfcore_write_s390_high_gprs (bfd *abfd,
11495 char *buf,
11496 int *bufsiz,
11497 const void *s390_high_gprs,
11498 int size)
11499{
11500 char *note_name = "LINUX";
11501 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11502 note_name, NT_S390_HIGH_GPRS,
0675e188
UW
11503 s390_high_gprs, size);
11504}
11505
d7eeb400
MS
11506char *
11507elfcore_write_s390_timer (bfd *abfd,
07d6d2b8
AM
11508 char *buf,
11509 int *bufsiz,
11510 const void *s390_timer,
11511 int size)
d7eeb400
MS
11512{
11513 char *note_name = "LINUX";
11514 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11515 note_name, NT_S390_TIMER, s390_timer, size);
d7eeb400
MS
11516}
11517
11518char *
11519elfcore_write_s390_todcmp (bfd *abfd,
07d6d2b8
AM
11520 char *buf,
11521 int *bufsiz,
11522 const void *s390_todcmp,
11523 int size)
d7eeb400
MS
11524{
11525 char *note_name = "LINUX";
11526 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11527 note_name, NT_S390_TODCMP, s390_todcmp, size);
d7eeb400
MS
11528}
11529
11530char *
11531elfcore_write_s390_todpreg (bfd *abfd,
07d6d2b8
AM
11532 char *buf,
11533 int *bufsiz,
11534 const void *s390_todpreg,
11535 int size)
d7eeb400
MS
11536{
11537 char *note_name = "LINUX";
11538 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11539 note_name, NT_S390_TODPREG, s390_todpreg, size);
d7eeb400
MS
11540}
11541
11542char *
11543elfcore_write_s390_ctrs (bfd *abfd,
07d6d2b8
AM
11544 char *buf,
11545 int *bufsiz,
11546 const void *s390_ctrs,
11547 int size)
d7eeb400
MS
11548{
11549 char *note_name = "LINUX";
11550 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11551 note_name, NT_S390_CTRS, s390_ctrs, size);
d7eeb400
MS
11552}
11553
11554char *
11555elfcore_write_s390_prefix (bfd *abfd,
07d6d2b8
AM
11556 char *buf,
11557 int *bufsiz,
11558 const void *s390_prefix,
11559 int size)
d7eeb400
MS
11560{
11561 char *note_name = "LINUX";
11562 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11563 note_name, NT_S390_PREFIX, s390_prefix, size);
d7eeb400
MS
11564}
11565
355b81d9
UW
11566char *
11567elfcore_write_s390_last_break (bfd *abfd,
11568 char *buf,
11569 int *bufsiz,
11570 const void *s390_last_break,
11571 int size)
11572{
11573 char *note_name = "LINUX";
11574 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11575 note_name, NT_S390_LAST_BREAK,
355b81d9
UW
11576 s390_last_break, size);
11577}
11578
11579char *
11580elfcore_write_s390_system_call (bfd *abfd,
11581 char *buf,
11582 int *bufsiz,
11583 const void *s390_system_call,
11584 int size)
11585{
11586 char *note_name = "LINUX";
11587 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11588 note_name, NT_S390_SYSTEM_CALL,
355b81d9
UW
11589 s390_system_call, size);
11590}
11591
abb3f6cc
NC
11592char *
11593elfcore_write_s390_tdb (bfd *abfd,
11594 char *buf,
11595 int *bufsiz,
11596 const void *s390_tdb,
11597 int size)
11598{
11599 char *note_name = "LINUX";
11600 return elfcore_write_note (abfd, buf, bufsiz,
07d6d2b8 11601 note_name, NT_S390_TDB, s390_tdb, size);
abb3f6cc
NC
11602}
11603
4ef9f41a
AA
11604char *
11605elfcore_write_s390_vxrs_low (bfd *abfd,
11606 char *buf,
11607 int *bufsiz,
11608 const void *s390_vxrs_low,
11609 int size)
11610{
11611 char *note_name = "LINUX";
11612 return elfcore_write_note (abfd, buf, bufsiz,
11613 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
11614}
11615
11616char *
11617elfcore_write_s390_vxrs_high (bfd *abfd,
11618 char *buf,
11619 int *bufsiz,
11620 const void *s390_vxrs_high,
11621 int size)
11622{
11623 char *note_name = "LINUX";
11624 return elfcore_write_note (abfd, buf, bufsiz,
11625 note_name, NT_S390_VXRS_HIGH,
11626 s390_vxrs_high, size);
11627}
11628
88ab90e8
AA
11629char *
11630elfcore_write_s390_gs_cb (bfd *abfd,
11631 char *buf,
11632 int *bufsiz,
11633 const void *s390_gs_cb,
11634 int size)
11635{
11636 char *note_name = "LINUX";
11637 return elfcore_write_note (abfd, buf, bufsiz,
11638 note_name, NT_S390_GS_CB,
11639 s390_gs_cb, size);
11640}
11641
11642char *
11643elfcore_write_s390_gs_bc (bfd *abfd,
11644 char *buf,
11645 int *bufsiz,
11646 const void *s390_gs_bc,
11647 int size)
11648{
11649 char *note_name = "LINUX";
11650 return elfcore_write_note (abfd, buf, bufsiz,
11651 note_name, NT_S390_GS_BC,
11652 s390_gs_bc, size);
11653}
11654
faa9a424
UW
11655char *
11656elfcore_write_arm_vfp (bfd *abfd,
11657 char *buf,
11658 int *bufsiz,
11659 const void *arm_vfp,
11660 int size)
11661{
11662 char *note_name = "LINUX";
11663 return elfcore_write_note (abfd, buf, bufsiz,
11664 note_name, NT_ARM_VFP, arm_vfp, size);
11665}
11666
652451f8
YZ
11667char *
11668elfcore_write_aarch_tls (bfd *abfd,
11669 char *buf,
11670 int *bufsiz,
11671 const void *aarch_tls,
11672 int size)
11673{
11674 char *note_name = "LINUX";
11675 return elfcore_write_note (abfd, buf, bufsiz,
11676 note_name, NT_ARM_TLS, aarch_tls, size);
11677}
11678
11679char *
11680elfcore_write_aarch_hw_break (bfd *abfd,
11681 char *buf,
11682 int *bufsiz,
11683 const void *aarch_hw_break,
11684 int size)
11685{
11686 char *note_name = "LINUX";
11687 return elfcore_write_note (abfd, buf, bufsiz,
11688 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
11689}
11690
11691char *
11692elfcore_write_aarch_hw_watch (bfd *abfd,
11693 char *buf,
11694 int *bufsiz,
11695 const void *aarch_hw_watch,
11696 int size)
11697{
11698 char *note_name = "LINUX";
11699 return elfcore_write_note (abfd, buf, bufsiz,
11700 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
11701}
11702
ad1cc4e4
AH
11703char *
11704elfcore_write_aarch_sve (bfd *abfd,
11705 char *buf,
11706 int *bufsiz,
11707 const void *aarch_sve,
11708 int size)
11709{
11710 char *note_name = "LINUX";
11711 return elfcore_write_note (abfd, buf, bufsiz,
11712 note_name, NT_ARM_SVE, aarch_sve, size);
11713}
11714
e6c3b5bf
AH
11715char *
11716elfcore_write_aarch_pauth (bfd *abfd,
11717 char *buf,
11718 int *bufsiz,
11719 const void *aarch_pauth,
11720 int size)
11721{
11722 char *note_name = "LINUX";
11723 return elfcore_write_note (abfd, buf, bufsiz,
11724 note_name, NT_ARM_PAC_MASK, aarch_pauth, size);
11725}
11726
bb864ac1
CES
11727char *
11728elfcore_write_register_note (bfd *abfd,
11729 char *buf,
11730 int *bufsiz,
11731 const char *section,
11732 const void *data,
11733 int size)
11734{
11735 if (strcmp (section, ".reg2") == 0)
11736 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
11737 if (strcmp (section, ".reg-xfp") == 0)
11738 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
11739 if (strcmp (section, ".reg-xstate") == 0)
11740 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
11741 if (strcmp (section, ".reg-ppc-vmx") == 0)
11742 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
11743 if (strcmp (section, ".reg-ppc-vsx") == 0)
11744 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
cb2366c1
EBM
11745 if (strcmp (section, ".reg-ppc-tar") == 0)
11746 return elfcore_write_ppc_tar (abfd, buf, bufsiz, data, size);
11747 if (strcmp (section, ".reg-ppc-ppr") == 0)
11748 return elfcore_write_ppc_ppr (abfd, buf, bufsiz, data, size);
11749 if (strcmp (section, ".reg-ppc-dscr") == 0)
11750 return elfcore_write_ppc_dscr (abfd, buf, bufsiz, data, size);
11751 if (strcmp (section, ".reg-ppc-ebb") == 0)
11752 return elfcore_write_ppc_ebb (abfd, buf, bufsiz, data, size);
11753 if (strcmp (section, ".reg-ppc-pmu") == 0)
11754 return elfcore_write_ppc_pmu (abfd, buf, bufsiz, data, size);
11755 if (strcmp (section, ".reg-ppc-tm-cgpr") == 0)
11756 return elfcore_write_ppc_tm_cgpr (abfd, buf, bufsiz, data, size);
11757 if (strcmp (section, ".reg-ppc-tm-cfpr") == 0)
11758 return elfcore_write_ppc_tm_cfpr (abfd, buf, bufsiz, data, size);
11759 if (strcmp (section, ".reg-ppc-tm-cvmx") == 0)
11760 return elfcore_write_ppc_tm_cvmx (abfd, buf, bufsiz, data, size);
11761 if (strcmp (section, ".reg-ppc-tm-cvsx") == 0)
11762 return elfcore_write_ppc_tm_cvsx (abfd, buf, bufsiz, data, size);
11763 if (strcmp (section, ".reg-ppc-tm-spr") == 0)
11764 return elfcore_write_ppc_tm_spr (abfd, buf, bufsiz, data, size);
11765 if (strcmp (section, ".reg-ppc-tm-ctar") == 0)
11766 return elfcore_write_ppc_tm_ctar (abfd, buf, bufsiz, data, size);
11767 if (strcmp (section, ".reg-ppc-tm-cppr") == 0)
11768 return elfcore_write_ppc_tm_cppr (abfd, buf, bufsiz, data, size);
11769 if (strcmp (section, ".reg-ppc-tm-cdscr") == 0)
11770 return elfcore_write_ppc_tm_cdscr (abfd, buf, bufsiz, data, size);
0675e188
UW
11771 if (strcmp (section, ".reg-s390-high-gprs") == 0)
11772 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
11773 if (strcmp (section, ".reg-s390-timer") == 0)
11774 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
11775 if (strcmp (section, ".reg-s390-todcmp") == 0)
11776 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
11777 if (strcmp (section, ".reg-s390-todpreg") == 0)
11778 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
11779 if (strcmp (section, ".reg-s390-ctrs") == 0)
11780 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
11781 if (strcmp (section, ".reg-s390-prefix") == 0)
11782 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
355b81d9
UW
11783 if (strcmp (section, ".reg-s390-last-break") == 0)
11784 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
11785 if (strcmp (section, ".reg-s390-system-call") == 0)
11786 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
abb3f6cc
NC
11787 if (strcmp (section, ".reg-s390-tdb") == 0)
11788 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
4ef9f41a
AA
11789 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
11790 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
11791 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
11792 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
88ab90e8
AA
11793 if (strcmp (section, ".reg-s390-gs-cb") == 0)
11794 return elfcore_write_s390_gs_cb (abfd, buf, bufsiz, data, size);
11795 if (strcmp (section, ".reg-s390-gs-bc") == 0)
11796 return elfcore_write_s390_gs_bc (abfd, buf, bufsiz, data, size);
faa9a424
UW
11797 if (strcmp (section, ".reg-arm-vfp") == 0)
11798 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
652451f8
YZ
11799 if (strcmp (section, ".reg-aarch-tls") == 0)
11800 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
11801 if (strcmp (section, ".reg-aarch-hw-break") == 0)
11802 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
11803 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
11804 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
ad1cc4e4
AH
11805 if (strcmp (section, ".reg-aarch-sve") == 0)
11806 return elfcore_write_aarch_sve (abfd, buf, bufsiz, data, size);
e6c3b5bf
AH
11807 if (strcmp (section, ".reg-aarch-pauth") == 0)
11808 return elfcore_write_aarch_pauth (abfd, buf, bufsiz, data, size);
bb864ac1
CES
11809 return NULL;
11810}
11811
b34976b6 11812static bfd_boolean
276da9b3
L
11813elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset,
11814 size_t align)
252b5132 11815{
c044fabd 11816 char *p;
252b5132 11817
276da9b3
L
11818 /* NB: CORE PT_NOTE segments may have p_align values of 0 or 1.
11819 gABI specifies that PT_NOTE alignment should be aligned to 4
11820 bytes for 32-bit objects and to 8 bytes for 64-bit objects. If
11821 align is less than 4, we use 4 byte alignment. */
11822 if (align < 4)
11823 align = 4;
ef135d43
NC
11824 if (align != 4 && align != 8)
11825 return FALSE;
276da9b3 11826
252b5132
RH
11827 p = buf;
11828 while (p < buf + size)
11829 {
c044fabd 11830 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
11831 Elf_Internal_Note in;
11832
baea7ef1
AM
11833 if (offsetof (Elf_External_Note, name) > buf - p + size)
11834 return FALSE;
11835
dc810e39 11836 in.type = H_GET_32 (abfd, xnp->type);
252b5132 11837
dc810e39 11838 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 11839 in.namedata = xnp->name;
baea7ef1
AM
11840 if (in.namesz > buf - in.namedata + size)
11841 return FALSE;
252b5132 11842
dc810e39 11843 in.descsz = H_GET_32 (abfd, xnp->descsz);
276da9b3 11844 in.descdata = p + ELF_NOTE_DESC_OFFSET (in.namesz, align);
252b5132 11845 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
11846 if (in.descsz != 0
11847 && (in.descdata >= buf + size
11848 || in.descsz > buf - in.descdata + size))
11849 return FALSE;
252b5132 11850
718175fa 11851 switch (bfd_get_format (abfd))
07d6d2b8 11852 {
718175fa
JK
11853 default:
11854 return TRUE;
11855
11856 case bfd_core:
f64e188b 11857 {
8acbedd6 11858#define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
f64e188b 11859 struct
718175fa 11860 {
f64e188b 11861 const char * string;
8acbedd6 11862 size_t len;
f64e188b 11863 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
718175fa 11864 }
f64e188b 11865 grokers[] =
b15fa79e 11866 {
8acbedd6 11867 GROKER_ELEMENT ("", elfcore_grok_note),
aa1ed4a9 11868 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
8acbedd6
KS
11869 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
11870 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
11871 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
864619bb
KS
11872 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note),
11873 GROKER_ELEMENT ("GNU", elfobj_grok_gnu_note)
f64e188b 11874 };
8acbedd6 11875#undef GROKER_ELEMENT
f64e188b
NC
11876 int i;
11877
11878 for (i = ARRAY_SIZE (grokers); i--;)
8acbedd6
KS
11879 {
11880 if (in.namesz >= grokers[i].len
11881 && strncmp (in.namedata, grokers[i].string,
11882 grokers[i].len) == 0)
11883 {
11884 if (! grokers[i].func (abfd, & in))
11885 return FALSE;
11886 break;
11887 }
11888 }
f64e188b
NC
11889 break;
11890 }
718175fa
JK
11891
11892 case bfd_object:
11893 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
11894 {
11895 if (! elfobj_grok_gnu_note (abfd, &in))
11896 return FALSE;
11897 }
e21e5835
NC
11898 else if (in.namesz == sizeof "stapsdt"
11899 && strcmp (in.namedata, "stapsdt") == 0)
11900 {
11901 if (! elfobj_grok_stapsdt_note (abfd, &in))
11902 return FALSE;
11903 }
718175fa 11904 break;
08a40648 11905 }
252b5132 11906
276da9b3 11907 p += ELF_NOTE_NEXT_OFFSET (in.namesz, in.descsz, align);
252b5132
RH
11908 }
11909
718175fa
JK
11910 return TRUE;
11911}
11912
864619bb 11913bfd_boolean
276da9b3
L
11914elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size,
11915 size_t align)
718175fa
JK
11916{
11917 char *buf;
11918
957e1fc1 11919 if (size == 0 || (size + 1) == 0)
718175fa
JK
11920 return TRUE;
11921
11922 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
11923 return FALSE;
11924
2bb3687b 11925 buf = (char *) _bfd_malloc_and_read (abfd, size + 1, size);
718175fa
JK
11926 if (buf == NULL)
11927 return FALSE;
11928
f64e188b
NC
11929 /* PR 17512: file: ec08f814
11930 0-termintate the buffer so that string searches will not overflow. */
11931 buf[size] = 0;
11932
2bb3687b 11933 if (!elf_parse_notes (abfd, buf, size, offset, align))
718175fa
JK
11934 {
11935 free (buf);
11936 return FALSE;
11937 }
11938
252b5132 11939 free (buf);
b34976b6 11940 return TRUE;
252b5132 11941}
98d8431c
JB
11942\f
11943/* Providing external access to the ELF program header table. */
11944
11945/* Return an upper bound on the number of bytes required to store a
11946 copy of ABFD's program header table entries. Return -1 if an error
11947 occurs; bfd_get_error will return an appropriate code. */
c044fabd 11948
98d8431c 11949long
217aa764 11950bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
11951{
11952 if (abfd->xvec->flavour != bfd_target_elf_flavour)
11953 {
11954 bfd_set_error (bfd_error_wrong_format);
11955 return -1;
11956 }
11957
936e320b 11958 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
11959}
11960
98d8431c
JB
11961/* Copy ABFD's program header table entries to *PHDRS. The entries
11962 will be stored as an array of Elf_Internal_Phdr structures, as
11963 defined in include/elf/internal.h. To find out how large the
11964 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
11965
11966 Return the number of program header table entries read, or -1 if an
11967 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 11968
98d8431c 11969int
217aa764 11970bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
11971{
11972 int num_phdrs;
11973
11974 if (abfd->xvec->flavour != bfd_target_elf_flavour)
11975 {
11976 bfd_set_error (bfd_error_wrong_format);
11977 return -1;
11978 }
11979
11980 num_phdrs = elf_elfheader (abfd)->e_phnum;
01bcaf63
TT
11981 if (num_phdrs != 0)
11982 memcpy (phdrs, elf_tdata (abfd)->phdr,
11983 num_phdrs * sizeof (Elf_Internal_Phdr));
98d8431c
JB
11984
11985 return num_phdrs;
11986}
ae4221d7 11987
db6751f2 11988enum elf_reloc_type_class
7e612e98
AM
11989_bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
11990 const asection *rel_sec ATTRIBUTE_UNUSED,
11991 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
11992{
11993 return reloc_class_normal;
11994}
f8df10f4 11995
47d9a591 11996/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
11997 relocation against a local symbol. */
11998
11999bfd_vma
217aa764
AM
12000_bfd_elf_rela_local_sym (bfd *abfd,
12001 Elf_Internal_Sym *sym,
8517fae7 12002 asection **psec,
217aa764 12003 Elf_Internal_Rela *rel)
f8df10f4 12004{
8517fae7 12005 asection *sec = *psec;
f8df10f4
JJ
12006 bfd_vma relocation;
12007
6835821b
AM
12008 relocation = (sec->output_section->vma
12009 + sec->output_offset
12010 + sym->st_value);
f8df10f4 12011 if ((sec->flags & SEC_MERGE)
c629eae0 12012 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 12013 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
f8df10f4 12014 {
f8df10f4 12015 rel->r_addend =
8517fae7 12016 _bfd_merged_section_offset (abfd, psec,
65765700 12017 elf_section_data (sec)->sec_info,
753731ee
AM
12018 sym->st_value + rel->r_addend);
12019 if (sec != *psec)
12020 {
12021 /* If we have changed the section, and our original section is
12022 marked with SEC_EXCLUDE, it means that the original
12023 SEC_MERGE section has been completely subsumed in some
12024 other SEC_MERGE section. In this case, we need to leave
12025 some info around for --emit-relocs. */
12026 if ((sec->flags & SEC_EXCLUDE) != 0)
12027 sec->kept_section = *psec;
12028 sec = *psec;
12029 }
8517fae7
AM
12030 rel->r_addend -= relocation;
12031 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
12032 }
12033 return relocation;
12034}
c629eae0
JJ
12035
12036bfd_vma
217aa764
AM
12037_bfd_elf_rel_local_sym (bfd *abfd,
12038 Elf_Internal_Sym *sym,
12039 asection **psec,
12040 bfd_vma addend)
47d9a591 12041{
c629eae0
JJ
12042 asection *sec = *psec;
12043
6835821b 12044 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
c629eae0
JJ
12045 return sym->st_value + addend;
12046
12047 return _bfd_merged_section_offset (abfd, psec,
65765700 12048 elf_section_data (sec)->sec_info,
753731ee 12049 sym->st_value + addend);
c629eae0
JJ
12050}
12051
37b01f6a
DG
12052/* Adjust an address within a section. Given OFFSET within SEC, return
12053 the new offset within the section, based upon changes made to the
12054 section. Returns -1 if the offset is now invalid.
12055 The offset (in abnd out) is in target sized bytes, however big a
12056 byte may be. */
12057
c629eae0 12058bfd_vma
217aa764 12059_bfd_elf_section_offset (bfd *abfd,
92e4ec35 12060 struct bfd_link_info *info,
217aa764
AM
12061 asection *sec,
12062 bfd_vma offset)
c629eae0 12063{
68bfbfcc 12064 switch (sec->sec_info_type)
65765700 12065 {
dbaa2011 12066 case SEC_INFO_TYPE_STABS:
eea6121a
AM
12067 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
12068 offset);
dbaa2011 12069 case SEC_INFO_TYPE_EH_FRAME:
92e4ec35 12070 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
37b01f6a 12071
65765700 12072 default:
310fd250
L
12073 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
12074 {
37b01f6a 12075 /* Reverse the offset. */
310fd250
L
12076 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12077 bfd_size_type address_size = bed->s->arch_size / 8;
37b01f6a
DG
12078
12079 /* address_size and sec->size are in octets. Convert
12080 to bytes before subtracting the original offset. */
61826503 12081 offset = ((sec->size - address_size)
bb294208 12082 / bfd_octets_per_byte (abfd, sec) - offset);
310fd250 12083 }
65765700
JJ
12084 return offset;
12085 }
c629eae0 12086}
3333a7c3
RM
12087\f
12088/* Create a new BFD as if by bfd_openr. Rather than opening a file,
12089 reconstruct an ELF file by reading the segments out of remote memory
12090 based on the ELF file header at EHDR_VMA and the ELF program headers it
12091 points to. If not null, *LOADBASEP is filled in with the difference
12092 between the VMAs from which the segments were read, and the VMAs the
12093 file headers (and hence BFD's idea of each section's VMA) put them at.
12094
12095 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
12096 remote memory at target address VMA into the local buffer at MYADDR; it
12097 should return zero on success or an `errno' code on failure. TEMPL must
12098 be a BFD for an ELF target with the word size and byte order found in
12099 the remote memory. */
12100
12101bfd *
217aa764
AM
12102bfd_elf_bfd_from_remote_memory
12103 (bfd *templ,
12104 bfd_vma ehdr_vma,
f0a5d95a 12105 bfd_size_type size,
217aa764 12106 bfd_vma *loadbasep,
fe78531d 12107 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
3333a7c3
RM
12108{
12109 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
5979d6b6 12110 (templ, ehdr_vma, size, loadbasep, target_read_memory);
3333a7c3 12111}
4c45e5c9
JJ
12112\f
12113long
c9727e01
AM
12114_bfd_elf_get_synthetic_symtab (bfd *abfd,
12115 long symcount ATTRIBUTE_UNUSED,
12116 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 12117 long dynsymcount,
c9727e01
AM
12118 asymbol **dynsyms,
12119 asymbol **ret)
4c45e5c9
JJ
12120{
12121 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12122 asection *relplt;
12123 asymbol *s;
12124 const char *relplt_name;
12125 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
12126 arelent *p;
12127 long count, i, n;
12128 size_t size;
12129 Elf_Internal_Shdr *hdr;
12130 char *names;
12131 asection *plt;
12132
8615f3f2
AM
12133 *ret = NULL;
12134
90e3cdf2
JJ
12135 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
12136 return 0;
12137
8615f3f2
AM
12138 if (dynsymcount <= 0)
12139 return 0;
12140
4c45e5c9
JJ
12141 if (!bed->plt_sym_val)
12142 return 0;
12143
12144 relplt_name = bed->relplt_name;
12145 if (relplt_name == NULL)
d35fd659 12146 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
12147 relplt = bfd_get_section_by_name (abfd, relplt_name);
12148 if (relplt == NULL)
12149 return 0;
12150
12151 hdr = &elf_section_data (relplt)->this_hdr;
12152 if (hdr->sh_link != elf_dynsymtab (abfd)
12153 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
12154 return 0;
12155
12156 plt = bfd_get_section_by_name (abfd, ".plt");
12157 if (plt == NULL)
12158 return 0;
12159
12160 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 12161 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
12162 return -1;
12163
eea6121a 12164 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
12165 size = count * sizeof (asymbol);
12166 p = relplt->relocation;
cb53bf42 12167 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
12168 {
12169 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
12170 if (p->addend != 0)
12171 {
12172#ifdef BFD64
12173 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
12174#else
12175 size += sizeof ("+0x") - 1 + 8;
12176#endif
12177 }
12178 }
4c45e5c9 12179
a50b1753 12180 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
12181 if (s == NULL)
12182 return -1;
12183
12184 names = (char *) (s + count);
12185 p = relplt->relocation;
12186 n = 0;
cb53bf42 12187 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
12188 {
12189 size_t len;
12190 bfd_vma addr;
12191
12192 addr = bed->plt_sym_val (i, plt, p);
12193 if (addr == (bfd_vma) -1)
12194 continue;
12195
12196 *s = **p->sym_ptr_ptr;
65a7a66f
AM
12197 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
12198 we are defining a symbol, ensure one of them is set. */
12199 if ((s->flags & BSF_LOCAL) == 0)
12200 s->flags |= BSF_GLOBAL;
6ba2a415 12201 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
12202 s->section = plt;
12203 s->value = addr - plt->vma;
12204 s->name = names;
8f39ba8e 12205 s->udata.p = NULL;
4c45e5c9
JJ
12206 len = strlen ((*p->sym_ptr_ptr)->name);
12207 memcpy (names, (*p->sym_ptr_ptr)->name, len);
12208 names += len;
041de40d
AM
12209 if (p->addend != 0)
12210 {
1d770845 12211 char buf[30], *a;
d324f6d6 12212
041de40d
AM
12213 memcpy (names, "+0x", sizeof ("+0x") - 1);
12214 names += sizeof ("+0x") - 1;
1d770845
L
12215 bfd_sprintf_vma (abfd, buf, p->addend);
12216 for (a = buf; *a == '0'; ++a)
12217 ;
12218 len = strlen (a);
12219 memcpy (names, a, len);
12220 names += len;
041de40d 12221 }
4c45e5c9
JJ
12222 memcpy (names, "@plt", sizeof ("@plt"));
12223 names += sizeof ("@plt");
8f39ba8e 12224 ++s, ++n;
4c45e5c9
JJ
12225 }
12226
12227 return n;
12228}
3d7f7666 12229
821e6ff6
AM
12230/* It is only used by x86-64 so far.
12231 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
7eacd66b
AM
12232 but current usage would allow all of _bfd_std_section to be zero. */
12233static const asymbol lcomm_sym
12234 = GLOBAL_SYM_INIT ("LARGE_COMMON", &_bfd_elf_large_com_section);
3b22753a 12235asection _bfd_elf_large_com_section
7eacd66b 12236 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, &lcomm_sym,
821e6ff6 12237 "LARGE_COMMON", 0, SEC_IS_COMMON);
ecca9871 12238
cc364be6
AM
12239bfd_boolean
12240_bfd_elf_final_write_processing (bfd *abfd)
06f44071
AM
12241{
12242 Elf_Internal_Ehdr *i_ehdrp; /* ELF file header, internal form. */
d1036acb
L
12243
12244 i_ehdrp = elf_elfheader (abfd);
12245
06f44071
AM
12246 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12247 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23 12248
df3a023b
AM
12249 /* Set the osabi field to ELFOSABI_GNU if the binary contains
12250 SHF_GNU_MBIND sections or symbols of STT_GNU_IFUNC type or
12251 STB_GNU_UNIQUE binding. */
cc364be6
AM
12252 if (elf_tdata (abfd)->has_gnu_osabi != 0)
12253 {
12254 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12255 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
12256 else if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU
12257 && i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_FREEBSD)
12258 {
12259 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind)
12260 _bfd_error_handler (_("GNU_MBIND section is unsupported"));
12261 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_ifunc)
12262 _bfd_error_handler (_("symbol type STT_GNU_IFUNC is unsupported"));
12263 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_unique)
12264 _bfd_error_handler (_("symbol binding STB_GNU_UNIQUE is unsupported"));
9aea1e31 12265 bfd_set_error (bfd_error_sorry);
cc364be6
AM
12266 return FALSE;
12267 }
12268 }
12269 return TRUE;
d1036acb 12270}
fcb93ecf
PB
12271
12272
12273/* Return TRUE for ELF symbol types that represent functions.
12274 This is the default version of this function, which is sufficient for
d8045f23 12275 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
12276
12277bfd_boolean
12278_bfd_elf_is_function_type (unsigned int type)
12279{
d8045f23
NC
12280 return (type == STT_FUNC
12281 || type == STT_GNU_IFUNC);
fcb93ecf 12282}
9f296da3 12283
aef36ac1
AM
12284/* If the ELF symbol SYM might be a function in SEC, return the
12285 function size and set *CODE_OFF to the function's entry point,
12286 otherwise return zero. */
9f296da3 12287
aef36ac1
AM
12288bfd_size_type
12289_bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
12290 bfd_vma *code_off)
9f296da3 12291{
aef36ac1
AM
12292 bfd_size_type size;
12293
ff9e0f5b 12294 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
aef36ac1
AM
12295 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
12296 || sym->section != sec)
12297 return 0;
ff9e0f5b 12298
ff9e0f5b 12299 *code_off = sym->value;
aef36ac1
AM
12300 size = 0;
12301 if (!(sym->flags & BSF_SYNTHETIC))
12302 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
12303 if (size == 0)
12304 size = 1;
12305 return size;
9f296da3 12306}
This page took 2.375103 seconds and 4 git commands to generate.